月曜日, 4月 22, 2013

#OCJP-104:「dp26022227.lolipop.jp」/「210.172.144.245」にZEUSバンキングトロイを発見!

下記のウェブサイトに「Zeus」/Zbotバンキングトロイを発見しました。

ホームページの見た目は下記のように企業のサイトですね。



そして下記のウRLをアクセスしたらマルウェアがダウンロードされてしまいます。



ダウンロード証拠(ログ)は下記となりますが...

--2013-04-22 18:28:48--  hxxp://dp26022227.lolipop.jp/6ycg8n.exe
Resolving dp26022227.lolipop.jp... 210.172.144(.)245
Caching dp26022227.lolipop.jp => 210.172.144(.)245
Connecting to dp26022227.lolipop.jp|210.172.144(.)245|:80... connected.
  :
GET /6ycg8n.exe HTTP/1.1
Host: dp26022227.lolipop.jp
HTTP request sent, awaiting response... 
  :
HTTP/1.1 200 OK
Date: Mon, 22 Apr 2013 09:28:29 GMT
Server: Apache
Last-Modified: Mon, 15 Apr 2013 22:41:00 GMT
ETag: "868074c-4b000-f2677700"
Accept-Ranges: bytes
Content-Length: 307200
Content-Type: application/octet-stream
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
  :
200 OK
Length: 307200 (300K) [application/octet-stream]
Saving to: ‘6ycg8n.exe’
2013-04-22 18:28:50 (725 KB/s) - ‘6ycg8n.exe’ saved [307200/307200]

ファイルのスナップショットの証拠(下記)


ファイル自体に暗号されたPEファイルです、詳細情報は下記のようになります...
Sections:
.text 0x1000 0xe00 3584
.rdata 0x2000 0x870 2560
.data 0x3000 0x2000 512
.rsrc 0x5000 0x4904f 299520

Entry Point at 0x59e
Virtual Address is 0x40119e
Compile time: 2013-01-23 18:06:23

ExifTool:
MIMEType                 : application/octet-stream
Subsystem                : Windows GUI
MachineType              : Intel 386 or later, and compatibles
TimeStamp                : 2013:01:23 19:06:23+01:00
FileType                 : Win32 EXE
PEType                   : PE32
CodeSize                 : 3584
LinkerVersion            : 2 25
FileAccessDate           : 2013:04:21 03:40:23+01:00
Warning                  : Invalid Version Info block
EntryPoint               : 0x119e
InitializedDataSize      : 302592
SubsystemVersion         : 5 1
ImageVersion             : 0 0
OSVersion                : 5 1
FileCreateDate           : 2013:04:21 03:40:23+01:00
UninitializedDataSize    : 0

00004D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
002000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
003000 00 00 00 00 00 00 00 01 00 00 00 80 00 00 00 ................
0040BB 11 00 0E 1F B4 09 CD 21 B8 01 4C CD 21 90 90 ........!..L.!..
005054 68 69 73 20 70 72 6F 67 72 61 6D 20 6D 75 73 This program mus
006074 20 62 65 20 72 75 6E 20 75 6E 64 65 72 20 57 t be run under W
007069 6E 33 32 0A 0D 24 37 00 00 00 00 00 00 00 00 in32..$7........
008050 45 00 00 4C 01 04 00 9F 26 00 51 00 00 00 00 PE..L....&.Q....
  [...]

このマルウェアを実行されたら下記のマルウェアファイルが出て、保存されます。。。
%AppData%\Lilagi(random, regex: [A-Z]{1}[a-z]{5})\veiby.exe (random, format regex: [a-z]{5}¥.exe )
%Temp%\tmp7cf80627.bat (random, format regex: tmp[a-z|0-9]{8}¥.bat )
%AppData%\Microsoft\Address Book\(USER).wab

下記のマルウェアプロセスが立ち上がって...
C:\Documents and Settings\[PC-USER]\Application Data\Lilagi\veiby.exe""
C:\WINDOWS\system32\cmd.exe" /c "C:\DOCUME~1\[PC-USER]\LOCALS~1\Temp\tmp7cf80627.bat"" 

そしてもっとのマルウェアファイルとBATファイルが削除されました。
当時下記のWindowsのレジストリに変更が行い...
HKEY_CURRENT_USER\Software\Microsoft\Epnese\27h77jd0 / VALUE: TZK2ftIpZeQhBJelF7vDdg== 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Server ID / VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Server ID/VALUE: 1 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Server ID/VALUE: 2 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere\LDAP Server ID/VALUE: 3 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Server ID/VALUE: 4 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\PreConfigVer/ VALUE: 4 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\PreConfigVerNTDS/VALUE: 1 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\Account Name/ VALUE: Active Directory 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Server/VALUE: NULL 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Search Return/VALUE: 100 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Timeout/VALUE: 60 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Authentication/VALUE: 2 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Simple Search/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Bind DN/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Port/VALUE: 196 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Resolve Flag/VALUE: 1 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Secure Connection/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP User Name/VALUE: NULL 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC\LDAP Search Base/VALUE: NULL 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\Account Name/VALUE: Bigfoot Internet Directory Service 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Server/VALUE: ldap.bigfoot.com 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP URL/VALUE: http://www.bigfoot.com 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Search Return/VALUE: 100 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Timeout/VALUE: 60 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Authentication/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Simple Search/VALUE: 1 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot\LDAP Logo/VALUE: %ProgramFiles%\Common Files\Services\bigfoot.bmp 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\Account Name/VALUE: VeriSign Internet Directory Service 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Server/VALUE: directory.verisign.com 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP URL/VALUE: http://www.verisign.com 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Search Return/VALUE: 100 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Timeout/VALUE: 60 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Authentication/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign\LDAP Search Base
  [...] 
 HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name\(null) /VALUE: C:\Documents and Settings\\Application Data\Microsoft\Address Book\.wab 
 HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\OlkContactRefresh/VALUE: 0 
 HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\OlkFolderRefresh/VALUE: 0 
 HKEY_CURRENT_USER\Identities\{B0BB3B42-3666-47AA-8D85-B94B99DB4C9B}\Identity Ordinal/VALUE: 1 
 HKEY_CURRENT_USER\Identities\Identity Ordinal/VALUE: 2 
 HKEY_CURRENT_USER\Software\Microsoft\Epnese\230fjh3e/VALUE:  1

