Windows users on certain versions of Microsoft software are vulnerable to a zero-day exploit discovered yesterday. Microsoft released security advisories and a fix-it-tool to address this vulnerability, and Jaime Blasco of AlienVault (@jaimeblascob) quickly released a great analysis with in-depth intelligence on the attack.

So far, the attack seems to be a targeted operation. We are only seeing around 25 users on OpenDNS network being affected. We pulled the DNS footprints of the users who requested the CnC server krickmart.com on November 4th and mapped their geo locations.

krickmart.com

As shown in the map, a majority of the affected users are located in Pakistan. This aligns with Jaime Blasco’s observation that this attack is targeting Pakistanis. Several users were also spotted in the Netherlands, Luxembourg, and Hungary, so we suspect that targets exist outside of Pakistan alone. We urge all Windows users who have installed software listed by Microsoft’s security advisory to check their system for IOC (Indicator of Compromise) information detailed in Jaime Blasco’s analysis. 

We can also share a quick summary of pDNS analysis of this attack to hopefully shed a bit light for the attack infrastructure analysis. 

 
[
  “37.0.125.77”,
  “krickmart.com.”,
  First_seen: “2013-08-10”,
  Last_seen: “2013-11-06”
]
[
  “31.210.96.220”,
  “maptonote.com.”,
  First_seen:”2013-08-20″,
  Last_seen: “2013-11-06”
]
[
  “31.210.96.213”,
  “myflatnet.com.”,
  First_seen:”2013-08-24″,
  Last_seen: “2013-11-06”
]
[
  “91.229.78.126”,
  “lampur.com.”,
  First_seen:”2013-09-27″,
  Last_seen: “2013-11-06”
]
[
  “91.229.78.100”,
  “lampur.com.”,
 First_seen: “2013-09-26”,
  Last_seen: “2013-09-26”
]
[
  “91.229.78.86”,
  “lampur.com.”,
 First_seen: “2013-09-24”,
  Last_seen: “2013-09-24”
]
[
  “91.229.78.82”,
  “lampur.com.”,
 First_seen: “2013-08-09”,
  Last_seen: “2013-08-18”
]
[
  “212.7.219.39”,
  “appworldstores.com.”,
  First_seen:”2013-08-25″,
  “2013-11-06”
]
[
  “31.210.96.222”,
  “similerwork.net.”,
  First_seen:”2013-08-10″,
  Last_seen: “2013-11-06”
]
[
  “37.0.124.95”,
  “intertechsupport.net.”,
  First_seen:”2013-08-08″,
  Last_seen: “2013-11-06”
]
[
  “91.229.78.126”,
  “lampur.com.”,
  First_seen:”2013-09-27″,
  Last_seen: “2013-11-06”
]
[
  “91.229.78.100”,
  “lampur.com.”,
  First_seen:”2013-09-26″,
  Last_seen: “2013-09-26”
]
[
  “91.229.78.86”,
  “lampur.com.”,
  First_seen:”2013-09-24″,
  Last_seen: “2013-09-24”
]
[
  “91.229.78.82”,
  “lampur.com.”,
  First_seen:”2013-08-09″,
  Last_seen: “2013-08-18”
]
[
  “93.170.128.60”,
  “twikstore.com.”,
  First_seen:”2013-10-28″,
  Last_seen: “2013-11-06”
]
 
CnC servers         Country
37.0.125.77         Russian Federation
37.0.124.106        Russian Federation
31.210.96.220       Turkey
31.210.96.213       Turkey
91.229.78.126       Ukraine
91.229.78.100       Ukraine
91.229.78.86        Ukraine
91.229.78.82        Ukraine
212.7.219.39        Netherlands
31.210.96.222       Turkey
37.0.124.95         Anonymous Proxy
91.229.78.126       Ukraine
91.229.78.100       Ukraine
91.229.78.86        Ukraine
91.229.78.82        Ukraine
93.170.128.60       Czech Republic
 

Here is a list of domains hosted on the above IP addresses:

krickmart.com.
www.krickmart.com.
ns1.krickmart.com.
ns2.krickmart.com.
maptonote.com.
irc.cetyeri.net.
www.maptonote.com.
ns1.maptonote.com.
ns2.maptonote.com.
myflatnet.com.
ebayforboots.net.
ns1.myflatnet.com.
lampur.com.
dinapigi.co.uk.
mail.dinapigi.co.uk.
ns2.dinapigi.co.uk.
www.dinapigi.co.uk.
ns1.lampur.com.
ns2.lampur.com.
lampur.com.
www.lampur.com.
appworldstores.com.
file-panda.com.
android.play.store.file-panda.com.
ns1.appworldstores.com.
ns1.file-panda.com.
ns2.appworldstores.com.
ns2.file-panda.com.
similerwork.net.
www.similerwork.net.
intertechsupport.net.
lampur.com.
dinapigi.co.uk.
mail.dinapigi.co.uk.
ns2.dinapigi.co.uk.
www.dinapigi.co.uk.
ns1.lampur.com.
ns2.lampur.com.
lampur.com.
www.lampur.com.
twikstore.com.
ns1.twikstore.com.
ns2.twikstore.com.

 

While hunting down all potential CnC servers, we noticed an interesting similarity of the server configuration across these domains. It might not turn out to be relevant, but this configuration isn’t typically seen compared to the random sample of 50,000 headers we analyzed below. As a result, we conclude that the same attackers are running all the servers in the attack.

Server: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Accept-Ranges: bytes
Transfer-Encoding: chunked
Content-Type: text/html
header-server-pie

 

 

 

 

This post is categorized in: