A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #26330  by R136a1
 Mon Jul 20, 2015 9:35 am
Hi folks,

the following information is based on an online article which describes a spear-fishing attack on the Pentagon: http://www.thedailybeast.com/articles/2 ... tagon.html

As you can see, the article is quite entertaining. So, if we believe the provided information the website of the National Endowment for Democracy (ned.org) was compromised to host a malicious file. And the spear-fishing mails contained a link to this file. Indeed, it turned out that a malicious ZIP file was uploaded to ned.org: "www.ned.org/docs/The New Containment Underminig Democracy.ZIP" (now removed)

ZIP: https://www.virustotal.com/en/file/9f46 ... /analysis/

The ZIP file contains a Self-extracting executable named "The New Containment Underminig Democracy.exe".

SFX EXE: https://www.virustotal.com/en/file/7b3e ... /analysis/

The self-extracting executable contains an executable named "readerView.exe" and a decoy document named "382212.pdf".

EXE: https://www.virustotal.com/en/file/ee5e ... /analysis/

The executable is a downloader that requests the real payload which is unfortunately missing. It tries to download the following SWF file: "http://connectads.com/events/power/2/loading.swf" (now removed)

The full analysis of MiniDionis can be found here: http://researchcenter.paloaltonetworks. ... o-seaduke/

All mentioned files + more MiniDionis samples are attached.

That's all
Attachments
PW: infected
(1.76 MiB) Downloaded 93 times
PW: infected
(1.86 MiB) Downloaded 80 times