RedKit Patterns – Additional Info to @fknsec Writeup

Posted: December 12th, 2012 | Author: | Filed under: IT Related | Tags: , , , | 4 Comments »

It’s been a while since the last time I logged in into my WordPress. I’ve jumped on BlueCoat System‘s bandwagon (and left MyCERT earlier), so I’ve to spent some time to make myself familiar with this new environment and job 🙂

Last week, @fknsec, in his blog, wrote a very good article about RedKit Exploit Kit. But here I would like to add few more interesting facts on the RedKit patterns

  1. @fknsec did mention about “/hmiq.htm” in his blog, but from my observation, beside Porche and Ferari, the RedKit author also like the letter H. The naming convention for the HTML file will always start from H and ended with .htm (everything in small case). So a working regex for this pattern world be:
    /\/h(m|f)[a-z]{2}\.htm$/

    ** updated on 14 Feb 2013 **
    Look like this portion is no longer valid at the moment. You can replace it with:

    /\/[a-z]{4}\.html?$/
  2. 887.jar and 332.jar is quite unique to RedKit. Go hunt them!
    /\/(887|332)\.jar$/
  3. Same goes to 987.pdf
    /\/987.pdf$/
  4. c.htm as mentioned by @fknsec can be in 1 char (letter) file name (in small case), or it can also be in 2 digit (number) and ended with .htm.
    /\/([a-z]{1}|\d{2})\.htm$/
  5. Unlike BlackHole and Cool exploit kit, RedKit will usually be hosted on compromised websites and not having his own special subdomain. Most of the time, RedKit files will be in the main directory of a website/domain
    eg: google.com/332.jar
  6. From my observation, among the famous tricks to lure victim to RedKit are:
    • Redirector script planted in jquery JS file
    • Redirector in “Domain to sell” placeholder

I think that’s all for today. I don’t know when is the next time to update my blog, since will keep my self busy in these coming weeks, with my first baby is going to execute /h(is|er)/ first version of “Hello World” script in near soon.

Till then, stay safe everyone & happy hunting!

 

Reference:

  1. http://fortknoxnetworks.blogspot.com/2012/12/exploit-medfos-url-detection-with-drop.html
  2. http://malware.dontneedcoffee.com/2012/08/cve-2012-4681-redkit-exploit-kit-i-want.html

Weekly Summary : Android tel URi and Malaysia Grey Cloud

Posted: October 2nd, 2012 | Author: | Filed under: IT Related | Tags: , , , , | No Comments »

What a busy week so here is my late update.

I’ve been asked by my wife on this weird javascript pattern. I’m not managed to download the content of the php file due to it has been removed, and some of them were giving me infinite loop of 302. Someone tweet me and ask me to set the referrer as the URL of the ‘infected’ website. A few hours later, I’ve saw a blog post “Redkit Exploit Kit: upgrades in anti-forensics.” popping up from my RSS reader. Mystery solved!

You might have heard about remote USSD attack has been discussed last week. This ‘vulnerability’ exist due to improper handling of “tel:” URi in Android. It affects many phones and according to this entry, it has been verified on not only Samsung Galaxy S3, but also on an HTC One X (running HTC Sense 4.0 on Android 4.0.3) and a Motorola Defy (running Cyanogen Mod 7 on Android 2.3.5). Patch has been released to address this issue and Android 4.1 has been verified not vulnerable to this vulnerability. Alternatively, users can use TelStop or Auto-Reset Blocker to prevent tel URi to be executed without user prompt.

A little update from Malaysia landscape. Exabytes has announced that their cloud server has been compromised and some virtual machines and data have been deleted. Official announcement can be found here.

Thats all.. Stay safe