[nsp-sec] [DDoS - City of New York]

Rob Thomas robt at cymru.com
Mon Aug 22 17:31:03 EDT 2011


Hi, Joel.

> This reminded me, I sent this to DOITT.NYC.GOV on the 17th - the
> attached .txt file is really an executable, my guess is "nothing good" :-)

Indeed!  :)  I ran this one through our malware-o-matic and
query-o-matic, and found a few interesting bits.

It looks up sfkdhjnsfjg.ru, which presently resolves to 195.189.226.119.

AS      | IP               | BGP Prefix          | CC | Registry |
Allocated  | AS Name
41018   | 195.189.226.119  | 195.189.226.0/23    | UA | ripencc  |
2006-05-30 | SERVER-UA-AS SERVER-UKRAINE DC

DNS RRs pointed to 195.189.226.119 this month include:

        stamp        |     qname      | class | type |      rdata
--------------------- ---------------- ------- ------ -----------------
 2011-08-19 15:46:12  |  sfkdhjnsfjg.ru  |  IN     |  A     |
195.189.226.119
 2011-08-22 07:36:04  |  rattsillis.com  |  IN     |  A     |
195.189.226.119

It then fetches the following URL:

   h x x p : / / sfkdhjnsfjg.ru / pusk3.exe

This is installed as:

   C:\Documents and Settings\IT\Local Settings\Temp\pusk3.exe

It then does another GET for:

   h x x p : / / sfkdhjnsfjg.ru / ftp / g.php

This is probably some sort of configuration file.  It is installed as:

   C:\Documents and Settings\IT\Local Settings\Temporary Internet
Files\Content.IE5\Z7L7D65P\g[1].htm

The file pusk3.exe looks up findtype.org, which presently resolves to
141.136.16.13.

AS      | IP               | BGP Prefix          | CC | Registry |
Allocated  | AS Name
50515   | 141.136.16.13    | 141.136.16.0/24     | RO | ripencc  |
2011-06-29 | TIER-DATA-CENTER Tier SRL

141.136.16.13 appears to be a Linux box.

DNS RRs pointed to 141.136.16.13 this month include:

        stamp        |       qname        | class | type |     rdata
--------------------- -------------------- ------- ------ ---------------
 2011-08-01 00:01:34  |  findtry.org         |  IN     |  A     |
141.136.16.13
 2011-08-01 00:01:34  |  findtube.org        |  IN     |  A     |
141.136.16.13
 2011-08-01 23:34:53  |  finddelightful.org  |  IN     |  A     |
141.136.16.13
 2011-08-01 23:34:54  |  findtune.org        |  IN     |  A     |
141.136.16.13
 2011-08-04 00:51:21  |  findturn.org        |  IN     |  A     |
141.136.16.13
 2011-08-07 02:51:08  |  findtwenty.org      |  IN     |  A     |
141.136.16.13
 2011-08-12 04:56:37  |  findtwice.org       |  IN     |  A     |
141.136.16.13
 2011-08-16 12:27:15  |  findtwo.org         |  IN     |  A     |
141.136.16.13
 2011-08-20 15:51:08  |  findtype.org        |  IN     |  A     |
141.136.16.13

We have at least 277 samples in our malware menagerie that point to
141.136.16.13.  Oofah!  If anyone would like the full list, let me know.
 It dates back to at least 2011-07-06 07:22:51 UTC.

pusk3.exe then issues the following GETs:

   h x x p : / / findtype.org / pica1 / 531-direct

This appears to be some sort of data file.

   h x x p : / / findtype.org / 404.php?type=stats&affid=531&subid=03&awok

That's probably some sort of counter or beacon method.

Thanks,
Rob.
-- 
Rob Thomas
Team Cymru
https://www.team-cymru.org/
"Say little and do much." M Avot 1:15



More information about the nsp-security mailing list