最後にネットワーク動きを発見、下記のようにレコードされました...
195.169.125.228:29902
78.139.187.6:14384
190.21.87.83:15196
186.134.148.36:12460
75.6.222.103:11577
79.186.121.2:29666 

ウイルストータルに確認しましたら、下記の情報となります...
URL: https://www.virustotal.com/en/file/ebb5522800279af67e2d209c26b6c97a4c15ea6e384c5f02a51e5c1a2b92a590/analysis/
SHA256: ebb5522800279af67e2d209c26b6c97a4c15ea6e384c5f02a51e5c1a2b92a590
SHA1:fdc202a332c52a55b4a9939bd8e8c2d0b7c1f40e
MD5: 1b55d07cb1ef519409d449ceb883999f
File size: 300.0 KB ( 307200 bytes )
File name: e68e83363dfcd5e48240116a502f0845f1f5a6c6
File type: Win32 EXE
Tags:peexe
Detection ratio: 34 / 46
Analysis date:2013-04-21 02:31:37 UTC ( 1 day, 8 hours ago )

MicroWorld-eScan: Trojan.GenericKDZ.14448
nProtect  : Trojan.GenericKDZ.14448
McAfee : PWS-FASY!1B55D07CB1EF
Malwarebytes : Malware.Packer.EGX7
K7AntiVirus  : Trojan
K7GW: Trojan
Symantec  : Packed.Generic.402
Norman : Hlux.WH
ESET-NOD32: a variant of Win32/Kryptik.AYWT
TrendMicro-HouseCall  : TROJ_SPNR.14DG13
Avast  : Win32:Kryptik-LKV [Trj]
Kaspersky : Trojan-Spy.Win32.Zbot.kkce
BitDefender  : Trojan.GenericKDZ.14448
Sophos : Mal/Zbot-KR
Comodo : TrojWare.Win32.Kryptik.AYFK
F-Secure  : Trojan.GenericKDZ.14448
DrWeb  : Trojan.Packed.2928
VIPRE  : Trojan.Win32.Winwebsec.mdc (v)
AntiVir: TR/Spy.ZBot.EB.325
TrendMicro: TROJ_SPNR.14DG13
McAfee-GW-Edition  : Heuristic.LooksLike.Win32.Suspicious.B
Emsisoft  : Trojan-Spy.Win32.Zbot (A)
Kingsoft  : Win32.Troj.Zbot.KK.(kcloud)
Microsoft : PWS:Win32/Zbot.gen!AM
SUPERAntiSpyware: Trojan.Agent/Gen-Fynloski
GData  : Trojan.GenericKDZ.14448
Commtouch : W32/Trojan.SQKB-8856
AhnLab-V3 : Trojan/Win32.Foreign
VBA32  : OScope.Malware-Cryptor.Hlux.6413
PCTools: HeurEngine.MaliciousPacker
Ikarus : Trojan-PWS.Win32.Zbot
Fortinet  : W32/Kryptik.X!tr
AVG : Crypt_s.AZD
Panda  : Generic Malware

やはりZeusですね、はやめにお手続きした方がいいと思います、下記はサイトの連絡先とネットワーク情報となります...
・サイトに書いた連絡先:
 チーフマリッジカウンセラー
 後藤理恵

・ドメイン:
[Domain Name]                   LOLIPOP.JP
[Registrant]                    paperboy&co.
[Name Server]                   sv.madame.jp
[Name Server]                   dns2.lolipop.jp
[Signing Key]                   
[Created on]                    2001/09/21
[Expires on]                    2013/09/30
[Status]                        Active
[Last Updated]                  2012/10/01 01:05:01 (JST)
Contact Information:
[Name]                          paperboy&co.
[Email]                         jp@muumuu-domain.com
[Web Page]                       
[Postal code]                   150-8512
[Postal Address]                26-1 Sakuragaokacho
                                Shibuya-ku, Tokyo
                                1508512,JAPAN
[Phone]                         03-5456-2622
[Phone]                         +81-3-5456-2622
[Fax]                           +81-3-5456-2633

・ネットワーク:
inetnum:        210.172.128.0 - 210.172.191.255
netname:        interQ-CIDR-BLK-JP
descr:          GMO Internet, Inc.
remarks:        Email address for spam or abuse complaints : abuse@gmo.jp
country:        JP
admin-c:        JP00014973
tech-c:         JP00014973

0 件のコメント:

コメントを投稿