REPOST - ORIGINALLY POSTED NOVEMBER 4, 2010
Recent reports from various sources in the security industry show that a large takedown of servers associated with the “Bredolab” trojan occurred within the past few weeks. While most of the reports have focused around the idea that this infrastructure was solely related to the command and control of Bredolab, our research shows that these servers were used as an all-purpose hosting infrastructure for criminal activity.
This criminal system came to our attention in July 2010, when NetWitness analysts were asked to investigate a hacked wordpress blog.
We found that the following obfuscated script had been injected into all .html and php pages on the site:
When decoded, this script created a redirect to the following location:
hxxp://bakedonlion.ru:8080/google.com/pcpop.com/torrentdownloads.net.php
Further investigation revealed an injection of the script into victim webpages via FTP:
These IPs all connected to the victim website within a 20-minute period on May 8th, and when plotted on a map, it becomes obvious that this is likely a botnet.
Down the Rabbit-hole
Once we established the source of the website compromise, we began back-tracking into the criminal infrastructure to help develop intelligence that would assist our customers. What we found was the following:
The initial injected script:
bakedonion.ru:8080/google.com/pcpop.com/torrentdownloads.net.php
redirects to obfuscated scripts:
bakedonion.ru:8080/index.php?pid=1&home=1
then:
bakedonion.ru:8080/jquery.jxx?ver=2.1.5
which ultimately result in exploit code being delivered to the visiting browser. If successful, the following GET occurs which causes the download of the bredolab malware.
bakedonion.ru:8080/welcome.php?id=6&pid=1&hello=503
Discovery of this infection sequence began a 3-month monitoring activity from June to August 2010.
More on Bredolab
Bredolab rose to prominence in the malware community around the middle of 2009. Trend Micro has a very good report on the malware’s specifics.
In this particular instance, this Bredolab variant downloaded both Fake AV and ZeuS, which are two well-known malware threats.
1) Fake AV – Installs a fake antivirus program that reports non-existent infections on the host workstation. The option to “clean” the host is given if the user agrees to pay a fee for the “pro” or “advanced” version of the software. This particular combination of social engineering and malware has been very popular in the past few years as it has a three-part punch:
2) ZeuS – An all-purpose information stealer that has historically been focused on financial fraud. Because online hosts often have the ability to use a web-based client to remotely manage files and folder on a host, this may likely be one of the sources for the stolen FTP credentials used in script injection.
Although not part of the campaign detailed here, Bredolab has been observed downloading other malware families, which provided evidence that the operator used the system in pay-per-install affiliate programs or provided install services to other miscreants.
Further into the infrastructure
Shortly after our initial investigation began, open source research in the security community into common paths on the miscreant servers revealed active Apache Server Status pages, a feature in the Apache webserver that allows you to monitor performance of your installation. This finding allowed us to log and further develop intelligence based on the page visits that we observed on the miscreant servers.
With this bit of information, we were able to take the previously known infection sequence, and expand it:
1) The initial directory sequence observed in the original injected script:
“google.com/pcpop.com/torrentdownloads.net.php”
was only one of many variations, some of which are as follows:
We surmised that this seemingly random combination of high-traffic sites served two purposes:
2) Specific paths to exploit artifacts, which included:
3) Additional Malware Downloads:
Examining Exploits
By taking a closer look at one of the exploits used in this particular campaign during the observed time period, we saw a common theme that is being used by most criminal elements in the current threat environment.
Criminal elements have learned that organizations typically have OS-level patching under control, but the patching of third-party applications is often outside of the capabilities of most organizations. This is usually due to both the complication of centralizing third-party patching, but more so because of the linking of commodity technologies, such as PDF readers, into mission-critical business processes that may be interrupted by upgraded versions and require lengthy testing prior to extensive deployment.
In this case, we see the following exploits being used in the exploit PDFs:
Which, when successful, calls out to the previously observed urls:
http://anyscent.ru:8080/welcome.php?id=6&pid=2&hello=503
While we did see multiple versions of this pdf file (1-10), they were all structurally identical, with slight changes to change the file enough to bypass antivirus detection.
A change of tactics
On or around June 11th, we observed a tactics change by the miscreants, based on the previously observed exploit-cycle. The previously seen requests, such as:
Stopped occurring, and we began seeing requests formatted as follows:
These requests were made to the same servers, but on port 80 (rather than the previously observed 8080). While it wasn’t immediately apparent at the time, this change signified a significant shift from a single domain based compromise structure to a multi-domain system that assigned specific roles to domains according to their desired use.
