2024 DDoS-for-Hire Landscape Part 7
1 day ago
Full spectrum technical computer security, malware analysis, exploitation, low and high level security and insecurity research
[main]
version=0.02
aid=30002
sid=0
builddate=4096
rnd=1035525444
knt=1288036792
[inject]
*=cmd.dll
[cmd]
srv=https://rukkeianno .com/;https://86b6b96b .com/;https://kangojjm1 .com/;https://lkaturl71 .com/
wsrv=http://skolewcho .com/;http://jikdooyt0 .com/;http://swltcho81 .com/;http://switcho81 .com/;http://rammyjuke .com/
psrv=http://crj71ki813ck. com/
version=0.15
bsh=51dd2a5137201c031dcc783efb440e975d6807a3
delay=7200
csrv=http://lkckclckli1i .com/
[tasks]
#matt jonkman, re 3fac60b31a7cda96e217c86405fcc48c # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET TROJAN Torpig Related Fake User-Agent (Apache (compatible...))"; flow:established,to_server; content:"User-Agent|3a| Apache (compatible|3b| MSIE 6.0|3b| Windows NT 5.1|3b| SV1)"; http_header; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2010823; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/VIRUS/TROJAN_Torpig; sid:2010823; rev:4;)
Having previously torn apart aspects of Mebroot and Torpig, I figured this would be a fast process, however no Torpig infection could be found, based on the typical indicators as discussed elsewhere and in previous blog entries. Perhaps the signature referred to a "Torpig Related" scenario - meaning not Torpig itself, but a different type of malware that perhaps came down from a Neosploit kit that has often been known to drop Mebroot & Torpig, or another malware that had some other Torpig association.
TDL was easy to find - multiple tools confirmed it's presence. mbr.exe from gmer.net: detected hooks: \Driver\atapi DriverStartIo -> 0x82133999 user != kernel MBR !!! sectors 80293246 (+255): user != kernel Warning: possible TDL4 rootkit infection ! TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
GMER also finds it easily: ---- Disk sectors - GMER 1.0.15 ---- Disk \Device\Harddisk0\DR0 sector 00 (MBR): rootkit-like behavior; TDL4 <-- ROOTKIT !!! Disk \Device\Harddisk0\DR0 sector 10: rootkit-like behavior; Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior; Disk \Device\Harddisk0\DR0 sectors 80292992 (+255): rootkit-like behavior;I did not yet want to "clean" TDL4 from the system but after a variety of reading, I learned that apparently most "cleaning" tools could not handle TDL4 yet. Some "cleaning" attempts were resulting in crashes boxen and fsked up file systems. Supposedly, HitMan Pro could do it, but I did not try it. Kaspersky offers a TDSSKiller tool, which readily detected TDL4 but was reportedly only able to "clean" a TDL3 infection on Nov 10. Since then, Kaspersky has updated TDSSKiller and it does indeed work with the TDL4 infection that I dealt with.
2010/11/10 15:33:03.0640 \HardDisk0 - detected Rootkit.Win32.TDSS.tdl4 (0)
cfg.ini: [main] version=0.02 aid=30002 sid=0 builddate=4096 rnd=1035525444 knt=1288036792 [inject] *=cmd.dll [cmd] srv=https://ruk keianno.com/;https://86b 6b96b.com/;https://kango jjm1.com/;https://lkatu rl71.com/ wsrv=http://skolew cho.com/;http://jikdo oyt0.com/;http://swltc ho81.com/;http://switcho 81.com/;http://rammyju ke.com/ psrv=http://crj71ki8 13ck.com/ version=0.15 bsh=51dd2a5137201c031dcc783efb440e975d6807a3 delay=7200 csrv=http://lkckclckl i1i.com/ [tasks]
Antivirus | Version | Last Update | Result |
a-squared | 5.0.0.30 | 2010.06.23 | Win32.SuspectCrc!IK |
AhnLab-V3 | 2010.06.23.01 | 2010.06.23 | - |
AntiVir | 8.2.4.2 | 2010.06.23 | TR/Dldr.Delphi.Gen |
Antiy-AVL | 2.0.3.7 | 2010.06.23 | - |
Authentium | 5.2.0.5 | 2010.06.23 | W32/Delfloader.B.gen!Eldorado |
Avast | 4.8.1351.0 | 2010.06.23 | - |
Avast5 | 5.0.332.0 | 2010.06.23 | - |
AVG | 9.0.0.836 | 2010.06.23 | - |
BitDefender | 7.2 | 2010.06.23 | Gen:Trojan.FirewallBypass.fKW@aqsq81n |
CAT-QuickHeal | 10.00 | 2010.06.23 | - |
ClamAV | 0.96.0.3-git | 2010.06.23 | - |
Comodo | 5195 | 2010.06.23 | Heur.Packed.Unknown |
DrWeb | 5.0.2.03300 | 2010.06.23 | - |
eSafe | 7.0.17.0 | 2010.06.23 | - |
eTrust-Vet | 36.1.7661 | 2010.06.23 | - |
F-Prot | 4.6.1.107 | 2010.06.23 | W32/Delfloader.B.gen!Eldorado |
F-Secure | 9.0.15370.0 | 2010.06.23 | Gen:Trojan.FirewallBypass.fKW@aqsq81n |
Fortinet | 4.1.133.0 | 2010.06.23 | - |
GData | 21 | 2010.06.23 | Gen:Trojan.FirewallBypass.fKW@aqsq81n |
Ikarus | T3.1.1.84.0 | 2010.06.23 | Win32.SuspectCrc |
Jiangmin | 13.0.900 | 2010.06.15 | - |
Kaspersky | 7.0.0.125 | 2010.06.23 | Heur.Trojan.Generic |
McAfee | 5.400.0.1158 | 2010.06.23 | Suspect-06!1717B7FFF97D |
McAfee-GW-Edition | 2010.1 | 2010.06.23 | Heuristic.BehavesLike.Win32.Keylogger.J |
Microsoft | 1.5902 | 2010.06.23 | TrojanDownloader:Win32/Small.gen!AO |
NOD32 | 5223 | 2010.06.23 | probably a variant of Win32/TrojanDownloader.Banload.BJY |
Norman | 6.05.10 | 2010.06.23 | W32/Downloader |
nProtect | 2010-06-23.02 | 2010.06.23 | Gen:Trojan.FirewallBypass.fKW@aqsq81n |
Panda | 10.0.2.7 | 2010.06.23 | Trj/CI.A |
PCTools | 7.0.3.5 | 2010.06.23 | - |
Prevx | 3.0 | 2010.06.23 | - |
Rising | 22.53.02.04 | 2010.06.23 | Trojan.DL.Win32.Downloader.GEN |
Sophos | 4.54.0 | 2010.06.23 | Sus/Delf-J |
Sunbelt | 6494 | 2010.06.23 | - |
Symantec | 20101.1.0.89 | 2010.06.23 | - |
TheHacker | 6.5.2.0.303 | 2010.06.23 | - |
TrendMicro | 9.120.0.1004 | 2010.06.23 | - |
TrendMicro-HouseCall | 9.120.0.1004 | 2010.06.23 | - |
VBA32 | 3.12.12.5 | 2010.06.23 | suspected of Win32.Trojan.Downloader (http://...) |
ViRobot | 2010.6.21.3896 | 2010.06.23 | - |
VirusBuster | 5.0.27.0 | 2010.06.23 | - |
