SPAM frauds, fakes, and other MALWARE deliveries...

Fake 'FedEx/USPS' SPAM - updates, Sundown EK

FYI...

Fake 'FedEx/USPS' SPAM - updates
- https://myonlinesecurity.co.uk/spoofed-fedex-and-usps-kovter-and-locky-sites/
28 Dec 2016

29 December 2016: (Payload Security report[6]) Contacted Hosts (169)
cobycaresfoundation .org: 72.47.244.92: https://www.virustotal.com/en/ip-address/72.47.244.92/information/
dev.zodia-q .com: 153.121.37.174: https://www.virustotal.com/en/ip-address/153.121.37.174/information/
shark1.idhost .kz: 82.200.247.240: https://www.virustotal.com/en/ip-address/82.200.247.240/information/
italysfinestdesign .it: 217.72.102.152: https://www.virustotal.com/en/ip-address/217.72.102.152/information/
salutgaudi .com: 185.2.4.20: https://www.virustotal.com/en/ip-address/185.2.4.20/information/
zodia-q .com: 153.121.37.174: https://www.virustotal.com/en/ip-address/153.121.37.174/information/

/counter/?a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&m=2365622&i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA

/counter/?i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA&a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&r=01

> 2nd version today (Payload Security Report[7]) Contacted Hosts (7)

/counter/?=&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo&a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&r=01

/counter/?a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&m=4831333&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo

6] https://www.hybrid-analysis.com/sam...2e495ebf5f70a1d1ad499f608fc?environmentId=100

7] https://www.hybrid-analysis.com/sam...8c7bf3df120afe3fed52a9f42ef?environmentId=100
___

Updated Sundown EK ...
- http://blog.trendmicro.com/trendlab...dated-sundown-exploit-kit-uses-steganography/
Dec 29, 2016 - "... On December 27, 2016, we noticed that Sundown was updated... The PNG files weren’t just used to store harvested information; the malware designers now used -steganography- to hide their exploit code. The newly updated exploit kit was used by multiple-malvertising-campaigns to distribute malware. The most affected countries were Japan, Canada, and France, though Japanese users accounted for more than 30% of the total targets:
> https://blog.trendmicro.com/trendla...nce/files/2016/12/sundown-steganography-1.jpg
... previous Sundown versions directly connected victims to the Flash-exploit-file on their landing page. In this updated version, the exploit kit’s malvertisement creates a hidden iframe that automatically connects to the Sundown landing page. The page will retrieve and download a white PNG image. It then decodes the data in this PNG file to obtain additional malicious code... we found that it included the exploit code targeting CVE-2015-2419, a vulnerability in the JScript handling of Internet Explorer. A Flash exploit for CVE-2016-4117 is also retrieved by the exploit code. The landing page itself includes an exploit targeting another Internet Explorer (IE) vulnerability, CVE-2016-0189... The Sundown exploit kit exploits vulnerabilities in Adobe Flash and JavaScript, among others... Indicators of Compromise: The following domains were used by the Sundown Exploit kit with the matching IP addresses:
xbs.q30 .biz (188.165.163.228)
cjf.0340 .mobi (93.190.143.211)
The Chthonic sample has the following SHA1 hash:
c2cd9ea5ad1061fc33adf9df68eeed6a1883c5f9
The sample also used the following C&C server:
pationare .bit"

pationare .bit: 'Could not find an IP address for this domain name.'

188.165.163.228: https://www.virustotal.com/en/ip-address/188.165.163.228/information/

93.190.143.211: https://www.virustotal.com/en/ip-address/93.190.143.211/information/

:fear::fear: :mad:
 
Fake 'FTC' SPAM

FYI...

