Malware hunt – wildfowl to find


More than twice for the last 24 hours I was asked the non-trivial question:

Where do You find the targets for the malware hunt, if You’re not a  part of the big team, malware researcher or not own a honeynet.

Actually, if You do want to fight a malware, IMHO it is very useful to have a honey-pot system, or, at least, be in security business somehow. It will provide You a non-stop flow of the malicious targets to review. But if  You not, and You still want to help?

Disclamer: All links provided lead to lists of malicious or potentially malicious resources. Do not click there on any link, or don’t run any file, without proper knowledge, env prepared and skills trained.

Well, here are the few links, that  aggregate latest known threats, that You can practice on:

Read more…

List of compromised domains [2725] that spread RedKit EK.


Hi all, folks.

Need Your help.

For last few month we were looking former Redkit spreading all over, using compromised websites to get into victim machines.

At this point, united tracker results indicate that at least 2725 unique domains were compromised and participated in Redkit spreading from 11.11.2012 till 31.01.2013

Since I literally have no free time to manage all cleanup process and no resources to provide support to owners of those web-resources (major part of them even not respond to mail), here is list 

Please note, that this list not 100% solid, there were few changes in Exploit Kit spreading system that tracking agent need to be reconfigured, but bottom line is – its at least 90% accurate.

Some domains were cleaned up, some – abused and took down by hoster company or owner. Most of listed hosts still infected, I assume. And since MDS system reuse them frequently, once they’ll appear to be malicious again. Please act accordingly.

In case Your website listed in here:

Removal instructions [for site\host\shared hosting services Owners]:

1. Search for .htaccess files and php.ini or .user.ini files in root directories, check them for mod_rewrite.c entries (see more details here)

2. Clean  files attached in mod_rewrite.c section of .htaccess

3. Hire security professional that will harden Your website\service to prevent future intrusions. If not – malware will return. 

Stay Safe!



Reveton.N malware – Safe Mode included.


Reveton.N malware quite known recently, it’s Ransomeware that lock Your PC and demand money.

See Microsoft Encyclopedia for screenshots and some details about it.

interesting is, that most of  removal instructions that Google found start from Boot in “Safe mode”

And my sample from 2 days ago infect victim in way, that in “Safe mode” nice window that demand money, reappear (!)

Ok, how?

Simple, actually. It inject itself into WMI service, as ServiceDLL both in ControlSet001 and ControlSet003

Local path of DLL is victim current %TEMP% folder

So, updated cleanup instructions for Reveton.N malware:

1. Reboot and press F8, choose “Safe mode with command prompt” and boot with Your current user

2. In command prompt (black window) type in

cd %TEMP%

and press Enter

then type in

del /q *.dll

and press Enter

type in

shutdown /r /f /t 00

press Enter

Computer will restart

3. Download proper antivirus and clean Your computer with it from all other malware You have on Your PC. 

Stay Safe!






“Four Horses Club” – social networking locker malware -[Updated]


This post is about “private” installs\monetize service named “Club Four Horses”:



Actually, this is malicious service “affiliate program” to convert installs on RU zone and Russian-speaking users around the world. Since it localized to RU zone, You may say, that it’s less interesting, but wait 🙂 Implementation is for RU, but idea … 🙂

Read more…

Javascript include: from attacker to victim & how to check?


Because of all that happened recently, let me be quick 🙂

Various soft present to automatically add text within webpages on compromised websites.

Those chain of samples for recent attack I followed 🙂


Hacker intrude on poorly configured website: thru software flaw, poor configuration or stolen credentials.

Software (shell) uploaded to remotely manage such website, link written in database of compromised websites.


Bundle of websites sent a command to add to each (or specific, default for example) page malicious code:


Read more…

FakeAV: “System Progressive Protection” inside out.


Yesterday my client was attached by some malware. And [censored] antivirus was unable to protect him.

[twitter link in WP not working, will check tomorrow]

So I had a free time to have a look on it.

Meet “System Progressive Protection”:

Read more…

Drive-by download malware within 643MB avi



Did You know, that ASF (Advanced Systems Format) by design include feature that can be used as drive-by download? No? Then – this post for You.

Read more…

“Photo Printing Kiosk” Honeypot v0.1beta


It is a problem, if You not in States or Finland, to monitor malware that spreading locally.  You need a honeypots, local lab etc.

Why it’s important, You ask?
1. This is easiest way to detect and prevent country-targeted, localized, narrowed attacks before fact became acknowledged by someone big.
2. It help local computer users stay less vulnerable to high-possible threats for them.
3. It’s cool, You see new stuff before even know about it.

Read more…

Free AV tools (updated 23.07.2012)


Once I did list of free tools You may use to cleanup Your computer without payment.
Looks like it time to renew – for me and my guys to use, and to all to use for Your purposes.

Free Antivirus on-demand scanners:

CureIT (DrWeb project)

CureIT 7 beta

TrenDMicro free cleanup tool:
All other free tools of TrendMicro (incl HijackThis):
Symantec Removal Tools:

Outdated, but in case You need it:

Kaspersky Removal Tool:

Rootkit eliminator (BlackLight):

Avast offline scanner:
F-Secure offline scanner:

Microsoft Safety Scanner:

Sophos Virus removal:

Antimalware tools:


Microsoft Windows Malicious Software Removal Tool:

Comodo Cleaning Essentials (malware cleanup and process )

Emsisoft Emergency Kit:
Online Scanners

Fast QuickScan (BitDefender Memory scan tool)

CA Scanner:

Rising AV:

Online File analysers:

Free AV solutions:

AV: Bitdefender Free




Microsoft Security Essentials


URL Analysers:


URLVoid (multiple engines):

DrWEB online check:

Useful tools:


 Process Explorer by Mark Russinovich

AntiRootkit TDSSKiller by Kaspersky

Updated 23.07.2012

Special thx for updates 0xerror

Facebook Malware Checkpoint


Facebook announced the Malware Checkpoint – service for detecting malicious activity on user’s computers. Technical solutions provided  by Microsoft Security Essentials  and McAfee’s Scan and Repair .

Here is some overview of the process

Read more…