If you are working in computer security and still don’t have hear about the latest Oracle Java 0day, aka CVE-2013-0422, then you should change you job ! This last Oracle Java 0day was discovered massively exploited in exploit kits by @kafeine the 10th January. Other exploit kits have quickly add support of this new vulnerability, like Gong Da exploit kit.
This new version was discovered on “hxxp://syspio.com/data/m.html” a web site how is actually still online.
“syspio.com” is hosted on 22.214.171.124, in KR and this domain name seem to be associated with a legit compromised web site.
After de-obfuscation of the “m.html” file you can see that Gong Da Pack has involve to the following diagram.
Here under some information s regarding the different files:
EnKi2.jpg (aka CVE-2011-3544) : 8/46 on VirusTotal.com
cLxmGk3.jpg (aka CVE-2012-0507) : 11/46 on VirusTotal.com
OLluRM4.jpg (aka CVE-2012-1723) : 20/46 on VirusTotal.com
GPUrKz2.jpg (aka CVE-2012-4681) : 29/45 on VirusTotal.com
PBLO5.jpg (aka CVE-2012-5076) : 12/46 on VirusTotal.com
Nuwm7.jpg (aka CVE-2013-0422): 6/46 on VirusTotal.com
ESET anti-virus editor has post a blog post the 18th December regarding a “new” malicious Apache module how inject malicious content into web pages served up by compromised servers. The malware, named Linux/Chapro.A by ESET, is using a XOR loop obfuscation and other techniques in order to evade detection by system administrators. ESET also reported that the malware was actively used by Exploit Kits, and precisely by Sweet Orange. Some screenshots were provided by ESET, but no samples.
I was interested by this new malware, cause few weeks ago another malicious Web server module was found, but this time targeting nginx in proxy mode, but with the same purposes.
Based on the few information’s provided by ESET I began my investigation in order to find samples and have more details on the malware.
If you take a look at page 23 of the presentation and to the screenshot made by ESET. Do you not see any similarities ?
I saw here too much similarities between the malicious Apache module discovered by Unmask Parasites and ESET Linux/Chapro.A.
Hopefully Unmask Parasites has provide more details (some strings) of the malicious Apache module in his blog post, in order to continue my investigations. The malicious Apache module was linked to Darkleech module by the author of this module on Russian underground forums.
The following diagram describe you the way November version of Cool EK was working.
Since few days, Cool EK has involve by removing support of Oracle Java CVE-2012-1723 vulnerability, replacing “new.jar” file with a “java.php” streamed file. The new “java.php” is only catched by 3/44 anti-viruses on VirusTotal. November version, aka “new.jar” was catched by 28/46 anti-viruses on VirusTotal.
In November version “file.jar” requested “myfile.dll” through “/r/f.php?k=1&e=0&f=0” request and “new.jar” requested the same DLL file through “/r/f.php?k=2&e=0&f=0” request. All these requests have been replaced, in the December version, with a unique request to “/r/f.php?k=1“.
The following diagram describe you the way December version of Cool EK is working.