Author Topic: Again the valuable avast! Webshield!  (Read 6394 times)

0 Members and 2 Guests are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Again the valuable avast! Webshield!
« on: June 16, 2014, 12:14:53 PM »
Only three av will detect (one of which is good old avast!): https://www.virustotal.com/nl/file/607255ccc56416deafe9d9029c7a8d0d9ff6b0fc07ba6e7ba2f9a04eec4708d4/analysis/
See: https://www.virustotal.com/nl/domain/lacusk.com/information/
and http://sitecheck.sucuri.net/results/lacusk.com/ as

and the misrepresentation from here: http://www.domaintuno.com/?
reported to WOT: domaintuno.com/d/lacusk.com?

polonus
« Last Edit: June 16, 2014, 12:21:16 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #1 on: June 18, 2014, 09:55:53 PM »
Well here avast! Web Shield detects JS:Decode-BDD[Trj] ->
Trustwave flags site as wirh potential virus behavior, despite this: http://www.statscrop.com/www/napsugarpiheno.hu

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37700
« Last Edit: June 18, 2014, 11:42:51 PM by Pondus »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #3 on: June 19, 2014, 01:34:20 PM »
Here avast! Web Shield detects  JS:Iframe-DWL[Trj] ->  iframes found:
http://sitecheck.sucuri.net/results/choicesupports.org
Code: 302,  htxp://jerezdeloscaballeros.org/ewsn.html?h=755681

Redirect to external server!
Excessive header info proliferation: apache/2.2.22 (unix) mod_ssl/2.2.22 openssl/0.9.8e-fips-rhel5 dav/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 frontpage/5.0.2.2635
spreading excessive attack info globally and to potential attackers, read:
-> http://www.brianhaddock.com/2011/gaining-shell-access-via-local-file-inclusion-vulnerabilities
-> http://www.exploit-db.com/exploits/19713/
       
pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37700
Re: Again the valuable avast! Webshield!
« Reply #4 on: June 19, 2014, 04:31:06 PM »
Here avast! Web Shield detects  JS:Iframe-DWL[Trj] ->  iframes found:
http://sitecheck.sucuri.net/results/choicesupports.org
Code: 302,  htxp://jerezdeloscaballeros.org/ewsn.html?h=755681

Redirect to external server!
Excessive header info proliferation: apache/2.2.22 (unix) mod_ssl/2.2.22 openssl/0.9.8e-fips-rhel5 dav/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 frontpage/5.0.2.2635
spreading excessive attack info globally and to potential attackers, read:
-> http://www.brianhaddock.com/2011/gaining-shell-access-via-local-file-inclusion-vulnerabilities
-> http://www.exploit-db.com/exploits/19713/
       
pol
VirusTotal
https://www.virustotal.com/nb/file/7fa0eb609c6c31b2eade2a0ee01b5833414b847defeab4c6217ea683d0c45e7d/analysis/1403188205/


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #5 on: June 19, 2014, 05:12:38 PM »
Hi Pondus,

According to Netcraft VirusTotal site is still vulnerable to Heartbleed: http://toolbar.netcraft.com/site_report?url=https://www.virustotal.com
Quote
The site offered the Heartbeat TLS extension prior to the Heartbleed disclosure. The extension is now disabled, but the server is still using the same certificate.
LastPass gives it clean, probably based on more recent information:
Quote
Site:   www.virustotal.com
Server software:   Google Frontend
Was vulnerable:   Possibly (might use OpenSSL, but we can't tell)
SSL Certificate:   The current cert appears to have been reissued recently, likely now safe (2 weeks ago)
Assessment:   Certificate now looks safe, go ahead and change your password

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline mchain

  • Avast Evangelist
  • Ultra Poster
  • ***
  • Posts: 5719
  • Spartan Warrior
Re: Again the valuable avast! Webshield!
« Reply #6 on: June 19, 2014, 10:19:07 PM »
Here avast! Web Shield detects  JS:Iframe-DWL[Trj] ->  iframes found:
http://sitecheck.sucuri.net/results/choicesupports.org
Code: 302,  htxp://jerezdeloscaballeros.org/ewsn.html?h=755681

Redirect to external server!
Excessive header info proliferation: apache/2.2.22 (unix) mod_ssl/2.2.22 openssl/0.9.8e-fips-rhel5 dav/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 frontpage/5.0.2.2635
spreading excessive attack info globally and to potential attackers, read:
-> http://www.brianhaddock.com/2011/gaining-shell-access-via-local-file-inclusion-vulnerabilities
-> http://www.exploit-db.com/exploits/19713/
       
pol
urlquery confirms redirect:  http://urlquery.net/report.php?id=1403207429027
Windows 11 Home 23H2
Windows 11 Pro 23H2
Avast Premier Security version 24.8.6127 (build 24.8.9372.868)
UI version 1.0.814

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #7 on: June 20, 2014, 09:35:30 PM »
Another example where avast! Web Shield correctly detects and blocks JS:Agent-BDA[Trj] in the browser executable, threat comes from here: Object: htxp://www.buah-ara.blogspot.com/
SHA1: 50b1069472df5906b9e160b072c7bcb67011c6ac
Name: TrojWare.JS.Agent.JM

We are being protected,

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #8 on: June 21, 2014, 09:55:15 AM »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #9 on: June 22, 2014, 05:39:06 PM »
Faced with an inconclusive result
See: http://urlquery.net/report.php?id=1403450287527  missed
and http://quttera.com/detailed_report/bytegraf.com       missed
Detected: https://www.virustotal.com/nl/url/f87f84e5806d499cc27b9335c565630cc984c8996a7584ee026e18d5083c7d8e/analysis/1403450530/

avast! Webshield blkocks as URL:Mal, but does not specify URL is subjected to threat Mal/HTMLGen-A,
while this appears to be down.

Damian
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #11 on: June 25, 2014, 03:29:23 PM »
iFrame malware here: htxp://coherence090611.cocolog-nifty.com/JSTAG_3[d46][108] infected with JS.IFrame.312
avast! Web Shield blocks and detects as JS:Iframe-EO[Trj]
we are being protected,

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!


Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37700
Re: Again the valuable avast! Webshield!
« Reply #13 on: June 25, 2014, 06:55:54 PM »
iFrame malware here: htxp://coherence090611.cocolog-nifty.com/JSTAG_3[d46][108] infected with JS.IFrame.312
avast! Web Shield blocks and detects as JS:Iframe-EO[Trj]
we are being protected,

polonus
killmalware  http://killmalware.com/coherence090611.cocolog-nifty.com/

VirusTotal
https://www.virustotal.com/nb/file/4e23fb00a8273ee946fefa94c273158557c7a5019b22c2f1e20b75f085ff2f84/analysis/1403715294/


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: Again the valuable avast! Webshield!
« Reply #14 on: June 25, 2014, 11:47:12 PM »
Due to interference of direct avast! Web Shield blocking of code detected, Dr Web's url checker scan and several others cannot connect and won't give scan results.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!