I wanted to report in the open an active threat that’s currently not being monitored by any internet security services.
Many Thanks to the reddit twitch community for pointing out this site.
Update:Note the site in question has a strikethought to prevent people from visiting the sites in question, It’s recommended that you do not visit any of the sites in question as the virus/bat seems to be a really nasty piece of malware that is taking over system32 and removing/tampering with boot files. (Thanks agian to the community for the analysis.)
Brief
The site in question is called ‘{domain}/blog’ and ‘{domain}/audiofix/’, a hacker seems to have scrapped the twitch.tv/blog site which is hosted with WPEngine (A firm which uses Linode servers and not Amazon EC2 instances). The site’s owner claims to provide a “brand new audio codec” by downloading an zip file containing a bat file. In addition the main stepte.ch site also includes a “system32 repairing tool” which also is a windows bat file that deletes system32. In addition the person is claiming to be “Helper of Twitch. Lead Webmaster. Sound Engineer” which is completely incorrect.
Here’s a file take from the virtual machine at malwr showing that the bat file is removing system32. http://i.imgur.com/cjWoaoD.jpg
Domain and Host Analysis
The domain in question is registered with GoDaddy using Domain Privacy Protection. The domain was registered on 2015-02-10, The site’s active DNS servers are GoDaddy defaults ns41.domaincontrol.com and ns42.domaincontrol.com
The site is being hosted at {IP} (Amazon Web Services) on an EC2 instance in US West. ASN Block: AS16509 if anyone is interested
scanning zip file dont give correct file info … MD5 and all other info will be for the zip and not the file inside
so to get correct info unzip and scan the file inside
They, the guys from Qihoo-360, that detect the FP - virus.bat.danger.gen - even advise to scan in Safe Mode to kill the alleged malcode and then when to no avail eventually re-format the HD. :o
是什么意思 = What does this mean? Shooting with elephant ammo unto a midget
First we check whether there is a real threat.
I believe the scripts are being used by trolls on Twitch.tv on the unsuspecting public. There have been many recent organised “raids” that are twitch viewers telling broadcasters that there computer has a virus or is broken. they are sending people to this site to download the so called “fix” only to find that the script deletes system32. It’s an old troll trick but the site in question looks legit. The fact that the malware publisher scrapped the twitch.tv/blog site for there own fake blog is telling that they understand web technologies pretty well.
I agree! Infact theres many awesome IRC bots that filter out bad traffic. MooBot and Nightbot are great tools for getting rid of URLs from the livestream however some are very new to livestreaming and are pretty vunrable. More education is needed to educate people about the risks of livestreaming.
A enterpise security vendor has now listed the site as containing malware. I have supplied them with samples of the files too, I’ve also sent reports to a larger OEM enterprise vendor to get the site added to there blacklists as well.
If you ever boot into Safe Mode using Windows. Hal.dll is always listed.
The Takeown and Del are Self Explanatory. Essentially, what is is doing is using something very close to |TakeOwnership.reg. It takes the file over for that User, and then that user can do whatever they want to.
Del is to Delete the file.
This is certainly a very very nasty file. And, it’s extremely small. Making it suitable for those even on Dial Up (Whoever is still)
Not my video :-). Besides, that video was made inside a Virtual Machine. I know enough not to damage my system… Even if I did… I have 3 systems at home, 2 are trustworthy to get a clean version of Hal.dll to rebuild the machine.
Actually, I wonder if that would work!? I will try that later inside a Testing Environment lol.
Whoops, sorry about that. Where would be the best place to report an active malicious website? I did attempt to remove the http at the front to prevent users from click on the site’s link by putting them in brackets.
Many thanks for the in-depth analysis. It seems far worse than i had originally imagined.