[Emerging-Sigs] Zeus? Virut? Krap? FakeAV?

Packet Hack inurbitz at yahoo.com
Wed Jan 27 00:16:54 EST 2010


Or even bredolab...

As I mentioned before we have some snort rules that watch for traffic to known Zeus hosts. 

Lately we've been getting hits to muza-flowers.biz that look like this:

    POST /blog.php?a8ea17ad031bf763b98b32690f49973c HTTP/1.1
    Accept: */*
    Accept-Language: en-us
    Referer: http://muza-flowers.biz/
    Content-Type: application/x-www-form-urlencoded
    Content-Encoding: gzip
    UA-CPU: x86
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
    Host: muza-flowers.biz
    Content-Length: 250
    Connection: Close
    Cache-Control: no-cache

    <binary data>

This looked similar to POSTs to Zeus drop sites, but there are more headers than the typical Zeus
communication. 

The remote IPs included these:

    96.0.203.114
    66.96.224.213
    204.12.231.186

none of which mapped to the IP of muza-flowers.biz (166.128.170.186). Eventually I discovered these
were Tor nodes:

    https://www.dan.me.uk/tornodes 

Other examples of POSTs include these:

    POST /blog.php?afe7f1106cc20f7cd26c9abac312ae34 HTTP/1.1
    POST /download.php?file=74af7000e8ec44f21e002097bead52d8 HTTP/1.1
    POST /entry.php?d61ed78b2f894e820c508ef954715e75 HTTP/1.1
    POST /forums.php?fid=10 HTTP/1.1
    POST /index.php?topic=127.175 HTTP/1.1
    POST /login.php?user=982bf7a19e789c32ac98ce3783d5adf8 HTTP/1.1
    POST /logout.php?sessid=99fe0fb08230bb2cb1838c1d249d0943 HTTP/1.1
    POST /memberlist.php?mode=viewprofile&u=43 HTTP/1.1
    POST /newpost.php?sub=newthread&fid=21 HTTP/1.1
    POST /redirect.php?url=e687fc40e4032d6e8ca8f219ea2a3d72 HTTP/1.1
    POST /viewforum.php?f=81 HTTP/1.1
    POST /YaBB.pl?num=222 HTTP/1.1

This seemed like it could be a software package (YaBB?), but a google search of the links brought me to
this page:

  http://www.threatexpert.com/report.aspx?md5=9c3a859ac9088b237fd48f28cfb4cd90

Instead of go-thailand-now.com my hosts were hitting muza-flowers.biz ( I eventually
did see a hit to go-thailand-now.com) . Searching for that domain I ran across this:

    http://superuser.com/questions/88788/how-do-i-un-gzip-data-captured-by-wireshark 

Since multiple hosts on my networks were using Tor to access muza-flowers.biz, it seemed like 
a clear case of Zbot now using Tor, so I began notifying based on these incidents.

However, further investigation shows the same URLs in other ThreatExpert reports (google
search for 'go-thailand-now.com'): 

    http://www.threatexpert.com/report.aspx?md5=7f275041f3019908400ec48789069d61
    http://www.threatexpert.com/report.aspx?md5=f46a6e78cadc4a7f8457b97bbd8ce2f3
    http://www.threatexpert.com/report.aspx?md5=448dc5c8de3418869a328e76ca4a5750

So this could be anything. Has anyone seen this kind of traffic and done any kind of forensics
on it to determine exactly what it is? My organization is fairly spread out so I can't always get
my hands on the actual infected machine. 

Coming up with sigs for these shouldn't be too difficult, but I want to make sure I am at least
in the ballpark when giving the sig a name. 

Thanks,
--pkthck


      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.emergingthreats.net/pipermail/emerging-sigs/attachments/20100126/fa504209/attachment-0001.html


More information about the Emerging-sigs mailing list