hxxp://paedagogisches-journal.de/images/spoolsv_.exe
md5sum ===> 52554e61e3e3da65f417222ce5bd13bb
http://www.virustotal.com/analisis/f6fae48d43c4da6b0ca242d6a65183d9f659fde4fd3db5d910c7789bd2a80357-1267361686
VT 4/42 (9.53%)
hxxp://dobmvnh.com/ollala/microsoft.bin
md5sum ===> a2901dc5af642b16e7a4d73648404482
hxxp://dobmvnh.com/robot.php
related:
hxxp://ks45tn2.cn/1337/bb.php?v=200&id=500109770&tid=61&b=cl&r=1&tm=2
This one is interesting. I was able to track the source of infection.
It starts at compromised German site
paedagogisches-journal.de/news.php
There is an obfuscated iframe that directs to
hulasoftz.cn/s/go.php?sid=13
hulasoftz.cn redirects to an Eleonore exploit kit at
siftozzillaa.cn/1/index.php?s=cac6ee5d4b75fc088217edb4cd34a968
payload of Eleonore kit is Oficla/Sasfis
siftozzillaa.cn/1/load.php?spl=mdac
Oficla contacts its C&C at
ks45tn2.cn/1337/bb.php?v=200&id=636608811&b=cl&tm=2
and it receives instruction for downloading Zeus from compromised German site.
[info]runurl:http://paedagogisches-journal.de/images/spoolsv_.exe|taskid:61|delay:45|upd:1|backurls:852159.com/1337/bb.php;hulasoftz.cn/1337/bb.php[/info]
ZeuS downloads its config file from
dobmvnh.com/ollala/microsoft.bin
and drops stolen data at
dobmvnh.com/robot.php