Mail.Ru is testing a new way to infect computers

    Once in the middle of the night nostalgia struck me and I decided to download the song “Angelica” - “Town” from the hares.

    I find, the bitrate is suitable, I choose mp3 and download .

    But for some reason the .exe file was downloaded ... and from the strange address
    what nonsense I think.

    I choose the .rar format, the same is downloaded - the .exe file is 160KB in size.

    I run whois by domain and get:
    domain:        MOILRU.RU
    person:        Private Person
    registrar:     REGRU-REG-RIPN
    created:       2013.05.13
    paid-till:     2014.05.13
    free-date:     2014.06.13
    source:        TCI

    Oops! Fresh!

    Fill the file with VirusTotal and get a report on the file.

    Screenshots of file properties.

    Selectively poked other compositions, everywhere the executable file sways instead of mp3.

    The downloaded files have different sizes, but everyone has a signature with the certificate.

    My user agent:
    Mozilla/5.0 (Windows NT 6.1; WOW64; rv:21.0) Gecko/20100101 Firefox/21.0

    I change it to Android. A redirect to goes right away and now normal mp3s are already downloading ...

    He listened, called, to the music at night.

    The comments reminded me of another article .

    PS I ask a rhetorical question - how can one sign so many different files with a certificate without it?

    PPS Checked the IP site, DNS and gateway provider - no spoofing. It was checked by a second antivirus - clean.

    (After 12 hours):

    The distributing domain has been changed to and the url format has been changed:

    A little later, the domain was again changed to (
    . Two days later, it was changed to (

    Which redirects to other domains, from which the download occurs: 

    These domains are also involved in the infection of visitors to the service.
    All of them are on IP The Data Center does not respond to abuses :(

    Inside the same file signed by a certificate from
    I am in Ukraine, which is probably why I do not get a file signed by LLC Pentagon.

    (After 16 hours)
    An inscription appeared at the jump:
    The file is downloaded using a special loader (trojans) from our partners - and Rambler . Launching the bootloader is absolutely safe for your computer, which is confirmed by a digital signature, but false positives for antiviruses are possible .

    I translate: We agreed with Kaspersky Lab, it does not consider these files as trojans, and Dr.Web, which classifies files as trojans, is not an antivirus at all.

    And the answer was received from distributors:

    From: Nikolay nik [a]

    You are complaining about the bootloader (which supposedly contains a virus).

    We hereby inform you that there is a false positive response. The file itself is nothing more than an HTTP client for downloading any content and it is certainly not a virus. The file is digitally signed by its manufacturer, Mail.Ru, and is located on Mail.Ru servers, which further confirms the origin and reliability of this file.

    Heuristic analyzers of some antiviruses can be triggered by the internal structure and actions of this file, however we guarantee that the triggered data is false.

    If you have questions about files that are distributed from our server - please write about them on nik [a]

    They also lack IP and they ordered new ones from the Data Center :(

    Also popular now: