본문 바로가기

malware

DomaIq / OutBrowse : Fake Java/Flash update malvertising campaign

728x90

DomaIq / OutBrowse : Fake Java/Flash update malvertising campaign

mangareaderEDIT – May 15 : some moves.

Some moves.

An other ads network hits by theses malvertising :https://twitter.com/malekal_morte/status/466539522176851968

The Fake Java/Flash Malvertising disapear, it is replaced by “Video Player update” campaign.
Note that, it’s still using the Adobe Flash Player update web page, even if they removed the Flash Player Logo.

Update_Video_Player.png Update_Video_Player2.png

But for me, it’s still a malvertising way :

  • It replaces the website you visit by the malvertising – so webmaster lose traffic. It’s also a disgusting way.
  • They are trying to maintain theses campaigns. For Example in my website, the ads network that dont want them have big difficulties to get them removed completly. It comes back over and over via appnexus network. For this reason, i have to suspend this ads network in my website until they find a way to remove this malvertising campaign completly.
  • They use domains rotation to bypass detections as most of malware campaign does.

~~

About uptobox, they said that behind exchange.admailtiser.com it’s Matomy.

Matomy_uptobox Matomy_uptobox2

An other Israli company – i made a post about Israel company there :http://malvertising.stopmalwares.com/2014/05/installcoreconduit-fake-flash-player-malvertising/

It seems that hoster and registrar are very slow to move (or they dont).

Most of the domains are registered on Enom Registrar and they are still online :http://pjjoint.malekal.com/files.php?read=20140515_r8u14r11e15i12I made this tweet :https://twitter.com/malekal_morte/status/466873006816755712

same for Egihosting : https://twitter.com/egihosting/status/466238690658746368
it seems that old domains using Egihosting IPs are still online, so malwares guys can used it again if they need.

About Antivirus. Only Malwarebytes and BitDefender did some URLs blacklists but binaries detections for PUP.DomaIQ are good for stuffs in the wild (around ~10/52 in VirusTotal).

I upload some PUP.DomaIQ samples on Malwaredb thoses last days :http://malwaredb.malekal.com/index.php?malware=DomaI

Avast! do not detect most of them (also the URLs), and in France, Avast! is very used – i will try to shake them about this :
DomaIQ_detection DomaIQ_detection2

EDIT May 16 : Appnexus got cleaned

ok now the good news…

First Avast! gonna move : https://twitter.com/misak19/status/466897774290948096

and then, the better one, got now a contact with Appnexus and they cleaned everything fast.

appnexus_malvertising2

appnexus_malvertising3This is really a good news, because most of theses malvertising were coming from this network, that is a big one : http://www.alexa.com/siteinfo/adnxs.com

appnexus_malvertising

Also i want to mention this…
a.ad-sys.com is loading this malvertising….. i was talking about them on this topic :http://malvertising.stopmalwares.com/2014/05/installcoreconduit-fake-flash-player-malvertising/

Will try to get it removed.

a-ad-sys_fake_Flash_JavaEDIT – Monday 19 : Appnexus got cleaned

Most of the appnexus malvertising has been removed.
I got also Avast! blocking it.

We notice a drop in adwares/PUPs removal resquest in forums – this is good.

avast_fakejavaflash_blockEDIT – Tuesday 21 : on Ebay France

Ebay France is hit – i made this post (in French language) :http://www.malekal.com/2014/05/20/ebay-virus-lpmxp2-lecteur-video-peux-etre-obsolete/

Video :

EDIT – Wednesday 22 : also on Yahoo Ads (only France?)

The Ebay Malvertising is still online, Ebay France and pubmatic doesnt reply to the request.

Also, Not the first time, the ads network i use in for my website is also loading content to Yahoo Ads.
They usally as Appnexus hit by theses malvertising.
Actually, an active one is delivery to the fake Flash Player page.

ads_yahooEDIT – Wednesday 28

some news.
ad-sys still leading to fake Java

fake_java_openxback to t411.me with admailtiser :

admailtiser_fake_javastill the same actor.

