<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Analyze on Omid Farhang</title><link>https://omid.dev/tags/analyze/</link><description>Recent content in Analyze on Omid Farhang</description><generator>Hugo -- 0.152.2</generator><language>en-US</language><copyright>2025 Omid Farhang | All rights reserved.</copyright><lastBuildDate>Fri, 29 Mar 2013 00:53:00 +0000</lastBuildDate><atom:link href="https://omid.dev/tags/analyze/index.xml" rel="self" type="application/rss+xml"/><item><title>Backdoor Uses Evernote as Command-and-Control Server</title><link>https://omid.dev/2013/03/29/backdoor-uses-evernote-as-command-and-control-server/</link><pubDate>Fri, 29 Mar 2013 00:53:00 +0000</pubDate><guid>https://omid.dev/2013/03/29/backdoor-uses-evernote-as-command-and-control-server/</guid><description>&lt;p&gt;&lt;a href="http://lh3.ggpht.com/-V5AGetYXHzk/UVTevh8EfuI/AAAAAAAAIDI/oy6-Q1Yi0zA/s1600-h/Evernote%25255B2%25255D.png"&gt;&lt;img loading="lazy" src="http://lh5.ggpht.com/-UZupKZ2CBOQ/UVTezUnrQ1I/AAAAAAAAIDQ/u45IOWgX-Ek/Evernote_thumb.png?imgmax=800" alt="Evernote" title="Evernote" /&gt;
&lt;/a&gt;With its rich functionality and accessibility, Evernote is a popular note-taking tool for its many users. Unfortunately, it may also provide the perfect cover for cybercriminals’ tracks.&lt;/p&gt;
&lt;p&gt;We recently uncovered a malware that appears to be using Evernote as a communication and control (C&amp;amp;C) server. The malware attempts to connect to Evernote via &lt;em&gt;&lt;a href="https://evernote.com/intl/zh-cn"&gt;https://evernote.com/intl/zh-cn&lt;/a&gt;&lt;/em&gt;, which is a legitimate URL.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh6.ggpht.com/-WlYuO6mkcEE/UVTe2Cd5cTI/AAAAAAAAIDY/DZStZpDf-54/s1600-h/Evernote-backdoor-strings%25255B5%25255D.jpg"&gt;&lt;img loading="lazy" src="http://lh5.ggpht.com/-7-_6LRyj-kc/UVTe5TGjyqI/AAAAAAAAIDg/JSGXpFb9Tcs/Evernote-backdoor-strings_thumb%25255B2%25255D.jpg?imgmax=800" alt="Evernote-backdoor-strings" title="Evernote-backdoor-strings" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The sample we gathered consists of an executable file, which drops a .DLL file and injects it into a legitimate process. The said .DLL file performs the actual backdoor routines.&lt;/p&gt;</description></item><item><title>Turkish FlashPlayer? no! It’s malware</title><link>https://omid.dev/2013/03/28/turkish-flashplayer-no-its-malware/</link><pubDate>Thu, 28 Mar 2013 17:37:00 +0000</pubDate><guid>https://omid.dev/2013/03/28/turkish-flashplayer-no-its-malware/</guid><description>&lt;p&gt;&lt;a href="https://omid.dev/images/2013/03/shot_130328_2124583.png"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/03/shot_130328_2124583.png" alt="shot_130328_212458[3]" /&gt;
&lt;/a&gt;I recently came across the file “FlashPlayer.exe” during the course of regular research.&lt;/p&gt;
&lt;p&gt;The file had been distributed with the file name FlashPlayer.exe and not surprisingly, when executed, it shows the following GUI, partly written in Turkish:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://omid.dev/images/2013/03/shot_130328_2128356.png"&gt;&lt;img loading="lazy" src="https://omid.dev/images/2013/03/shot_130328_2128356.png" alt="shot_130328_212835[6]" /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Obviously, it’s disguised as an Adobe Flash Player 11 installer.&lt;/p&gt;
&lt;p&gt;Here is more info about the file:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-md" data-lang="md"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;File Name: FlashPlayer.exe
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;MD5: e2856b1ad6c74c51767cab05bdedc5d1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;SHA1: 1ac150ddb964722b6b7c96808763b3e4d0472daf
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;CRC32: a8464606