Fake 'FTC' SPAM - ransomware
- https://myonlinesecurity.co.uk/spoofed-ftc-consumer-complaint-notification/
3 Jan 2017 - "... an email with the subject of 'Consumer complaint notification' pretending to come from Federal Trade Commission <ftc.mvUJw@ ftc .gov.uk>... this is a ransomware version. Techhelplist* has kindly helped out and run the sample on a test system and got this very seasonal screenshot:
* https://twitter.com/Techhelplistcom/status/816316984371646469
... The domain “ftc .gov.uk” does -not- exist... The link-in-the-email goes to:
http ://govapego .com//COMPLAINT42084270.zip

Screenshot: https://i2.wp.com/myonlinesecurity.co.uk/wp-content/uploads/2017/01/ftc-1.png?resize=1024,574&ssl=1

3 January 2017: COMPLAINT42084270.zip: Extracts to: COMPLAINT.pdf.exe - Current Virus total detections 21/57*
Payload Security**..."
* https://www.virustotal.com/en/file/...55281f42b0a1de98d14644fa/analysis/1483458092/
COMPLAINT.pdf.exe

** https://www.hybrid-analysis.com/sam...e7a55281f42b0a1de98d14644fa?environmentId=100
Contacted Hosts
81.4.123.67: https://www.virustotal.com/en/ip-address/81.4.123.67/information/

govapego .com: 92.51.134.34: https://www.virustotal.com/en/ip-address/92.51.134.34/information/

:fear::fear: :mad:
 
Blockchain - phish

FYI...

Blockchain - phish
- https://myonlinesecurity.co.uk/verify-your-wallet-blockchain-phishing/
4 Jan 2017 - "... don’t ever click-the-link in the email. If you do it will lead you to a website that looks at first glance like the genuine Blockchain website but you can clearly see in the address bar, that it is fake. Some versions of this and similar phish will ask you fill in the html ( webpage) form that comes attached to the email. The link-in-the-email goes to
http:// 178.33.66.249 /~kudi/admin/blockchain/info/login.php .. which is an OVH German server..

Screenshot: https://i2.wp.com/myonlinesecurity....ds/2017/01/blockchain1.png?fit=1361,998&ssl=1

If you follow through, all they want is your email address and password but none of the other information that these phishing scams usually ask for:
> https://i2.wp.com/myonlinesecurity....2017/01/blockchain2.png?resize=1024,758&ssl=1 .."

178.33.66.249: https://www.virustotal.com/en/ip-address/178.33.66.249/information/
> https://www.virustotal.com/en/url/5...8e6f169ab764ccf5f6f64f1a042707ef706/analysis/
Detection: 5/68

:fear::fear: :mad:
 
Fake 'New Invoice' SPAM, Tech support SCAM on Macs

FYI...

Fake 'New Invoice' SPAM - Cerber ransomware
- https://myonlinesecurity.co.uk/new-invoice-2768-16-malspam-delivers-cerber-ransomware/
5 Jan 2017 - "... an email with the subject of 'New Invoice #2768-16'... pretending to come from what I assume are random companies, names and email addresses with a zip attachment containing a js file that eventually delivers Cerber ransomware... One of the emails looks like:
From: Janie Cain <asgard1234@ post .su>
Date:Thu 05/01/2017 17:25
Subject: New Invoice #2768-16
Attachment: info-inv.zip
This email is being sent in order to inform you that a new invoice has been generated for your account.
Please see the file that is attached.
The file is password protected to protect your information.
The password is 123456
Thank you.
Janie Cain


5 January 2017: info-inv.zip: Extracts to: info-inv.js - Current Virus total detections 12/54*
... Analysis by techhelplist[1] has found it to deliver Cerber ransomware. It downloads from 86.106.131.141 /10.mov which is a renamed .exe file that if you try to run manually would open windows media player instead, although the script file will run it successfully (VirusTotal 3/45**) (Payload Security ***) (MALWR [4]). This Cerber version contacts -576- hosts... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://twitter.com/Techhelplistcom/status/817105275580772353

* https://www.virustotal.com/en/file/...91d94d78c5845e3b40092c34/analysis/1483646751/

** https://virustotal.com/en/file/a784...9639ae08a24b38152169509511b8d0642bb/analysis/

*** https://www.hybrid-analysis.com/sam...a24b38152169509511b8d0642bb?environmentId=100
Contacted Hosts (576)

4] https://malwr.com/analysis/MTQ2NTI1ZjNjOTIxNDI0Mzk4ZDczOWYzMTg5NjBhOGI/

86.106.131.141: https://www.virustotal.com/en/ip-address/86.106.131.141/information/
> https://www.virustotal.com/en/url/9...fdfec770590c58b7f7853702439c2acf181/analysis/
___

