Author Topic: Much visited Dutch news site infected with FP_AX_CAB_INSTALLER64.ex- ?  (Read 3123 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33903
  • malware fighter
Hi folks,

Like to get information on this detection, please? http://siteinspector.comodo.com/public/reports/show_log?id=663184
Action: Inject code to other applications also check link to -s0.2mdn dot net
see: http://www.mywot.com/en/scorecard/s0.2mdn.net
Sucuri does not find anything suspicious".
Given clean here: http://urlquery.net/report.php?id=8266
Suspicious part:
-www.nu.nl/scripts-cache/xtclicks.js suspicious
[suspicious:2] (ipaddr:62.69.179.12) (script) -www.nu.nl/scripts-cache/xtclicks.js
Can anyone confirm?

polonus


« Last Edit: November 13, 2011, 12:35:03 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37533
  • Not a avast user
« Last Edit: November 13, 2011, 01:48:39 AM by Pondus »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33903
  • malware fighter
Re: Much visited Dutch news site infected with FP_AX_CAB_INSTALLER64.ex- ?
« Reply #2 on: November 13, 2011, 05:38:26 PM »
Hi Pondus,

Well done, and as always coming up with the right details to enable polonus to get a bit nearer to the root of the evil. And why, Pondus, because at the end of the wepawet page you provided for us, we can now take that MD5 hash and then we land here through a simple google query:
Now we can see what is really out there or rather was out there as the link may no longer be up or dead:
http://amada.abuse.ch/?search=e8935d47df2caa9aecf5dc5b7ee48cc5 Flash malware - probably not longer there? The second string provided there is a complicated password string and when reversing I get "d41d8cd98f00b204e9800998ecf8427e -   
The string provided is not a true MD5 hash. Please try again.
MD5 encoding is d41d8cd98f00b204e9800998ecf8427e
CRC32 encoding is 0
SHA1 encoding is da39a3ee5e6b4b0d3255bfef95601890afd80709
Base64 encoding is null" -http://bs.serving-sys.com/BurstingPipe/adServer.bs
has a very poor WOT reputation
And this is what goes on there XSS header injection, see this report:
http://xss.cx/examples/html/bs.serving-sys.com-http-header-injection.html
report source: -http://xss.cx/sitemap.aspx

Interesting, Pondus, interesting....

polonus



« Last Edit: November 13, 2011, 05:40:00 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!