The obfuscation wasn't too bad in this case... Just a couple tricks repeated 
over and over.

I manually 'unwrapped' the layers of obfuscation, and ended up with some pretty 
simple code.

For example:
c4239='do';
db749="coaujoimrggh".replace(/[oajirgh]+/g,"");
eaf76='ent.r';
f638e36f4="esgkfkusueduvrbo".replace(/[sgkudvbo]+/g,"");
gda746b57='rer';
a206c=eval(c4239+db749+eaf76+f638e36f4+gda746b57);

Is basically a set of strings containing extra characters, that are stripped 
out by the replace commands, then merged.  This can be simplified to:
c4239='do';
db749="cum";
eaf76='ent.r';
f638e36f4="efer";
gda746b57='rer';
a206c=eval("document.referer");

-Dave

> -----Original Message-----
> From: [email protected] 
> [mailto:[email protected]] On Behalf
> Of David Shpritz
> Sent: Wednesday, December 02, 2009 12:44 PM
> To: PaulDotCom Security Weekly Mailing List
> Subject: Re: [Pauldotcom] phishing question
> 
> Hey David,
> Would you mind telling us what method you used to deobfuscate the scripts?  
> Usually I have done these
> by hand or used Malzilla, but I'm always looking for new methods.  Thanks!
> 
> David Shpritz
> 
> -----Original Message-----
> From: [email protected] 
> [mailto:[email protected]]
> On Behalf Of David Auclair
> Sent: Wednesday, December 02, 2009 9:45 AM
> To: PaulDotCom Security Weekly Mailing List
> Subject: Re: [Pauldotcom] phishing question
> 
> It looks like the javascript on the page you mentioned leads to this page:
> hxxp://www . businessinabox . com . au/357/?go
> 
> Which is full of more obfuscated javascript, which leads to sites such as:
> hxxp:// 62.204.113.141 /d=www.facebook.com/0x3E8/f=fb2/view/console=yes/
> 
> Which seems to have 'you need to update your flash player' image, linking to 
> setup.exe
> 
> According to virustotal, the setup.exe contains koobface:
> http://www.virustotal.com/analisis/5e9ce9c41a8f46d5dfc4ce366f6f47cb347bcbaa93cd1fcb132a72f61bab14e1-
> 1259705119
> 
> -Dave
> 
> > -----Original Message-----
> > From: [email protected] 
> > [mailto:[email protected]] On
> Behalf
> > Of Chris Blazek
> > Sent: Wednesday, December 02, 2009 12:04 AM
> > To: PaulDotCom Security Weekly Mailing List
> > Subject: Re: [Pauldotcom] phishing question
> >
> > PJ,
> >    Yeah, I had the user change all passwords from the email account to
> > fb. I had tried googling for that 1st part of the address, hoping
> > someone had posted something about it. That came up empty.
> > I tried to get malzilla to decode it, but I really have little
> > experience decoding JavaScript like that.
> > I'll try looking for deobfuscaters to see if something else can decode
> > it.
> > Sorry for the typos in the original email. :)
> >
> > Thanks for the help!
> >
> > Chris
> >
> >
> >
> > On Dec 1, 2009, at 8:47 PM, PJ McGarvey <[email protected]> wrote:
> >
> > > Well, if you mean what does the obfuscated code do, there are a few
> > > sites I've used that can "de-obfuscate" code however sometimes all
> > > that can tell you is that "yeah, it's probably malicious".  I would
> > > google for "javascript deobfuscate".
> > >
> > > You could submit the blogspot site to an online sandbox for
> > > analysis, like I just did:
> > >
> > > http://anubis.iseclab.org/?action=result&task_id=1c4a179271c4d4ee4f5b9820e431f7281&format=html
> > >
> > > and possibly find other URLs found in the de-obfuscated code to see
> > > what they do.... like this one
> > > http://1nonsensical.cn/?pid=312s02&sid=4db12f
> > >
> > > ... I've yet to find a .cn domain name I could trust.  LOL.
> > >
> > > Follow down the rabbit hole...
> > >
> > > That way you can find out if the PC was infected, and how to clean
> > > it up.
> > >
> > > Otherwise it would seem like some sort of facebook worm that spreads
> > > using the FB address book.  Was the user logged into Facebook at the
> > > time?  Might be a good idea to change their password, sounds like it
> > > either used the active facebook session to send itself out, or maybe
> > > a cookie with the user's saved credentials.
> > >
> > > PJ
> > >
> > > From: [email protected]
> > > Date: Tue, 1 Dec 2009 14:54:36 -0600
> > > To: [email protected]
> > > Subject: [Pauldotcom] phishing question
> > >
> > > A coworker clicked on a link in an email and was directed to
> > > facebook then redirected to the following site:
> > > despatiesmercemerce . blogspot . com
> > > All of there fb contacts then received the same email. I pulled up
> > > the site in malzilla and noticed a script block in the header that
> > > looks like it's obfuscated.
> > >
> > > I was wondering if someone in the group could figure out what the
> > > site was trying to do.
> > >
> > > Thanks,
> > > Chris
> > >
> > >
> > > _______________________________________________
> > > Pauldotcom mailing list
> > > [email protected]
> > > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > > Main Web Site: http://pauldotcom.com
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to