Virus Guy wrote:
> So I expect the results of my 2 submissions to show up in 15 to 30
> minutes. I'll post back here those results when or if I see them.
So here is one result:
http://www.threatexpert.com/report.aspx?md5=41b50686b86af4d679b735ce456d539b
* The following Internet Connection was established:
Server Name Server Port Connect as User Connection Password
198.74.56.121 443 (null) (null)
There was an outbound traffic produced on port 443:
00000000 | 504F 5354 202F 696E 6465 782E 7068 7020 | POST /index.php
00000010 | 4854 5450 2F31 2E31 0D0A 4163 6365 7074 | HTTP/1.1..Accept
00000020 | 3A20 2A2F 2A0D 0A43 6F6E 7465 6E74 2D54 | : */*..Content-T
00000030 | 7970 653A 2061 7070 6C69 6361 7469 6F6E | ype: application
00000040 | 2F78 2D77 7777 2D66 6F72 6D2D 7572 6C65 | /x-www-form-urle
00000050 | 6E63 6F64 6564 0D0A 5573 6572 2D41 6765 | ncoded..User-Age
00000060 | 6E74 3A20 4D6F 7A69 6C6C 612F 352E 3020 | nt: Mozilla/5.0
00000070 | 2857 696E 646F 7773 204E 5420 362E 313B | (Windows NT 6.1;
00000080 | 2057 4F57 3634 3B20 7276 3A32 382E 3029 | WOW64; rv:28.0)
00000090 | 2047 6563 6B6F 2F32 3031 3030 3130 3120 | Gecko/20100101
000000A0 | 4669 7265 666F 782F 3238 2E30 0D0A 486F | Firefox/28.0..Ho
000000B0 | 7374 3A20 6C6F 6361 6C68 6F73 740D 0A43 | st: localhost..C
000000C0 | 6F6E 7465 6E74 2D4C 656E 6774 683A 2033 | ontent-Length: 3
000000D0 | 3037 0D0A 4361 6368 652D 436F 6E74 726F | 07..Cache-Contro
000000E0 | 6C3A 206E 6F2D 6361 6368 650D 0A0D 0A80 | l: no-cache.....
000000F0 | 0000 0074 81F4 DAA5 DD40 8E02 D83A 2B38 | ...t.....@...:+8
00000100 | 7CA4 51E4 BA0E ACE1 AE5D 478C 1BB1 C845 | |.Q......]G....E
00000110 | 1CDE 8E2B 0B82 96C6 D949 CAF9 E7B0 B50A | ...+.....I......
00000120 | 4280 3CA4 EF6C C47D D0BC E9FE 8812 533D | B.<..l.}......S=
00000130 | F5BC 64FE 9310 F339 A8FD 2FDA 8423 5DA0 | ..d....9../..#].
00000140 | DCEF B36F 4101 528C 1D09 D10F 6553 9D8B | ...oA.R.....eS..
00000150 | B419 BC84 A02D A94E A4B3 6574 11B7 FE34 | .....-.N..et...4
00000160 | A9C5 D1B9 B4DF B4C3 DA33 1B6B BA7B CA4C | .........3.k.{.L
00000170 | 3F80 69AB 0000 006C D8B9 A1CD 6B05 B417 | ?.i....l....k...
00000180 | 6E19 1F42 AA48 4FAB F47E F838 C291 A725 | n..B.HO..~.8...%
00000190 | 3785 D850 B386 9285 2CB1 EBBA 7FF4 C131 | 7..P....,......1
000001A0 | 52B8 42C5 4CCD 8F70 F5FA CD8F E289 D3BA | R.B.L..p........
000001B0 | A241 FEC8 57C2 3D9A 895D 065C 13C4 DC89 | .A..W.=..].\....
000001C0 | 4E93 EFF8 5088 3551 8D7A 2C46 95EB 2D3C | N...P.5Q.z,F..-<
000001D0 | 039E F73E C135 312C 6B7C F61C 0C7D 9A3D | ...>.51,k|...}.=
000001E0 | 7971 AC01 6AB4 1F2C 1242 BC36 8DF7 2863 | yq..j..,.B.6..(c
000001F0 | 5A96 4A10 993A BD60 8DE7 4E06 A341 7EE6 | Z.J..:.`..N..A~.
00000200 | BF7E E27E 57A6 6DF1 618F 53E9 B015 3F8E | .~.~W.m.a.S...?.
00000210 | 387E A399 C9D1 4778 FBFD 2730 94C1 21B7 | 8~....Gx..'0..!.
00000220 | A485 | ..
Trying to bring up that IP as an HTTPS requests gives an error. Trying
just http redirects to:
http://198.74.56.121/install.php?profile=default
Which is either trying to install or offering me something called
"Drupal".
The IP rDNS is
rockfish.pelagicsoftware.com.
http://rockfish.pelagicsoftware.com/
Pelagic Software
5501 Patterson Ave
Suite 201
Richmond, VA 23226
804.631.3474
So they seem to have a web server that is hacked. Is anyone here going
to tell them?
You will note that there is no indication in this ThreatExpert report
that this file was detected as malware/viral. It is not yet showing up
in the public files-analyzed page.