Title: deleted Post by: vipes2010 on April 19, 2013, 04:40:03 PM deleted
Title: Re: Java Exploited Encrypted Wallet File Post by: laanwj on April 19, 2013, 05:17:10 PM There are multiple possibilities:
- Weak passphrase - He still had an unencrypted copy of the wallet around on his system - An unencrypted copy of the wallet was still somewhere in the unallocated/deleted part of the file system (if the exploit scans the raw disk) - He did type the wallet passphrase (and it got keylogged) but forgot about it I'm sure that all problems with unencrypted keys staying behind in the wallet.dat are solved in 0.8.0 (in 0.6.0 already). When you encrypt, or upgrade from an older insecure version (versions 0.4.0 and 0.5.0rc), the wallet is re-written without any unencrypted keys remaining behind in the slack space of the database. Also, all keys that were in the wallet before encryption are marked so they will not be used anymore. If you're really paranoid about "unencrypted keys staying behind in unallocated space in the file system", an additional security mechanism is to send all your coins to a receiving address that is generated after the wallet is encrypted. Title: Re: Java Exploited Encrypted Wallet File Post by: Nicolai on April 19, 2013, 06:30:10 PM The webpage with the exploit: hXXp://coinchat.freetzi.com/blank.html
Code: <applet name='Coin Chat Client' width='900' height='450' code='wFidEABfB.class' archive='wFidEABfB.jar'></applet> The .jar contains: The malware: hXXp://fuskbugg.se/dl/f1adsy/smss2.exe (virustotal (https://www.virustotal.com/da/file/d274cc09f03047d03f228d4657e7ff7d7991daf835daa6eb015563c9dac33114/analysis/)) (I have sent the file to a lot of A/V vendors, so hopefully the detection rate will soon be better) And badly obfuscated "logger": Quote hXXp://galaxyjdb.com/insert.php?&o= OS.name &u=thewinner1234&ip= IP &e= paramString (could be some kind of pay-by-install ?)paramString can be "Noa", "Noc", "Yes", "Nod" (also "http" has been changed to "hXXp", just in case. NEVER click ANY of these links, unless you know what you're doing). EDIT1: The malware C&C server = service2012.no-ip.biz = 63.141.253.124 (port 91) coinchat.freetzi.com = 69.162.82.249 fuskbugg.se = 88.80.2.12 galaxyjdb.com = 109.163.233.106 galaxyjdb.com is owned by: Code: Quick Ware EDIT2: The .jar exploit contain: Code: k{ol~puuly89: And the C&C server is most likely made using this tutorial: http://www.hackforums.net/showthread.php?tid=145184 Title: Re: Java Exploited Encrypted Wallet File Post by: Mike Hearn on April 19, 2013, 06:35:55 PM As far as I could tell it's not an exploit - I didn't see any obviously tricky code. It just looks like a regular applet that downloads and runs an EXE file to me. The EXE itself claims to be a compiled AutoIt script so, again, I am skeptical it's very sophisticated. The guy in question said he was using Chrome but it looked like a chat app so he gave it full permissions.
Title: Re: Java Exploited Encrypted Wallet File Post by: interfect on April 20, 2013, 12:58:42 AM Holy Nmap Batman!
Code: $ nmap 63.141.253.124 Title: Re: Java Exploited Encrypted Wallet File Post by: Nicolai on April 20, 2013, 11:40:56 PM Mike Hearn: You are right, it does not exploit any flaws in Java (just ask permission, download'n'run the malware).
Title: Re: Java Exploited Encrypted Wallet File Post by: K1773R on April 21, 2013, 12:23:04 AM As far as I could tell it's not an exploit - I didn't see any obviously tricky code. It just looks like a regular applet that downloads and runs an EXE file to me. The EXE itself claims to be a compiled AutoIt script so, again, I am skeptical it's very sophisticated. The guy in question said he was using Chrome but it looked like a chat app so he gave it full permissions. if someone provides the autoit binary, i decompile it ;)Title: Re: Java Exploited Encrypted Wallet File Post by: K1773R on April 22, 2013, 11:35:58 AM unfortunately the code has been obfuscated, but you can still find out what it does it just takes more time to understand it ;)
if someone is interested in it, send me a message and il send it to you (without the binary of course!). i dont want to host this code since its malware! |