From: ArameFarpado on
hzzp://security-tool2010.org/username

it induces non informated users to install a rogue anti virus that blocks
the windows system
the site is a complete fake, i don't have a c:\ drive and it shows 358
viruses in my c:\ drive
From: Gordon Darling on
On Sun, 14 Feb 2010 14:20:53 +0000, ArameFarpado wrote:

> hzzp://security-tool2010.org/username
>
> it induces non informated users to install a rogue anti virus that
> blocks the windows system
> the site is a complete fake, i don't have a c:\ drive and it shows 358
> viruses in my c:\ drive

Found 300 Trojans on my c: drive (on a Linux machine!)

Whois

Domain ID:D158322157-LROR
Domain Name:SECURITY-TOOL2010.ORG
Created On:09-Feb-2010 13:17:56 UTC
Last Updated On:09-Feb-2010 13:21:26 UTC
Expiration Date:09-Feb-2011 13:17:56 UTC
Sponsoring Registrar:UK2 Group Ltd. (R123-LROR)
Status:CLIENT TRANSFER PROHIBITED
Status:TRANSFER PROHIBITED
Registrant ID:DI_11145153
Registrant Name:Joshua Curry
Registrant Organization:n/a
Registrant Street1:145 Lochmere Lane
Registrant Street2:
Registrant Street3:
Registrant City:Hartford
Registrant State/Province:Illinois
Registrant Postal Code:06103
Registrant Country:US
Registrant Phone:+860.4171945
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:softvseo(a)gmail.com
Admin ID:DI_11145153
Admin Name:Joshua Curry
Admin Organization:n/a
Admin Street1:145 Lochmere Lane
Admin Street2:
Admin Street3:
Admin City:Hartford
Admin State/Province:Illinois
Admin Postal Code:06103
Admin Country:US
Admin Phone:+860.4171945
Admin Phone Ext.:
Admin FAX:
Admin FAX Ext.:
Admin Email:softvseo(a)gmail.com
Tech ID:DI_11145153
Tech Name:Joshua Curry
Tech Organization:n/a
Tech Street1:145 Lochmere Lane
Tech Street2:
Tech Street3:
Tech City:Hartford
Tech State/Province:Illinois
Tech Postal Code:06103
Tech Country:US
Tech Phone:+860.4171945
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech Email:softvseo(a)gmail.com
Name Server:NS1.FFUJI.COM
Name Server:NS2.FFUJI.COM

Regards
Gordon
From: VanguardLH on
ArameFarpado wrote:

> hzzp://security-tool2010.org/username
>
> it induces non informated users to install a rogue anti virus that blocks
> the windows system
> the site is a complete fake, i don't have a c:\ drive and it shows 358
> viruses in my c:\ drive

If using IE8, why didn't you report it as an unsafe web site (Tools ->
Smartscreen filter -> Report as Unsafe)?

http://stopbadware.org/home/faq
"How can I report a badware application or website?"

http://www.google.com/safebrowsing/report_badware/
To report a site with malicious software

http://securitylabs.websense.com/content/reportMalicious.aspx

http://www.mvps.org/winhelp2002/criteria.htm
Use the "Contact" link. Never used their hosts file. Looks like this is
how you get a host added to their hosts file.
From: Ant on
"ArameFarpado" wrote:

> hzzp://security-tool2010.org/username

Redirects to:
security-tool2010.com/online-scanner/index.html
which has a frame to:
89.248.171.83/hitin.php?land=21&affid=16278
which redirects to:
89.248.171.83/index.php?c=0&affid=16278
which contains the encoded script for the page.

Randomly generates filenames in the fake scan:

var listname = new Array('$winnt$', '37', '12520850', '6to4svc', 'aaaamon',...
var listras = new Array('inf', 'cpx', 'dll', 'acm', 'cpl', 'exe', 'ax',...
filetext = "Now scanning: "
+ listname[Math.floor(Math.random() * listname.length)] + "."
+ listras[Math.floor(Math.random() * listras.length)];

The exe payload is at:
89.248.171.83/6_671cd6.php?affid=16278

89.248.171.83 is Ecatel LTD in the Netherlands. admin[at]ecatel.net
(or abuse[at]ecatel.net).


From: Virus Guy on
Ant wrote:

> The exe payload is at:
> 89.248.171.83/6_671cd6.php?affid=16278

The IP address 89.248.171.83 is (or - was) the A-record for
fitvup83.shortlouse.net. The domain shortlouse.net apparently expired
Dec 2008. That IP address (alone) will serve up the fake AV scan and
the payload without needing any particular URL (as indicated above).

I just submitted the payload to VT. VT did not claim to have seen or
scanned it before.

Only 6/41 hit rate (15%).

Comodo TrojWare.Win32.FraudTool.ST.~GGI
eTrust-Vet Win32/Fraud!packed
Panda Suspicious file
Rising Packer.Win32.Agent.bb
Symantec Suspicious.Insight
TrendMicro Cryp_Krap-9

The file, when run, creates a .bat and .exe file with a numeric name
(probably random) here:

C:\Documents and Settings\All Users\Application
Data\20541517\20541517.bat
C:\Documents and Settings\All Users\Application
Data\20541517\20541517.exe

And creates a Run key pointing to the .exe file.

(I don't have those files - this is from anubis analysis).