Author Topic: Large Http Botnet: New Binary Location, Binary files repacked  (Read 2968 times)

0 Members and 1 Guest are viewing this topic.

July 16, 2010, 04:57:17 pm
Read 2968 times


  • Newbie

  • Offline
  • *

  • 4
Preface: Attached Zip includes screenshots of the malicious network activity, a PCAP log of the activity and all of the related binary files. A text file with noted Post/Gets is also included if you are unfamiliar with viewing PCAP Logs.

In case attachment is not delivered it is located here
The password to this link as well as the attached zip file is "infected"

The main file is live at  (This is a downloader which has been seen in multiple exploit-kit frameworks (BEPs) iframed into high-profile sites). Estimates are that over 160K downloads of the exe have been successful, the address above seems to be consistently updated with new binaries when the previous is detected.

Webservers used in the download chain include:,,,,,
Webservers with unknown network activity generated by the executables:,,

Currently ONLY these antivirus have generically detected the packer: McAfee,NOD32,Prevx,Sophos
If your antivirus is not in the list you need to contact these vendors and figure out how they have generically detected the software used to pack the binaries and add detection to your software as well.

The Malware is currently downloading 4 files tgb.exe, tgc.exe, tgd.exe, Txehea.exe

The tgx.exe files are downloaded to: %userpath%\local settings\temp\
Txehea.exe is downloaded to %windir%\

All files have been repacked as of this morning which can be observed by their cleanish looking virustotal scans
Debug.exe -> 9/38
Tgb.exe -> 3/41
Tgc.exe -> 11/40
Tgd.exe -> 10/41
Txehea.exe 13/42

Please update databases accordingly and for the love of god add some detection for the packer these bastards are using. Stop using simple definitions and get some generic ones going otherwise these guys will just repack the file and do-away with any detections that were added.  As noted above the installation count for these files is growing rapidly generic detection must be added quickly or the virus will spread like a plague.

A Ethereal PCAP dump of the malicious network activity is included, from the PCAP logs this network activity has been noted below
Post: /n75jnkj46n45kj6n456.php?
POST: /werber/9458366286d/217.gif
Post: /borders.php

Uknown Activity