EDIT – June 2

An update.
This Week end, t411.me get blacklisted by Google – in french :http://forum.malekal.com/t411-blackliste-par-google-t48050.html – seems that fix the malicious redirections, but t411.me is still loading content to pubdirecte that is loading content to m2pub so i guess it will be back soon.

  • openx.net is still redirecting to fake Flash/Java Malvertising
  • Also, admailtiser / ad-sys are still loading a lot of them.

i found also some of them in Clicksor network :

Clicksor_fake_flash Clicksor_fake_java

new domains are still registered to ENOM that seems not to move, so i made this write and ping them on twitter : http://pjjoint.malekal.com/files.php?read=20140602_f12d8h9s10o5

EDIT – June 6

According netcraft – ask.fm was hitten by Fake Java Malvertisinghttp://news.netcraft.com/archives/2014/06/02/ask-fm-users-being-redirected-to-malware-sites.html

also on this French topic, an user say to get Fake Malvertising on mangaxd.com :http://www.commentcamarche.net/forum/affich-30322426-popup-fausse-mise-a-jour-adobe-flash-player

The redirection is made by admailtiser.com loaded by affiliation-france.com, not the first time i see them.

magaxd_malvertising_fake_flash

First, they are red in WOT : https://www.mywot.com/en/scorecard/affiliation-france.com

According the website – affiliation-france belong to Venesome LTD, they got a box in British Virgin Islands, so could be from everywhere.

affiliation-france_Venesomeaffiliation-france_Venesome2

also, they use DNS at DNSMADEEASY.COM domains like many domains i have already told in this topic : http://malvertising.stopmalwares.com/2014/05/installcoreconduit-fake-flash-player-malvertising/

Domain Name: AFFILIATION-FRANCE.COM
Registrar: WILD WEST DOMAINS, LLC
Whois Server: whois.wildwestdomains.com
Referral URL: http://www.wildwestdomains.com
Name Server: NS10.DNSMADEEASY.COM
Name Server: NS11.DNSMADEEASY.COM
Name Server: NS12.DNSMADEEASY.COM
Name Server: NS13.DNSMADEEASY.COM
Name Server: NS14.DNSMADEEASY.COM
Name Server: NS15.DNSMADEEASY.COM
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 31-may-2013
Creation Date: 12-dec-2009
Expiration Date: 12-dec-2014

A five-page website of something else :)

EDIT – June 16

Openx removed the malvertising some days ago. Thanks to them :)
An other malvertising come up at Appnexus network (maybe 3rd network party) yesterday, hackernews write a news about malvertising at DeviantArt :http://thehackernews.com/2014/06/deviantart-malwaretising-campaigns-lead.html but of course, it’s not only there.
Got it yesterday on mangafox.com – i reported it to Appnexus, so i expect to get it removed soon.

mangafox

Also admailtiser is back on Appnexus network via fastlick.net (conversant Media).

admailtiser

EDIT – A look at the Fake Flash Malvertising on Appnexus network

A Fake Flash Malvertising is still alive at Appnexus.

Here a screenshot of the source – as you can see, a javascript is call from a BMP URL JAVA-WORD.COM
The domain is suspicious :

Domain Name: JAVA-WORD.COM
Registrar: NAME.COM, INC.
Whois Server: whois.name.com
Referral URL: http://www.name.com
Name Server: NS1.LINODE.COM
Name Server: NS2.LINODE.COM
Name Server: NS3.LINODE.COM
Name Server: NS4.LINODE.COM
Name Server: NS5.LINODE.COM
Status: ok
Updated Date: 12-jun-2014
Creation Date: 12-nov-2013
Expiration Date: 12-nov-2014

