[nsp-sec] Attn: Microsoft/MSN Messenger - MSN-bot Social Engineering Messages

Rob Thomas robt at cymru.com
Tue Feb 26 14:27:32 EST 2008


Hi, Brian.

Nice find!

> A botnet using a command of "msn.url" was seen (a bit over an hour  
> ago)
> sending out messages to try to social engineer people into installing
> hXXp://www.massiverender.com/ingles/p3.exe (http changed to hXXp to
> prevent possible clicking).

This one also showed up on 2008-02-22 16:31:04 UTC as photo38.JPG on  
a myspace page, I think.

The bot installs itself as C:\WINDOWS\system32\poolmc.exe.  It makes  
at least one registry key change:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run  
"Windows Pool Setup" = poolmc.exe

The bot creates an interesting mutex named "pool4" (no quotes), which  
we see in only two members of our malware menagerie.

It's interesting that it subsequently runs:

    C:\ipconfig /flushdns.*

The bots are using 01.cybernix.info as the C&C DNS RR.  This  
presently resolves to:

    01.cybernix.info has address 216.151.162.19
    01.cybernix.info has address 64.34.166.236
    01.cybernix.info has address 64.34.168.165
    01.cybernix.info has address 64.34.193.234
    01.cybernix.info has address 64.34.203.207
    01.cybernix.info has address 195.137.213.67

7393    | 216.151.162.19   | 216.151.160.0/20    | CA | arin     |  
2006-07-20 | CYBERCON - CYBERCON, INC.
29339   | 195.137.213.67   | 195.137.212.0/23    | DE | ripencc  |  
2003-07-31 | MBBG-AS Markus Bach Betriebs Gesellschaft mbH
30099   | 64.34.166.236    | 64.34.160.0/19      | US | arin     |  
2004-07-15 | SB-2 - ServerBeach
30099   | 64.34.168.165    | 64.34.160.0/19      | US | arin     |  
2004-07-15 | SB-2 - ServerBeach
30099   | 64.34.193.234    | 64.34.192.0/19      | US | arin     |  
2004-07-15 | SB-2 - ServerBeach
30099   | 64.34.203.207    | 64.34.192.0/19      | US | arin     |  
2004-07-15 | SB-2 - ServerBeach

We see at least 14 samples in our malware menagerie that use the  
01.cybernix.info DNS RR.  The oldest sample that uses *.cybernix.info  
entered our collection on 2008-01-23 17:05:07 UTC.

Ah!  Watch out!  This is also using:

    pool.hybridtx.com PORTS: 9035 SERVPASS: gsaxx00

We have 85 samples in our malware menagerie that use the  
*.hybridtx.com DNS RRs.  The oldest dates back to - bleh - 2007-01-08  
22:32:28 UTC.  So the possible DNS RRs include:

       timestamp      |     dns_name      |      ip
--------------------- ------------------- ---------------
  2008-02-11 00:22:23 | 01.cybernix.info  | 64.34.203.207
  2008-02-22 00:20:23 | crib.acidfox.info | 64.34.203.207
  2008-01-06 00:33:07 | pool.hybridtx.com | 64.34.203.207

The bots are gathering on TCP 3055.  Other C&C ports from the past  
include TCP 9035, TCP 3050, and TCP 9058.  The server password is  
"gsaxx00" (no quotes) and the bots have nicks of the format "\00\USA 
\85p8rc2zhh" (no quotes).

Hmm, interestingly it appears that at least one of the C&C servers is  
a Win2K box, not the more frequent *nix IRC server.

There are at least 103 bots on the TCP 3055 botnet, but I'm still  
pulling those numbers and looking at traffic to the other C&C ports.

Thanks,
Rob.
-- 
Rob Thomas
Team Cymru
http://www.cymru.com/
cmn_err(do_panic, "Out of coffee!");







More information about the nsp-security mailing list