Threat Level: green Handler on Duty: Yee Ching Tok

SANS ISC: InfoSec Handlers Diary Blog InfoSec Handlers Diary Blog

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Excerpt from a chapter in the continuing saga of Fast Flux and SSDD

Published: 2007-12-06
Last Updated: 2007-12-07 00:46:05 UTC
by William Salusky (Version: 1)
0 comment(s)

Throughout my daily incident response thought process I contemplate whether any given issue is the result of a new "Web 2.0 worm".  Well, I didn’t necessarily find a new one in this case, but I almost can't avoid stumbling into surges of fast flux network activity.  What follows here is not new, but certainly worthy of rehashing the state of flux.

If we "Flash back" to the handler diary from June 26-28th 2007 where we posted details involving a drive-by vector which leveraged MySpace user pages, and you will see this is just a continuing chapter into "SSDD"; same STUFF different domains. 

The malicious life cycle of this specific flux net is maintained through:

  •  MySpace User credentials compromised by Phishing campaign
  •  The above referenced phish sites are Fast Flux hosted domains
  •  Every Phish site page load contains a drive-by exploit
  •  Drive-by exploit results in Fast Flux network growth
  •  New flux nodes become service endpoints
  •  Phished MySpace user credentials are injected with links to the drive-by flux domains

                 Rinse, wash and repeat

Only the domains and IPs of the innocent have been changed.
   *Actually, I see no innocence here, it's just bad!* 

If you are unlucky enough to fall prey [or intentionally fall prey!] during a visit to one of the many Flux net hosted MySpace Phish sites: (By no means is the following an attempt to build a complete list of active flux domains, I can't cut/paste faster than domains are being registered)

                        *** LIVE BROWSER EXPLOIT CODE - BE WARNED *** 


The resulting drive-by would attempt to add your computer into the fast flux fold and begins it’s iframe journey through the inclusion of:


The only new element in all of this worth noting is an incorporation of the recently published QuickTime exploit, and that is only in addition to what has become an almost de-facto standard suite of browser exploits.  Once the usual JavaScript tricks have been decoding away, you would find that a successful exploitation of your host leads to the download and execution of the following malware:

            http://currentses (file.exe)

            Sample: currentses
File type(s): MS-DOS executable (EXE), OS/2 or MS Windows
            Size: 14848 Bytes
            MD5:  5d82154be8afc311dd7dca691e5889e8
            SHA1: 40d1e47e1bc3bf7c04dc0c59af9819859ec6b804

I'm going to skip the technical deep dive involved in foot printing the local host activity for a host that has been compromised and file.exe was executed. I will only offer that the criminal goal has been accomplished.  A Fast Flux proxy node has been deployed and you would find that both TCP port 80 and UDP port 53 listeners were bound via dll injection into the iexplore.exe process.  As a result of encoded configuration file updates, connections inbound to the affected host on TCP 80 or UDP 53 are transparently relayed upstream to the Flux Mothership who is responsible for servicing the respective web or dns request.  This particular Fast Flux mothership has been sitting quite happily at IP, in addition to which manages health/availability monitoring of the flux net and serving flux node configuration files.  I might normally advocate a host take-down but in cases like this, this will only mean we would need to spend the time to find the new Mothership when it migrates 20 minutes after takedown.  They're bad hosts, so block them.  Bad host, no traffic! 

            My T-Shirt today says,
            "I was a fast flux node and all I got to serve were a few online casino's"

If the NoScript browser plug-in were a person, they would so be on my buddy list.  Consider yourself introduced, and it goes without saying, be careful when and where you choose to browse. 


William Salusky

Handler on Duty ;)


0 comment(s)


Published: 2007-12-06
Last Updated: 2007-12-06 17:06:55 UTC
by William Salusky (Version: 1)
1 comment(s)

Malvertising (malicious advertising) is a reasonably fresh take on an online criminal methodology that appears focused on the installation of unwanted or outright malicious software through the use of internet advertising media networks, exchanges and other user supplied content publishing services common to the Social Networking space.  The most popular Malvertising vector active "in the wild" is a result of the client rendering of Adobe Flash SWF files that contain maliciously coded Flash ActionScript.  In my own limited (but growing) experience, Malicious SWF files may share one or more of the following features:

  • They are often protected from casual swf decompiler tools though the use of commercial SWF encryption tools
  • May contain complex de-obfuscation routines to hide the actual intent of any embedded ActionScript.
  • May directly contain exploit code used to attack the client
  • May act solely as the drive-by vector in performing a 'GetURL' equivalent referral to the actual upstream exploit host
  • May primarily be a Social Engineering attack to confuse or trick a user into accepting the installation of software
  • Contains time sensitive payloads which do not go 'live' until a specific date and time.

In light of a growing problem that has the potential to effectively place every internet user at risk, even when only visiting sites they would otherwise fully trust, there is at least a new tool available to assist the security researcher community with a means to better identify malicious SWF files.  The timing for this is excellent, as I have personally only learned of this tool just this morning.  This particular tool is the OWASP hosted project named 'SWFIntruder'.  I will be doing my own deep dive into the details of it's use for inclusion into my own SWF analysis tool bag.  The personal SWF analysis tool bag happens to include two other freely available (also cross platform) SWF file decompilers:

SWFIntruder :
swfdump      : (source available)
and 'flare'     :  (binary only)  :(

We may expand on how you might consider applying security mitigations for this threat type as a protection for the average user which may include your spouse, parents, children, corporate network users, etc... in a future diary.  Please do write in with your own insights into the malvertising problem space.

William Salusky
Handler on Duty :)


1 comment(s)

T'is the season to be jolly - Lindt sale

Published: 2007-12-06
Last Updated: 2007-12-06 04:59:13 UTC
by Mark Hofman (Version: 1)
0 comment(s)

T'is the season to be jolly as the saying goes. 

During the holiday period we are all going to be subjected to various scams and schemes.  About 10.30 this morning people in Sydney Australia started to receive emails advertising a Lindt Chocolate sale at the Elizabeth Street Store (mostly forwarded by friends and family).

A cash only sale between 11 and 1 on Thursday the 6th of December.   Needless to say as I write this there are several hundred people outside the store hoping to cash in on the $5 per bag deals advertised in the email.  The PDF looks really good and genuine. I had junior on his way to get some (BTW kgleeson, you might want to remove the properties from the PDF file before doing something like this, although there could be a good explanation for the name being there). 

A slightly panicked security guard is currently outside the store yelling "It's a scam!!, there is no Sale".

Whilst this is a mildly amusing scam/prank during the holiday season everyone should be on the lookout for the usual greeting cards, "free gifts", credit card reprieves and other emails designed to extract money from our pockets.

Cheers,  I'll have to send junior off to Coles or Woollies to get my weekend stash.



Other information received (thanks Scott) points to a forum post regarding this.  It looks like the sale was meant for the people in the building only and got a bit out of hand and was canceled.  Find the explanation here. So no scam/prank after all kgleeson is safe.

Back to grabbing my greeting cards, playing elf bowl, purchasing pressies from the dodgy brothers, whilst supplementing my income by working from home.

 Made the news as well



0 comment(s)
Diary Archives