trant Name: wu bin
Registrant Organization: wubin
Registrant Street: yinglonghuayuan 60dong 501
Registrant City: nanjing
Registrant State/Province: jiangsu
Registrant Postal Code: 210014
Registrant Country: CN
Registrant Phone: +86.84297132
Registrant Email: 12557286@qq.com
Admin Name: wu bin
Admin Organization: wubin
Admin Street: yinglonghuayuan 60dong 501
Admin City: nanjing
Admin State/Province: jiangsu
Admin Postal Code: 210014
Admin Country: CN
Admin Phone: +86.84297132
Admin Email: 12557286@qq.com
Tech Name: wu bin

appnexusThe BMP give a an other code :

appnexus4-1

we got an other call at : http://www.java-word.com/ResponeSevlet?domain=FR_300x250_280000&c=FR_300x250_280000.jpg

appnexus2if you call directly, you got an image, so no redirection :

appnexus4-1

appnexus5and the code when you are redirected to the Fake Flash Malvertising :

appnexus3

You got a redirection per IP – This is clearly malvertising way.

EDIT June 20

it leaves, it comes back :)

so, still big traffic.

The Pubmatic malvertising  is the same as DeviantArt website  mentioned in the Hackernews news.
In my case, it replace the website you are trying to visit.

pubmatic

There is a SWF at http://cdn1sitescout.edgesuite.net/7000/6907/04d2e46e9d7b9e59.swf that is redirecting to http://a.fwed.net/web/FR/click.php leading then to reduxmediia.com and avadslite.com :
 fwed.netExample :
http://a.fwed.net/web/FR/click.php - (144.76.207.229)
http://a.fwed.net/web/FR/stats.php - (144.76.207.229)

http://www.reduxmediia.com/apu.php?n=&zoneid=4960&cb=INSERT_RANDOM_NUMBER_HERE&popunder=1&direct=1

http://tah.avadslite.com/?kw=4960s1=1456785536.242716.2f6ce9a7b5.4960.29d29e960563b549b1e0d650d261f839&s2=pc (184.170.128.86)

http://yb0zz.playnow.mediamother.eu/?sov=444346705&hid=dljhrhvjjhpd&id=XNSX.1456785536.242716.2f6ce9a7b5.4960.29d29e960563b549b1e0d650d261f839%3A%3Apc

http://yb0zz.playnow.mediamother.eu/templates/np.codec.mini/mediaplayer_update_keyed_DLIK/images/logos/logo1.png (107.191.48.203)

I got today a Media Player popup on Deviant Art – the redirection to the SWF is made by Rubiconproject and then we still find fwed.net / reduxmediia.com :

DeviantArt_MediaPlayerUpdateThe Malvert : http://cdn1sitescout.edgesuite.net/7000/6907/04d2e46e9d7b9e59.swf

pubmatic2EDIT – June 24

As usual, Appnexus did some clean up.
Pubmatic said they gonna check the issue :https://twitter.com/PubMatic/status/481089326861004800
The Malvertising at ValueClick / Convertmedia Network is still online – i got it from MangaReader.net (~1000 at Alexa) – by the way, if you look at the graph, they lose traffic, i guess malvertising are probably responsible :http://www.alexa.com/siteinfo/mangareader.net

i got another malvertising still at mangareader.net from onclickads.net Network via popup :

http://onclickads.net/afu.php?zoneid=19227

http://www.livesoccer2014.com/?ci=8828&version=1.1.5.55&ti1=8224766571

http://www.livesoccer2014.com/css/newstyle_FR.css

http://www.all-pages.net/LPfiles/css/downloadIndicator.css

http://www.all-pages.net/LPfiles/js/jquery.js

http://www.html-files.com/AMddlT.js

http://www.all-pages.net/LPfiles/js/common2.js

http://www.all-pages.net/LPfiles/js/networkCommon.js

MangaReader_popup
a TVapp to watch World Cup Match :https://www.virustotal.com/fr/file/b81100083f6d118b647ab850ea456ff03cd40e943cf1f72703e2f22ac2c263eb/analysis/

SHA256:    b81100083f6d118b647ab850ea456ff03cd40e943cf1f72703e2f22ac2c263eb
Nom du fichier :    TVapp__8826_i942936337_il269.exe
Ratio de détection :     9 / 54
Date d’analyse :     2014-06-24 14:23:02 UTC (il y a 42 minutes)

AVG     BundleApp_r.R     20140624
AhnLab-V3     PUP/Win32.Amonetiz     20140624
AntiVir     ADWARE/Adware.Gen2     20140624
Avast     Win32:Amonetize-BX [PUP]     20140624
ESET-NOD32     a variant of Win32/Amonetize.AW     20140624
Kaspersky     not-a-virus:HEUR:AdWare.Win32.Amonetize.heur     20140624
Malwarebytes     PUP.Optional.Amonetize     20140624
Sophos     Amonetize     20140624
VIPRE     Amonetize (fs)     20140624

WordCup

MangaReader_popup2EDIT – July 1 : Adcash – Ad-sys.com and adorika.net

seems some cleanup has been made :)

I notice a malvertising on www.hinata-online.fr from adcash that redirect to http://a.ad-sys.com / http://a.adorika.net / http://main.vodonet.net
It replaces the websites you are trying to visit.

Redirector : http://iron.zbane.com/MAIN/ironsource/rev_share_v2.php /
Binary : http://cdn.adorikacontentportal.com/?ic_user_id=321

ad-sys / adorika usual actor in thoses malvertising – already mentioned there :http://malvertising.stopmalwares.com/2014/05/installcoreconduit-fake-flash-player-malvertising/

PUP Detection :

https://www.virustotal.com/fr/file/73c986e6506eb8a2c978f223029d1501a4f91aef3665cfe230c735a0690d9e1b/analysis/1404199056/

SHA256:     73c986e6506eb8a2c978f223029d1501a4f91aef3665cfe230c735a0690d9e1b
Nom du fichier :     flvplayer.exe
Ratio de détection :     7 / 54
Date d’analyse :     2014-07-01 07:17:36 UTC (il y a 9 minutes)

AVG     Generic.953     20140701
ESET-NOD32     a variant of Win32/InstallCore.PL     20140701
K7AntiVirus     Unwanted-Program ( 00454f261 )     20140630
K7GW     Unwanted-Program ( 00454f261 )     20140630
Norman     InstallCore.CERT     20140701
Sophos     Install Core Click run software     20140701
VIPRE     Trojan.Win32.Generic!BT     20140701

adcash_fake_flash2 adcash_fake_flash

EDIT – July 18 : Adcash / PopAds / Directrev still loading fake Java/Flash malvertising

Still some fake Java/Flash malvertising around

below a screenshot of popads replies :

fakeJava_popadsalso adcash network that is loading content to admailtiser :https://twitter.com/malekal_morte/status/490011867931496450

adcash_fakejavaAdcash is also loading another kind of fake flash malvertising :https://twitter.com/malekal_morte/status/489816300735451136

Notice also that adcash is loading a lot of fake virus alert for mobile, see this topic :http://malvertising.stopmalwares.com/2014/07/mobile-malvertising-fake-virus-alert/
adcash_fake_flash

EDIT – July 19 : adk2 / plymedia : Matomy

Again a fake Java Malvertising on mangareader.
The souce id darchmedia network that is loading content to adsmedia.com (yes again) that load content to adk2 network and load the fake java malvertising:

http://nc4.darchermedia.com/rub/manga10/300×250.html
http://cdn.adsrvmedia.com/adsrvmedia/tags/banner/banner.js?context=35181161&size=300×250

http://ads.adk2.com/player.html

http://www.sheinsiade.com/frch.php?pc1=show3

http://www.kellimindre.com/FR/index.php

adsrvmedia_adk2_suiteadsrvmedia_adk2

adk2.com has some alias whis a mention of plymedia :

