Monday, 11 July 2016

BEAWARE...!!!!! OF BLACK SHADES RANSOMEWARE

BLACK SHADES CRYPTO RANSOMEWARE


A new ransomware called Black Shades Crypter was discovere that encrypts your data and ransoms it for very low price of $30 paid in bitcoins or Paypal. This ransom targets both English and Russian speaking victim's as note also contains russian language it converts any file to .silent extension and encrypts files.
Unlikely, this ransomware includes strings in the executable that contain taunting messages to security researchers who may be analyzing the ransomware.Unfortunately, at this time there is no way to decrypt this ransomware for free. 

Black Shades Crypter Taunts Security Researchers

When analyzing the Black Shades ransomware there are multiple obfuscated strings in the source code that appear to be taunting security researchers who are analyzing it. Some of these strings are simply base64 encoded, while two others use basic string manipulation that is easily decoded.
The obfuscated strings that were found are shown below:
The above strings translates to: YoxcnnotcrackthisAlgorithmynare>idiot<
Russian String
This decodes to the Russian String: вы не можете взломать меня я очень жесткий
In English (Google Translated. I can't make this stuff up): you can not hack me, I am very hard 
Obfuscated Taunts
Text5 decodes to: Hacked by Russian Hackers in Moscow Tverskaya Street
Text6 decodes to: youaresofartocrackMe

The Black Shades Crypter Encryption Process

It is currently unknown how the Black Shades Ransomware is being distributed,
but based on the string YouTube embedded in executable,MalwareHunterTeam   thinks it may be distributed as fake videos, fake cracks, or fake patches.Once executed, Black Shades will delete the Shadow Volume Copies on the computer using this command:
cmd.exe /C vssadmin.exe Delete Shadows /All /Quiet
It will then determine the victim's IP address by going to the site http://icanhazip.com and to see if there is an Internet connection by going to Google.com. If the program cannot connect to icanhazip.com it will crash and display the below error. This means that you can modify your hosts file and point icanhazip.com to 127.0.0.1 to block this ransomware from encrypting a computer.

Connection Error
Crash Error
It will then create a unique ID for the victim and check to see if it can connect to Google. If it is able to, it will upload it along with the computer name, user name, key, execution time, the number 0 to act as a placeholder for the amount of files encrypted, and a reference string to the Command & Control server. This reference string is currently set to Youtube. 
When encrypting a victim's computer, Black Shades will only encrypt the following folders on the C: drive using AES-256 encryption and also drop a file in each folder called YourID.txt, which contains the unique victim ID.  When encrypting the Desktop it will also drop the Ваш идентификатор file, which contains the victim ID as well.
%Userprofile%\Downloads
%Userprofile%\Documents
%Userprofile%\Desktop
%Userprofile%\Pictures
%Userprofile%\Music
%Userprofile%\Videos
C:\Users\Public
On other drives, it will encrypt every folder it scans. When encrypting a file it will append the .silentextension to encrypted files. For example, test.jpg will become test.jpg.silent. When encrypting files it will only encrypt those that have one of the following extensions.
.vb,.cs,.c,.h,.html,.7z,.tar,.gz,.m4a,.wma,.aac,.csv,.rm,.txt,.text,.zip,.rar,.m,.ai,.cs,.db,.nd,.xlsx,.pl,.ps,.py,.3dm,.3ds,.3fr,.3g2,.ini,.xml,.jar,.lz,.mda,.log,.mpeg,.myo,.fon,.gif,.JNG,.jp2,.PC3,.PC2,.PC1,.PNS,.MP2,.AAC,.3gp,.ach,.arw,.asf,.asx,.avi,.bak,.bay,.mpg,.mpe,.swf,.PPJ,.cdr,.cer,.cpp,.cr2,.crt,.crw,.dbf,.dcr,.html,.xhtml,.mhtml,.asp,.dds,.der,.des,.dng,.doc,.dtd,.dwg,.dxf,.CSS,.rss,.jsp,.php,.dxg,.eml,.eps,.ert,.fla,.fla,.flv,.hpp,.docm,.docx,.flac,.iif,.ipe,.ipg,.kdc,.key,.lua,.m4v,.max,.xls,.yuv,.back,.mdb,.mdf,.mef,.mov,.mp3,.mp4,.mpg,.mrw,.x3f,.xlk,.xlr,.msg,.nef,.nk2,.nrw,.oab,.obi,.odb,.odc,.wmv,.wpd,.wps,.odm,.odp,.ods,.odt,.orf,.ost,.p12,.p7b,.vob,.wav,.wb2,.p7c,.pab,.pas,.pct,.pdb,.pdd,.pdf,.per,.sr2,.srf,.str,.ar,.bz2,.rz,.s7z,.apk,.zipx,.pem,.pfx,.pps,.ppt,.prf,.psd,.pst,.ptx,.rw2,.rwl,.sql,.3gp,.qba,.qbb,.qbm,.qbr,.qbw,.qbx,.qby,.r3d,.raf,.raw,.rtf,.AVI,.indd,.java,.jpeg,.pptm,.pptx,.xlsb,.xlsm,.jpg,.png,.ico,.JPG,.MP4,.MP4,.FLV,.MKV,
During different stages of the encryption process it will check again for the ability to connect to Google, and if possible, will connect to the Command & Control server and send an update that contains the count of files that have been encrypted.
When done encrypting, Black Shades will create the Hacked_Read_me_to_decrypt_files.Htmlransom note on the Windows Desktop and also copy it into the victim's startup folder so that it shows every time the user logs into the computer.

