This message was sent to Taiwan government and is digitally signed with a valid signature. I am not sure if the signature is obtained for a fake account or the account is hijacked, this is why I am not posting the email address. If you work for TW government, you can ask for it. There was also a PDF attached with a personally identifiable information (full application) of an applicant for International Cooperation and Development Fund (Taiwan) - Women Development program. It is not included in this post. I assume it was stolen earlier as well.
CVE #
Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document.
Download
- http://contagio.deependresearch.org/files/CVE/CVE-2012-0158_Taidpoor_malware_2C199988A121B60818FA7D534E6C67B4.zip (with Taidoor 40d79d1120638688ac7d9497cc819462)
- http://contagio.deependresearch.org/files/bin/Taidoor_tar.zip (tar archive contents with taidoor binary desktop.ini 6D6B797C99A11B066746948EB1EF4AA8 and shortcut to it)

List of files
CVE-2012-1535 2C199988A121B60818FA7D534E6C67B4 房號表.doc
Taidoor binaries for research
0D0F38981E6CF09E82D6E55388A6F478
22E4F5AF13E6142E1623DFBFA05B5AD4
30768B6024557DDA108B648DC535A5EB
40D79D1120638688AC7D9497CC819462
6841A2C4EA247786241F5AB07050E3A4
7B806E6BFC75155EF8FC3DDC9D2B0113
83A0609EE10D87A66278CCCEBF8C6449
A47BDA32F159DEFC594D41526C65130A
A5E11557AF48B26279B430E1D1249A3B
AC3B1CABE39BCBD517B5E24A2320360F
C07F9E0C804D8972E5D8D3F000DF5CDE
C26178BF39160BF7B362A83D15F808E4
CC2C80F5472EC9A915452BB6F023063C
D5AB3E5DFC80FD03C789C5733B666B9C
E8CDFD82AA1F52F3CD2BBD845E17B354
F1A1C8900829185C5367C57A26453A13
F61056E724133467EDF61DECE1C9AEBF
F99554368B58D31F3AA389E81A98A95A
Payload information
40d79d1120638688ac7d9497cc819462 Taidoor WPFFontCache_v0400.exe ( in Word)
6d6b797c99a11b066746948eb1ef4aa8 Taidoor desktop.ini in the tar file (appears malformed)
The message sent to TW government
Digitally signed
房號表.doc
Data for reference
Table of the room number '
Receive please reply
Tel :505-22771333
Fax :505-22674025
-----------------------------------------------------------
From: xxxxxxxx [mailto:xxxx@yahoo.com.tw]
Sent: Monday, September 10, 2012 10:46 PM
To: xxxxxxxx@mac.gov.tw
Subject: 資料供參考
收到煩請回覆
謝謝
Tel:505-22771333
Fax:505-22674025
#1 2C199988A121B60818FA7D534E6C67B4
Payload - Trojan Taidoor / Simbot embedded in the Word document and inside the tar archive (desktop.ini (Taidoor 9 / 43 Virustotal) file with a PDF (Virustotal ) and a shortcut file (C:\WINDOWS\system32\cmd.exe /c desktop.ini)
Created files locations
Local Settings\Temp\ÿÿÿÿÿÿ.doc <decoy
Local Settings\Messenger.exe < file name varies
Local Settings\NetDDEdsdm.exe
Local Settings\WPFFontCache_v0400.exe
Local Settings\Temp\~dfds3.reg
Artifacts locations
Doctor Watson files due to the initial crash
Local Settings\History\History.IE5\MSHist012012101420121015\index.dat
Local Settings\Temp\65824578.od
Local Settings\Temp\dw.log
Local Settings\Temp\Word8.0\ShockwaveFlashObjects.exd
Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol
\Temporary Internet Files\Content.MSO\26F7849B.wmf
Created files:
MD5:
Messenger.exe 40d79d1120638688ac7d9497cc819462 << file name varies!