host ads.adk2.com
ads.adk2.com is an alias for pool.plymedia.iponweb.net.
pool.plymedia.iponweb.net has address 54.85.163.191
pool.plymedia.iponweb.net has address 54.85.157.244
pool.plymedia.iponweb.net has address 54.85.67.10
pool.plymedia.iponweb.net has address 54.85.76.240
pool.plymedia.iponweb.net has address 54.85.170.59
pool.plymedia.iponweb.net has address 54.85.121.122
pool.plymedia.iponweb.net has address 54.84.211.226
pool.plymedia.iponweb.net has address 54.84.222.248
pool.plymedia.iponweb.net has address 54.85.166.61
pool.plymedia.iponweb.net has address 54.85.177.25
pool.plymedia.iponweb.net has address 54.85.150.60
pool.plymedia.iponweb.net has address 54.84.34.147
pool.plymedia.iponweb.net has address 54.84.200.63
pool.plymedia.iponweb.net has address 54.85.164.185
pool.plymedia.iponweb.net has address 54.85.69.175
pool.plymedia.iponweb.net has address 54.84.129.127

plymedia.com is also mentionned in the whois :

Admin Name: David Markowitz
Admin Organization: PLYmedia Israel (2006) Ltd.
Admin Street: 48 King George
Admin City: Tel Aviv
Admin State/Province: NA
Admin Postal Code: 64337
Admin Country: Israel
Admin Phone: +972.972547631761
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: david@plymedia.com

and yeah another israli stuff.
Matomy (another israli company already mentionned) is mentionned on their website.

adsrvmedia_adk2_matomyAdk2 and Plymedia contacts are the same :

adsrvmedia_adk2_adresse2 adsrvmedia_adk2_adresse

Do you remember m2pub ? it’s already mentionned in this topic (Mars 13 EDIT and June 2)
Also :

m2pub_adk2

creative.m2pub.com is an alias for cdn.adk2.com.
cdn.adk2.com is an alias for cdn.adk2.co.edgekey.net.
cdn.adk2.co.edgekey.net is an alias for e332.g.akamaiedge.net.
e332.g.akamaiedge.net has address 2.16.120.96

m2pub load also PUPs :
Fake Virus Alert : https://twitter.com/malekal_morte/status/473414276116664320Java Log use : https://twitter.com/malekal_morte/status/468111720184311808

and…. the m2pub.com whois lead to Matomy :

egistry Registrant ID:
Registrant Name: Shlomi Sharabi
Registrant Organization: Matomy Media Group
Registrant Street: Hanechoshet st.
Registrant Street: 6
Registrant City: Tel Aviv
Registrant State/Province: Tel Aviv
Registrant Postal Code: 69719
Registrant Country: Israel
Registrant Phone: 773606060
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: it@matomy.com
m2pub_whois

~~

about admailtiser.com – it’s related to convertmedia – another israli company.
=> https://twitter.com/malekal_morte/status/472339472378785792
=> https://twitter.com/malekal_morte/status/469815653730631680
convertmedia_admailtiserconvertmedia_admailtiser2

So, some israli companies are linked.
Admailtiser.com is loading fake Java/Flash malvertising for mouths.
adsrvmedia.com is new and is also always leading to fake Flash/Java malvertising see https://twitter.com/malekal_morte/status/489671945701818368
There is no information about the source of this domain, but it load content to ad2k.com that is redirecting to fake Java malvertising.

Thoses israli companies are always around.

EDIT – July 29 2014  ; exchange.continular.com replace exchange.admailtiser.com

just to make notice that exchange.continular.com replace exchange.admailtiser.com

on the whois, we can find a domain contextin.com :

Registry Registrant ID:
Registrant Name: Gil Shiff
Registrant Organization: ArgumTech Ltd.
Registrant Street: Marcel Janco 3
Registrant City: Tel-Aviv
Registrant State/Province: Israel
Registrant Postal Code: 69413
Registrant Country: Israel
Registrant Phone: +97-254-464-4320
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: gil@contextin.com

This domain lead to convertmedia.com :

exchange_continularexchange_continular2

EDIT – August 5 2014 : new kind of Java Malvertising

Since some days, a new kind of malvertising.
A popup come up, then you are redirecting to a fake Java webpage.

