{"id":3785,"date":"2011-01-06T09:28:28","date_gmt":"2011-01-06T16:28:28","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3785"},"modified":"2018-01-30T12:32:41","modified_gmt":"2018-01-30T19:32:41","slug":"new-years-drive-by-brings-a-recursive-rogue","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/01\/06\/new-years-drive-by-brings-a-recursive-rogue\/","title":{"rendered":"New Year&#8217;s Drive-By Brings a Recursive Rogue"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2005.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/01\/05\/new-years-drive-by-brings-a-recursive-rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2015.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;title=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2025.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;title=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2035.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;title=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2045.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;title=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2055.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;Title=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2065.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2075.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/01\/05\/new-years-drive-by-brings-a-recursive-rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2085.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;headline=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2095.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F01%2F05%2Fnew-years-drive-by-brings-a-recursive-rogue&amp;h=New%20Year%27s%20Drive-By%20Brings%20a%20Recursive%20Rogue\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2105.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2115.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_greetingcard_obs.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3788\" title=\"20110104_nydb_greetingcard_obs_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_greetingcard_obs_crop.png\" width=\"369\" height=\"90\" \/><\/a>On the morning of January 2nd, still bleary eyed, I checked my email to find a charming notification informing me that I&#8217;d received an electronic greeting card. Yay! I thought to myself: The first targeted malware of 2011 plopped right into my lap.<\/p>\n<p>I immediately pulled up my research machine, browsed to the URL in the message (don&#8217;t try this at home, kids), and found my test system swamped in malware. After classifying the files and their source URLs into our definitions &#8212; I didn&#8217;t want this to happen to <em>you<\/em>, after all &#8212; I turned the computer back off and slept until Tuesday, when I resumed my analysis.<\/p>\n<p>As it turns out, the payloads delivered by the drive-by download are as common as sand at the beach, but some of the techniques used by the malware&#8217;s distributor to obfuscate the true nature of the executable payload files (which may have been stored on what appears to be a hijacked, legitimate server running <a href=\"http:\/\/www.joomla.org\/\" target=\"_blank\">Joomla<\/a>) are fairly novel, and also a bit ridiculous.<\/p>\n<p><!--more--><\/p>\n<p>Our festive drive-by started with a browser exploit against the outdated version of Internet Explorer running on my test system. The page looked like it was trying to load a flash video, and displayed just a link that says &#8220;You need to update to the latest Flash Player.&#8221; Without waiting for me to click the link, the page pulled down and executed the first payload, a downloader called <strong>adobeupdate.exe<\/strong> that&#8217;s relatively recent to the scene: <strong>Trojan-Downloader-Karagany<\/strong>. <a href=\"http:\/\/blog.webroot.com\/2010\/11\/22\/karagany-isnt-a-doctor-but-plays-one-on-your-pc\/\" target=\"_blank\">We first wrote about this trojan<\/a> in November.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_malware-icons.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3791\" title=\"20110104_nydb_malware-icons\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_malware-icons.png\" width=\"173\" height=\"236\" \/><\/a><\/p>\n<p>Karagany quietly copied itself to the desktop, naming the file <strong>err.log#######<\/strong> (where the # signs indicate a random number from 0 to 9, which changes each time you run the Trojan). This behavior is virtually identical to what we saw two months ago.<\/p>\n<p>What was interesting was just how the malicious Javascript running on the server hosting the drive-by pulled down the Karagany payload. The payload was embedded in the source HTML of the driveby page, but it looked like a jumble of binary nonsense data. However, a Javascript file called within the context of the page performs a little computational gymnastics with the jumbled data, as shown in this screenshot.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_reversebase64.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3793\" title=\"20110104_nydb_reversebase64_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_reversebase64_crop.jpg\" width=\"420\" height=\"136\" \/><\/a><\/p>\n<p>The malware was first encoded in Base64, then the Base64-encoded version of the file was, byte by byte, reversed. The command within the script that switches the data back to a readily decodable format is called &#8220;reverseBase64Chars.&#8221; The end result was a double-encoded binary data embedded in the page, which looked like junk. However, when a victim visits the page, the script runs, and the script does the required byte-flip on each character, then decodes the Base64, as it writes the file to the victim&#8217;s PC. The infographic below illustrates the malware distributor&#8217;s elevator pitch description of the process.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_maldog.