V
Virus Guy
I got one of those storm invitation e-mails yesterday (Halloween
theme, subject = "FW: To much fun").
The link is:
hxxp://69.144.141.75/
It tries to do some cross-site scripting, as well as run an active-x
control. This results in 2 temp files in my IE cache.
I sent those 2 files (one is 6.6 kb, the other 33.9 kb) to Virus
Total, and only 1 application flagged them - Webwasher-Gateway -
identified as JavaScript.CodeUnfolding.gen!High (suspicious).
The user-clickable payload in this case was dancer.exe (about 125 kb)
and it was identified by 19 out of 32 apps on VT (59% detection
rate). Most/all of the first-tier AV apps flagged it (but then again
this is probably after a good 24 hours of exposure).
What is probably not widely known is that all AV apps seem to not care
about the self-unpacking javascript files that come as part of the
experience. Why aren't they looking for those?
This makes Webwasher-Gateway look good.
theme, subject = "FW: To much fun").
The link is:
hxxp://69.144.141.75/
It tries to do some cross-site scripting, as well as run an active-x
control. This results in 2 temp files in my IE cache.
I sent those 2 files (one is 6.6 kb, the other 33.9 kb) to Virus
Total, and only 1 application flagged them - Webwasher-Gateway -
identified as JavaScript.CodeUnfolding.gen!High (suspicious).
The user-clickable payload in this case was dancer.exe (about 125 kb)
and it was identified by 19 out of 32 apps on VT (59% detection
rate). Most/all of the first-tier AV apps flagged it (but then again
this is probably after a good 24 hours of exposure).
What is probably not widely known is that all AV apps seem to not care
about the self-unpacking javascript files that come as part of the
experience. Why aren't they looking for those?
This makes Webwasher-Gateway look good.