An Intelligence Breakthrough
At this point in the investigation, we began linking like servers together based on community reports and our own field work with indicators such as malware and exploit filenames. Since they all had available server status pages, this again expanded our ability to collect intelligence on this system. A breakthrough occurred when we observed one of the exploit servers transferring a tgz archive from one of the other servers in the system via HTTP. With the proper path, we were then able to retrieve this file directly from the exploit server and further explore it. This archive contained a series of DNS zone configuration files that detailed the infrastructure with labels and allowed us completely map the system as it was updated. We surmised that the configuration files were used by the criminal miscreants to update their exploit system in an automated fashion. This would allow quick updates when security researcher activity caused a takedown of a suspect domain. With this discovery, we began logging changes to the infrastructure on a daily basis.
Mapping the Infrastructure
With the zone information and other monitoring, we observed 114 IP addresses resolving to known malicious domains in this system.
12312 | 62.27.51.163 | ECOTEL ecotel communication ag |
12322 | 88.191.47.83 | PROXAD Free SAS |
12322 | 88.191.79.158 | PROXAD Free SAS |
12322 | 88.191.79.223 | PROXAD Free SAS |
13213 | 83.170.113.88 | UK2NET-AS UK-2 Ltd Autonomous System |
13727 | 216.8.179.23 | ND-CA-ASN – NEXT DIMENSION INC |
15418 | 77.68.52.52 | FASTHOSTS-INTERNET Fasthosts Internet Ltd. Gloucester |
15685 | 217.11.254.41 | CASABLANCA-AS Casablanca INT Autonomous system |
15830 | 217.20.47.85 | TELECITY-LON TELECITYGROUP INTERNATIONAL LIMITED |
16265 | 85.17.137.40 | LEASEWEB LEASEWEB AS |
16265 | 85.17.19.26 | LEASEWEB LEASEWEB AS |
16265 | 94.75.243.6 | LEASEWEB LEASEWEB AS |
16276 | 178.32.1.70 | OVH OVH |
16276 | 188.165.124.185 | OVH OVH |
16276 | 188.165.159.139 | OVH OVH |
16276 | 188.165.192.22 | OVH OVH |
16276 | 188.165.196.19 | OVH OVH |
16276 | 188.165.204.115 | OVH OVH |
16276 | 188.165.61.44 | OVH OVH |
16276 | 188.165.95.132 | OVH OVH |
16276 | 188.165.95.133 | OVH OVH |
16276 | 213.186.47.177 | OVH OVH |
16276 | 213.251.164.84 | OVH OVH |
16276 | 87.98.149.171 | OVH OVH |
16276 | 91.121.108.38 | OVH OVH |
16276 | 91.121.11.69 | OVH OVH |
16276 | 91.121.15.168 | OVH OVH |
16276 | 91.121.162.65 | OVH OVH |
16276 | 91.121.163.43 | OVH OVH |
16276 | 91.121.167.167 | OVH OVH |
16276 | 91.121.174.152 | OVH OVH |
16276 | 91.121.182.209 | OVH OVH |
16276 | 91.121.226.19 | OVH OVH |
16276 | 91.121.27.197 | OVH OVH |
16276 | 91.121.3.80 | OVH OVH |
16276 | 91.121.74.88 | OVH OVH |
16276 | 94.23.110.107 | OVH OVH |
16276 | 94.23.12.62 | OVH OVH |
16276 | 94.23.158.31 | OVH OVH |
16276 | 94.23.198.9 | OVH OVH |
16276 | 94.23.220.163 | OVH OVH |
16276 | 94.23.220.194 | OVH OVH |
16276 | 94.23.224.132 | OVH OVH |
16276 | 94.23.228.40 | OVH OVH |
16276 | 94.23.229.220 | OVH OVH |
16276 | 94.23.24.66 | OVH OVH |
16276 | 94.23.28.143 | OVH OVH |
16276 | 94.23.34.93 | OVH OVH |
16276 | 94.23.35.107 | OVH OVH |
16276 | 94.23.92.35 | OVH OVH |
16582 | 66.185.162.248 | NEXTLEVELINTERNET – NEXTLEVEL INTERNET |
174 | 82.138.98.27 | COGENT Cogent/PSI |
20773 | 87.230.53.82 | HOSTEUROPE-AS AS of Hosteurope Germany / Cologne |
20773 | 87.230.55.58 | HOSTEUROPE-AS AS of Hosteurope Germany / Cologne |