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3794\" title=\"20110104_nydb_maldog\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_maldog.jpg?w=300\" width=\"273\" height=\"208\" \/><\/a><\/p>\n<p>Looking back at the research I had done in November, it appears that this double-decoding baloney has been part of Karagany&#8217;s infection behavior since I first looked at it, but I hadn&#8217;t noticed it the previous time. It&#8217;s worth noting that as silly as it seems, the process appears to be effective at masking the true nature of the binary &#8212; the file is hidden in plain sight, so to speak.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_antivirusscan.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3795\" title=\"20110104_nydb_antivirusscan\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_antivirusscan.jpg?w=300\" width=\"300\" height=\"225\" \/><\/a><\/p>\n<p>Karagany&#8217;s previous payload was a rogue named Antivirus 2010. Its new rogue payload carries the oddly generic moniker <strong>Antivirus Scan<\/strong>. These bogus products report that a raft of infections have taken control of the PC, and try, without a hint of subtlety, to coerce you into paying as much as $70 for a useless &#8220;subscription.&#8221;<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_avscan_box.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3797\" title=\"20110104_nydb_avscan_box\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_avscan_box.png\" width=\"219\" height=\"238\" \/><\/a><\/p>\n<p>Hey, after all, Antivirus Scan&#8217;s Web site claims to provide <em>powerfull <\/em>protection, even in the <em>Standart Edition<\/em>. The $70 Ultimate version must be really good, because the description says &#8220;Buying this version, you obtain an ultimate protection. Since this day you can feel safe.&#8221;<\/p>\n<p>That&#8217;s a lie, since forever. And what about these testimonials?<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_avscan_testamonial.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3798\" title=\"20110104_nydb_avscan_testamonial\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_avscan_testamonial.png\" width=\"321\" height=\"73\" \/><\/a><\/p>\n<p>Thanks to this fraud, Gary in London is finally able to read his Apache server logs free of the fear and loathing that previously accompanied such a task? Well, free of the fear, anyway.<\/p>\n<p>Among the tricks this rogue employs are the fake scan, the fake &#8220;detection of malicious activity&#8221; dialog box;<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguealert.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3799\" title=\"20110104_nydb_roguealert\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguealert.png?w=300\" width=\"300\" height=\"217\" \/><\/a><\/p>\n<p>&#8230;the &#8220;fake System Tray warning message balloon&#8221;<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguesystray.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3800\" title=\"20110104_nydb_roguesystray\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguesystray.png\" width=\"324\" height=\"119\" \/><\/a><\/p>\n<p>&#8230;the fake firewall alert<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguepopalert.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3802\" title=\"20110104_nydb_roguepopalert\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_roguepopalert.png\" width=\"284\" height=\"279\" \/><\/a><\/p>\n<p>&#8230;and the instant classic, &#8220;randomly opening a new tab in the active browser to a porn site&#8221; trick.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_rogue_404adultcom.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3801\" title=\"20110104_nydb_rogue_404adultcom\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_rogue_404adultcom.png?w=300\" width=\"300\" height=\"216\" \/><\/a><\/p>\n<p>That one never gets old, except, of course, when the porn site the rogue&#8217;s creators chose to load is offline.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_recursive-rogue-alert.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-3796\" title=\"20110104_nydb_recursive-rogue-alert\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/01\/20110104_nydb_recursive-rogue-alert.png?w=300\" width=\"300\" height=\"124\" \/><\/a><\/p>\n<p>I can also appreciate the recursive irony when a rogue antivirus infection displays a warning message about a (supposedly different) rogue antivirus infection.<\/p>\n<p>All well-deserved mockery aside, though, I hope the real lesson gets across: Avoid links that point to electronic greeting cards, especially when those links come from a source you don&#8217;t know, and point to a site you&#8217;ve never heard of. Electronic greeting card emails are, quite possibly, the most hackneyed trope in social engineering. It&#8217;s fun to get into the holiday spirit, but you shouldn&#8217;t let your guard down for a second, even when you&#8217;ve been on vacation.<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the morning of January 2nd, still bleary eyed, I checked my email to find a charming notification informing me that I&#8217;d received an electronic greeting card. Yay! I thought to myself: The first targeted malware of 2011 plopped right into my lap. I immediately pulled up my research machine, browsed to the URL in [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4263,4811,8413,4825,8405,8399,3619,8403,8407,3477,3919,8205,4893,4785,8401,4477,8409,3471,5759,8411],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3785"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3785"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3785\/revisions"}],"predecessor-version":[{"id":17101,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3785\/revisions\/17101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3785"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3785"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}