I may have some data loss to Romania. How can I decode what I have magaged to capture? Thanks in advance. Please teach me so I can apply this to future captures. And maybe help others.
Their response ack the data
asked 06 Apr ‘11, 14:18 Onebusytech retagged 09 Apr ‘11, 07:35 packethunter |
One Answer:
What you got here is trouble. The request goes out to the domain zsmoupnlyotrokq.info. At this time the domain does not exist (nslookup returns "non-existent domain". The most remarkable website abuse.ch also hosts the Zeustracker, a website dedicated to tracking computers infected with the Zeus trojan horse. As the domain zsmoupnlyotrokq.info does not exist Zeustracker is currently not reporting it. However, the google cache for Zeustracker still has the entry: So your trace file shows the encrypted command & control traffic for Zeus. Alas, decrypting Zeus traffic is not for the faint of heart. Unfortunately, Zeus does not use a single master key. Finding the key for your infection requires a decent amount of reverse engineering. One possible approach is listed in a blog at threadexpert.com. Depending on your version of Zeus this information could already be outdated. Good hunting, you have a worthy target! :-) answered 09 Apr '11, 07:19 packethunter edited 09 Apr '11, 07:34 |
Thanks for your time and assistance in reviewing this for me. I suspected as much. But it does help to strengthen my message that they should take this very seriously. I advised them to inform the user of the risks and possible loss of personal information that could have occurred.
You might want to accept the answer then to get the question off the open questions list ;-)