20773 | 87.230.73.52 | HOSTEUROPE-AS AS of Hosteurope Germany / Cologne |
20877 | 87.237.106.195 | DATEK DATEK Telecom SRL |
20912 | 212.66.100.194 | ASN-PANSERVICE Panservice |
23136 | 74.213.179.183 | ONX – OnX Enterprise Solutions Inc. |
24806 | 81.2.210.98 | INTERNET-CZ INTERNET CZ |
24940 | 188.40.81.119 | HETZNER-AS Hetzner Online AG RZ |
24940 | 88.198.14.169 | HETZNER-AS Hetzner Online AG RZ |
24940 | 88.198.35.214 | HETZNER-AS Hetzner Online AG RZ |
24940 | 88.198.49.197 | HETZNER-AS Hetzner Online AG RZ |
24940 | 88.198.55.175 | HETZNER-AS Hetzner Online AG RZ |
24989 | 88.84.145.36 | IXEUROPE-DE-FRANKFURT-ASN IX Europe Germany AS |
27699 | 200.168.150.223 | TELECOMUNICACOES DE SAO PAULO S/A – TELESP |
2860 | 194.79.88.121 | NOVIS Novis Telecom |
28677 | 62.193.208.175 | AMEN AMEN Network |
28753 | 188.72.211.253 | NETDIRECT AS NETDIRECT Frankfurt |
28753 | 188.72.212.104 | NETDIRECT AS NETDIRECT Frankfurt |
29073 | 94.102.54.11 | ECATEL-AS AS29073 |
29131 | 109.169.29.144 | RAPIDSWITCH-AS RapidSwitch |
2914 | 198.64.133.214 | NTT-COMMUNICATIONS-2914 – NTT America |
29321 | 217.195.160.74 | CENTRONETAS Centronet |
29550 | 92.48.119.94 | SIMPLYTRANSIT Simply Transit Ltd |
29550 | 94.76.254.248 | SIMPLYTRANSIT Simply Transit Ltd |
29873 | 67.223.233.101 | BIZLAND-SD – The Endurance International Group |
31333 | 83.151.21.150 | VOLLMAR-AS AS31333 |
31365 | 85.153.38.2 | SGSTELEKOM SGS Telekom Autonomous System |
32244 | 67.225.181.217 | LIQUID-WEB-INC – Liquid Web |
3301 | 213.180.79.146 | TELIANET-SWEDEN TeliaNet Sweden |
3356 | 62.67.246.113 | LEVEL3 Level 3 Communications |
34265 | 213.108.72.158 | SILVERTELECOM-AS SilverTelecom Ltd |
34762 | 77.241.80.228 | COMBELL-AS Combell group NV |
34779 | 93.103.5.146 | T-2-AS AS set propagated by T-2 |
34779 | 93.103.5.156 | T-2-AS AS set propagated by T-2 |
35228 | 87.194.123.116 | BEUNLIMITED Avatar Broadband Limited |
35830 | 80.248.221.213 | SIVIT-AS SIVIT Network – http://www.sivit.net/ |
36057 | 174.137.179.244 | WEBAIR-AMS Webair Internet Development Inc |
39326 | 93.89.80.117 | GOSCOMB-AS Goscomb Technologies Limited |
39582 | 89.106.8.40 | GRID Grid Bilisim Teknolojileri A.S. |
41044 | 194.24.228.81 | THYA-AS Thya AS Number |
4134 | 61.177.120.254 | CHINANET-BACKBONE No.31 |
42926 | 213.128.83.18 | RADORE Radore Hosting Telekomunikasyon Hizmetleri San. ve Tic. Ltd. Sti. |
43350 | 77.247.180.40 | NFORCE NForce Entertainment B.V. |
43413 | 78.41.22.130 | ASNEW NEW TELEKOM |
43541 | 93.185.105.74 | VSHOSTING VSHosting s.r.o. |
44112 | 77.222.43.78 | SWEB-AS SpaceWeb JSC |
44976 | 91.204.116.114 | IONOD-AS AZNet Autonomous System |
4766 | 218.145.56.55 | KIXS-AS-KR Korea Telecom |
4766 | 222.122.81.54 | KIXS-AS-KR Korea Telecom |
48539 | 91.198.106.6 | OXILION-AS Oxilion B.V. |
49981 | 217.23.7.112 | WORLDSTREAM WorldStream |
5577 | 212.117.161.3 | ROOT root SA |
6724 | 85.214.22.200 | STRATO STRATO AG |
6908 | 78.41.156.236 | DATAHOP Datahop Ltd |
7992 | 72.38.223.96 | COGECOWAVE – Cogeco Cable |
8001 | 69.164.212.94 | NET-ACCESS-CORP – Net Access Corporation |
8399 | 81.93.5.49 | ORNIS-AS RISC GROUP IT SOLUTIONS S.A. |
8560 | 87.106.99.134 | ONEANDONE-AS 1&1 Internet AG |
8935 | 212.19.216.11 | INTOUCH-CS-AS Amsterdam |
8972 | 62.75.161.249 | PLUSSERVER-AS PlusServer AG |
8972 | 62.75.162.196 | PLUSSERVER-AS PlusServer AG |
8972 | 85.25.152.176 | PLUSSERVER-AS PlusServer AG |