Tech support SCAM - DoS on Macs
- https://blog.malwarebytes.com/101/m...page-attempts-denial-of-service-via-mail-app/
Jan 5, 2017 - "... yet another 'technique' that targets Mac OS users running Safari... second variant appears to still be capable of opening up iTunes, without any prompt in Safari... IOCs:
safari-get[.]com: Could not find an IP address for this domain name
safari-get[.]net: 111.118.212.86: https://www.virustotal.com/en/ip-address/111.118.212.86/information/
> https://www.virustotal.com/en/url/4...7fbab339f1063cb94c8ddcec0f90c229831/analysis/
safari-serverhost[.]com: Could not find an IP address for this domain name
safari-serverhost[.]net: 111.118.212.86 "

:fear::fear: :mad:
 
Last edited:
Merry X-Mas Ransomware, Fake 'Apple' SPAM

FYI...

Merry X-Mas Ransomware
- https://isc.sans.edu/diary.html?storyid=21905
2017-01-09 - "... Merry X-Mas Ransomware was first reported as distributed through malicious spam (malspam) disguised as FTC consumer complaints*...
* https://myonlinesecurity.co.uk/spoofed-ftc-consumer-complaint-notification/
3 Jan 2017
By Sunday 2017-01-08, I saw an updated version of the Merry X-Mas Ransomware distributed through malspam disguised as 'court attendance' notifications. The malspam was a -fake- notification to appear in court. Email headers indicate the sender's address was -spoofed- and the email came from a cloudapp .net domain associated with Microsoft:
> https://isc.sans.edu/diaryimages/images/2017-01-09-ISC-diary-image-02.jpg
The -link- from the malspam downloaded a zip archive. The zip archive contained a Microsoft Word document with a malicious macro. If macros were enabled on the Word document, it downloaded and executed the ransomware.
Flow chart of the infection process:
> https://isc.sans.edu/diaryimages/images/2017-01-09-ISC-diary-image-03.jpg
... IoCs follow:
192.185.18.204 port 80 - neogenomes .com - GET /court/PlaintNote_12545_copy.zip [initial zip download]
81.4.123.67 port 443 - onion1 .host:443 - GET /temper/PGPClient.exe [ransomware binary]
168.235.98.160 port 443 - onion1 .pw - POST /blog/index.php [post-infection callback]
... Malspam with links to malware is a common threat. This is not an unusual method of malware distribution, and its holiday theme also fits the season... Still, we need to keep an ongoing dialog to promote awareness of this and other ransomware threats. Too many people continue to fall for it..."
(More detail at the isc URL above.)

192.185.18.204: https://www.virustotal.com/en/ip-address/192.185.18.204/information/

81.4.123.67: https://www.virustotal.com/en/ip-address/81.4.123.67/information/

168.235.98.160: https://www.virustotal.com/en/ip-address/168.235.98.160/information/
___

Fake 'Apple' SPAM - links to malware
- https://myonlinesecurity.co.uk/spoo...ty-checks-malspam-delivers-cerber-ransomware/
9 Jan 2016 - "... an email with the subject of 'Apple latest security checks' pretending to come from Support@ App .com... Link goes to ‘http ://bellinghamontap .com/apple.zip’... Attachment: Link in email...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/Apple-latest-security-check-1024x666.png

9 January 2017: apple.zip: Extracts to: apple.exe - Current Virus total detections 4/56*
Payload Security**. I am guessing from this report it is Cerber ransomware, by the number of IP addresses it contacts... The basic rule is NEVER open any attachment to an email -or- click-a-link in an email unless you are expecting it...."
* https://www.virustotal.com/en/file/...78582b3f20d37c838c42c6c4297b9ca8b7f/analysis/

** https://www.hybrid-analysis.com/sam...20d37c838c42c6c4297b9ca8b7f?environmentId=100
Contacted Hosts (576)

bellinghamontap .com: 192.254.185.196: https://www.virustotal.com/en/ip-address/192.254.185.196/information/
> https://www.virustotal.com/en/url/7...f8240299296128bfde5b98f4c825c96007e/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Certificate UPDATE' SPAM, Ransom Victims Who-Pay-Up Get-Stiffed

FYI...

Fake 'Certificate UPDATE' SPAM - delivers Trickbot
- https://myonlinesecurity.co.uk/spoo...tor-malspam-delivers-trickbot-banking-trojan/
10 Jan 2017 - "... an email with the subject of 'Certificate UPDATE' pretending to come from Administrator at your-own-email-address delivers Trickbot banking Trojan... One of the emails looks like:
From: Administrator <Administrator@ victim domain .tld >
Date: Tue 10/01/2017 01:25
Subject: Certificate UPDATE
Attachment: certificate.zip
**********Important – Internal ONLY**********
Your Web mail account Certificate is about to expire. Please update it.
New Certificate is in attachment. Download and launch file.
Certificate details:
Filename: Certificate.crt
Key: 6260-6233-GFPV-6072-UAAV-1048
Domain: ...
MX record: ...


10 January 2017: certificate.zip: Extracts to: Certificate_webmail.scr - Current Virus total detections 15/57*
Payload Security**... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...117e6d7c6ef931ab0b5fa720/analysis/1484029988/

** https://www.hybrid-analysis.com/sam...d1c117e6d7c6ef931ab0b5fa720?environmentId=100
Contacted Hosts
78.47.139.102
36.37.176.6
201.236.219.180
144.76.203.79

___

Extortionists Wipe Databases, Victims Who-Pay-Up Get-Stiffed
- https://krebsonsecurity.com/2017/01...-of-databases-victims-who-pay-up-get-stiffed/
Jan 10, 2017 - "Tens of thousands of personal and possibly proprietary databases that were left accessible to the public online have just been -wiped- from the Internet, replaced with ransom-notes demanding payment for the return of the files. Adding insult to injury, it appears that virtually none-of-the-victims (who) have paid the ransom have gotten-their-files-back because multiple-fraudsters are now wise to the extortion attempts and are competing to replace-each-other’s-ransom notes.
At the eye of this developing data destruction maelstrom is an online database platform called MongoDB. Tens of thousands of organizations use MongoDB to store data, but it is easy to misconfigure and leave the database exposed online. If installed on a server with the default settings, for example, MongoDB allows anyone to browse the databases, download them, or even write over them and delete them..."
Shodan, a specialized search engine designed to find things that probably won’t be picked up by Google, lists the number of open, remotely accessible MongDB databases available as of Jan. 10, 2017
> https://krebsonsecurity.com/wp-content/uploads/2017/01/shodanmongo.png
... Truth 1: “If you connect it to the Internet, someone will try to hack it.”
Truth 2: “If what you put on the Internet has value, someone will invest time and effort to steal it.”
Truth 3: “Organizations and individuals unwilling to spend a small fraction of what those assets are worth to secure them against cybercrooks can expect to eventually be relieved of said assets.”
(More detail at the 1st krebsonsecurity URL at the top.)

:fear::fear: :mad:
 
Last edited:
Fake 'Document', Neutrino Bot SPAM

FYI...

Fake 'Document' SPAM - delivers Trickbot
- https://myonlinesecurity.co.uk/docu...l-address-delivers-trickbot-banking-trojan-2/
11 Jan 2017 - "An email with the subject of 'Document from Vogel' (random name) pretending to come from the same random name at your-own-email-address with a malicious word doc attachment delivers Trickbot banking Trojan... The email looks like:
From: Michael Vogel <Michael.Vogel@ victim domain .tld >
Date: Wed 11/01/2017 06:59
Subject: Document from Vogel
To: admin@victim domain.tld + 9 other names at my domain
Attachment: Vogel_1101_30.doc
My company sent you a document. Check it attached.
Regards,
Michael Vogel
G8 Education Limited


11 January 2017: Vogel_1101_30.doc - Current Virus total detections 9/55*
Payload Security** shows a download of what pretends to be a png (image file) but is actually a renamed .exe file from ‘http ://artslogan .com.br/images/jhfkjsdhfntnt.png’ which is renamed by the script to yatzxwe.exe and automatically run (VirusTotal 12/57***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...10d8f87d9e021fe8a505e369/analysis/1484121516/

** https://www.hybrid-analysis.com/sam...8d110d8f87d9e021fe8a505e369?environmentId=100
Contacted Hosts
189.1.168.176
78.47.139.102
36.37.176.6
201.236.219.180
144.76.203.79


*** https://www.virustotal.com/en/file/...d7038ffcd0e3736119d37be2/analysis/1484091723/
___

Post-holiday spam campaign delivers Neutrino Bot
- https://blog.malwarebytes.com/cybercrime/2017/01/post-holiday-spam-campaign-delivers-neutrino-bot/
Jan 11, 2017 - "During the Christmas season and early into the new year, we noticed a sharp decrease in spam volume, perhaps as online criminals took a break from their malicious activities and popped the champagne to celebrate. It could also have been a time to regroup and plan new strategies for the upcoming year... over the weekend we observed a large new campaign purporting to be an email from ‘Microsoft Security Office’ with a link to a full security report (Microsoft.report.doc). This was somewhat unexpected, as typically the malicious Office files are directly attached to the email. Instead, the files are hosted on various servers with a short time to live window:
> https://blog.malwarebytes.com/wp-content/uploads/2017/01/email.png
The booby-trapped document asks users to enable-macros in order to launch the malicious code:
> https://blog.malwarebytes.com/wp-content/uploads/2017/01/macro_blocked.png
If the macro executes, the final payload will be downloaded and executed. This is Neutrino bot..."
IOCs:
Malicious doc:
agranfoundation[.]org/Microsoft[.]report[.]doc: 192.185.77.168
xn--hastabakc-2pbb[.]net/Microsoft[.]report[.]doc: 176.53.17.106
ecpi[.]ro/Microsoft[.]report[.]doc: 89.42.223.64
ilkhaberadana[.]com/Microsoft[.]report[.]doc: 159.253.46.194
cincote[.]com/Microsoft[.]report[.]doc: 192.185.145.46
mallsofjeddah[.]com/Microsoft[.]report[.]doc: 192.185.191.165
dianasoligorsk[.]by/Microsoft[.]report[.]doc: 178.124.131.21
8dd66dd191c9f0d2f4b5407e5d94e815e8007a3de21ab16de49be87ea8a92e8d
Neutrino bot:
www .endclothing [.]cu[.]cc/nn.exe: 137.74.93.42
87b7e57140e790b6602c461472ddc07abf66d07a3f534cdf293d4b73922406fe
b1ae6fc1b97db5a43327a3d7241d1e55b20108f00eb27c1b8aa855f92f71cb4b
ca64848f4c090846a94e0d128489b80b452e8c89c48e16a149d73ffe58b6b111

:fear::fear: :mad:
 
Last edited:
Fake 'MoneyGram' SPAM, 'Phishy' tweets, Indian tech support SCAMS

FYI...

Fake 'MoneyGram' SPAM - delivers Java Jacksbot
- https://myonlinesecurity.co.uk/spoofed-moneygram-urgent-request/
12 Jan 2017 - "... fake financial themed emails containing java adwind or Java Jacksbot attachments...previously mentioned... HERE*....
* https://myonlinesecurity.co.uk/?s=java+adwind
... This version is slightly unusual... has a html attachment with -links- for you to download the file yourself.

Screenshot: https://myonlinesecurity.co.uk/wp-c...nt-Request-of-Payment-Confirmation-email-.png

If you are unwise enough to open the html -attachment- you see a webpage looking like this:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/Urgent-Request-of-Payment-Confirmation.png
The page tries to automatically download the zip file, if that doesn’t work then the download button appears. That goes to http ://dreamsbroker .com/Requested%20Missing-Confirmation%20of%20payment.zip which extracts to 2 identical but differently named java.jar files. Received documents And Customers identification.jar and Request Missing Transaction Details and Refrence.jar

12 January 2017: Received documents And Customers identification.jar (323kb) - Current Virus total detections 24/55*
Payload Security**. These malicious attachments have a password stealing component, with the aim of stealing your bank, PayPal or other financial details along with your email or FTP ( web space) log in credentials. Many of them are also designed to specifically steal your Facebook and other social network log in details... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...c59e5048ae9ee944bd84d443/analysis/1484201418/

** https://www.hybrid-analysis.com/sam...63cc59e5048ae9ee944bd84d443?environmentId=100
Contacted Hosts
83.243.41.200

dreamsbroker .com: 180.235.148.70: https://www.virustotal.com/en/ip-address/180.235.148.70/information/
___

