Today found in our proxy logs.
Does anybody know edit.google.com.main.update.the-format.cn ?
It downloads some java classes and an obfuscated javascript "com.php".
I have problems to decode that script. Can anybody help ?
23/Sep/2008:16:32:24 +0200 1357 xxx.xxx.xxx.xxx TCP_MISS/302 461 GET http://64.233.169.104.d78e324f848df9fc.managerss.cn/index.cn/ - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:25 +0200 1427 xxx.xxx.xxx.xxx TCP_MISS/200 1519 GET http://edit.google.com.main.update.the-format.cn/lis/index.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:28 +0200 604 xxx.xxx.xxx.xxx TCP_MISS/200 590 GET http://edit.google.com.main.update.the-format.cn/lis/javac.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:37 +0200 2001 xxx.xxx.xxx.xxx TCP_MISS/200 16673 GET http://edit.google.com.main.update.the-format.cn/lis/java.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:38 +0200 2252 xxx.xxx.xxx.xxx TCP_MISS/200 16673 GET http://edit.google.com.main.update.the-format.cn/lis/java.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:39 +0200 1698 xxx.xxx.xxx.xxx TCP_MISS/200 4461 GET http://edit.google.com.main.update.the-format.cn/lis/com.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:39 +0200 717 xxx.xxx.xxx.xxx TCP_MISS/404 572 GET http://edit.google.com.main.update.the-format.cn/lis/BaaaaBaa.class - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:32:40 +0200 558 xxx.xxx.xxx.xxx TCP_MISS/404 578 GET http://edit.google.com.main.update.the-format.cn/lis/BaaaaBaa/class.class - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:33:21 +0200 847 xxx.xxx.xxx.xxx TCP_MISS/200 4462 GET http://edit.google.com.main.update.the-format.cn/lis/com.php - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:33:24 +0200 655 xxx.xxx.xxx.xxx TCP_MISS/404 571 GET http://edit.google.com.main.update.the-format.cn/lis/BaaaaBaa.class - DIRECT/200.63.48.105 text/html
23/Sep/2008:16:33:25 +0200 694 xxx.xxx.xxx.xxx TCP_MISS/404 577 GET http://edit.google.com.main.update.the-format.cn/lis/BaaaaBaa/class.class - DIRECT/200.63.48.105 text/html
Java classes were detected as
Virus/Malware: JAVA_BYTEVER.BQ
File: C:\WINNT\TEMP\jar_cache22490.tmp (Baaaaa.class)
Date/Time: 23.09.2008 16:32:40
Result: Virus successfully detected, cannot perform the Quarantine action (Please see scan result of infected file: jar_cache22490.tmp)
---------------------------------------------------
Virus/Malware: JAVA_BYTEVER.BR
File: C:\WINNT\TEMP\jar_cache22490.tmp (BaaaaBaa.class)
Date/Time: 23.09.2008 16:32:44
Result: Virus successfully detected, cannot perform the Quarantine action (Please see scan result of infected file: jar_cache22490.tmp)
---------------------------------------------------
Virus/Malware: TROJ_JAVA.AT
File: C:\WINNT\TEMP\jar_cache22490.tmp (Dvnny.class)
Date/Time: 23.09.2008 16:32:44
Result: Virus successfully detected, cannot perform the Quarantine action (Please see scan result of infected file: jar_cache22490.tmp)
---------------------------------------------------
Virus/Malware: JAVA_BYTEVER.BS
File: C:\WINNT\TEMP\jar_cache22490.tmp (VaaaaaaaBaa.class)
Date/Time: 23.09.2008 16:32:44
Result: Virus successfully detected, cannot perform the Quarantine action (Please see scan result of infected file: jar_cache22490.tmp)