Fake_Java_new Fake_Java_new2

Zedo network is currently hit by thoses malvertising :

http://uwk.iphoneintroduce.com/300×250.html

http://dl82.xzstny.com/topic/java/go.php?code=java&country=FR&aid=137&ext=3

Domain are random : https://www.virustotal.com/fr/ip-address/192.186.132.194/information/

The whois is suspicious :

Domain Name: IPHONEINTRODUCE.COM
Registrar: GODADDY.COM, LLC
Whois Server: whois.godaddy.com
Referral URL: http://registrar.godaddy.com
Name Server: NS61.DOMAINCONTROL.COM
Name Server: NS62.DOMAINCONTROL.COM
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 10-jun-2014
Creation Date: 09-jul-2013
Expiration Date: 09-jul-2015

Admin Name: James Kirk
Admin Organization:
Admin Street: 134 Michael’s Bay Rd
Admin City: Manitowaning
Admin State/Province: Ontario
Admin Postal Code: P0P 1N0
Admin Country: Canada
Admin Phone: +1.7053687010
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: JamesKirk1979@start.ca

Fake_Java_new3

EDIT – August 12 2014 : adk2x.com

another israli domain :

Domain Name: ADK2X.COM
Registrar: GODADDY.COM, LLC
Whois Server: whois.godaddy.com
Referral URL: http://registrar.godaddy.com
Name Server: NS-1399.AWSDNS-46.ORG
Name Server: NS-1737.AWSDNS-25.CO.UK
Name Server: NS-72.AWSDNS-09.COM
Name Server: NS-936.AWSDNS-53.NET
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 10-mar-2014
Creation Date: 13-feb-2014
Expiration Date: 13-feb-2015

Admin Name: David Markowitz
Admin Organization: PLYmedia
Admin Street: 48 King George
Admin City: Tel Aviv
Admin State/Province: NA
Admin Postal Code: 64337
Admin Country: Israel
Admin Phone: +972.547631761
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: david@plymedia.com

The redirection to the Fake Flash webpage :

fake_java_adk2x fake_java_adk2x_suite fake_java_adk2x_suite2 fake_java_adk2x_suite3

The redirection to the binary – (java.exe – hey it’s Flash!).
Solimba affiliation program.

http://4.track404od.com/d/536ccaac561ca36f1e8b4708/6602816573

http://flv2.dmrcdn.com/n/3.1.22.6/12912912/java.exe?tid=53e9ac69561ca359198b459b

https://www.virustotal.com/fr/file/6e76040741f3c07cf9fd2465a974cd59be0413ff2f2b22fdad73a099857dbf80/analysis/1407823055/

SHA256:6e76040741f3c07cf9fd2465a974cd59be0413ff2f2b22fdad73a099857dbf80
Nom du fichier :java.exe
Ratio de détection :16 / 53
Date d’analyse :2014-08-12 05:57:35 UTC (il y a 1 minute)
AVGBundleApp_r.AJ20140812
AVwareSolimba20140812
AgnitumPUA.Solimba!20140810
AntiVirAPPL/Firseria.Gen820140812
AvastWin32:Trojan-gen20140812
ComodoApplication.Win32.Firseria.MAP20140812
DrWebTrojan.DownLoader11.2444120140812
ESET-NOD32a variant of MSIL/Solimba.AH20140812
K7AntiVirusUnwanted-Program ( 0040f8f51 )20140811
K7GWUnwanted-Program ( 0040f8f51 )20140811
MalwarebytesPUP.Optional.Popeler20140812
PandaTrj/Genetic.gen20140811
SophosSolimba Installer20140812
SymantecSecurityRisk.BL20140812
VBA32Downware.Morstar20140811
VIPRESolimba20140812
728x90