'Phishy' sponsored tweets
- https://blog.malwarebytes.com/cybercrime/2017/01/more-phishy-sponsored-tweets/
Jan 12, 2016 - "Another day, another couple of rogue sponsored tweets [1], [2] which lead to phishing:
1] https://blog.malwarebytes.com/cybercrime/2016/10/promoted-tweet-leads-to-credit-card-phishing/
2] https://www.scmagazineuk.com/crimin...ith-twitter-verification-scam/article/629182/
The account pushing the first phish has now been deleted, but it’s trivial to set up another one – and the phishing URL itself is -still- active, ready to be redeployed at a moment’s notice... site is located at
verifiedaccounts(dot)us
and – like the older versions of this scam – is all about getting yourself verified:
> https://blog.malwarebytes.com/wp-content/uploads/2017/01/sponsored-phish1.jpg
The site kicks things off by asking for username, email address, account type, phone number, year of account creation, and (finally) associated password. It’s not long before they’re sniffing around your wallet, too:
> https://blog.malwarebytes.com/wp-content/uploads/2017/01/sponsored-phish2.jpg
... We strongly advise all users of Twitter to be on their guard – just because a tweet is sponsored, doesn’t mean the content it leads to is legitimate. Be on your guard and don’t hand over login details, payment credentials, or anything else to sites -claiming- they can get you verified."

verifiedaccounts(dot)us: 192.185.128.203: https://www.virustotal.com/en/ip-address/192.185.128.203/information/
> https://www.virustotal.com/en/url/a...eec64f1f8b434fa3d4e84534d559caa3883/analysis/
Detection ratio: 10/68
___

More Indian tech support SCAMS
- http://blog.dynamoo.com/2017/01/scam-01254522444-fake-bt-engineer-and.html
12 Jan 2017 - "... huge upsurge in the number of Indian tech support scammers ringing, both at home and my place of work. For example.. this:
One common trick they use revolves around this hexadecimal number 888DCA60-FC0A-11CF-8F0F-00C04FD7D062. Either it's a signal that hackers are at your PC, or it's your secret router ID that only BT would know. The conversation goes something like this..
Victim: "But I don't get my internet from BT.."
Scammer: "BT provides all the internet connections for everyone else, including TalkTalk and Virgin Media."
Victim: "How do I know you're from BT?
Scammer: "There is a confidential Router ID that only BT will know. You can verify this to prove that we are BT."
The scammer then talks the victim through pressing -R then CMD (followed by OK) and then ASSOC (followed by RETURN). That simply produces a list of file associations (e.g. to say that .xlsx is an Excel spreadsheet). The line they want you to see is:
.ZFSendToTarget=CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}
This is just something to do with how Windows handles compressed files and folders. All Windows machines should have this entry, but it looks sufficiently scary about to impress at least some victims.
>> NEVER GIVE THESE PEOPLE ACCESS TO YOUR PC.
However, if you want to waste their time please do so.. if you work in IT you can probably play a convincingly dumb user. It seems that they will try for up to 40 minutes or so before they give up. Alternatively, say that you have to get your laptop out from somewhere and it is very slow and just put them on hold. Every minute of their time you can waste will stop them targeting other potential victims. And don't just ignore the call - report it. If you are in the UK you can report this sort of -scam- to Action Fraud* - it will certainly help law enforcement if they have an idea of how many potential victims there are."
* http://www.actionfraud.police.uk/report_fraud

:fear::fear: :mad:
 
Last edited:
Fake blank-body/no-subject SPAM

FYI...

Fake blank-body/no-subject SPAM - delivers Cerber
- https://myonlinesecurity.co.uk/empty-blank-email-asisianu-delivers-cerber-ransomware/
15 Jan 2017 - "I have been seeing these emails sporadically for the last month or so, but all previous versions have been corrupt... today’s actually has a working zip file. These arrive as a blank/empty email with no-subject pretending to come from asisianu@ pauleycreative .co.uk with a zip file containing a malicious word doc. They all actually come from asisianu at random email addresses, sometimes they spoof your-own-email-address, but always the 'From' address in the email is asisianu@pauleycreative .co.uk. This is Cerber ransomware... The email looks like:
From: asisianu@ pauleycreative .co.uk
Date: Sun 15/01/2017 06:54
Subject: none
Attachment: EMAIL_31327_info.zip


