A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #20493  by unixfreaxjp
 Thu Aug 15, 2013 4:25 am
OP #Kelihos by #MalwareMustDie team.

Report is attached, for registered members only.
Read the comment before. Many mis-spell pls bear.
Please support us suppressing Kelihos and please help to cleanup IP infection in your network & country.
Attachments
The attachment is text file contains report of the latest OP Kelihos status, shared to KERNELMODE.INFO exclusively.
The information is important to research/study purpose, suspension purpose, and mitigation purpose.
The information is free to use with mention MalwareMustDie group who made hard effort on this OP.
Any paste and claiming the research data for any forum online by any entity w/o mention is forbidden.
MalwareMustDie (here-forth MMD) is legal NPO entity registered in Ohio,US and Tokyo, Japan,
withhold rights of the current data and the abuse of usage will be legally prosecuted.
---
On behalf of MalwareMustDie, @unixfreaxjp

(4.58 KiB) Downloaded 62 times
 #20496  by unixfreaxjp
 Thu Aug 15, 2013 9:47 am
Our Russian friend, beware.
.RU started to be used again by Kelihos scums, just now.
From yesterday's registration via Reggi.RU
PoC is for KM members only, we won't let bad guys see!

Image
The used domains so far are:

DAFLYCYM.RU
NETEKWEC.RU
BESYQSOP.RU

There are many more, please be aware..
Below is the GREP formula for Kelihos domains in RU and SU via Reggi.SU:
[a-z]{8}\.[a-z]{2}
#MalwareMustDie!
Last edited by Xylitol on Fri Aug 16, 2013 10:13 am, edited 1 time in total. Reason: picture size
 #20503  by unixfreaxjp
 Thu Aug 15, 2013 4:26 pm
Kelihos scum moved registrar again into Germany Registrar: 1API GmbH
And registering payload domains like .INFO, .EU, .NL etc from it.
PoC is below in attachment part for the KM members only, if you have contact to 1API GmbH please-
kindly inform them to stop the registration of the randomized domain with the below regex:
Image
Attachments
Screen Shot 2013-08-16 at 12.31.51 AM.png
Scroll the picture down to see all of the PoC details
Screen Shot 2013-08-16 at 12.31.51 AM.png (173.59 KiB) Viewed 595 times
 #20511  by GAGA
 Sat Aug 17, 2013 12:42 pm
Security Observer's Repot
Overview
Code :SECO2013-8-1701
Title :Fake Intel
Author :Martin
Date submitted :2013-8-17
MD5 :9B68B45AFA269BA1B0C01749FA4B**2F

Detail
Disclosure of status
2013-8-17 Security Observer issued a warning to the vendor

Detection status
2013-8-17 AVAST!:Not detected
2013-8-17 Kaspersky:Not detected
If you want to get this sample,you can send an e-mail to join us
Link:http://www.atvirus.net/?p=1723
E-mail:partner@atvirus.net

Respond
None
But,I have the sample,so i post it to our community~~ :lol:
Download:
(913.91 KiB) Downloaded 83 times
Password:infected
https://www.virustotal.com/en/file/b71a ... 376743809/
 #20520  by unixfreaxjp
 Sun Aug 18, 2013 2:52 pm
@EP_X0FF
Cc: @Xylit0l

Kindly forgive me if this question is not a proper subject, be free to delete this post then.
I want to ask WHY Kelihos samples, the Kelihos BotNet (I called it Momma Kelihos) like below VT posted ones ALWAYS having the worse detection ratio? Upon detected is only between 2/4x to 5/4x in average 3/4x.
https://www.virustotal.com/en/file/4ea5 ... /analysis/
https://www.virustotal.com/en/file/c687 ... /analysis/
https://www.virustotal.com/en/file/dc26 ... /analysis/
https://www.virustotal.com/en/file/dc26 ... /analysis/
and so on..

Even we shared and sent the samples immediately to every AV & public.

Is it something in the binary that makes it so low score in detection?
Or is it because AV doesn't think they are important to detect and focus to the previous layer of trojan who downloaded them?
I am afraid Kelihos is having builder that can prevent AV detection in zero ratio upon released.