HTML Ransom Note
HTML Ransom Note
This ransom note contains instructions on how to connect to the associated payment site, which is described below.
When this whole process is completed, Black Shades will try to delete itself and leave behind only the ransom notes.

The Black Shades File Decrypter Site

The Black Shades Ransom note contain a link to the payment site where a victim can pay the ransom. This site is titled the Black Shades File Decrypter and allows a victim to make a payment in bitcoins or using Paypal.

Payment Site
Payment Site
The use of Paypal is an odd choice for any criminal activity as it can easily be traced.

Updates:

6/3/16 - MalwareHunterTeam pointed out that not being able to connect to http://icanhazip.com will generate a crash. Also realized that Google connection is only for checking if connected to the Internet.
Files associated with the Black Shades Crypter Ransomware:
%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.exe
%UserProfile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hacked_Read_me_to_decrypt_files.Html
%UserProfile%\AppData\Roaming\Windows\win.exe
YourID.txt
Ваш идентификатор
Hacked_Read_me_to_decrypt_files.Html
Registry Entries associated with the Black Shades Crypter Ransomware::
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Driver"="%UserProfile%\AppData\Roaming\Windows\win.exe" /autostart"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Setup\Generalize "DisableSR" = 1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 1

Tuesday, 12 April 2016

INURLBR – Advanced Search Engine Tool

This tool functions in many ways enabling you to harness the power of what’s already indexed by the search engines and analyse your target for potential exploits, capture E-mails and URLs with internal custom validation for each target/URL found.Also supports external commands for exploitation, so if your scan/search finds a potential validated SQL Injection vulnerability, you could have INURLBR directly launch sqlmap or your tool of choice

Features

  • Generate IP ranges or random_ip and analyse the targets.
  • Customization of HTTP-HEADER, USER-AGET, URL-REFERENCE.
  • Execute external commands to exploit certain targets.
  • Generate random dorks or set dorks file.
  • Option to set proxy manually or from a file list.
  • Supports both SOCKS and HTTP proxies
  • Set time for proxy change when using random.
  • Supports TOR to randomise IP.
  • Debug processed URLs & HTTP requests.
  • Can send vulnerable URLs to an IRC chat room.
  • Support for GET / POST => SQLI, LFI, LFD injection exploits.
  • Filter and validate based on regexp.
  • Extraction of e-mail addresses and URLs.
  • Validation using HTTP response codes.
  • Search pages based on strings file.
  • Exploits commands manager.
  • Paging limiter on search engines.
  • Beep sound when a vulnerability is found.
  • Use text file as a data source for URLs to test.
  • Find personalized strings in return values of the tests.
  • Checks and validates for Shellshock.
  • File validation for the WordPress config file – wp-config.php.
  • Can execute a sub-process for validation.
  • Validate syntax errors for databases and programming.
  • Data encryption as native parameter.
  • Random Google host.
  • Scan port.

Search Engines and Methods Supported

  • Google / (CSE) generic random / API
  • Bing
  • Yahoo! BR
  • Ask
  • HAO123 Br
  • Google (API)
  • Lycos
  • UOL Br
  • Yahoo! US
  • Sapo
  • Dmoz
  • Gigablast
  • Never
  • Baidu BR
  • Andex
  • Zoo
  • Hotbot
  • Zhongsou
  • Hksearch
  • Ezilion
  • Sogou
  • DuckDuckGo
  • Boorow
  • Google (CSE) generic random
Special
  • Tor Find
  • Elephant
  • Torsearch
  • Wikileaks
  • OTN
  • Shodan

Errors Checked For

  • Java Infinitydb
  • LFI
  • Zimbra mail
  • Zend framework
  • MariaDB
  • MySQL
  • Jbossweb
  • Microsoft
  • ODBC
  • PostgreSQL
  • PHP
  • WordPress
  • Web Shell
  • JDBC
  • ASP
  • Oracle
  • DB2
  • CFM
  • LUA
command to get INURLBR :-
git clone https://github.com/googleinurl/SCANNER-INURLBR.git inurlbr
once it is downloaded it will appear like this:

For command search and help you can go to github for searches.
Happy searching...!!!!


Monday, 11 January 2016

pwntools – CTF Framework & Exploit Development Library


pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.
pwntools - CTF Framework & Exploit Development Library
Command-line frontends for some of the functionality are available:
  • asm/disasm: Small wrapper for various assemblers.
  • constgrep: Tool for finding constants defined in header files.
  • cyclic: De Bruijn sequence generator and lookup tool.
  • hex/unhex: Command line tools for doing common hexing/unhexing operations.
  • shellcraft: Frontend to our shellcode.
  • phd: Replacement for hexdump with colors.
Usage
Requirements
pwntools is best supported on Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).
Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with:
However, some of the features (ROP generation and assembling/disassembling foreign architectures) require non-Python dependencies. For more information, see the complete installation instructions here.
You can download pwntools here:
Or read more here.

Enjoy learning and please like it tf you found it helpful.