lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAAVARzaLDIYEeE70JrKQC1iMKAAAAQAAAAV5sxgnkGOESrjEBYrg5O8gEAAAAA@tasintegrators.com> From: niranjan at tasintegrators.com (Paul Niranjan) Subject: Backdoor not recognized by Kaspersky VirusScreen ASaP detected virus in attachment sent to you by "Kristian Hermansen" <khermansen@...technology.com>. The file has been processed with the following result: TextDocument.zip: W32/Bagle.gen!pwdzip(cleaned) G.Paul Niranjan Babu -----Original Message----- From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Kristian Hermansen Sent: Wednesday, March 03, 2004 4:04 AM To: full-disclosure@...ts.netsys.com Subject: [Full-Disclosure] Backdoor not recognized by Kaspersky Attached backdoor not recognized by Kaspersky or Norton 2004? I received this file recently, but Kaspersky did not detect malicious code. Wondering if any of you guys know about it or have analyzed it before? It is definitely NOT a text document. I opened it up with WinHex and see the file "yfivyjmg.exe" in there towards the beginning. Looks to be a packed exe within, and first few bytes are: 504B03040A0001000000C07E62309FE242510C300000003000000C00000079666976796A6D67 2E6578653A47705E116B1456E7F572AF21A99C0D52671B62085EC94DD8FDABE712E68000E55E E8A39241 Last few bytes are: E19F9DC6E1E9F0FAA7CD925D18C9104DCA9DF88955F8AEBD81D036BCB930889EAE0D2BA2A6EF 88A334F8B3108A414B1C9D15AA883225504B010214000A0001000000C07E62309FE242510C30 0000003000000C000000000000000100200000000000000079666976796A6D672E657865504B 050600000000010001003A000000363000000000 I am reluctant to open the zip right now, as I fear it may be exploiting an overflow to run the EXE file within. I may try to open it on a virtual machine later, but if you guys do know anything about this one please let me know. It's nice and small too (12 KB)! Wonder if the guy wrote it himself. Of course, the IP address is spoofed to a University of Chicago machine. Is it even possible to trace back? I still have the full headers, but they looked nicely stripped to the gills. I have been receiving elevated attacks via email over the last few days, so maybe it is some guy on this list trying to get me ;-) One previous email stated that it was the FBI and to call a number listed in the email. This was most likely an attempt to get the number I was calling from. This guy thinks he's smooth... Kristian Hermansen khermansen@...technology.com -----Original Message----- From: management@...otoys.com [mailto:management@...ankedout}.com] Sent: Tuesday, March 02, 2004 5:03 PM To: webmaster@...ankedout}.com Subject: E-mail account security warning. Dear user of {blankedout}.com gateway e-mail server, Your e-mail account has been temporary disabled because of unauthorized access. For details see the attached file. For security purposes the attached file is password protected. Password is "65316". Best wishes, The {blankedout}.com team http://www. {blankedout}..com -------------- next part -------------- A non-text attachment was scrubbed... Name: winmail.dat Type: application/ms-tnef Size: 3652 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040303/f20c21cd/winmail.bin
Powered by blists - more mailing lists