![]() |
Watch Out For GIF Images Containing Hidden Malicious Code
On June 24th, a visitor to the SANS Internet Storm Center reported that his company was "...in the middle of a very disturbing ... issue regarding the adware/spyware/IE exploit genre..." He requested help analyzing an "encrypted or compressed" file that had been downloaded to a machine at their site. Tom Liston, one of our volunteer handlers, spent the weekend analyzing this issue. His findings are summarized here.
The victim of the attack found that a file called "img1big.gif" had been loaded onto their machine. Because of the account restrictions on the person running the machine, it had failed to install properly, which was why it had come to their attention. It is this file that they forwarded to the SANS Internet Storm Center for analysis. The file is not a graphic file at all. It is actually a 27648 byte Win32 executable that has been compressed using the Open Source executable compressor UPX. This file decompresses to an 81920 byte file which contains two Win32 executables bound together. The first portion of the file (and what actually runs if the file extension is changed and the program is launched) is a "file dropper" Trojan, designed to install any executable concatenated to its body. The second half of the file consists of a Win32 DLL that is installed by the file dropper under WindowsXP as a randomly named .dll file under C:\WINDOWS\System32\. This DLL is installed as a "Browser Helper Object" (BHO) under Internet Explorer. A "Browser Helper Object" is a DLL that allows developers to customize and control Internet Explorer. When IE 4.x and higher starts, it reads the registry to locate installed BHO's and then loads them into the memory space for IE. Created BHO's then have access to all the events and properties of that browsing session. This particular BHO watches for HTTPS (secure) access to URLs of several dozen banking and financial sites in multiple countries. When an outbound HTTPS connection is made to such a URL, the BHO then grabs any outbound POST/GET data from within IE before it is encrypted by SSL. When it captures data, it creates an outbound HTTP connection to http://www.refestltd.com/cgi-bin/yes.pl and feeds the captured data to the script found at that location. |
Actually that has been happening for awhile...fucking weasels are really up on this...hope they all rot in hell :BangBang:
|
"You can point your gun at me
And hope it will go away But if God was alive, He would hate you anyway." Cheers! just checking in on vacation :glugglug :glugglug |
I love using Mozilla :glugglug
|
Great, how long before we will have to make our sigs static jpegs on gfy?
|
man this shit is getting more and more sinister with each exploit/hack/trojan that comes to light,
|
Anybody want me to write them a BHO?
Its gonna cost ya. :Graucho |
any protection out on this one yet?
|
if any coders want to hook me up on how to execute spyware using GIFs, contact me, my aim info is in my profile
|
Thanks for the info.
|
Quote:
|
Quote:
get over it money is money people can download ad-aware if it bothers them |
The surpreme court needs to stop wasting time with the porn sites and focus on shit like this
|
Quote:
:1orglaugh :1orglaugh :1orglaugh :1orglaugh :1orglaugh |
Quote:
|
Quote:
:1orglaugh :1orglaugh :1orglaugh |
Back in my trojanning days I met a chick who did a similar job in GIF's and when I tried to discuss it with a professor or two they'd always laugh me out of the room. You can't execute code from inside of a gif, there is no compiler (blah blah blah) and yada yada... So finally someone has probably paired it with IRC bots to infect hundreds a day and now all of a sudden it IS possible... funny how shit turns out.
|
Quote:
|
Quote:
:eek7 you must be kidding |
Quote:
|
Fuck, pretty soon they'll have to just abandon this internet as we know it and start all over again from scratch. Mark my words, it'll happen. :thumbsup
|
Quote:
i'd set it up outside the u.s. lol |
I have been battling fucked up spyware all week and I know it came from some TGP sites.
Fucking auto intalling mother fuckers. I can't see how screwing up my machine is making anyone money. I couldn't even buy something from them if I wanted to. It fucks the browser up so bad that even when you click on the search listings from the auto intalled hacked homepage, you just get ads to remove spyware. The pay per click search engine traffic will become worthless at this rate really. |
Quote:
|
This is evil.
|
Quote:
|
Quote:
|
Quote:
Most surfers barely know how to open internet explorer, much less install and use opera or mozilla. If this stuff keeps up surfers will be afraid to go to adult sites period. |
Mozilla Mozilla Mozilla Mozilla Mozilla
|
mozilla stopped using gif's ?? news to me :) hahah
mozilla has more holes than a golf course |
Hey Smokey did you even read the post?
"The file is not a graphic file at all. It is actually a 27648 byte Win32 executable that has been compressed using the Open Source executable compressor UPX. This file decompresses to an 81920 byte file which contains two Win32 executables bound together. The first portion of the file (and what actually runs if the file extension is changed and the program is launched) is a "file dropper" Trojan, designed to install any executable concatenated to its body. The second half of the file consists of a Win32 DLL that is installed by the file dropper under WindowsXP as a randomly named .dll file under C:\WINDOWS\System32\. This DLL is installed as a "Browser Helper Object" (BHO) under Internet Explorer. " Does nothing at all to people on Mozilla . Mozilla is secure because not many people use it.. so who is going to bother wasting time trying to exploit it? That being said.. I am sure any holes that people do find will be patched with alacrity. |
Quote:
|
Actually if you read the write-up at
http://isc.sans.org/presentations/banking_malware.pdf you'll find that the image file needs to be renamed to install itself. They theorize that a .chm exploit is used to rename the GIF and run it. So the fact that it's a GIF file isn't really important, it could have any file extension the attacker would like. JPG would work just as well. |
woa! Imagine the data that "listener" server gets! Thousands and thousands of CC numbers/passwords...
|
Thanks for the information!
|
Quote:
|
Quote:
2. Don't be so quick to open your mouth. |
Quote:
If you actually read the post you'd see that it uses the BHO... now my guess is telling me that Mozilla doesn't have this BHO. I'm glad I use Linux and Mozilla :glugglug |
Quote:
|
All times are GMT -7. The time now is 08:01 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123