Fake 'Order Accepted', 'Message', 'QUICKBOOKS', 'Message' SPAM, 'Paypal' phish
FYI...
Fake 'Order Accepted' SPAM - doc malware
-
http://myonlinesecurity.co.uk/order-pc299139pps-accepted-contractvehicles-co-uk-word-doc-malware/
30 Nov 2015 - "An email with the subject of 'Order PC299139PPS Accepted' pretending to come from CVLink <noreply@ contractvehicles .co.uk> with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs...
Screenshot:
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/Order-PC299139PPS-Accepted-1024x561.png
30 November 2015: PC299139PPS
.doc - Current Virus total detections 1/55*
MALWR analysis** shows us it downloads what looks like a
Dridex banking malware from
http ://members.chello .at/~antitrack_legend/89u87/454sd
.exe (VirusTotal 3/54***)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...7d25366332200e97edda81c4/analysis/1448873990/
**
https://malwr.com/analysis/NWE5YWEzNTdiNzEzNGNjZjgyNjlkYWQzMTc2ODExZmI/
***
https://www.virustotal.com/en/file/...a968700da1bcd1622a6caf2f/analysis/1448873756/
___
Fake 'Message' SPAM - malware attachment
-
http://blog.dynamoo.com/2015/11/malware-spam-message-from.html
30 Nov 2015 - "I have only one sample of this rather terse email with -no- body text:
From: scan@ victimdomain
Reply-To: scan@ victimdomain
To: hiett@ victimdomain
Date: 30 November 2015 at 09:22
Subject: Message from mibser_00919013013
The spam appears to originate from within the victim's own domain, but it does not. In the sample I saw, the attachment was named Smibser_00915110211090
.xls, had a VirusTotal detection rate of 3/54* and contained this
malicious macro... According to this Hybrid Analysis report** and this Malwr report*** the macro downloads
a malicious executable from:
velitolu .com/89u87/454sd
.exe
This binary has a detection rate of 3/55****. Automated report tools [1] [2] show network traffic to:
94.73.155.12 (Cizgi Telekomunikasyon Anonim Sirketi, Turkey)
42.117.2.85 (FPT Telecom Company, Russia)
89.189.174.19 (Sibirskie Seti Novokuznetsk, Russia)
5.63.88.100 (Centr, Kazakhstan)
The payload is likely to be the
Dridex banking trojan...
Recommended blocklist:
94.73.155.12
42.117.2.85
89.189.174.19
5.63.88.100 "
*
https://www.virustotal.com/en/file/...431037149e5d5f68518206fe/analysis/1448880036/
**
https://www.hybrid-analysis.com/sam...edcc8431037149e5d5f68518206fe?environmentId=2
***
https://malwr.com/analysis/YjgwNGJkYzc0ZTY4NGUxODg3MzliOWUzODBiODNhNTk/
****
https://www.virustotal.com/en/file/...659bcfbc034998e62688b8f9/analysis/1448880465/
1]
https://malwr.com/analysis/ZTk4OWY0OWFjOGQ2NDZiMWEwOGFlNWY4ZDU5MDIzOTk/
2]
https://www.hybrid-analysis.com/sam...f2095659bcfbc034998e62688b8f9?environmentId=1
___
Fake 'QUICKBOOKS' SPAM - leads to malware
-
http://blog.dynamoo.com/2015/11/malware-spam-intuit-qb-quickbooks.html
Nov 30, 2015 - "This -fake- Intuit QuickBooks spam
leads to malware:
From: QUICKBOOKS ONLINE [qbservices@ customersupport .intuit .com]
Date: 30 November 2015 at 10:42
Subject: INTUIT QB
As of November 5th, 2015, we will be updating the browsers we support. We encourage you to upgrade to the latest version for the best online experience. Please proceed the following link, download and install the security update for all supported browsers to be on top with INTUIT online security!
InTuIT. | simplify the business of life
© 2015 Intuit Inc. All rights reserved. Intuit and QuickBooks are registered trademarks of Intuit Inc. Terms and conditions, features, support, pricing, and service options subject to change without notice.
Screenshot:
https://3.bp.blogspot.com/-jqzrc2_aW3Y/Vkyln1SIkyI/AAAAAAAAHYo/GOHMdVkAYWg/s400/intuit.png
The spam is almost identical to this one[1] which led to
Nymaim ransomware:
>
http://www.welivesecurity.com/2013/07/02/the-home-campaign-overstaying-its-welcome/
In this particular spam, the email went to a landing page at updates .intuitdataserver-1 .com/sessionid-7ec395d0628d6799669584f04027c7f6 which then attempts to download
a -fake- Firefox update*. This executable has a VirusTotal detection rate of 3/55**... The Hybrid Analysis report*** shows the
malware attempting to POST to mlewipzrm .in which is multihomed on:
89.163.249.75 (myLoc managed IT AG, Germany)
188.209.52.228 (BlazingFast LLC, Ukraine / NForce Entertainment, Romania)
95.173.164.212 (Netinternet Bilgisayar ve Telekomunikasyon San. ve Tic. Ltd. Sti., Turkey)
The nameservers for mlewipzrm .in are NS1 .REBELLECLUB .NET and NS2 .REBELLECLUB .NET which are hosted on the following IPs:
210.110.198.10 (KISTI, Korea)
52.61.88.21 (Amazon AWS, US) ...