Antivirus | Version | Last Update | Result |
a-squared | 5.0.0.30 | 2010.06.22 | - |
AhnLab-V3 | 2010.06.22.00 | 2010.06.22 | - |
AntiVir | 8.2.2.6 | 2010.06.21 | TR/ATRAPS.Gen |
Antiy-AVL | 2.0.3.7 | 2010.06.22 | - |
Authentium | 5.2.0.5 | 2010.06.22 | W32/SysVenFak.A.gen!Eldorado |
Avast | 4.8.1351.0 | 2010.06.21 | - |
Avast5 | 5.0.332.0 | 2010.06.21 | - |
AVG | 9.0.0.787 | 2010.06.21 | - |
BitDefender | 7.2 | 2010.06.22 | Gen:Trojan.Heur.OK0@trs3QZoiC |
CAT-QuickHeal | 10.00 | 2010.06.22 | - |
ClamAV | 0.96.0.3-git | 2010.06.22 | - |
Comodo | 5180 | 2010.06.22 | TrojWare.Win32.Spy.Banker.Gen |
DrWeb | 5.0.2.03300 | 2010.06.22 | - |
eSafe | 7.0.17.0 | 2010.06.20 | - |
eTrust-Vet | 36.1.7657 | 2010.06.22 | - |
F-Prot | 4.6.1.107 | 2010.06.21 | W32/SysVenFak.A.gen!Eldorado |
F-Secure | 9.0.15370.0 | 2010.06.22 | Gen:Trojan.Heur.OK0@trs3QZoiC |
Fortinet | 4.1.133.0 | 2010.06.21 | - |
GData | 21 | 2010.06.22 | Gen:Trojan.Heur.OK0@trs3QZoiC |
Ikarus | T3.1.1.84.0 | 2010.06.22 | - |
Jiangmin | 13.0.900 | 2010.06.15 | - |
Kaspersky | 7.0.0.125 | 2010.06.22 | - |
McAfee | 5.400.0.1158 | 2010.06.22 | - |
McAfee-GW-Edition | 2010.1 | 2010.06.22 | - |
Microsoft | 1.5902 | 2010.06.22 | - |
NOD32 | 5216 | 2010.06.21 | - |
Norman | 6.05.06 | 2010.06.21 | - |
nProtect | 2010-06-21.01 | 2010.06.21 | - |
Panda | 10.0.2.7 | 2010.06.21 | - |
PCTools | 7.0.3.5 | 2010.06.22 | - |
Prevx | 3.0 | 2010.06.23 | Medium Risk Malware |
Rising | 22.53.01.04 | 2010.06.22 | - |
Sophos | 4.54.0 | 2010.06.22 | - |
Sunbelt | 6483 | 2010.06.21 | - |
Symantec | 20101.1.0.89 | 2010.06.22 | - |
TheHacker | 6.5.2.0.302 | 2010.06.22 | - |
TrendMicro | 9.120.0.1004 | 2010.06.22 | - |
TrendMicro-HouseCall | 9.120.0.1004 | 2010.06.22 | - |
VBA32 | 3.12.12.5 | 2010.06.22 | - |
ViRobot | 2010.6.21.3896 | 2010.06.22 | - |
VirusBuster | 5.0.27.0 | 2010.06.21 | - |
Additional information | |||
File size: 660992 bytes | |||
MD5: 100c62729e997e6fcc1997e7bdded0d7 |
Key | Name | Value | Times |
HKLM\SOFTWARE\Microsoft\CTF\SystemShared\ | CUAS | 0 | 1 |
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes | MS Shell Dlg 2 | Tahoma | 4 |
HKLM\SYSTEM\CurrentControlSet\Control\Session Manager | CriticalSectionTimeout | 2592000 | 1 |
HKLM\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | TransparentEnabled | 1 | 1 |
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName | ComputerName | PC | 3 |
HKLM\System\CurrentControlSet\Control\ServiceCurrent | 8 | 1 | |
HKLM\System\CurrentControlSet\Control\Terminal Server | TSUserEnabled | 0 | 1 |
HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle | Language Hotkey | 1 | 2 |
HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle | Layout Hotkey | 2 | 2 |