06.02.2015 Views

Russian Business Network study - bizeul.org

Russian Business Network study - bizeul.org

Russian Business Network study - bizeul.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Version 1.0.1<br />

RBN <strong>study</strong> – before and after<br />

David Bizeul<br />

redirector_url = "*fineco.it /fineco/PortaleLogin {www} /it/fineco.php 2 0 3"<br />

redirector_url = "onlineid.bankofamerica.com /cgi-bin/sso.login.controller* {www}<br />

/usa/boa_pers/sso.login.php 2 0 2"<br />

redirector_url = "onlinebanking-nw.bankofamerica.com /login.jsp* {www} /usa/boa_pers/sso.login.php 2 0<br />

2"<br />

redirector_url = "online.wellsfargo.com /signon* {www} /usa/wellsfargo.php 2 0 2"<br />

redirector_url = "ibank.barclays.co.uk /olb/*/LoginPasscode.do {www} /uk/barc/LoginPasscode.php 2 0 2"<br />

redirector_url = "*ebank.hsbc.co.uk /servlet/com.hsbc.ib.app.pib.logon.servlet.OnLogonVerificationServlet<br />

{www} /uk/hsbc/hsbc.php 2 0 2"<br />

redirector_url = "online*.lloydstsb.* /miheld.ibc {www} /uk/lloyds/lloyds.php 2 0 2"<br />

redirector_url = "*halifax-online.co.uk /_mem_bin/UMLogonVerify.asp {www} /uk/halifax.co.uk.php 2 0 3"<br />

redirector_url = "olb2.nationet.com /signon/SinglePageSignon_wp1.asp* {www} /uk/nationwide.php 2 0 3"<br />

redirector_url = "webbank.openplan.co.uk /core/webbank.asp {www} /uk/woolwich.co.uk.php 2 0 3"<br />

#DE<br />

redirector_url = "meine.deutsche-bank.de /mod/WebObjects/dbpbc.woa/* {www} /de/deutschebank.de/login.php<br />

2 0 3"<br />

redirector_url = "banking.postbank.de /app/login.prep.do* {www} /de/postbank/postbank.de.php 2 0 3"<br />

redirector_url = "portal*.commerzbanking.de /P-Portal/XML/IFILPortal/pgf.html* {www}<br />

/de/commerzbanking/login.php 2 0 2"<br />

redirector_url = "www.dresdner-privat.de /servlet/P/SSA_MLS_PPP_INSECURE_P/pinLogin.do {www}<br />

/de/dresdner-privat/pers.php 2 0 3"<br />

redirector_url = "www.dresdner-privat.de /servlet/N/SSA_MLS_PPP_INSECURE_N/pinLogin.do {www}<br />

/de/dresdner-privat/corp.php 2 0 3"<br />

This file was obviously a configuration file for a banking trojan. All indicated urls were targets which the trojan had to<br />

redirects on malicious site.<br />

Let’s consider the second line :<br />

redirector_url = "*fineco.it /fineco/PortaleLogin {www} /it/fineco.php 2 0 3"<br />

______ _______________ ____ _________ _____<br />

1 2 3 4 5<br />

There are different fields inside :<br />

1 : domain name<br />

2 : end of the legitimate url<br />

3 : protocol used (http)<br />

4 : target redirected location (end of the URL)<br />

5 : <br />

It’s clear that’s one data is missing: the target domain. This domain was probably obtained through www_domains_list<br />

pointing on pageshowlink.com (parking page during the investigation).<br />

I could also access to a htaccess file :<br />

RewriteEngine On<br />

#/x26_new.phpdata=$1<br />

#rewrite dlya novih ID tipa<br />

TROY_ID|build_name|build_version<br />

RewriteRule ^XFsQa5/(.+)$ /gamma/x26_newid.phpdata=$1<br />

RewriteRule ^hgbs845/(.+)$ /gamma/x26_new10.phpdata=$1<br />

So everything trying to reach http://evildomain.com/XFsQa5/whateveryouwant/forinstance/bankofamerica.com/ would<br />

be translated as http://evildomain.com/gamme/x26_newid.phpdata=$1<br />

$1 may be an identifier mixing a real trojan ID, the build name and the build version.<br />

As I didn’t know anything about $1, I asked for a default file on gamma/x26_newid.phpdata=1<br />

I got a strange binary file, removed the beginning of the file and obtained a fully functional Torpig version. And what is<br />

“fun” with this default version is that few antivirus recognized this file as a suspicious file at the moment.<br />

I made a small comparison [ 10 ] between 2007-07-23 and 2007-10-25:<br />

10<br />

http://www.virustotal.com<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!