All files are digitally signed with a "CZ Solutions" certificate making it easy to create a Yara or ClamAV signature.
A few Zeus samples seem to be still beaconing. Most are sinkholed.
The certificate is now revoked by VeriSign.
Enjoy
Download
- MacControl payload http://www.securelist.com/en/blog/208193616/New_MacOS_X_backdoor_variant_used_in_APT_attacks
- OSX.SabPub payload http://www.securelist.com/en/blog/208193470/New_Version_of_OSX_SabPub_Confirmed_Mac_APT_attacks
- OSX/Dockster.A payload http://www.intego.com/mac-security-blog/new-targeted-attack-on-tibetan-activists-using-os-x-discovered/
- OSX_Docklight payload http://contagioexchange.blogspot.com/2012/05/019-speechdoc-macosxms09-027a-word.html and http://blogs.technet.com/b/mmpc/archive/2012/04/30/an-interesting-case-of-mac-osx-malware.aspx
| Wikipedia |
Exploits directed at Wordpress and/or Joomla content management systems(CMS) have been increasing at a dramatic rate over the past year. Internet blogs and forums are flooded with posts about hacked CMS installations. Popular jargon refers to the attackers as "hackers", but it is generally understood that these mass compromises are being performed via automated scanners and tools. However, we believe that there is not enough coverage of the actual malware involved.
PDF
Name
|
MD5
|
GrooveMonitor.exe [dropper]
|
f3dd76477e16e26571f8c64a7fd4a97b
|
juboot.exe
|
fa0b300e671f73b3b0f7f415ccbe9d41
|
jucheck.exe
|
c4cd216112cbc5b8c046934843c579f6
|
SLEEP.EXE
|
ea7ed6b50a9f7b31caeea372a327bd37
|
WmiPrv.exe
|
b7117b5d8281acd56648c9d08fadf630
|