
Just like the above logo, several groups will strengthen our effort and several hackers will unify our goal.
Do contact us if you would like to start help us in the expansion process. You can email us at contact.fingers @ gmail.com
- EF
This is how real girls party. Great high quality pictures onNow of course i understood that it's a worm, but still, lets see where it leads to.
http://jusmineza.PartyPicturez.info
OK, they said in the text:Terms of Use / Privacy Policy:
This page is not affiliated with or operated by Microsoft(tm) or MSN Network(tm).
This is not a "phishing" site that attempts to "trick" you into revealing personal information.So they don't want our usernames and password, which is also the EMAIL of most people, yeah I believe them, sure.
1. Send Instant Messages to your friends promoting this site. 2. Introduce new entertaining sites to your friends via Instant Messages.Which is completely different with what a worm does. A worm just spreads and "introduces", "entertaining" sites with a lot of porn and exploits.
By using our service/website you hereby fully authorize T P Ltd to send messages of a commercial nature via Instant Messages and E-Mails on behalf of third parties via the information you provide us.Yeah why not, take my account and send spam "on behalf of third parties" and if they get like hacked or something, we are not responsible, you agreed to this.
.....
ANY LIABILITY, INCLUDING WITHOUT LIMITATION ANY LIABILITY FOR DAMAGES CAUSED
Registrant Email:9648af2d68114548bfc703cca6806a46.protect@whoisguard.comWell, don't fill any form you see without reading the small (and in this case GREY) prints :)
Admin Name:WhoisGuard Protected
Admin Organization:WhoisGuard
Update:
The same worm also sends this message:
"[msn_dst_user], claim your Prize!
http://[msn_src_user].win-win-it.com/winner.php"
And
congratulations [msn_dst_user]!!!
http://[msn_src_user].accept-your-gift.com/winner.php
And
merry XMAS heres your gift
http://[msn_src_user].specialofferforyou.info/gift.php
And
[msn_dst_user], claim your Xmas Card!
http://[msn_src_user].greeting-cardss.com/xmas.php
And
http://freegiftznow.com/xmas.phpAnd
[msn_dst_user], see the pics from yesterday's christmas party what do u think?The messages are updated by the hour, these ones are specific for xmas.
http://[msn_src_user].yourimagez.com/xmas.php
Which is also registered by WHOISGuard.
Both these websites were built to make people download this:
http://www.desktopsmiley.com/toolbar/desktopsmiley/download/stb_installer.exe
Which they claim is:
"Download DesktopSmiley to get 1000's of FREE Smileys!
It's totally FREE! No Registration. No Spyware."
Yes, a toolbar advertised by a WORM is not spyware, sure...
The example above was version 2.0c. It seems these guys used different methods and different domains and different company names in the older versions (which is typical to viruses and spyware but not to legitimate software).
The following example belongs to an older version 1.1c whi MSN message:
foto http://hi5.eu.com/id.php?=[dst_user_email]Which prompts a download for "IMG455.jpg-www.photo.com" which is an EXE file with a COM extension and where ran "True Type Detection" will be made by windows loader and it will execute as the regular EXE file it is.
I said O.K maby they didn't go through the trouble marking the "Installer", but they did all detect the Trojan Downloader, right?
Well, they didn't :)
This is really funny to see that all you need to be "a top notch" malicious software is to just download WinRar and NIST (NullSoft Installation System) and create a windows xp sp3 installation torrent, this is after 20 years of Anti-Virus security techonology by 7 billion dollar a year market.
More funny stuff! the author of this virus was so lazy he just put a list the relative path to the real setup executable of all the software he will infect and share in the internet so the "setup.exe" he made will now try to execute a list of files which only one should exist on your infected download :)
Some Examples:
\Game\wws98.exe
\WinRoute.exe
\GAME\LBWIN.EXE
\vs.exe
\Pandora.exe
Be aware of what you download! it seems the best way to tell if its an infected setup is to right click setup.exe and see if WinRar suggests "Extract To" (I am joking of course)
The executed "file.exe" downloaded http://www.cxgr.com/3913574.exe which is also a NIST file and also a Trojan Downloader and my upload was the first time it was scanned in virustotal and you can guess the results:
Whats really annoying me in this result is that the 3-4 Anti-Viruses that "supply a solution" above and detect the downloader DOES NOT DETECT THE CONSTANT FILE IT DOWNLOADS which means all the malware creator needs to do is modify the downloader or use a new one and there he goes again infecting the entire planet and getting away with it!
Now "3913574.exe" downloaded http://www.cxgr.com/Setup_ver1.1400.0.exe
Which is not packed by a known packer and even isn't identified as having a "packed entropy" by PEiD. Its a small application compiled by ms vc++ 7/8, 72kb.
Its import table it quite limited and it calls GetProcAddress to get:
SetProcessPriorityBoost, WriteFile, GetEnvironmentVariableA, InternetOpenA, ExitProcess, GetTempPathA, InternetCloseHandle, CloseHandle, TerminateProcess, CreateFileA, DeleteFileA,SHChangeNotify, lstrcpyA, lstrcpyn, InternetGetConnectedState, GetAdaptersInfo
SetThreadPriority, GetModuleFileNameA, Sleep, ShellExecuteEx, InternetOpenUrlA
Of course the strings are not plaintext and its also not XOR, how refreshing!!! its a nice code that identified a header byte and multiples the bytes with a word per this header, may be it is some kind of little compression.
Now more then 10 executables are downloaded into your system, some are detected by some AV's and some are not, they are packed with Armadillo v1.71 and some with ASPack v2.12
http://www.virustotal.com/he/analisis/7e8af73b605c1c82d0d990d204e12559
http://www.virustotal.com/he/analisis/f60edd90989cd53b73dfedd4df4d3aec
http://www.virustotal.com/he/analisis/6f0ab356e2bd80d4845fdb5ebbe619e1
http://www.virustotal.com/he/analisis/11232e1cf52a2c68b4f28815e7eedb60
These executables are saved in:
%programfiles%\MicroAV
%windir%\PCHealthCenter
and of course to %windir%\system32
more < exe_from_internet.exe:Zone.Identifier