Repeated exe incursion from Fansub.tv


Ad: Buy Girls Und Panzer Merch from Play Asia!

NinjaDuck

-chi
Kouhai
Just to see if fansub.tv admin is aware.. or thinks it's something we shouldn't feel concerned about.. u do know one (or more) of your third party advertisers is using your website to deliver & launch EXECUTABLES to our c:\ root folders, right? ...I believe & trust that it's third party anyway; i can only conceive they are being delivered thru the ad system.

It just happened again.. this time I noted it was right after the "Somebody has a crush on you!" ad loaded when I opened a new window to the koushin-editor.php
As with many of the other times, I haven't browsed anywhere else this week -- when I'm busy with project work my poor neglected internet box basically just stays connected to the awesome Daft script all the time, but the incursions only ever pop up the firewall warnings while I'm actually moving around the fansub site; they've never been logged when I'm not here.

I've kept disabled copies of the unauthorised downloaded executables going back several months:

-The files are always called c:\sys????.exe or c:\sys???.exe (suffixed by 3 or 4 random letters)
-They're always 9k in size, which unpack to 24k
-They're executables compressed by UPX (Ultimate Packer for eXecutables, a win32 version of something like LZEXE)
-They're implementations of GetWebFile v1.0 (C++ by Jay Beckert, open source at The Code Project)
-Inside u can find Jay's titlebar blurb "GetWebFile - What file will we get today?"
-Contain handles to KERNEL32.DLL MFC42.DLL MSVCRT.DLL USER32.DLL
-All contain a reference to the insidious infecty site "sys-browser.com"

My AVG annoyingly doesn't pick up on it, probably because it's not a fully fledged "infection" -- only find it in c:\ and task manager -- couldn't find evidence of registry or other permanent tampering after only these foothold incursions, but who knows what might've happened if the sys-browser.com download attempts succeeded.. luckily my firewall chucks visible nanas and automatically blocks them.

The destination IPs in the log are various but seem to follow a theme, eg: owned by such domains as akamai (the advertising e-hub giant); origin-codecs (a microsoft.com domain); www.l (google); extremehosting.net; the odious sys-browser.com site itself. When the exe initially fails (thanks to outgoing firewall) there's ongoing attempts to query my ISP's DNS before I kill the process in task manager.

sys-browser.com is responsible for such gems as Troj/Dloadr-BDI which is a Browser Helper Object infection that downloads files from their site.
(refer http://www.sophos.com/security/analyses/trojdloadrbdi.html )

Hopefully the firewall log evidence suggests a third-party of sys-browser.com origin is just racking up hits for themselves against forth-party ad-hosting giants, rather than something sinister (i have yet to set up a sacrifical quarantined system to find out what file(s) these incursions are trying to download), but it would be nice if fansub.tv -- which has long proven its motives selfless and the site & its admin team worthy of esteem, admiration & user trust -- lobbied their ad provider to ban such practice by their clients.

Have fun & mung beans,
Duck.
 
We've had problems with this before, but it's a pretty hard problem to track down since we use 3 or 4 different ad companies - which each serve a variety of advertisements. I've pulled out one of the ad providers that I believe might be causing this problem, so please let me know if the problems appears to go away.
 
You're always busy being awesome, Daft-sama ^_^

I went nuts browsing all over the place in fansub.tv for what seemed like a good half hour (so many goodies, so little duckipoo-bandwidth, sigh), but the autoit script i made to pounce on it the instant it happened again went to waste: So far it looks like the right thorn was plucked out. Also had Ethereal involved to see if I could capture whether it was a file download attempt or just an ad URL with someone's referral ID (which could be reported back to the ad provider; they're the ones getting money stolen from them in "fake hit" scam payouts after all).

I'll mention if it happens again. I hope the way your ad system works is that the other ad providers automatically "take up the slack" of the rejected company and fansub revenue doesn't suffer. :eek:(

ps: the way you easily said it was a problem and the fast action speaks volumes about fansubtv & its admin. huzzah! Can you please come and work for my ISP.

Have fun & cheesie puffs,
Duck.
 
Playasia - Play-Asia.com: Online Shopping for Digital Codes, Video Games, Toys, Music, Electronics & more
Back
Top