lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue Oct  4 22:57:11 2005
From: yorn at (
Subject: RE:

x.chm contains money.exe (needs to be added to virusscanners)

I don't have time to analyze the file, but it is attached here in a zip
file. Password to extract is 'money'. Anyone want to run some analysis?

-----Original Message-----
[] On Behalf Of Aditya
Sent: Tuesday, October 04, 2005 11:35 AM
To: 'THORNTON Simon'
Subject: RE: [Full-disclosure]
anexploitdistribution point (update2)
Sensitivity: Confidential

> FYI,
> I've had the site disabled by the ISP, at least it will 
> deny the perps the ability to find out who has been compromised. The
> molecularmultimedia
> site is obvioulsy just a front, will see what can be done about this.

The site was found after 2 different attempts here are more details   which is

<img src="1.jpg">
<iframe src="" width="0" height="0"></iframe>
---- end myphoto.jpg

And is


-----end index.html

And is the front end to something more

Also visiting with mozilla with the latest
version of mozilla With all the patches still caued the trojan to be
executed - I found this from the Norton antivir logs ....

> It's amazing looking at the page source, there are at least 4 
> different exploits (I'm still analysing this) encoded into the 
> javascript components of the page.

And they are pretty good also - new 0day for mozilla also 1.7.12!

Will let you all know if I find anything!...
-------------- next part --------------
A non-text attachment was scrubbed...
Type: application/x-zip-compressed
Size: 8343 bytes
Desc: not available
Url :

Powered by blists - more mailing lists