To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
derby.com looks like an installer, given it's size (~ 1.8 MB).  In
fact, if you take a look at section .pklstb (located at 0xa400), you
see:
 0f73000 688030f7 0068bec7 12016800 000000e8  h.0..h....h.....
 0f73010 aa971b00 e92fdc54 ff402823 29504b4c  ...../.T.@(#)PKL
 0f73020 49544533 3220436f 70797269 67687420  ITE32 Copyright 
 0f73030 31393938 20504b57 41524520 496e632e  1998 PKWARE Inc.
 0f73040 2c20416c 6c205269 67687473 20526573  , All Rights Res
 0f73050 65727665 64202824 52657669 73696f6e  erved ($Revision
 0f73060 3a202429 00504b4c 54333200 00100100  : $).PKLT32.....


On Sun, Nov 25, 2007 at 05:03:41AM +0000, Paul Ferguson babbled thus:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> ----------
> FYI.
> 
> - ferg
> 
> [forwarded message[
> 
> 
> Date: Sat, 24 Nov 2007 23:17:32 -0500
> From: jayjwa <[EMAIL PROTECTED]>
> To: Dshield Mail List <[EMAIL PROTECTED]>
> 
> 
> (Possibly) new trojans. These came from a link spammed out in email
> that ended up in my Hotmail inbox. The files are win32 PE's, with some
> interesting strings embedded in them. One of the files appears to be a
> server of some sort with smtp ability. There's also alot of calls to
> graphics routines, so maybe one of the files is a client or user
> interface of some type. Written in Delphi, downloaded from
> suspiroamor.land.ru, root directory.
> 
> amor.com: The only file linked in the email. Probably downloads/exec
> others.
> 
> Interesting strings:
> 
>           taskkill -f /im gbpsv.exe
>           C:\Arquivos de programas\GbPlugin\gbieh.dll
>           C:\Arquivos de programas\GbPlugin\gbieh.gmd
>           C:\windows\Crime.exe
>           C:\WINDOWS\system32\WormList.exe
>           URLDownloadToFileA
>           shell32.dll
>           ShellExecuteA
> 
> derby.com: Referenced in the above file.
> 
> javas.com: Same. Contains an email template, lots of calls to Winsock.
> 
> Interesting hardcoded strings:
> 
>          msnlist.txt
>          [EMAIL PROTECTED]
>          Lista MSN (
>          gsmtp185.google.com
> 
>          hsResolving
>          hsConnecting
>          hsConnected
>          hsDisconnecting
>          hsDisconnected
>          hsStatusText
>          ftpTransfer
>          ftpReady
>          ftpAborted
>          IdComponent
>          TIdStatusEvent
>          ASender
> 
>          Indy 9.00.10
>          X-Library
> 
> * About to connect() to suspiroamor.land.ru port 80 (#0)
> *   Trying 82.204.219.223... connected
> * Connected to suspiroamor.land.ru (82.204.219.223) port 80 (#0)
> > GET /javas.com HTTP/1.1
> > User-Agent: from Russia with love?
> > Host: suspiroamor.land.ru
> > Accept: */*
> > 
> < HTTP/1.1 200 OK
> < Server: nginx/0.5.31
> < Date: Sun, 25 Nov 2007 03:09:45 GMT
> < Content-Type: application/octet-stream
> < Content-Length: 523264
> < Last-Modified: Fri, 23 Nov 2007 22:31:24 GMT
> < Connection: keep-alive
> < Accept-Ranges: bytes
> < 
> { [data not shown]
> 
> 
> The signature/data files are a bit old (Nov. 9) but F-prot had this to say:
> 
> amor.com  Infection: Possibly a new variant of
> W32/NewMalware-LSU-based!Maximus
> 
> Available as downloaded above, or local copies together in a zip for
> anyone that wants to look at them:
> 
> https://atr2.ath.cx/vx_lab/specimens/unidentified/suspiroamor-land-ru/suspi
> roamor-land-ru-trojan.zip
> 
> Useful tool to examine binaries:
> http://hte.sourceforge.net/
> 
> _________________________________________
> SANS Network Security 2007 in Las Vegas September 22-30. 39 courses,
> SANS top instructors.  http://www.sans.org/info/9346
> 
> [end]
> 
> 
> --
> "Fergie", a.k.a. Paul Ferguson
>  Engineering Architecture for the Internet
>  fergdawg(at)netzero.net
>  ferg's tech blog: http://fergdawg.blogspot.com/

-- 
PinkFreud
Chief of Security, Nightstar IRC network
irc.nightstar.net | www.nightstar.net
Server Administrator - Blargh.CA.US.Nightstar.Net
Unsolicited advertisements sent to this address are NOT welcome.
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to