NetDDEdsdm.exe 40d79d1120638688ac7d9497cc819462
WPFFontCache_v0400.exe 40d79d1120638688ac7d9497cc819462
~dfds3.reg eeda7daba8d3329e33a9d2b0e56f4f80
Sha256
5387ad3225657f8857ddeaf70346722b1ef232beff3d74a9bf8d31738fc9c59a WPFFontCache_v0400.exe
7cb6182a8972a6aae9511f9d23ef6414a30bfb24fa8f1926d3cd81072414f75d ~dfds3.reg
Artifacts
26F7849B.wmf
66121875.od
dw.log
index.dat
ShockwaveFlashObjects.exd
ssdeep:
384:yPNY1M5Zni1HHl2EqVZqbS0hVYk4h5t6Dla:kEq8l2nqbXYP60,"Messenger.exe"
Traffic
Process ID: 2744 (svchost.exe)
Process doesn't appear to be a service
PID Port Local IP State Remote IP:Port
2744 TCP 1229 172.16.253.132 ESTABLISHED 211.234.117.141:443
| Frames Bytes | | Frames Bytes | | Frames Bytes |
211.234.117.141 <-> 172.16.253.132 1000 103328 862 51720 1862 155048
Active Connections
Proto Local Address Foreign Address State PID
TCP 172.16.253.132:1375 211.234.117.141:443 FIN_WAIT_2 2744
C:\WINDOWS\system32\WS2_32.dll
C:\WINDOWS\system32\WININET.dll
[svchost.exe]
WHOIS Source: APNIC
IP Address: 211.234.117.141
Country: Korea, Republic Of
Network Name: KIDC-KR
Owner Name: LG DACOM KIDC
From IP: 211.234.96.0
To IP: 211.234.127.255
Allocated: Yes
Contact Name: Host Master
Address: 11F, KTF B/D, 1321-11, Seocho2-Dong, Seocho-Gu,, Seoul, Korea, 137-857
Email: hostmaster@nic.or.kr
Phone: +82-2-2186-4500
Fax: +82-2-2186-4496
GET /apzsr.php?id=021793111D309GE67E HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
Host: 211.234.117.141:443
Connection: Keep-Alive
Cache-Control: no-cache
strings_~dfds3.reg
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WPFFontCache_v0400"="C:\\Documents and Settings\\Laura\\Local Settings\\WPFFontCache_v0400.exe"
Email Headers
SAMPLE #1 2C199988A121B60818FA7D534E6C67B4
Microsoft Mail Internet Headers Version 2.0
Received: from mse99.trade.gov.tw ([172.16.2.4]) by mail93.trade.gov.tw over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 11 Sep 2012 10:46:25 +0800
Received: from AntiSpam.trade.gov.tw (antispam.trade.gov.tw [172.17.1.4])
by mse99.trade.gov.tw with ESMTP id q8B2kJNZ080932
for <xxxxxxxxxx@trade.gov.tw>; Tue, 11 Sep 2012 10:46:19 +0800 (GMT-8)
(envelope-from xxxxxxx@yahoo.com.tw)
Received: from nm26-vm9.bullet.mail.sg3.yahoo.com (nm26-vm9.bullet.mail.sg3.yahoo.com [106.10.151.120])
by AntiSpam.trade.gov.tw with SMTP id q8B2kCCb051478
for <smh@trade.gov.tw>; Tue, 11 Sep 2012 10:46:12 +0800 (CST)
(envelope-from xxxxxxxxxxx@yahoo.com.tw)
Received: from [106.10.166.116] by nm26.bullet.mail.sg3.yahoo.com with NNFMP; 11 Sep 2012 02:46:12 -0000
Received: from [106.10.167.238] by tm5.bullet.mail.sg3.yahoo.com with NNFMP; 11 Sep 2012 02:46:10 -0000
Received: from [127.0.0.1] by smtp211.mail.sg3.yahoo.com with NNFMP; 11 Sep 2012 02:46:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com.tw; s=s1024; t=1347331570; bh=y/fTGjKrz3P9wnnVOmsuyivYegUymx1m+pNZIqSI8io=; h=X-Yahoo-Newman-Id:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:Received:Message-ID:From:To:Subject:Date:MIME-Version:Content-Type:X-Priority:X-MSMail-Priority:X-Mailer:X-MimeOLE; b=BUNM174C2z5YUcyGfAKTAir+opr4A/fP53RmctXSWVtyJjmanA9UACeePVMrBEal78LLYCM9Rsxwhilp1zL6WIllyIrpr0QkSCwH0cviuMoVeHcbOn+NYjedOkZW4gU2Cc7E0cUSoiCJcX+IB/S698snOtUrF1P7Myy0DbOpoC4=
X-Yahoo-Newman-Id: 538238.79310.bm@smtp211.mail.sg3.yahoo.com
X-Yahoo-Newman-Property: ymail-5
X-YMail-OSG: M_hRw4wVM1lKJVKy3cN._hIFgwq7ygzEDXdVecwWndt0GCK
UYyfTw_pZb5Zl.vKdwNgbVhgbvIYW6Apbi_6qrta83ynjAQU9gosALflRvlj
1P8cG27uA3C2TQSGhNbASyznBE8G0iD9IzO6Bwp16HtZbJU9pbRWkBz79ULj
1A6OCOnKOfqJZPy9sMPeDz8HRIY1iFT1wyTMvrnczltjCk2LPCriCnNIHQx.