Which, when plotted on a map, looks like:
This map example shows the high concentration of compromised servers in the OVH autonomous system, a large hosting company located in France. While this shouldn’t specifically illustrate that OVH is overtly malicious, it does show that their hosting strategies are permissive to cybercrime (or at least, they are not staffed or equipped to handle abuse requests in a timely manner.). This data also doesn’t take into account sink-holing activity, in which a security researcher will register a known malicious domain and redirect its traffic to a friendly server for intelligence or defensive purposes.
Historically, however, OVH has been highly ranked in most “malicious organization lists” which include the following:
With our new found intelligence in hand, we began mapping the infrastructure according to labels and descriptions that were part of the zone files. What we found was a tiered infrastructure that spread domains across specific functions.
A Tiered-Criminal Infrastructure
After analyzing the DNS configuration over the observed time-period, we classified the servers into four distinct “functions”
These were:
Command and Control Domains
During our observation, we tracked 23 domains specifically devoted to C2 activity, which were then sub-divided into other categories:
afterspan.ru | Bredolab Command and Control | |
alesolo.ru | Bredolab Command and Control | |
armyerror.ru | Bredolab Command and Control | |
bayjail.ru | Bredolab Command and Control | |
coolblender.ru | Bredolab Command and Control | |
discountprowatch.com | Bredolab Command and Control | |
evilpal.ru | Bredolab Command and Control | |
exitguide.ru | Bredolab Command and Control | |
eyesong.ru | Bredolab Command and Control | |
feeplain.ru | Bredolab Command and Control | |
forhomessale.ru | Bredolab Command and Control | |
galoh.ru | Bredolab Command and Control | |
hostindianet.com | Bredolab C2/ DNS configuration | |
hotgas.ru | Bredolab Command and Control | |
imoviemax.ru | Bredolab Command and Control | |
localegg.ru | Bredolab Command and Control | |
tunemug.ru | Bredolab Command and Control | |
yourarray.ru | Bredolab Command and Control | |
getyourdns.com | DNS Configuration | |
dnsofthost.com | DNS Configuration | |
instantdnsserver.com | DNS Configuration | |
netdnshosting.com | DNS Configuration | |
netwebinternet.ru | Unknown (labeled “Win Proxy”) |
Most of these domains all used the same registrar:
registrar: NAUNET-REG-RIPN
Naunet , a Russian registrar located in Moscow, has been highly visible in many “known bad organization” lists. Accord to data at URIBL (http://uribl.com), nearly 100% of the domains recently registered at this registrar are listed for spam, malware or exploits:
Listed Domains registered at NAUNET-REG-RIPN
97.68% – 970 of 993 domains registered at are listed by URIBL in the 5 day period prior to the 48hr publication delay.
Additionally, the ShadowServer organization has tracked additional malicious behavior (to which NetWitness was a contributor) from this registrar:
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20100815
According to the NAUNET website, multiple avenues of “support” contact information are given for contact, but in our experience, abuse notifications are never answered. This, combined with observed behavior, makes it highly likely that NAUNET-REG-RIPN is complicit in cybercrime activity, if not directly involved.
