Fwd: Scan from a Xerox W. Pro #0099345 dropping Bugat

Subject:  Fwd: Scan from a Xerox W. Pro #0099345
Attachment: Xerox_Workcentre_03.08_FZ1820.htm
Fwd_Scan from a Xerox W. Pro #0099345

The spam attachment contained an encoded script which is used to redirect to an Phoenix Exploit kit at cjjasjjikooppfkja[.]ru:8080 /images/aublbzdni.php hosted at IP addresse(s):

83.238.208.55
89.218.55.51
95.156.232.102
111.93.161.226
118.97.9.60
125.19.103.198
62.85.27.129
190.81.107.70
200.169.13.84
210.56.23.100
210.109.108.210
211.44.250.173
219.94.194.138

During our testing a malicious flash file containing CVE-2011-0611 was downloaded from cjjasjjikooppfkja[.]ru:8080 /images/hvincoylguat.swf. This flash file had the following properties.

File: brcweqgshnxqh.swf
Size: 7,790 bytes
MD5: 289a35c701f0d709dcd5e260478c26b6

This flash file exploited CVE-2011-0611 and was detected by 15 of 43 AV vendors on VirusTotal.

A malicious PDF file was also downloaded from cjjasjjikooppfkja[.]ru:8080 /images/kobzfoivdpdzilx.php. This PDF file had the following properties:

File: gthpcpxmgvjoe.php
Size: 13,426 bytes
MD5: 292cc51c6487e3216d93aa118300d5f0

The PDF exploits CVE-2010-0188 and was detected by 26 of 43 AV vendors on VirusTotal.

If exploitation is successful, it redirects to kroshkidlahlebans[.]ru:8080 /images/jw.php?i=15 or kroshkidlahlebans[.]ru:8080 /images/jw.php?i=8 , a Bugat/Feodo variant with the following properties is installed:

File: gsxohsapcpklkti.exe
MD5: cfe9c369c2d97f2cac65b2db903ba442
Size: 74,752 bytes
Timestamp: 2005:12:01 11:05:00+01:00
Company Name: Exact Software
File Description: Brazil Glued Acne Arthur Areas
Product Name: Lets
Tag 5 Ce QQR7p TL7 Jfax Mim KE: pdKnm4BFwM8DltvyQrVi
YQ Nd 27 Um MROKU: ubxxDP1i2qe58

Bugat/Feodo is installed as:
File: C:\Documents and Settings\Administrator\Application Data\KB00090109.exe

This Bugat/Feodo variant retrieved its configuration file/target list from a command and control server at ciasamkbnavtknxiko[.]ru:8080 /rwx/B1_3n9/in/. This domain is hosted at the following IP addresses on a fast flux infrastructure:

81.169.187.170
85.214.204.32
94.20.30.91
112.78.124.115
124.124.212.172
182.50.142.154
208.109.170.55

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: