Author Topic: This piece of code better be blocked by NoScript...  (Read 3374 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
This piece of code better be blocked by NoScript...
« on: June 06, 2010, 05:57:48 PM »
Hi malware fighters,

I found this piece of obfuscated script online here: hxtp://dreamonisland.com/js/google.js
To have a look at the script itself I attached a picture of it below...
Then I started to analyze it here: hxtp://jsunpack.jeek.org/dec/go?report=ace9f60ac7d71e8a56595d9bec7cc0de541ed715

going here: hxtp://daddyseye.net/in.cgi?default and then here: wXw.itmakemehappy*com/666/load0x1.php?spl=mdac&fh= reported here as dangerous in two circumstances
http://www.malwaredomainlist.com/mdl.php?search=itmakemehappy.com

I also attached a picture of the dangerous part of the code as outline in Malzilla...

polonus
« Last Edit: June 06, 2010, 06:12:38 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: This piece of code better be blocked by NoScript...
« Reply #2 on: June 06, 2010, 07:45:44 PM »
Yep, my good anti-malcode friend, it is code I would not like to turn around with a stick if it was on my website...
as a general rule I would not trust any code obfuscated in that fashion, be it suspiscious, malicious or benign,
I like to block its access to my browser or OS for that particular reason.
script       1460 bytes
Filetype:    UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
MD5:    ffa7160820f9ef31fec6cc45b86e80d2
SHA1:    26904226a0f740598aecd4f6ff520799048657d4

The trackers certainly have something to hide, see analysis here:
http://wepawet.iseclab.org/view.php?hash=22a6b09a195d10dc677c41bb24975241&t=1275844664&type=js

and then also look into this: htxp://www.itmakemehappy.com/666/voli9x1.php
open that up with an instance of malzilla and you get some nice obfuscated soup code...
and these finds cannot be omitted, still flagged here:
http://www.malwaredomainlist.com/mdl.php?search=itmakemehappy.com
dreamonisland*com is on SURBL lists: PH
itmakemehappy*com is on SURBL lists: PH WS
Not a very good reputation....
Both flock browser and WOT extension stopped me from going here: htxp://daddyseye.net/in.cgi?default
and got this redirecting:
Code: [Select]
^^^^^^
<meta http-equiv="REFRESH" content="1; URL='htxp://www.itmakemehappy.com/666/voli9x1.php'">
^^^^^^
document moved <a href="htxp://www.itmakemehappy.com/666/voli9x1.php">here</a>
^^^^^^

Then also ook here: http://www.malwaredomainlist.com/mdl.php?search=%2F666%2Findex.php&colsearch=All&quantity=50

polonus
« Last Edit: June 06, 2010, 09:41:40 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: This piece of code better be blocked by NoScript...
« Reply #3 on: June 07, 2010, 12:07:05 AM »
Hi malware fighters,

There was a reply in the NoScript forum: http://forums.informaction.com/viewtopic.php?f=8&t=4482#p18953
And these are the results http://www.virustotal.com/analisis/01a7a275cb6055af4801973732941a9d7494e64efa09d971fc1ba2fbbf565507-1275840380
which avast detects as: Win32:Agent-AKOM aka BackDoor.Siggen.20773

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!