Traffic Domains
The next group of domains were what we classified as “traffic domains”.
These domains were used specifically in injection and spam tasks, and either via injected script or direct hyperlink to direct visiting browsers to exploit domains for exploitation and malware downloads:
abovebikini.ru | pantsletter.ru |
abovehell.ru | penzit.ru |
absurdyear.ru | planetevidence.ru |
albinoearth.ru | pocketbloke.ru |
animalink.ru | pokingissue.ru |
ashmind.ru | publicsummer.ru |
barkingtar.ru | ratdock.ru |
betaguy.ru | reactionpoet.ru |
bitterwater.ru | recordsquare.ru |
breezesuitor.ru | rescuedtoilet.ru |
budgetdude.ru | riotassistance.ru |
chickcase.ru | rosevulture.ru |
circusillness.ru | rudeinsect.ru |
coldboy.ru | salebracket.ru |
countryme.ru | salebracket: |
crispybattle.ru | scarystroke.ru |
cutboss.ru | secondgain.ru |
dayemail.ru | shelfmurder.ru |
dizzyfruit.ru | shirtdifficulty.ru |
dyehill.ru | shortrib.ru |
earbeach.ru | slaveperfume.ru |
easychurch.ru | sodarm.ru |
fightkid.ru | soggyplan.ru |
furrytack.ru | soreturtle.ru |
galacticstall.ru | sourmood.ru |
giganticartist.ru | squareamp.ru |
gorgeoushead.ru | starvingarctic.ru |
hairyartist.ru | suitorlady.ru |
hereport.ru | sweatymilk.ru |
icypose.ru | tameflame.ru |
inkcoverage.ru | tendermix.ru |
inkrainbow.ru | thumbgirl.ru |
lonelyzero.ru | tipelephant.ru |
lovingmug.ru | trapbarf.ru |
mealpoets.ru | tunematerial.ru |
mightyradar.ru | validblood.ru |
muginsect.ru | viralwork.ru |
nuttyiron.ru | waredream.ru |
obscurewax.ru | wickerarms.ru |
octopusdye.ru | winterfight.ru |
onionhorse.ru | yellowbarn.ru |
ourpub.ru | zenwitch.ru |
ourpub.ru | zenwitch.ru |
In the case of this group of domains, all were registered at NAUNET-REG-RIPN:
Again showing ongoing abuse occurring with this registrar.
Exploit Domains
The third group of domains, which were the most numerous (380) of the classifications, where used exclusively for host exploitation and typically listened on port 8080 for connections:
accesspad.ru | momhand.ru |
actcountry.ru | mooddeal.ru |
allzero.ru | moodwater.ru |
anyscent.ru | mooseclock.ru |
applecorn.com | morefame.ru |
aquaticwrap.ru | motherfire.ru |
areadrum.com | mshand.ru |
aroundpiano.ru | mspizza.ru |
atlanticslime.ru | mspsion.ru |
bakedship.ru | mudbaby.ru |
ballweek.ru | mushybeer.ru |
bandrace.ru | mushyoil.ru |
bannerpoets.ru | musicnut.ru |
barfquake.ru | musicspark.ru |
barngrape.ru | nearflash.ru |
barnsoftware.ru | newpoem.ru |
baybear.ru | nicechevy.ru |
baymediagroup.com | oilrule.ru |
bedemand.ru | oldgoal.com |
bellday.ru | onionfleet.ru |
bentbluff.ru | opentruck.ru |
bentfolk.ru | ourhit.ru |
besttap.ru | outerrush.com |
betafleet.ru | packimage.ru |
bindispute.ru | panlip.ru |
bingizmo.ru | panskill.ru |
binpub.ru | pantscow.ru |
bitsdad.ru | parcelfool.ru |
bittag.ru | partymoney.ru |
blingfame.ru | pearlring.ru |
blockacid.ru | pearlrisk.ru |
bluefun.ru | pegamp.ru |
bluffonion.ru | pendude.ru |
boatbit.ru | petcode.ru |
bogrebel.ru | picturecurrent.ru |
bookdisk.ru | pilldot.ru |
boozelight.ru | planeshoes.ru |
bossmoon.ru | poolshirt.ru |
boyion.ru | poorweb.ru |
breadcells.ru | pressurespa.ru |
brushmen.ru | priorbars.ru |
bugweek.ru | problemdollars.ru |
busyspade.com | punkdye.ru |
cafemack.com | queenedge.ru |
canmaid.ru | queryiron.ru |
casejuice.ru | questwidow.ru |
caveidea.ru | quietlight.ru |
