These URLs were redirected to by another *.php (which was found in injected iframe at some legitimate site).
Still trying around with these links but as of yet have not found a good way to get payload properly.
The index.php contains exe.phpx=jar5 (knockout.exe?) and some other stuff. Final payloads are "Security Tool", I believe.
detect geo location
different exe for country
RU JP
http://www.virustotal.com/file-scan/report.html?id=96e247f3b8498fa8d8d96d7d691999d88feb81e85d6985fd58d5c13d10535c44-1288868795
DE IT US
http://www.virustotal.com/file-scan/report.html?id=35ec83e3efe40fc5121578a86ffe10998992851d5ca70be2defe877d0dcfe7bc-1288868719
Hmm, strange. the link to your 'RU JP sample' gives:
File: exe.php@x=jar5
Time: Thu Nov 4 13:50:01 UTC 2010
VT Result: 9 /43 (20.9%)
AntiVir TR/Crypt.XPACK.Gen2
Microsoft VirTool:Win32/Obfuscator.KC
Panda Suspicious file
PCTools SecurityToolFraud!Gen4
Prevx Medium Risk Malware
Sunbelt VirTool.Win32.Obfuscator.ah!e (v)
Symantec SecurityToolFraud!Gen4
TrendMicro TROJ_FAKEAV.SMBY
TrendMicro-HouseCall TROJ_FAKEAV.SMBY
6018008c56790c712abb90cb0113bdcb
--------
A sample which I just got via JP IP gave:
File: exe.phpx=jar5-04nov10.txt
Time: Thu Nov 4 13:50:30 UTC 2010
VT Result: 18/ 43 (41.9%)
AntiVir TR/Crypt.XPACK.Gen
Authentium W32/Trojan3.CHI
AVG Agent.5.AK
BitDefender Gen:Variant.Kazy.2562
DrWeb Trojan.Packed.20878
F-Prot W32/Trojan3.CHI
F-Secure Gen:Variant.Kazy.2562
GData Gen:Variant.Kazy.2562
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.H
Microsoft TrojanDownloader:Win32/Waledac.C
NOD32 a variant of Win32/Kryptik.HWR
Norman W32/Fitmu.A!genr
nProtect Gen:Variant.Kazy.2562
Panda Trj/Sinowal.XHS
Prevx Medium Risk Malware
Sophos Mal/Zbot-AN
TrendMicro Cryp_Bredo-14
TrendMicro-HouseCall Cryp_Bredo-14
MD5 be89942e0c9bb6012fe83f372bf83805
----
Something odd there.