En réponse à un tweet de @PhysicalDrive0 : VirusTotal #Fynloski #Shameless
LegalCopyright: 1.0.2
Assembly Version: 1.0.2.0
InternalName: je suis charlie.exe
FileVersion: 94.0.3.1
CompanyName: Creative Updreg
Comments: Creative Technology Ltd.
ProductName: Copyright (c) Creative Technology Ltd. 2000
FileDescription: UpdReg
Se copie dans "%TMP%\svchost.exe" puis s'exécute.
Dépose une image dans %TMP%\Binded_%d.jpg
Affiche l'image avec la commande.
"rundll32.exe" %WINDIR%\system32\shimgvw.dll,ImageView_Fullscreen %TMP%\Binded_%d.jpg

Il s'agit d'un RAT de type DarkComet dont voici la configuration.

Le compte du no-ip.org est "snakes63"
63 est le département du Puy-de-Dôme.
La résolution retourne l'IP 86.216.158.194
Soit aclermont-ferrand-157-1-247-194.w86-216.abo.wanadoo.fr
Autre échantillon du 23/11/2014, snakes63.no-ip.org ( 86.216.34.116:1604/TCP )
Connexion au port 1500/TCP:
0x00000000 (00000) 44353733 42413541 34454646 43334642 D573BA5A4EFFC3FB
0x00000010 (00016) 36323933 3038 629308
Connexion au port 80/TCP:
Server: HP HTTP Server; HP Photosmart 5520 series - CX042B; Serial Number: CN37I166360602; Morgan_pp Built:Mon Oct 27, 2014 08:28:54AM {MGP1CN1444AR, ASIC id 0x003a0008}
Si vous utilisez des RATs à des fins malveillantes, vous serez traqués.
➱ ( 19 May 2014 ) FBI arrests 100 hackers over Blackshades malware
➱ ( 19 June 2014 ) Case No. 2:14-cv-00987-GMN-GWF - No-IP "Malicious Domains"
➱ ( 30 June 2014 ) Microsoft received court permission to take over No-IP
➱ ( 21 November 2014 ) Multiple UK arrests in international operation
Edit: Période octobre-novembre 2014, usage d'autres DarkComet vers Proxy (UK):
☣ SNAKES.NO-IP.ORG ( 31.24.33.221:1500/TCP )
------------------------------------------------------------------------------------------------------------
2014-10-22 [ MD5: 095EC3D659F84C01C66480E2894C4D34 ]
[+] Reading file
[+] Searching for Config
[+] Printing Config to screen
[-] Key: CampaignID Value: chtbib
[-] Key: Domains Value: snakes.no-ip.org:1500
[-] Key: FTPHost Value: ftp.missyclac.esy.es
[-] Key: FTPKeyLogs Value: 1
[-] Key: FTPPassword Value: Wxcvbn12
[-] Key: FTPPort Value: 21
[-] Key: FTPRoot Value: /logs
[-] Key: FTPSize Value: 5
[-] Key: FTPUserName Value: u556955310
[-] Key: FireWallBypass Value: 0
[-] Key: Gencode Value: EV93vHg3uqyk
[-] Key: Mutex Value: DC_MUTEX-67H4MAG
[-] Key: OfflineKeylogger Value: 1
[-] Key: Password Value:
[-] Key: Version Value: #KCMDDC51#
[+] End of Config
------------------------------------------------------------------------------------------------------------
2014-10-24 [ MD5: 0ED23D04CE0425A8B323154673C6CA8D ]
[+] Reading file
[+] Searching for Config
[+] Printing Config to screen
[-] Key: CampaignID Value: victims
[-] Key: Domains Value: snakes.no-ip.org:1500
[-] Key: FTPHost Value: ftp.missyclac.esy.es
[-] Key: FTPKeyLogs Value: 1
[-] Key: FTPPassword Value: Wxcvbn12
[-] Key: FTPPort Value: 21
[-] Key: FTPRoot Value: /LOGS
[-] Key: FTPSize Value: 10
[-] Key: FTPUserName Value: u556955310
[-] Key: FireWallBypass Value: 0
[-] Key: Gencode Value: zJ0185x3kSCE
[-] Key: Mutex Value: DC_MUTEX-KSHTTKC
[-] Key: OfflineKeylogger Value: 1
[-] Key: Password Value:
[-] Key: Version Value: #KCMDDC51#
[+] End of Config
------------------------------------------------------------------------------------------------------------
2014-11-07 [ MD5: 4B14CA5840A6BE9D96036A5A5F7CF8DA ]
[+] Reading file
[+] Searching for Config
[+] Printing Config to screen
[-] Key: CampaignID Value: victims
[-] Key: Domains Value: snakes.no-ip.org:1500
[-] Key: FTPHost Value: ftp.missyclac.esy.es
[-] Key: FTPKeyLogs Value: 1
[-] Key: FTPPassword Value: Wxcvbn12
[-] Key: FTPPort Value: 21
[-] Key: FTPRoot Value: /public_html/LOGS
[-] Key: FTPSize Value: 5
[-] Key: FTPUserName Value: u556955310
[-] Key: FireWallBypass Value: 0
[-] Key: Gencode Value: hdHuzVdsH7j3
[-] Key: Mutex Value: DC_MUTEX-5L38XJU
[-] Key: OfflineKeylogger Value: 1
[-] Key: Password Value:
[-] Key: Version Value: #KCMDDC51#
[+] End of Config
------------------------------------------------------------------------------------------------------------
2014-11-23 [ MD5: 04D606C37161E905BF8CAF18638D8371 ]
[+] Reading file
[+] Searching for Config
[+] Printing Config to screen
[-] Key: CampaignID Value: Guest16
[-] Key: Domains Value: snakes63.no-ip.org:1604
[-] Key: FTPHost Value: ftp.hackrecovery.altervista.org
[-] Key: FTPKeyLogs Value: 1
[-] Key: FTPPassword Value: vaccifopna24
[-] Key: FTPPort Value: 21
[-] Key: FTPRoot Value: /snakes
[-] Key: FTPSize Value: 5
[-] Key: FTPUserName Value: hackrecovery
[-] Key: FireWallBypass Value: 0
[-] Key: Gencode Value: SuKNfhN4lSrT
[-] Key: Mutex Value: DC_MUTEX-FBGL5CH
[-] Key: OfflineKeylogger Value: 1
[-] Key: Password Value:
[-] Key: Version Value: #KCMDDC51#
[+] End of Config
------------------------------------------------------------------------------------------------------------
2014-11-25 [ MD5: A73661806D923F1C158D561B1816A09F ]
[+] Reading file
[+] Searching for Config
[+] Printing Config to screen
[-] Key: CampaignID Value: chtbib
[-] Key: Domains Value: snakes.no-ip.org:1500 | snakes.no-ip.org:1600
[-] Key: FTPHost Value: ftp.missyclac.esy.es
[-] Key: FTPKeyLogs Value: 1
[-] Key: FTPPassword Value: Wxcvbn12
[-] Key: FTPPort Value: 21
[-] Key: FTPRoot Value: /logs
[-] Key: FTPSize Value: 5
[-] Key: FTPUserName Value: u556955310
[-] Key: FireWallBypass Value: 0
[-] Key: Gencode Value: iuQRrAhTsUJs
[-] Key: Mutex Value: DC_MUTEX-E3MSV7R
[-] Key: OfflineKeylogger Value: 1
[-] Key: Password Value:
[-] Key: Version Value: #KCMDDC51#
[+] End of Config
------------------------------------------------------------------------------------------------------------