ZeroAccess distributed in Japan, via Glazunov Exploit Kit.
The EK infected site was practically hacked, without IE & some conditions it blinds me..
But after the conditions met:
Noted: this is the injection code made by server site. No such trace of redirection code found in original site's data. Mustbe a hacked of either .htaccess, php.ini, default.php etc, or even there's a deeper risk than that, please be concerned to your server security if you got hit by this EK infection.
redirected access was spotted to various URLs, same IP:
Code: Select allhxxp://212.124.115.197-static.reverse.softlayer.com:8080/3167716386/733
hxxp://212.124.115.197-static.reverse.softlayer.com:8080/3167716386/5504.zip
hxxp://212.124.115.197-static.reverse.softlayer.com:8080/17371
This redirection caused by injection code in the top page:
or
with help of @kafeine we whacked the sample in one session only:
The ZeroAccess is using below Crypto:
Code: Select allMicrosoft Base Cryptographic Provider v1.0
Faking Google Update:
Code: Select allGoogleUpdate.exe
Google Update Service (gupdate)
Keeps your Google software up to date. If this service is disabled or stopped,
your Google software will not be kept up to date, meaning security vulnerabilities
that may arise cannot be fixed and features may not work. This service uninstalls
itself when there is no Google software using it.
The actual DLL used:
Code: Select allGDI32.dll
USER32.dll
IMM32.DLL
ntdll.dll
kernel32.dll
Secur32.dll ←注意(確認・チェック・DEP)
RPCRT4.dll
ADVAPI32.dll
USP10.dll
LPK.DLL
msvcrt.dll
WS2HELP.dll
WS2_32.dll ←注意(結構マルウェア使われています)
SHLWAPI.dll
SHELL32.dll
comctl32.dll
mswsock.dll ←注意(ネットワーク)
hnetcfg.dll ←注意(ネットワーク)
wshtcpip.dll ←注意(ネットワーク)
rsaenh.dll ←注意(エンコーディング)
crypt32.dll ←注意(エンコーディング)
Apphelp.dll
VERSION.dll
Forget it if you want to run sample in Cuckoo or sandbox:
GeoIP as usual:
ZeroAccess Botnet:
All leads to this one IP only, suspected CnC used for initiation the bot:
Encrypted comm via "malformed" UDP aka ZeroAccess botnet crypted protocol:
Samples, PCAP, PluginDetect 0.8.1 used, Jar with CVE-2013-1493 as per below pic is shared below, hope this help researchersand antivirus industry!
Sample:
JAR:
https://www.virustotal.com/en/file/02f4 ... 375117024/
Payload:
https://www.virustotal.com/en/file/3f8b ... 375108446/
More details is
here (I am sorry is in Japanese! Please use google translate, but I strongly suggest you see as per it is for the better format codes)