Best regards,
 #20522  by EP_X0FF
 Sun Aug 18, 2013 4:07 pm
Because they always virus scan payloads on private multi-av checkers before using. Simple rule: EK payloads must be FUD by default for target audience and location. If you spread malware exclusively for country X where popular scanners A & B, you don't care if antivirus C from other country Y will detect it, you will push bot clean from A & B antivirus detections, leaving C as is (if it not bypassed automatically as in most cases because signatures are mostly common).

Binary rotates few times per day to avoid signature updates. If AV releases generic signature they update crypter, adopting to AV changes, and everything starts from the beginning. Why Fortinet has always good detection ratio (compared to others)? Because they dgaf for it, as it not available for EK target audience.
 #20525  by unixfreaxjp
 Sun Aug 18, 2013 5:31 pm
So that's why AV is never in winning position at all against these binaries. Thank you. Your explanation rocks, and your heart is good for sharing, respect!
Hope many users will be more aware of this fact too.
This group is truly Evil, so please be careful for you and friends who live in same countries with these moronz.
Look forward to see them behind bars.
 #20527  by unixfreaxjp
 Sun Aug 18, 2013 9:08 pm
Kelihos opened .NET domains too via BizCN.
PoC & last info is for KM members only.
Attachments
200.png
Actuve registrar used now:
BizCN for .NET, .INFO, .ORG,.ME
1API GmbH for .NL, .EU
Reggi.RU for .RU, .SU

200.png (49.52 KiB) Viewed 509 times
 #20589  by unixfreaxjp
 Sat Aug 24, 2013 8:08 am
The latest full set of kelihos binary samples:
http://www.mediafire.com/?shhuvrtkxn5l9pn
Attachments
Screen Shot 2013-08-24 at 5.10.26 PM.png
https://www.virustotal.com/en/file/76c90936347470895bf3747a4bc708e3ff341b23f1a8b8e8d14b0bf109e80254/analysis/1377327635/
https://www.virustotal.com/en/file/2d82d3b03231366944018e5117ddd2cd80a521db843a320774b58004127a8115/analysis/1377327699/
https://www.virustotal.com/en/file/f3b398626244ad2b86b762f82603fe954bd60913bf5a850789573b78f49acaa0/analysis/1377327760/
https://www.virustotal.com/en/file/72133539ac0f54bbda8640477af8f5e084229f34c42e4187ca61a7294979706a/analysis/1377327871/
https://www.virustotal.com/en/file/da65918f7ac5a9275a150e863b61d97421c0f7dbbc3255fada7fb2a08e37ecde/analysis/1377327940/
https://www.virustotal.com/en/file/0bfd3c1daa9b44edd7d08e525216a54133f883dec4919be07987f931ea502127/analysis/1377328117/
https://www.virustotal.com/en/file/57c630b45a709f4ed50022d3543fb7c3016521ca5b6381727b4f967d217a88d2/analysis/1377328142/
https://www.virustotal.com/en/file/7b86e613647064851a1788fde085a9092f7e5721767ac03d0c113ae130bc91cf/analysis/1377328252/
https://www.virustotal.com/en/file/7eb578b9ba425a392b8cd326848c771612d8fc2bb4e9d0a4f2ef337b4541d478/analysis/1377328325/
https://www.virustotal.com/en/file/75a95e520c3f4d73787c2ff48e4767c884875e75c9cf122409744103e930377a/analysis/1377328412/
https://www.virustotal.com/en/file/1f51fabd922a9cc34e6a497df4d279b2d20d284a2329e1533b29a03d2d682a1a/analysis/1377328697/
https://www.virustotal.com/en/file/e1521dc185607a3cbc50777ab6d365acbcdd9e30afc6f62cd16fca320109dd83/analysis/
https://www.virustotal.com/en/file/7e5dbb2c4bed47bac8f51ff6d7428a6ac1e62e9fef92310e6e3488b024d8ccea/analysis/1377329047/
https://www.virustotal.com/en/file/11b92ec959505dd48127d17eeec44829c4d87029c3f125e0071e2ee89ccd90b3/analysis/1377329164/
https://www.virustotal.com/en/file/50869bfad10a3c71ed3edc2fd4481ffed5cbf5ace73154bcf4f98eb11edc47ff/analysis/1377329246/

Screen Shot 2013-08-24 at 5.10.26 PM.png (6.54 KiB) Viewed 464 times
  • 1
  • 3
  • 4
  • 5
  • 6
  • 7
  • 10