Malicious HTA file in hxxtp://report-inshop.com/policies/A Step in the Right Direction.hta
downloads additional malware wincfg.exe Trojan:Win32/Tapaoux.A
Download
- BCCCA07E2147BE4CF30E73A6714D8C38 A Step in the Right Direction.hta
- 1971EE25847D246116835C7157CF7F89 wincfg.exe
- 19A08F48D71044E0A4091EF4A4E16131 April 07.pdf
Sent: Friday, April 23, 2010 7:52 AM
To: XXXXXXXXXX
Subject: Obama's New Nuclear Policies: A Step in the Right Direction
Obama's New Nuclear Policies: A Step in the Right Direction
Arms Control, Nuclear Weapons, Nonproliferation, Defense
Michael E. O'Hanlon, Director of Research and Senior Fellow, Foreign Policy
The Brookings Institution
Documents View (Acrobat Version 9.0 or less)
Headers
Received: from BLU139-W28 ([65.55.111.137]) by blu0-omc4-s33.blu0.hotmail.com
with Microsoft SMTPSVC(6.0.3790.3959); Fri, 23 Apr 2010 04:52:29 -0700
Message-ID:
Return-Path: richard.wilson34@hotmail.com
Content-Type: multipart/alternative;
boundary="_f03abef7-5a0c-4660-b04a-387c90937f45_"
X-Originating-IP: [123.125.156.137]
From: Richard Wilson
http://www.robtex.com/ip/123.125.156.137.html#blacklists
http://www.robtex.com/ip/123.125.156.137.html#whoisinetnum: 123.112.0.0 - 123.127.255.255
netname: UNICOM-BJ
descr: China Unicom Beijing province network
descr: China Unicom
country: CN
person: ChinaUnicom Hostmaster
nic-hdl: CH1302-AP
e-mail: abuse@chinaunicom.cn
address: No.21,Jin-Rong Street
address: Beijing,100140
address: P.R.China
phone: +86-10-66259940
fax-no: +86-10-66259764
country: CN
changed: abuse@chinaunicom.cn 20090408
mnt-by: MAINT-CNCGROUP
source: APNIC
person: sun ying
address: fu xing men nei da jie 97, Xicheng District
address: Beijing 100800
country: CN
phone: +86-10-66030657
fax-no: +86-10-66078815
e-mail: hostmast@publicf.bta.net.cn
nic-hdl: SY21-AP
mnt-by: MAINT-CNCGROUP-BJ
changed: suny@publicf.bta.net.cn 19980824
changed: hm-changed@apnic.net 20060717
changed: hostmast@publicf.bta.net.cn 20090630
source: APNIC
Virustotal
A Step in the Right Direction.hta from hxxtp://report-inshop.com/policies/A Step in the Right Direction.hta
http://www.virustotal.com/analisis/746e8ea808d2fa9c51e72f25a84c0924ecddc4b82ee3efae122e27158b1b2c2e-1272024139
File A_20Step_20in_20the_20Right_20Dir received on 2010.04.23 12:02:19 (UTC)
Current status: finished
Result: 0/40 (0.00%)
Additional information
File size: 198809 bytes
MD5 : bccca07e2147be4cf30e73a6714d8c38
From A Step in the Right Direction.hta - Shellcode 2 exe (sandsprite.com) results
shellcode.exe
Current status: finished
Result: 14/40 (35.00%)
AntiVir 8.2.1.224 2010.04.23 PCK/Dumped
Authentium 5.2.0.5 2010.04.24 W32/SmallTrojan.M.gen!Eldorado
AVG 9.0.0.787 2010.04.24 Agent_r.OV
CAT-QuickHeal 10.00 2010.04.23 (Suspicious) - DNAScan
Comodo 4676 2010.04.24 TrojWare.Win32.TrojanDownloader.Small.~AOLO
F-Prot 4.5.1.85 2010.04.24 W32/SmallTrojan.M.gen!Eldorado
Jiangmin 13.0.900 2010.04.24 Trojan/Agent.ckpb
Kaspersky 7.0.0.125 2010.04.24 Trojan-Downloader.Win32.Small.aolo
McAfee 5.400.0.1158 2010.04.24 Generic Downloader.fa
McAfee-GW-Edition 6.8.5 2010.04.23 Packer.Dumped
Microsoft 1.5703 2010.04.24 TrojanDownloader:Win32/Sileco.A
TheHacker 6.5.2.0.268 2010.04.23 Trojan/Downloader.Small.aolo
