Henry Law <
ne...@lawshouse.org> writes:
> I had a friendly email from a packaging company in Leicester this
> morning, asking me to quote against an attached Purchase Order. Ha
> ha; obviously some kind of malware distributor. The attachment was
> called "PO.uue", which intrigued me, since .uue is usually a uuencoded
> file.
>
> I detached it on my linux machine and had a look at it. Not uuencoded
> at all, in fact, but a RAR file containing "Documents.scr". Curiouser
> and curiouser, since my only experience of .scr is a Windows
> Screensaver.
>
> I've got no further in identifying the actual payload of this thing,
> except to note that EMacs identifies the thing as a graphic file and
> invokes its Imagemagick mode, which surprised me even further. The
> displayed graphic is nonsense, though: see
>
http://www.lawshouse.org/misc/Documents.scr.InEmacs.png
Could be coincidence, but it looks suspiciously like a ZX Spectrum
crashing. Is it perhaps 6912 bytes long?
http://fileformats.archiveteam.org/wiki/SCR_(ZX_Spectrum)
This may just mean that it’s designed to look like that to get past some
kind of filter, and in fact contains a payload that will be differently
interpreted by something else.
> Has anyone any knowledge of this kind of attack, who could satisfy my
> curiousity by explaining firstly how the .uue file is interpreted by
> Windows (presumably the target environment), and on the assumption
> that it's automatically extracted, how the Screensaver file is given
> control so that whatever nasty stuff it contains is made active.
How the attacker expects it to be extracted I couldn’t say. But note
that it only takes a target at least as curious as you were to do it
manually.
Most image formats[1] are are (sometimes quite complex) languages and
most of the parsers for those languages were hand-written by people who
were thinking primarily about data compression rather than computer
security. The result is that, historically at least, they were full of
bugs and some of those bugs were exploitable.
[1] although not the ZX Spectrum format mentioned above, which is a
straight memory dump.
The situation has probably improved a bit in the last few years (popular
bug-finding tools like afl-fuzz are well-suited to this kind of issue)
but the need to stay fully patched remains.
--
http://www.greenend.org.uk/rjk/