From bh 108.178.59.25/a.php?e=5&f=0e44a
Just got interested into this threat
exploits -> payloads -> zeusV3 -> pwd stealer and/or rogue/fake soft
https://www.virustotal.com/file/bfd5046 ... 342385814/
https://www.virustotal.com/file/a1b36aa ... 342385371/
Microsoft don't detect it :mrgreen:
Code: Select allhxxp://sam-latrilogie.com:8080/pony/gate.php
hxxp://loceanic.fr:8080/pony/gate.php
hxxp://viveroparadiso.com.ar/NSyf.exe
hxxp://uppalneurohospital.com/x7nx.exe
hxxp://greatroastcoffee.com/w1HjW1.exe
gate.php <- If gate/pony so Blackhole and the rest
.exe files -> zeus & cie.
Pony C&C:
Code: Select allhxxp://80.248.208.162:8080/pony/admin.php (sam-latrilogie.com)
hxxp://194.146.227.48:8080/pony/admin.php (loceanic.fr)
hxxp://176.31.255.41:81/pony/admin.php (etsiunjour.fr)
Abuse already sent to OVH but no reaction.
Look's like they use pony to get accounts/credentials and use them for bh/pony/etc or to host pe on compromised machines
Also have a look here, kafeine have do an awesome work:
http://malware.dontneedcoffee.com/2012/ ... ny-17.html