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;SHA-256: b5f37cc44365a5a1b240e649ea07bbb17959ceddc3f8b67a793df694a6f03a88
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;SHA-512: e2d1388bd5feec51227cfa10a5606f7d3bc58f12ea95d688acb5178ff31a156a1092f739e7dd276f4c5368d89c33ed6a15b08ff5df294b9c3647905c1083921d
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;SHA-384: 5d622afcf87e33334a446df5dfd2be7769cab596cc9a121bfd6269bc85ee980f75e1a2d1472f0eb379788845230d883b
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;File Size: 561,152
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;Version: 2.01
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;Source: hxxps://flash-player-download.com/FlashPlayer.exe
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;VirusTotal: &lt;a href="http://www.virustotal.com/latest-report.html?resource=e2856b1ad6c74c51767cab05bdedc5d1"&gt;Latest Report&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Ladies with few clothes tend to cause a lot of trouble on PCs – and now on Android devices too</title><link>https://omid.dev/2012/08/02/ladies-with-few-clothes-tend-to-cause-a-lot-of-trouble-on-pcs-and-now-on-android-devices-too/</link><pubDate>Thu, 02 Aug 2012 14:21:00 +0000</pubDate><guid>https://omid.dev/2012/08/02/ladies-with-few-clothes-tend-to-cause-a-lot-of-trouble-on-pcs-and-now-on-android-devices-too/</guid><description>&lt;p&gt;Cross-posted from Surelist&lt;/p&gt;
&lt;p&gt;The appearance of a new Android malware family is not that surprising at all today. Especially when we talk about SMS Trojans which are one of the most popular and oldest type of threats created for extracting money from users. A new family of SMS Trojans named &lt;strong&gt;Vidro&lt;/strong&gt; appeared a few days ago but we’ve already collected a lot of APK files with very similar functionality. At the moment all the samples we have found target users only from Poland.&lt;/p&gt;</description></item><item><title>A technical analysis of Adobe Flash Player CVE-2012-0779 Vulnerability</title><link>https://omid.dev/2012/05/25/a-technical-analysis-of-adobe-flash-player-cve-2012-0779-vulnerability/</link><pubDate>Fri, 25 May 2012 09:19:00 +0000</pubDate><guid>https://omid.dev/2012/05/25/a-technical-analysis-of-adobe-flash-player-cve-2012-0779-vulnerability/</guid><description>&lt;p&gt;&lt;a href="http://blogs.technet.com/b/mmpc/" target="_blank"&gt;Microsoft Malware Protection Center&lt;/a&gt; wrote:&lt;/p&gt;
&lt;p&gt;Recently, we&amp;rsquo;ve seen a few attacks in the wild targeting a patched Adobe Flash Player vulnerability. The vulnerability related to this malware was addressed with a recent &lt;a href="http://www.adobe.com/support/security/bulletins/apsb12-09.html"&gt;patch&lt;/a&gt; released by Adobe on May 4th. On the Windows platform, Flash Player 11.2.202.233 and earlier is vulnerable. If you&amp;rsquo;re using vulnerable version, you need to update your Flash Player now to be protected against these attacks. We had a chance to analyze how the malware (sha1: e32d0545f85ef13ca0d8e24b76a447558614716c) works and here are the interesting details we found during the investigation.&lt;/p&gt;</description></item><item><title>New CAPTCHA method or just another likejacking scam?</title><link>https://omid.dev/2012/02/13/new-captcha-method-or-just-another-likejacking-scam/</link><pubDate>Mon, 13 Feb 2012 17:19:00 +0000</pubDate><guid>https://omid.dev/2012/02/13/new-captcha-method-or-just-another-likejacking-scam/</guid><description>&lt;p&gt;Sorin Mustaca wrote at Avira TechBlog:&lt;/p&gt;
&lt;p&gt;In case you’ve seen this on Facebook, try to not click on it even if you understand French (it appears to be only in Franch) because it will take you on a road where you don’t want to be.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://lh4.ggpht.com/-w1gAni39XUs/Tzk_EqGw5bI/AAAAAAAAEwI/eZc6TJv5QkA/s1600-h/likejacking%25255B3%25255D.png"&gt;&lt;img title="likejacking" border="0" alt="likejacking" src="http://lh4.ggpht.com/-CBqHxABjhtw/Tzk_JG3mXFI/AAAAAAAAEwQ/yPjcasqtAPQ/likejacking_thumb%25255B1%25255D.png?imgmax=800" width="466" height="223" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But, we like to live dangerous, so we analyzed this for you.&lt;/p&gt;
&lt;p&gt;Continue Reading at Avira TechBlog: &lt;a href="http://techblog.avira.com/2012/02/13/new-captcha-method-or-just-another-likejacking-scam/en/" title="http://techblog.avira.com/2012/02/13/new-captcha-method-or-just-another-likejacking-scam/en/"&gt;http://techblog.avira.com/2012/02/13/new-captcha-method-or-just-another-likejacking-scam/en/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>New worm targeting weak passwords on Remote Desktop connections (port 3389)</title><link>https://omid.dev/2011/08/29/new-worm-targeting-weak-passwords-on-remote-desktop-connections-port-3389/</link><pubDate>Mon, 29 Aug 2011 14:13:00 +0000</pubDate><guid>https://omid.dev/2011/08/29/new-worm-targeting-weak-passwords-on-remote-desktop-connections-port-3389/</guid><description>&lt;p&gt;&lt;strong&gt;Microsoft Malware Protection Center:&lt;/strong&gt; We&amp;rsquo;ve had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm:Win32/Morto.A and you can see a detailed description of at &lt;a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FMorto.A"&gt;http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fMorto.A&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Morto attempts to compromise Remote Desktop connections in order to penetrate remote systems, by exploiting weak administrator passwords. Once a new system is compromised, it connects to a remote server in order to download additional information and update its components. It also terminates processes for locally running security applications in order to ensure its activity continues uninterrupted. Affected users should note that a reboot may be required in order to complete the cleaning process.&lt;/p&gt;</description></item><item><title>Analysis of TR/Spy.SpyEye</title><link>https://omid.dev/2011/03/30/analysis-of-trspy-spyeye/</link><pubDate>Wed, 30 Mar 2011 14:48:00 +0000</pubDate><guid>https://omid.dev/2011/03/30/analysis-of-trspy-spyeye/</guid><description>&lt;p&gt;&lt;strong&gt;&lt;a href="http://lh6.ggpht.com/_vaUVXcmC3OI/TZM7yPvanvI/AAAAAAAADyk/MnvbNy90n7E/s1600-h/avira_logo_red_rgb%20%282%29%5B7%5D.jpg"&gt;&lt;img title="avira_logo_red_rgb (2)" border="0" alt="avira_logo_red_rgb (2)" align="right" src="http://lh6.ggpht.com/_vaUVXcmC3OI/TZM7zv1UDMI/AAAAAAAADyo/tMldI0CRkKA/avira_logo_red_rgb%20%282%29_thumb%5B5%5D.jpg?imgmax=800" width="150" height="36" /&gt;&lt;/a&gt;Avira TechBlog:&lt;/strong&gt; SpyEye is a malware family which we are monitoring for some time. Today we are analyzing a sample which is detected as TR/Spy.SpyEye.flh by &lt;a href="https://omid.dev/en/knowledge-base/programs/avira-premium-security-suite" target="_blank"&gt;Avira products&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Trojan is able to inject code in running processes and can perform the following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Capture network traffic&lt;/li&gt;
&lt;li&gt;Send and receive network packets in order to bypass application firewalls&lt;/li&gt;
&lt;li&gt;Hide and prevent access to the startup registry entry&lt;/li&gt;
&lt;li&gt;Hide and prevent access to the binary code&lt;/li&gt;
&lt;li&gt;Hide the own process on injected processes&lt;/li&gt;
&lt;li&gt;Steal information from Internet Explorer and Mozilla Firefox&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A detailed analysis of this malware by Liviu Serban, Virus Researcher at Avira.&lt;/p&gt;</description></item></channel></rss>