1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Scam Misleading Site?

Discussion in 'Security and Privacy' started by sniper9228, 2008/11/11.

  1. 2008/11/11
    sniper9228

    sniper9228 Well-Known Member Thread Starter

    Joined:
    2005/08/31
    Messages:
    615
    Likes Received:
    1
    This is probably the dumbest question I ever asked. Is this a spyware site? Misleading site?

    Code:
    hxxp://www.dixalivop.com/recherche/katmandu-c/investing/727-798.html
    All it does is ask you something, honestly, don't be afraid to click it. I would not post something that automatically installs.
     
    Last edited by a moderator: 2008/11/12
  2. 2008/11/11
    rsinfo

    rsinfo SuperGeek Alumni

    Joined:
    2005/12/25
    Messages:
    4,076
    Likes Received:
    178
    Don't really know but something is going on here.

    If I access the site with FF with NoScript enabled, it shows me a different site. If I disable NoScript for this site, it redirects me to different sites - it has redirected me to youtube, microsoft, yahoo with option for a Program to Install.

    I would be very wary of this site & stay clear of it.
     

  3. to hide this advert.

  4. 2008/11/12
    TeMerc

    TeMerc Inactive Alumni

    Joined:
    2006/05/13
    Messages:
    3,226
    Likes Received:
    4
    That site is redirecting to install flashplayer, supposedly from macromedia, however the url gives it away to those who are paying attention, note the red part, which is the actual domain the file is coming from, not macromedia:
    Code:
    hxxp://fpdownload.macromedia.com.get.flashplayer.current.usasrv01.[COLOR="Red"]hk[/COLOR]/downloads/install_flash_player.exe
    It has already been scanned by Virus Total originally on Nov1, which had it 4\36, but now scans at 8\36, not much better really:
    File install_flash_player.exe received on 11.01.2008 17:12:56 (CET)

    Result: 8/36 (22.23%)
    AntiVir 7.9.0.31 2008.11.11 TR/Dropper.Gen
    Avast 4.8.1248.0 2008.11.11 Win32:Trojan-gen {Other}
    BitDefender 7.2 2008.11.12 Trojan.PWS.Games.C
    eSafe 7.0.17.0 2008.11.11 Suspicious File
    GData 19 2008.11.12 Trojan.PWS.Games.C
    Panda 9.0.0.4 2008.11.11 Suspicious file
    SecureWeb-Gateway 6.7.6 2008.11.12 Heuristic.Malware
    Symantec 10 2008.11.11 Trojan Horse


    http://www.virustotal.com/analisis/bf6ab999b653362de00bd65e98b61a96

    There is a quick stop at:
    hxxp://n3t.cc/in.cgi?default&seoref=&parameter=$keyword&se=$se&ur=1&HTTP_REFERER=http%3A%2F%2Fwww.dixalivop.com%2Frecherche%2Fkatmandu-c%2Finvesting%2F727-798.html&default_keyword=727%20798&tag=lfnew

    So rsinfo you were certainly right in avoiding that site.

    Users need to always be leery whenever prompted to install any file to view any sort of media content.

    I'm going to install it and see what runs.
     
    Last edited: 2008/11/13
  5. 2008/11/12
    TeMerc

    TeMerc Inactive Alumni

    Joined:
    2006/05/13
    Messages:
    3,226
    Likes Received:
    4
    Here is what I wound up with:

    File vinrunerz.exe received on 11.11.2008 22:29:34 (CET)
    Current status: finished

    Result: 11/36 (30.56%)
    AntiVir - - TR/Crypt.XPACK.Gen
    Avast - - Win32:Trojan-gen {Other}
    AVG - - SHeur.CRWF
    BitDefender - - Trojan.PWS.Games.C
    eSafe - - Suspicious File
    GData - - Trojan.PWS.Games.C
    Norman - - W32/Smalltroj.IEDO
    Prevx1 - - Worm
    SecureWeb-Gateway - - Trojan.Crypt.XPACK.Gen
    Symantec - - Downloader
    TrendMicro - - PAK_Generic.001


    http://www.virustotal.com/analisis/95ab07a11d68187af6614dffbaefac31

    And analysis by some experienced people:
    http://www.threatexpert.com/report.aspx?uid=9ea1a6f2-0ae7-470d-b8e3-9061f147a654

    http://research.sunbelt-software.com/threatdisplay.aspx?name=Goldun.Fam&threatid=43858

    the link referenced in the Threat Expert is the exact link I got the file from.
     