wiQkHjRgleWGaSE7ttC2ZV9RIjPQgh0.g9uo0UZ.LlmAUh7kRVP9oOvHmPqJ
P5q_Gzc8aPC2akubsC8IPycCSta_7nCtl82o5t59LOqP5n0paxFa_0.w2tRF
leWS4Pxjzw6JzmyVyYOTcdR9kVLCcXwYd7VxVUtmczoLB8XfFiACzeAQ0WBn
KpUY5KWwDe4FklBAB1uQ3F9i3OPdaNw0K
X-Yahoo-SMTP: QFan6h2swBBkcpPdQXIiwXg08TmA4BU-
Received: from SFGDSGSGFDSG (xxxxxxxxx@111.254.231.18 with login)
by smtp211.mail.sg3.yahoo.com with SMTP; 10 Sep 2012 19:45:40 -0700 PDT
Message-ID: <14FD634A91254F6D81F309B6AE0D96D2@SFGDSGSGFDSG>
From: xxxxxxxxx@yahoo.com.tw>
To: xxxxxxxx@mac.gov.tw>
Subject: =?big5?B?uOquxqjRsNGm0g==?=
Date: Tue, 11 Sep 2012 10:45:37 +0800
MIME-Version: 1.0
Content-Type: multipart/signed;
protocol="application/x-pkcs7-signature";
micalg=SHA1;
boundary="----=_NextPart_000_00F2_01CD900A.93FD5BE0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6109
X-DNSRBL:
X-MAIL: xxx.trade.gov.tw q8B2kJNZ080932
Return-Path: xxxxxxxxxxyahoo.com.tw
X-OriginalArrivalTime: 11 Sep 2012 02:46:25.0984 (UTC) FILETIME=[A3043C00:01CD8FC7]
Automatic scans
SHA256: 5387ad3225657f8857ddeaf70346722b1ef232beff3d74a9bf8d31738fc9c59a
SHA1: e4a5517ed0626677a31f123446403dd1e79afca4
MD5: 40d79d1120638688ac7d9497cc819462
File size: 32.0 KB ( 32768 bytes )
File name: WPFFontCache_v0400.exe
File type: Win32 EXE
Tags: peexe armadillo
Detection ratio: 20 / 44
Analysis date: 2012-10-14 21:16:36 UTC ( 1 day, 4 hours ago )
Antivirus Result Update
AVG Generic29.AHPF 20121014
BitDefender Gen:Trojan.Heur.RP.cq0@ayoZefab 20121014
Emsisoft Backdoor.Win32.Simbot!IK 20120919
ESET-NOD32 a variant of Win32/Injector.UQP 20121014
F-Secure Gen:Trojan.Heur.RP.cq0@ayoZefab 20121003
GData Gen:Trojan.Heur.RP.cq0@ayoZefab 20121014
Ikarus Backdoor.Win32.Simbot 20121014
Kaspersky Trojan.Win32.Inject.elqk 20121014
Kingsoft Win32.Troj.Inject.(kcloud) 20121008
McAfee-GW-Edition - 20121014
Microsoft Backdoor:Win32/Simbot.gen 20121014
MicroWorld-eScan Gen:Trojan.Heur.RP.cq0@ayoZefab 20121014
Norman W32/Obfuscated_JA 20121014
nProtect Trojan/W32.Inject.32768.CG 20121014
Panda Suspicious file 20121014
PCTools Trojan.Taidoor 20121014
Sophos Mal/Simbot-B 20121014
Symantec Trojan.Taidoor!gen1 20121014
TrendMicro BKDR_SIMBOT.SMAZ 20121014
TrendMicro-HouseCall BKDR_SIMBOT.SMAZ 20121014
ViRobot Backdoor.Win32.Simbot.32768 20121014
SHA256: 950aef9e49da2f64cbf48f3c3e31545f463686989ed75c332168fdfc841bf26d
SHA1: e519986529723c74d93efe8441ea42985529805b
MD5: 6d6b797c99a11b066746948eb1ef4aa8
File size: 36.1 KB ( 36976 bytes )
File name: desktop.ini
File type: Win32 EXE
Detection ratio: 9 / 43
Analysis date: 2012-10-16 04:33:05 UTC ( 0 minutes ago )
Additional information
Antivirus Result Update
Agnitum Suspicious!SA 20121014
AVG Suspicion: unknown virus 20121016
Comodo UnclassifiedMalware 20121016
ESET-NOD32 a variant of Win32/Injector.XDH 20121015
Ikarus Virus.Win32.Patched 20121016
Kingsoft Win32.Troj.Sasfis.(kcloud) 20121008
Norman W32/Obfuscated_JA 20121015
Symantec WS.Reputation.1 20121016
TrendMicro-HouseCall TROJ_GEN.F47V0911 20121016
All news about malware you can to find heere. :) http://malware-source.com/
ReplyDelete