chainjoke.ru | quietzero.com |
chaosscone.ru | raceobject.ru |
chaoticice.ru | rackcells.ru |
chemistspiral.ru | radarmaze.ru |
cherrysolo.ru | radiomum.com |
chevylaw.ru | radioquest.ru |
childbar.ru | rainfile.ru |
chinawrap.ru | rancideye.ru |
claimpad.ru | raregum.ru |
claimrice.ru | rawscent.ru |
clanday.com | rawware.ru |
clanflag.ru | realyear.ru |
clannut.ru | rebelrobe.ru |
clockledge.ru | rimpearl.ru |
clothstarlet.ru | ripejoke.ru |
clubpie.ru | riskvenom.ru |
conebreakfast.ru | riverocean.ru |
copbun.ru | rockbale.ru |
crystalgreed.ru | roomglass.ru |
crystalrobe.ru | ropefad.ru |
cupbabe.ru | roseshow.ru |
cupjack.ru | roundstorm.com |
cutchair.ru | rowhock.ru |
cuteblame.ru | rubylips.ru |
cuteflash.ru | rubytune.ru |
dailytaxes.ru | ruralmetal.ru |
dealyak.ru | sackball.ru |
diamonddoctor.ru | sadute.com |
dimfame.ru | salesgin.ru |
dingosock.ru | salesyack.ru |
diseasednoodle.ru | sansriot.ru |
dizzyfrogs.ru | scarletpole.ru |
dollrocket.ru | scaryrack.ru |
donutquestion.ru | sheepbody.com |
dopebank.ru | sheepfork.ru |
dressdollars.ru | shinyfrogs.ru |
driparea.ru | shinytower.com |
drunkbat.ru | shipfink.ru |
drunkjeans.com | shirtband.ru |
dullcoins.ru | shirtcoins.ru |
dumbdevice.ru | shirtsalt.ru |
earlymale.com | shoesrebel.ru |
easyrag.ru | shophill.ru |
emptyprint.ru | shortcafe.ru |
entrypill.ru | shortemail.ru |
envirodollars.ru | shortrebel.ru |
evilpen.ru | showarms.ru |
examplebit.ru | showexample.ru |
fadcobra.ru | silencepill.ru |
fadhusband.ru | silencewindow.ru |
fadwife.ru | sillyfame.ru |
famerule.ru | sillysauce.ru |
familywater.ru | sisterqueen.ru |
fightword.ru | sixthdoor.ru |
filmriot.ru | skyrat.ru |
filmsnake.ru | slaveday.ru |
fireback.ru | slavetube.ru |
fitshoes.ru | sledhour.ru |
flamechild.ru | slickclaim.ru |
fleetgarbage.ru | slickstage.ru |
fordloss.ru | smelldoll.ru |
foxfleet.ru | smelldrip.ru |
freaklimit.ru | smokyegg.ru |
friedfool.ru | snakebeast.ru |
frogshair.ru | sneakyring.ru |
galhose.ru | soggyshop.ru |
galneed.ru | solocherry.ru |
galslime.com | sonnose.ru |
galstorm.ru | soremouse.ru |
gasrisk.ru | soundpit.ru |
geekrib.ru | soundreptile.ru |
giantreputation.ru | sourstate.ru |
gigasofa.com | spacememory.ru |
ginmail.ru | splatspa.com |
girllab.ru | spoonsled.ru |
gizmoacid.ru | spotback.ru |
gocloth.ru | spotthing.ru |
greedford.ru | stagepause.ru |
gunclown.ru | stallnut.ru |
guntap.ru | statebot.ru |
guygun.ru | steelpose.ru |
hairybelt.ru | stickregion.ru |
hairyrobot.ru | streetchair.ru |
harpear.ru | stuffcorn.ru |
harshlab.ru | sublover.ru |
hatbot.ru | subpeace.ru |
heroguy.ru | suitorbook.ru |
hiddenyak.ru | sunpound.ru |
highstate.ru | superedge.ru |
hillchart.com | surelemon.ru |
hillnerd.ru | tackymud.ru |
homecan.ru | talldeed.ru |
horsedoctor.ru | tangytable.ru |
hugefrogs.ru | tanspice.com |
hugegirls.ru | tanyear.com |
hugejar.com | tartonion.ru |
indiancurtain.ru | taxesball.ru |
inktime.ru | taxestower.ru |
ionicclock.com | taxshelf.ru |
jackgas.ru | termquake.ru |
jarpub.ru | theirpicture.ru |
juicemilk.ru | theirsnot.ru |
juicypark.ru | thewatches-discount.com |
kidstune.ru | thirdharp.ru |
kitegreed.ru | tightmouse.ru |
lameshow.ru | tightsales.com |
landclock.ru | tintie.ru |
lasteye.com | tipbear.ru |
lazydonut.ru | tipsymoon.ru |
lazymatch.ru | towersky.ru |
legmood.ru | toxicedge.ru |
lessgap.ru | treecorn.ru |
lesskids.ru | treetip.ru |