  6. 2008/11/12
    sniper9228

    sniper9228 Well-Known Member Thread Starter

    Joined:
    2005/08/31
    Messages:
    615
    Likes Received:
    1
    Amazing

    It is amazing how an inexperienced user can get caught in that scam. Not only did it mention flash player once, but also asked me to install a microsoft security update WHICH I DENIED OBVIOUSLY. This is especially weird after Patch Tuesday.
     
  7. 2008/11/12
    sniper9228

    sniper9228 Well-Known Member Thread Starter

    Joined:
    2005/08/31
    Messages:
    615
    Likes Received:
    1
    wait so what malware did you get?
     
  8. 2008/11/12
    rsinfo

    rsinfo SuperGeek Alumni

    Joined:
    2005/12/25
    Messages:
    4,076
    Likes Received:
    178
    Very brave.

    Note to beginners/inexperienced users - I won't try that even with fully patched computer, with anti virus, anti spyware loaded. Its downright dangerous & not for faint hearted.
     
  9. 2008/11/12
    Rockster2U

    Rockster2U Geek Member

    Joined:
    2002/04/01
    Messages:
    3,181
    Likes Received:
    9
    Sniper ........

    ............. Just when it looked like you might be coming around based on some of your other posts in a couple of other threads :eek: But wait a minute - I'm going to give you the benefit of the doubt and encourage you to continue reforming your past habits.

    Now, for a little different perspective and a bit of humor - lets look at your posts in this thread (and please don't take offense, just look at this objectively). Chalk it up to a good learning experience.

    :rolleyes: :rolleyes: :rolleyes:
     
  10. 2008/11/13
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    OK, here's what happens in FF on Linux:

    1. first, FF cannot opem hxxp:// because that protocol is not associated with FF.

    2. Change above URL to http:// and the URL redirects to this:
    Code:
    hxxp://www.youtube.com.results-search_query.usasrv01.hk/y/?k=727+798
    which is a dead givaway of trickery used in the URL. The URL "look like" a youtube address, however, the URL use a TLD of .hk, which = Hong Kong.

    When loading that URL (http://) a fake alert pops up prompting to install an update to Flash Player.

    Thye site also plants a "last visit" cookie and if have that cookie, then next visit to the URL redirects to a MS Security Bulletin page and throws an alert to "install a MS security update ".

    These alerts are created using a javascript files called jquery.js and blockui.js. These scripts also will load the same URL inside another browser window/tab IF you have another window/tab opened, thereby replacing the existing page w/ the result of 2 malicious pages now. The new pages are created inside IFRAMES.
    Code:
    <iframe src= "hxxp://www.google.ru/search?q=727 798&hl=en" width= "100%" id= "youtube" height= "100%" scrolling= "no "></iframe>
    Notice the .RU (Russia) TLD.

    The loading of these IFRAMES is also controlled ny PHP functions that are not visible in the HTML code but are called from one of the javascript files.

    IMHO the URL in this thread should be removed as novice users WILL get infected. Or minimumly put that URL inside
    Code:
     tags.
     
    Last edited: 2008/11/13
  11. 2008/11/13
    TeMerc

    TeMerc Inactive Alumni

    Joined:
    2006/05/13
    Messages:
    3,226
    Likes Received:
    4
     
  12. 2008/11/14
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Usually, HXXP URLs are a dead giveaway that something *could* be awry.

    HXXP is not a protocol recoginzed by most browsers or applications. IE7 has built in support for HXXP and auto converts it to HTTP. Usually, one must manually change the XXs to TTs.

    HXXP is most often used:

    - to avoid passing the HTTP referer header (bypass browser filters and server logs)
    - to prevent robots from following the links. (bypass anti-malware definition gathering)
    - to bypass link spam protection (blogs, forums, etc)
    - to prevent users from clicking a harmful link (programs that recognize plain text links such as text editors, email programs, custom applications)

    Malicious sites will use HXXP, which extends the time that the site remains "unflagged" by ant-spyware/anti-virus program definitions or Web filtering mechanisms.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.