As far as I can tell, these domains are hosted on the following IPs:
52.91.28.199 (Amazon AWS, US)
213.238.170.217 (Eksen Bilisim, Turkey)
75.127.2.116 (Foroquimica SL / ColoCrossing, US)
I recommend that you -block- the following IPs and/or domains:
52.91.28.199
213.238.170.217
5.135.237.209
196.52.21.11
75.127.2.116
210.110.198.10
52.61.88.21
89.163.249.75
188.209.52.228
95.173.164.212 ..."
(More listed at the dynamoo URL above.)
*
https://urlquery.net/report.php?id=1448887234353
**
https://www.virustotal.com/en/file/...78b5c6bd556fa37d7ca0a7b0/analysis/1448887362/
flashplayer19_ga_update
.exe - 3/55
***
https://www.hybrid-analysis.com/sam...544fd78b5c6bd556fa37d7ca0a7b0?environmentId=1
1]
http://blog.dynamoo.com/2015/11/mystery-intuit-quickbooks-spam-leads-to.html
___
Fake 'Message' SPAM - xls malware
-
http://myonlinesecurity.co.uk/messa...n-email-domain-excel-xls-spreadsheet-malware/
30 Nov 2015 - "An email with the subject of 'Message from mibser_00919013013' pretending to come from
scan@ your own email domain with
a malicious Excel XLS spreadsheet attachment is another one from the
current bot runs... The email has a totally -blank- body and just an XLS (Excel spreadsheet) attachment...
30 November 2015: Smibser_00915110211090
.xls - Current Virus total detections 4/55*
... Download’s
Dridex banking malware from
dalamantransferservicesrentacar .com/89u87/454sd
.exe (VirusTotal 1/54**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...8de7b4cc9584bb5c65106603/analysis/1448888284/
**
https://www.virustotal.com/en/file/...ef83c4af81e249ef67da91f4/analysis/1448889035/
TCP connections
94.73.155.12:
https://www.virustotal.com/en/ip-address/94.73.155.12/information/
191.234.4.50:
https://www.virustotal.com/en/ip-address/191.234.4.50/information/
___
Fake 'Invoice Attached' SPAM - doc/xls malware
-
http://myonlinesecurity.co.uk/invoi...td-word-doc-or-excel-xls-spreadsheet-malware/
30 Nov 2015 - "An email with the subject of 'Invoice Attached' pretending to come from random names, companies and email addresses with
a malicious word doc or Excel XLS spreadsheet attachment is another one from the
current bot runs... The email looks like:
Good morning,
Please see the attached invoice and remit payment according to the terms listed at the bottom of the invoice. If you have any questions please let us know.
Thank you!
Mr. Susie Weber
Accounting Specialist| USBank, GH Industrial Co., Ltd
30 November 2015: invoice_details_68171045
.xls - Current Virus total detections 1/55*
MALWR analysis** shows us that it downloads http ://gallinda28trudi .com/v12/free17ld
.exe (VirusTotal 3/55***) which is
a Nymain Ransomware as described by Dynamoo****... The
XLS macro drops/creates a UpdateWinrar
.js that instructs the victim’s computer to download the file & rename it as %temp%\UpdOffice
.exe then automatically run it, so making you think that it is an Office update if you see any alerts about the file running... DO NOT enable macros or editing, no matter how plausible the instructions appear to be:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/invoice_details_68171045_xls-1024x602.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...db7cef79352ff940e245b6d7/analysis/1448892567/
**
https://malwr.com/analysis/YTkzYjYxZGJiOTRhNDZjYjg2NGQ4ZDhiOGIxZjAyZjI/
Hosts:
31.184.234.5:
https://www.virustotal.com/en/ip-address/31.184.234.5/information/
***
https://www.virustotal.com/en/file/...78b5c6bd556fa37d7ca0a7b0/analysis/1448887816/
FlashPlayerUpdate
.exe
****
http://blog.dynamoo.com/2015/11/malware-spam-intuit-qb-quickbooks.html
___
Fake 'Sales Invoice' SPAM - malicious attachment
-
http://blog.dynamoo.com/2015/11/malware-spam-sales-invoice-opi599241.html
30 Nov 2015 - "This -fake- financial spam is not from James F Kidd, but is instead a simple -forgery- with
a malicious attachment:
From: orders@ kidd-uk .com
Date: 30 November 2015 at 13:42
Subject: Sales Invoice OP/I599241 For ANDSTRAT (NO.355) LTD
Please see enclosed Sales Invoice for your attention.
Regards from Accounts at James F Kidd
( email: accounts@ kidd-uk .com )
I have seen a single copy of this spam with an attachment invoice574206_1
.doc which has a VirusTotal detection rate of 3/55*. This Malwr report** indicates that in this case there may be an error in the
malicious macro. The Hybrid Analysis report is inconclusive. This document is presumably attempting to
drop the Dridex banking trojan...