lightkeys.ru | tribalbell.ru |
limitgap.ru | tubleg.ru |
lipbloke.ru | tuneblouse.com |
liplead.ru | undermix.ru |
lipspig.ru | useyack.ru |
locoblock.ru | utefox.ru |
lossplant.ru | validplan.com |
lostson.ru | vamptoes.ru |
lowermatch.ru | vastchief.ru |
luckyfan.ru | warydrunk.ru |
luckyfilth.ru | waxyblock.com |
luckysled.com | waxytooth.ru |
lumpybell.ru | wearyratio.ru |
lumpysmell.ru | weedsea.ru |
lunchego.ru | weekrack.ru |
lunchstroke.ru | widescone.ru |
macrotub.com | wildplane.ru |
madtax.ru | windybog.ru |
maidshed.ru | witfence.ru |
malecold.ru | workray.ru |
marketholiday.ru | wormware.ru |
mealsmell.ru | wrapboss.ru |
metalspice.ru | yaktrack.ru |
micarea.ru | yummyeyes.ru |
microlightning.ru | zenrope.ru |
mildbabe.ru | zilchpipe.ru |
minedesigns.ru | zinceye.ru |
minutecorn.ru | zipmoon.ru |
modelbomb.ru | zoojeans.ru |
moldypill.ru | zooneed.ru |
The majority of these domains were again registered at NAUNET, but we also see an additional familiar face in the “bad registrar” space:
Supporting Domains
The fourth and final classification of domains in this infrastructure were devoted to a number of “supporting activities”, most notably elements that are typically the subject matter of mass-spam campaigns.
This includes:
The domains in this group were as follows:
bestviagraa.com | Pharmacy Spam | |
bestviagracenter.com | Pharmacy Spam | |
bestviagrapharmacies.com | Pharmacy Spam | |
bestviagrapills.com | Pharmacy Spam | |
buynowviagra.com | Pharmacy Spam | |
buyviagraworld.com | Pharmacy Spam | |
cheapdrug-shop.com | Pharmacy Spam | |
cheapviagrarx.com | Pharmacy Spam | |
co-pharmacy.com | Pharmacy Spam | |
drugbestprice.com | Pharmacy Spam | |
drugs-shop4u.com | Pharmacy Spam | |
drugshops24.com | Pharmacy Spam | |
eropharmacy.com | Pharmacy Spam | |
esuperviagra.com | Pharmacy Spam | |
expressviagraonline.com | Pharmacy Spam | |
greatviagrabest.com | Pharmacy Spam | |
greatviagraprice.com | Pharmacy Spam | |
i-drugshop.com | Pharmacy Spam | |
live-pharmacy.com | Pharmacy Spam | |
mybestviagra.com | Pharmacy Spam | |
naturalviagraonline.com | Pharmacy Spam | |
onlineviagraorder.com | Pharmacy Spam | |
pharmacy-4you.com | Pharmacy Spam | |
pharmacy-magazine.com | Pharmacy Spam | |
superviagraonline.com | Pharmacy Spam | |
thecheapviagra.com | Pharmacy Spam | |
thenaturalviagra.com | Pharmacy Spam | |
thesuperviagra.com | Pharmacy Spam | |
theviagrapills.com | Pharmacy Spam | |
theviagrasite.com | Pharmacy Spam | |
viagra-international.com | Pharmacy Spam | |
viagrabestprices.com | Pharmacy Spam | |
viagrapriceline.com | Pharmacy Spam | |
web-drugshop.com | Pharmacy Spam | |
world-drugshop.com | Pharmacy Spam | |
discount-bestwatch.com | Counterfeit Merchandise | |
discount-bestwatches.com | Counterfeit Merchandise | |
discount-smartwatch.com | Counterfeit Merchandise | |
watch-atbestprice.com | Counterfeit Merchandise | |
watchatlowprice.com | Counterfeit Merchandise | |
firstmillionrecords.ru | Gambling | |
getyourmillions.ru | Gambling | |
milliondoll.ru | Gambling | |
multimillionman.ru | Gambling | |
thegreatmillion.ru | Gambling | |
gr8kino.ru | Pirated Video | |
100bestfilms.ru | Pirated Video | |
kino-welcome.ru | Pirated Video | |
skachivai-kino.ru | Pirated Video | |
seebestkino.ru | Pirated Video | |
hochutebia.ru | Online Dating | |
hotsex-meets.ru | Online Dating | |
dating-4you.ru | Online Dating | |
dating-group.ru | Online Dating | |
dating-spot.ru | Online Dating | |
love-pair.ru | Online Dating | |
xochu-dating.ru | Online Dating | |
planet-of-sexy.ru | Pornography | |
planet-sexy.ru | Pornography | |
seksyplanet.ru | Pornography | |
seksyy-planet.ru | Pornography | |
seksyyplanet.ru | Pornography | |
sexadults.ru | Pornography | |
sexhotmamba.ru | Pornography | |
sexmambass.ru | Pornography | |
sexmambu.ru | Pornography | |
sexplaycom.ru | Pornography |
Scan4you.net
An added bit of intelligence that came through the server status pages on these servers was the proxying of “scan4you.net” through all of the exploit domains. This was evident by the following request:
GET /scan4u/ HTTP/1.0,2010-06-10 10:00:01
GETs of the following URL from any exploit domain on port 8080 resulted in a connection to _http://scan4u.net_
Scan4you.net is essentially a “criminal virustotal plus”. That is, it is a service where a miscreant can submit a newly created malware binary to gauge the detection rate of various antivirus vendors. While similar to virustotal in this regard, the key is that scanned binaries aren’t submitted to the antivirus vendors in question, as is done with virustotal. A general overview of the service (translated from Russian) shows the following key points:
As well as antivirus checks, the miscreants running the service appear to have extended their checks into the online blacklist area:
“Domain check on presence in black list: ZeuS domain blocklist, ZeuS IP blocklist, ZeuS Tracker, MalwareDomainList (MDL), Google Safe Browsing (FireFox), PhishTank (Opera, WOT, Yahoo! Mail), hpHosts, SPAMHAUS SBL, SPAMHAUS PBL, SPAMHAUS XBL, MalwareUrl,SmartScreen (IE7/IE8 malware & phishing Web site),Norton Safe Web, Panda Antivirus 2010, (Firefox Phishing and Malware Protection), SpamCop.net and RFC-Ignorant.Org.”
This update indicates ongoing blacklist checks across a variety of services, including:
Miscreants using this service have a one-stop shop for both the detection of malicious binaries as well as the existence of their delivery systems in disparate blacklists across the Internet.
Tying it together
When the numbers are looked at as a whole, the infrastructure shows knowledge of defender techniques, as well as insight into the various money-making schemes involved.
Exploit domains are, by far, the largest slice of the total number of involved domains. Because exploit activity is often the “noisiest” of the infection cycle in a malware campaign and usually the mostly likely target for takedown, it makes sense that this operator would have a large quantity of such domains to rotate into campaigns as needed. Details showed this was a proxy network as well, so the use of compromised servers as a front-line helps to prevent takedown of the back-end servers feeding the system.
Based on the gathered intelligence as a whole, the operator was likely making money off of this scheme in a number of ways:
Conclusions
The intelligence gathered on this system show the continuing advancement of criminal exploit systems and detail the following points:
Special thanks to the following researchers, who played a key role in helping us understand this system:
Vitaly Kamluk – Kaspersky Lab, Japan
Steven Burn – Ur I.T. Mate Group
Happy Hunting!
Alex Cox, Principal Research Analyst
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.