lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 14 Jan 2008 14:09:49 -0500
From: Mario Contestabile <marioc@...puter.org>
To: "'Jose Nazario'" <jose@...key.org>,
	"'crazy frog crazy frog'" <i.m.crazy.frog@...il.com>
Cc: "'Untitled'" <full-disclosure@...ts.grok.org.uk>,
	"'PenTest'" <pen-test@...urityfocus.com>, bugtraq@...urityfocus.com
Subject: RE: what is this?

Looks like the local name is actually more random:

var name = "c:\\win"+GetRandString(4)+".exe";

Kinda dumb though, as any non-admin class user won't have access to the
local folder on the root [c:\].

marioc@...puter.org
http://securitymario.spaces.live.com/

 

-----Original Message-----
From: Jose Nazario [mailto:jose@...key.org] 
Sent: Monday, January 14, 2008 10:44 AM
To: crazy frog crazy frog
Cc: Untitled; PenTest; bugtraq@...urityfocus.com
Subject: Re: what is this?

On Sun, 13 Jan 2008, crazy frog crazy frog wrote:

> http://secgeeks.com/what.zip
> password is 12345
> can somebody guide/help me what is this and how can i remove it?

te file you sent here contains a bunch of embeded nulls (every other
character is 00). stripping those out reveals ...

that it's a collection of browser exploits. by the looks of it it's MPack
and uses the heapspray slide stuff.

the goal is to download hxxp://techicorner.com/bcuoixqf (which looks dead)
as a local file c:\\mosvs8.exe and then run it.


very common exploit scenario these days (but they usually have some form 
of js obfuscation going on).

i hope this helps.

________
jose nazario, ph.d.		    http://monkey.org/~jose/

Powered by blists - more mailing lists