UPDATE: I have received two more samples, one names invoice574206/1
.pdf and the other invoice574206/1
.doc. Both are Word documents (so the one with the PDF extension will not open). The VirusTotal detection rates are 7/54[3] and 4/55[4]. One of these two also produces an error when run. The working attachment (according to this Malwr report[5] and Hybrid Analysis report[6]) downloads
a malicious binary from:
bjdennehy .ie/~upload/89u87/454sd
.exe
This has a VirusTotal detection rate of 3/54[6]... Automated analysis tools... show malicious traffic to:
94.73.155.12 (Cizgi Telekomunikasyon Anonim Sirketi, Turkey)
103.252.100.44 (PT. Drupadi Prima, Indonesia)
89.108.71.148 (Agava Ltd, Russia)
91.223.9.70 (Elive Ltd, Ireland)
41.136.36.148 (Mauritius Telecom, Mauritius)
185.92.222.13 (Choopa LLC, Netherlands)
42.117.2.85 (FPT Telecom Company, Vietnam)
195.187.111.11 (Szkola Glowna Gospodarstwa Wiejskiego, Poland)
37.128.132.96 (Memset Ltd, UK)
37.99.146.27 (Etihad Atheeb Telecom Company, Saudi Arabia)
41.38.18.230 (TE Data, Egypt)
89.189.174.19 (Sibirskie Seti Novokuznetsk, Russia)
122.151.73.216 (M2 Telecommunications Group Ltd, Australia)
185.87.51.41 (Marosnet Telecommunication Company LLC, Russia)
217.197.159.37 (NWT a.s., Czech Republic)
41.56.123.235 (Wireless Business Solutions, South Africa)
91.212.89.239 (Uzinfocom, Uzbekistan)...
Recommended blocklist:
94.73.155.12
103.252.100.44
89.108.71.148
91.223.9.70
41.136.36.148
185.92.222.13
42.117.2.85
195.187.111.11
37.128.132.96
37.99.146.27
41.38.18.230
89.189.174.19
122.151.73.216
185.87.51.41
217.197.159.37
41.56.123.235
91.212.89.239 "
(More detail at the dynamoo URL above.)
*
https://www.virustotal.com/en/file/...169125bee5f6a31ccdef2a15/analysis/1448893229/
**
https://malwr.com/analysis/N2YwM2Q0YzU1OTk0NDRiN2FjNWVmNjUzNjQzYzc5ZTQ/
3]
https://www.virustotal.com/en/file/...b16d787914b5eacd994c2831/analysis/1448894274/
4]
https://www.virustotal.com/en/file/...f9d8104d3361c572dd85f541/analysis/1448894280/
5]
https://malwr.com/analysis/ZjMwYTdmMzBiMTVlNDM0ODg2ZWI2NmRlMDg5NWUyMzE/
6]
https://www.hybrid-analysis.com/sam...12409ef83c4af81e249ef67da91f4?environmentId=1
___
Fake 'Paypal' phish...
-
http://myonlinesecurity.co.uk/your-access-is-limited-modainpelle-com-paypal-phishing/
30 Nov 2015 - "An email saying 'Your Access Is Limited' coming from PayPal Team <scanner@ modainpelle .com>
While at first glance this appears to be a typical
PayPal phish, there are a few differences... There are a few major common subjects in a phishing attempt. Lots of them are either PayPal or your Bank or Credit Card, with a message saying some thing like:
• Your Access Is Limited
• Urgent: Your card has been stopped !
• There have been unauthorised or suspicious attempts to log in to your account, please verify
• Your account has exceeded its limit and needs to be verified
• Your account will be suspended !
• You have received a secure message from < your bank>
• We are unable to verify your account information
• Update Personal Information
• Urgent Account Review Notification
• We recently noticed one or more attempts to log in to your PayPal account from a foreign IP address
• Confirmation of Order
The original email looks like this. It will NEVER be a genuine email from PayPal or Your Bank so don’t ever follow the links or fill in the html (webpage) form that comes attached to the email.
The link in this case goes to http ://www .hocine1990.ehost-services239 .com/index/ ... This particular phishing campaign starts with an email with a link...
Screenshot:
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/modain_pelle_payapal_phish-1024x740.png
The website looks similar to this typical example of a PayPal phishing site:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/fake_paypal-site-1024x531.png
If you fill in the email address and password you get an intermediate page apologising for any inconvenience looking like:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/e_host_paypal_phish-1024x524.png
Then get sent on to a page looking like this one from an earlier PayPal Phish:
>
http://myonlinesecurity.co.uk/wp-content/uploads/2015/11/fake_paypal-site_2-1024x519.png
Which is a typical phishing page that looks very similar to a genuine PayPal update page,
if you don’t look carefully at the URL in the browser address bar. This one wants your personal details, your Paypal account log in details and your credit card and bank details. Many of them are also designed to specifically steal your email, facebook and other social network log in details..."
:fear::fear:
