Sunday, December 28, 2008
The "DesktopSmiley, Not A Spyware" ToolBar
So we got a non-phishing worm downloading a non-spyware program, let's see its non-evil actions :)
The first thing I did was downloading the installer, which asks no questions and shows no EULA. It is also digitally signed by "DoubleD Advertising Limited", well that's really funny, we have got to give them that :)
So I ran it in a VM:
That is quite original! "A non-virtualized hardware system is required", of course anybody technical gets how lame this lie is :)
why would an IE toolbar "require" a "non-virtualized hardware", why would it even bother to check if it's running under a virtualized environment unless it has some illegal actions to hide?!
Well i am defiantly not going to execute it on my machine :)
Maby i will test is some other day on a real machine with Restore-IT/Ghost
In the meantime, let's take look at some of the things that it does:
It copies some IE settings from HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ to HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ except for (AutoDetect and UNCAsIntranet which exist there and get modified):
ProxyBypass:1 (default 1)
IntranetName:1 (default 1)
MigrateProxy:1 (default 1)
AutoDetect:1 (default 0)
UNCAsIntranet:1 (default 0)
ProxyEnable:0 (default 0)
It sure looks like someone is going to assign a proxy for us :)
The setup process command-line:
"C:\Documents and Settings\Insider\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\stbup.exe" /new /src=user
the "/src=user" really sounds like there are cases which the user did not initiated the installation :) it could be used for self-update though.
Lets examine some of the the strings in the memory of this "DoubleD" software:
Software\SimonTatham\PuTTY\Sessions
Software\SimonTatham\PuTTY\SshHostKeys
Software\SimonTatham\PuTTY
\PUTTY.RND
Well, i don't want to point a blaming finger but it seems this "legitimate smiley IE toolbar" is very interested in getting some access to our saved PuTTY SSH hosts...quite innocent
There are a lot of weird stuff this spyware does, like starting a local proxy which explains how they steal data from IE and makes this self-updating software a cool way to make a non-botnet botnet :)
It also implements an SSH client and almost every famous encryption algorithm (rinjdeal, AES, des, 3des, blowfish) looks like it does local MITM attacks to SSH login software.
So get root and Smile away with it :)
Wednesday, December 24, 2008
Big Brands XSS
Apple Store - XSS (less then 15 minutes to find it, manually)
American Express - HTTPS XSS (less then a minute to find it, manually)
How can us customers trust the big brand companies when our accounts are compromised and we can no longer trust links to those empires websites?!
Thursday, December 18, 2008
The MSN "Not A Phishing Worm"
I am just working as usual when I got the following message on my MSN Messenger:
This is how real girls party. Great high quality pictures onNow of course i understood that it's a worm, but still, lets see where it leads to.
http://jusmineza.PartyPicturez.info
So I went into the site and it looked like this:
With what i have seen until now, this is a classic phising site, I saw dozens
like it for Yahoo! in the past. But wait! lets look at that GREY text blow:
OK, they said in the text:Terms of Use / Privacy Policy:
This page is not affiliated with or operated by Microsoft(tm) or MSN Network(tm).
This is not a "phishing" site that attempts to "trick" you into revealing personal information.So they don't want our usernames and password, which is also the EMAIL of most people, yeah I believe them, sure.
They just want to:
1. Send Instant Messages to your friends promoting this site. 2. Introduce new entertaining sites to your friends via Instant Messages.Which is completely different with what a worm does. A worm just spreads and "introduces", "entertaining" sites with a lot of porn and exploits.
By using our service/website you hereby fully authorize T P Ltd to send messages of a commercial nature via Instant Messages and E-Mails on behalf of third parties via the information you provide us.Yeah why not, take my account and send spam "on behalf of third parties" and if they get like hacked or something, we are not responsible, you agreed to this.
.....
ANY LIABILITY, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR DAMAGES CAUSED
I believe this should be called "Legal Phishing User Agreement" or "Worm As A Service".
It is also a little wiered that a "legal" domain called "partypicturez.info" is dealing with MSN accounts and not PICTURES FROM PARTIES and has unlimited(*.) subdomains and only 1 page, don't you think?!
Ofcourse they used the domain protection:
Registrant Email:9648af2d68114548bfc703cca6806a46.protect@whoisguard.comWell, don't fill any form you see without reading the small (and in this case GREY) prints :)
Admin Name:WhoisGuard Protected
Admin Organization:WhoisGuard
Update:
The messages are updated by the hour, these ones are specific for xmas.
Any file or subdomain in win-win-it.com redirects to http://www.desktopsmiley.com/go.do?a=814
The same worm also sends this message:
"[msn_dst_user], claim your Prize!
http://[msn_src_user].win-win-it.com/winner.php"
And
congratulations [msn_dst_user]!!!
http://[msn_src_user].accept-your-gift.com/winner.php
And
merry XMAS heres your gift
http://[msn_src_user].specialofferforyou.info/gift.php
And
[msn_dst_user], claim your Xmas Card!
http://[msn_src_user].greeting-cardss.com/xmas.php
And
http://freegiftznow.com/xmas.phpAnd
[msn_dst_user], see the pics from yesterday's christmas party what do u think?And this one, which redirects to http://www.xxxblackbook.com
http://[msn_src_user].yourimagez.com/xmas.php
Mmmm Babe!And this one which is misconfigured and will not work the the subdomain contains an "_"
Just got myself a naughty profile here. You should check me out before its too late!
http://www.theblogboards.com/profiles.php
http://[msn_src_user]And.crazy-new-year-party-pics.com
http://nu-years.awesomeofferz.comAnd
http://[msn_src_user]And.real-cool-newyear-party-pics.com
Claim your Prize! EXPIRY: TODAY!!!! HurryAnd
http://mypoemstoyou.com/winner.php
see pictures of me naked & fucking all night long!! LOLAnd
http://www.seex4u.com/collegepics.php
see my 2009 new years party album i uploaded here <:o)<:o) http://2009-newyear-party-pics.com/party.phpAnd this which redirects to http://www.naughty-nightz.com/
see this blogAnd
http://theblogboards.com/blog.php
hey babe... i created a profile here with some of my secret pictures.... dont wait too long .... signup to see!
http://www.date-me-now.com/myprofile.php
Which is also registered by WHOISGuard.
Both these websites were built to make people download this:
http://www.desktopsmiley.com/toolbar/desktopsmiley/download/stb_installer.exe
Which they claim is:
"Download DesktopSmiley to get 1000's of FREE Smileys!
It's totally FREE! No Registration. No Spyware."
Yes, a toolbar advertised by a WORM is not spyware, sure...
The example above was version 2.0c. It seems these guys used different methods and different domains and different company names in the older versions (which is typical to viruses and spyware but not to legitimate software).
The following example belongs to an older version 1.1c whi MSN message:
foto http://hi5.eu.com/id.php?=[dst_user_email]Which prompts a download for "IMG455.jpg-www.photo.com" which is an EXE file with a COM extension and where ran "True Type Detection" will be made by windows loader and it will execute as the regular EXE file it is.
Those people don't care a bit and they left "Directory Browsing" open in the subdomain's root, check it out at: http://hi5.eu.com/
They even forgot to remove their private packer from the site: http://hi5.eu.com/pa-packer.rar
They also have a version at: http://new.upicx.com/ (which i think just went down...)
Which loads " http://new.upicx.com/indexx.php" and " http://new.upicx.com/pop.php" and VERIFYS the request's REFERER is " http://new.upicx.com/" so direct reference to these files returns "404 Not Found".