I think this is a spinned-out version of BillGates or they released NEW version, just spotted by the generous anonymous report (w/thanks)
This is the sample:
https://www.virustotal.com/en/file/a2da ... /analysis/
Noted : Detection ratio is dropped to ZERO (oh.. not again) !!!
No Bill nor Gates, No DNSAmp with its IP addresses hard coded too, the atack "Beikong" manager is gone & replaced with fresh one.
Same GCC: (GNU) 4.0.0 compilers with glibc 2.3.5 compats..but this can be changed.
Serials and other "parts" stays, with new addition in the C++ projects:
Code: Select all Attack.cpp
Bee.cpp
CmdMsg.cpp
ConfigDoing.cpp
ExChange.cpp
Manager.cpp
ProtocolUtil.cpp
StatBase.cpp
ThreadAtk.cpp
ThreadAtkTimer.cpp
ThreadClientStatus.cpp
ThreadTask.cpp
AutoLock.cpp
Media.cpp
NetBase.cpp
ThreadCondition.cpp
Thread.cpp
ThreadMutex.cpp
Utility.cpp
WinDefSVC.cpp
Attack.cpp
Bee.cpp
CmdMsg.cpp
ConfigDoing.cpp
ExChange.cpp
Manager.cpp
ProtocolUtil.cpp
StatBase.cpp
ThreadAtk.cpp
ThreadAtkTimer.cpp
ThreadClientStatus.cpp
ThreadTask.cpp
AutoLock.cpp
Media.cpp
NetBase.cpp
ThreadCondition.cpp
Thread.cpp
ThreadMutex.cpp
Utility.cpp
WinDefSVC.cpp
xinetd for autostart stays:
Code: Select all#!/bin/bash
/etc/rc%d.d/S%d%s
ln -s /etc/init.d/%s %s
The attack vectors is decreased:
Code: Select all1. AttackUdp
2. AttackSyn
3. AttackIcmp
4. AttackDns
5. AttackCC
6. AttackTcp
More user-agent used:
Code: Select allMozilla/4.0 (compatible; MSIE 4.0; Windows 98)
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:0.9.4) Gecko/20011128 Netscape6/6.2.1
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1b2) Gecko/20060823 SeaMonkey/1.1a
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11
Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en; rv:1.8.1.6) Gecko/20070809 Camino/1.5.1
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.43 Safari/537.31
Mozilla/5.0 (Windows NT 5.1; rv:18.0) Gecko/20100101 Firefox/18.0
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2; .NET4.0C; .NET4.0E)
0x08047C Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322)
*) I will add the reversing highlight later. Gotta nail this down first.
Typical drop:
Code: Select all00000000 16 00 00 00 01 00 00 00 00 00 4e 2e 25 45 4e 2e |..........N.%EN.|
00000010 25 45 4e 2e 25 45 e8 fd e8 03 |%EN.%E....|
0000001a
They tried to fool us in CNC connection now, but good guys IS NOT THAT STUPID. CNC data is cracked as per below:
Code: Select allIP: 61.147.103.21
Port: 8809
CNC Hostname: g.nasa-uni.com ==> 61.147.103.21
IP Location: 61.147.103.21||23650 | 61.147.103.0/24 | CHINANET-JS-AS | CN | CHINATELECOM.COM.CN | CHINANET JIANGSU PROVINCE NETWORK
CNC Domain registration details for "escalation process":
Domain Name: NASA-UNI.COM
Registry Domain ID: 1838734896_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Update Date: 2013-12-11 03:32:25
Creation Date: 2013-12-11 03:14:08
Registrar Registration Expiration Date: 2015-12-11 03:14:08
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.480-624-2505
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: clientRenewProhibited
Domain Status: clientDeleteProhibited
Registry Registrant ID:
Registrant Name: xxx xxx
Registrant Organization: xxx
Registrant Street: xxx
Registrant City: xxx
Registrant State/Province: Alberta
Registrant Postal Code: 520131
Registrant Country: China
Registrant Phone: +0.1522222222
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: thierrysy410@gmail.com
Registry Admin ID:
Yep. This prick is using this email address, which I just confirmed is valid:
thierrysy410@gmail.com
CNC domain cracked PoC:
Code: Select allSYSCALL-sendto(4, "3=\1\0\0\1\0\0\0\0\0\0\1g\10nasa-uni\3com\0\0\1\0\1", 32, 0,
{sa_family=AF_INET, sin_port=htons(53),
sin_addr=inet_addr("DNS-SERVER-ADDRESS")}, 16)
CNC IP cracked PoC:
Code: Select allSYSCALL-connect(3, {sa_family=AF_INET, sin_port=htons(8809),
sin_addr=inet_addr("61.147.103.21")}, 16)
Can be lookud^up:
Code: Select all; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60523
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;g.nasa-uni.com. IN A
;; ANSWER SECTION:
g.nasa-uni.com. 3600 IN A 61.147.103.21
;; AUTHORITY SECTION:
nasa-uni.com. 3600 IN NS ns56.domaincontrol.com.
nasa-uni.com. 3600 IN NS ns55.domaincontrol.com.
;; ADDITIONAL SECTION:
ns56.domaincontrol.com. 1404 IN A 208.109.255.28
ns55.domaincontrol.com. 934 IN A 216.69.185.28
;; Query time: 347 msec
;; SERVER: 202.238.95.24#53(202.238.95.24)
;; WHEN: Sat Oct 18 20:45:00 2014
;; MSG SIZE rcvd: 132
#MalwareMustDIE!