text
stringlengths
4
429
treated
authentication
into
botnet.
Once
authenticated,
victim
uses
following
check-
beacons:
HTTP
GET:
/search6[RndNum]?h1=[VictimId]
o Where
VictimId
same
string
identifying
victim
machine
previously
used
parameter
value.
User-
Agent:
Mozilla/5.0
(compatible;
Windows
5.2)
o Note
that
user-
agent
changed
hard-
coded
string
versus
using
encoded
system
name
initial
check-
Some
Trojan
functionality
includes:
Download
file
from
C&C:
o HTTP
GET:
/download7[RndNum]?h1=[VictimId]
Upload
file
C&C:
o HTTP
POST:
/upload8[RndNum]?h1=[VictimId]
Command
execution
response
C&C:
o HTTP
POST:
/search2[RndNum]?h1=[VictimId]
There
over
dozen
other
commands
identified
Trojan
listed
CyberESI
report.
September
2010
ISSNIP
Phishing
Email
with
Malicious
Attachment
days
later
following
previously
detailed
incident,
another
incident
with
information
publicly
available