TrendMicro 9.120.0.1004 2010.04.24 TROJ_SMALL.SMJ2
Additional information
File size: 102994 bytes
MD5 : 9b41c8a47770bb3f8ff5f76aad49c84f
wincfg.exe from hxxp://report-inshop.com/policies/wincfg.exe - see wireshark screenshot above
File wincfg.exe received on 2010.04.24 16:44:33 (UTC)
Result: 1/40 (2.50%)
Microsoft 1.5703 2010.04.24 Trojan:Win32/Tapaoux.A
File size: 357344 bytes
MD5 : 1971ee25847d246116835c7157cf7f89
Result: 1/40 (2.50%)
Microsoft 1.5703 2010.04.24 Trojan:Win32/Tapaoux.A
File size: 357344 bytes
MD5 : 1971ee25847d246116835c7157cf7f89
Virustotal
April 07.pdf from hxxp://report-inshop.com/policies/April%2007.pdf
http://www.virustotal.com/analisis/f48bf933148dff98c92d4f64b9b735d381db6fb45390091613ab9c4f90b25f09-1272126805
File April_07.pdf received on 2010.04.24 16:33:25 (UTC)
Result: 0/40 (0.00%)
Additional information
File size: 46135 bytes
MD5 : 19a08f48d71044e0a4091ef4a4e16131
Traffic wincfg.exe - by Anubis
DNS Queries: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Name: [ www.microsoft.com ], Query Type: [ DNS_TYPE_A ], Query Result: [ ], Successful: [ YES ], Protocol: [ udp ] Name: [ hummfoundation.org ], Query Type: [ DNS_TYPE_A ], Query Result: [ 124.217.226.220 ], Successful: [ YES ], Protocol: [ udp ]
[=============================================================================] Global Network Activities [=============================================================================] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] HTTP Conversations: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] From ANUBIS:1038 to 124.217.226.220:80 - [ hummfoundation.org ] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [ ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [ ] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [ ] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [ ] Request: [ GET /on/yahoo/banner4.php?jpg=../yahoo ], Response: [ 200 "OK" ] Request: [ GET /on/yahoo/banner3.php?jpg=../(LQAhZ2Uy ], Response: [ ] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] TCP Connection Attempts: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] From ANUBIS:1039 to 124.217.226.220:80 From ANUBIS:1040 to 124.217.226.220:80 From ANUBIS:1041 to 124.217.226.220:80 From ANUBIS:1043 to 124.217.226.220:80 From ANUBIS:1044 to 124.217.226.220:80 Robtex.com
124.217.226.220
bidor.net, skyll.net, qcs.com.my, niceugg.net, jadi.com.my and at least 51 other hosts point to 124.217.226.220. It is blacklisted in one list.
http://www.robtex.com/ip/124.217.226.220.html
inetnum: 124.217.224.0 - 124.217.255.255
netname: PIRADIUS-NET
descr: PIRADIUS NET
country: MY
admin-c: PA124-AP
tech-c: PA124-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-MY-PIRADIUS
changed: hm-changed@apnic.net 20071217
source: APNIC
person: PIRADIUS NET Administrator
nic-hdl: PA124-AP
e-mail: abuse@piradius.net
address: PIRADIUS NET
address: Unit 21-3A, Level 21
address: Plaza DNP 59, Jalan Abdullah Tahir
address: Taman Century Garden
address: 80300 Johor Bahru, Johor
address: Malaysia
phone: +607 334 8605
fax-no: +607 334 8605
country: MY
changed: admin@piradius.net 20071003
mnt-by: MAINT-MY-PIRADIUS
source: APNIC
No comments:
Post a Comment