Body content: Totally empty/blank

15 January 2017: 12412.doc - Current Virus total detections 9/56*. Payload Security** shows a download from
http ://coolzeropa .top/admin.php?f=0.dat which is renamed by the script to rcica.exe (VirusTotal 7/58**).
This also drops a full screen set of instructions on how to decrypt and pay the ransom:
_HOW_TO_DECRYPT_CDF8WC_.hta ... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...12dab8ab1f7002c97b8b5788/analysis/1484469048/

** https://www.hybrid-analysis.com/sam...76e12dab8ab1f7002c97b8b5788?environmentId=100
Contacted Hosts (577)

*** https://www.virustotal.com/en/file/...ea65f024e4bd0059659024d7/analysis/1484469369/

coolzeropa .top: 35.161.229.79: https://www.virustotal.com/en/ip-address/35.161.229.79/information/
84.200.34.99: https://www.virustotal.com/en/ip-address/84.200.34.99/information/

:fear::fear: :mad:
 
Blank-emails no-subject SPAM

FYI...

Blank-emails no-subject SPAM - deliver Locky and Kovter
- https://myonlinesecurity.co.uk/blank-emails-with-no-subject-delivering-locky-and-kovter/
17 Jan 2017 - "... We are starting to see Locky, Kovter delivery emails trickling in this morning. The sites and payloads are the same as described in this post:
> https://myonlinesecurity.co.uk/spoofed-fedex-and-usps-kovter-and-locky-sites/
It looks like the Locky gangs are gearing up for a mass malspam, but are getting the delivery systems fine tweaked and having a few problems. We always see errors and problems before a mass Locky onslaught. If they keep to the sites they have been using for the last month or so, it will be relatively easy to track them & block malware. The emails received so far today are totally-blank, no-subject. The zip attachment extracts to another zip before extracting to a supposedly .jse file. However these are not encoded javascript. They are just minimally obfuscated, in fact perfectly readable by a human:
From: charlie.wills@ 02glass .com
Date: Mon 16/01/2017 23:30 (arrived 07:35 utc 17/01/2017)
Subject: blank


Attachment: 38168891.zip extracts to 38168891.doc.zip extracts to 38168891.doc.jse
VirusTotal 5/54* | Payload Security**
Payload:
1bin Locky: https://www.virustotal.com/en/file/...3633c0c6c57833e4b6d5d618/analysis/1484631951/
File name: a1.exe / Detection: 16/55

2.bin Kovter:
https://www.virustotal.com/en/file/...9cbc4e93a802ae4b0359d965/analysis/1484642102/
File name: 2.bin / Detection: 12/56

* https://www.virustotal.com/en/file/...3d08c03eb1a71ea8dae5eb59/analysis/1484641911/

** https://www.hybrid-analysis.com/sam...27f3d08c03eb1a71ea8dae5eb59?environmentId=100
Contacted Hosts (171)

:fear::fear: :mad:
 
Fake 'ACH', 'signature required' SPAM

FYI...

Fake 'ACH' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/spoo...on-case-no-malspam-delivers-locky-ransomware/
18 Jan 2017 - "... an email spoofing ACH (Automated Clearing House) with the subject of 'Blocked Transaction Case No 255275283' coming or pretending to come from random companies, names and email addresses with rar attachment extracting to a very heavily obfuscated .JS file delivers Locky ransomware after a long convoluted download system... One of the emails looks like:
From: Eufemia Quintyne <xefiuza03040150@ photogra .com>
Date: Wed 18/01/2017 14:08
Subject: Blocked Transaction. Case No 255275283
Attachment: doc_details.rar
The Automated Clearing House transaction (ID: 058133683), recently initiated
from your online banking account, was rejected by the other financial
institution.
Canceled ACH transaction
ACH file Case ID 04123240
Transaction Amount 1624.05 USD ...


18 January 2017: doc_details.rar: Extracts to: doc_details.js - Current Virus total detections 7/54*
Payload Security** shows it drops another .js file (Payload Security ***) (VirusTotal 7/53[4]) which in turn downloads Locky ransomware from unwelcomeaz .top/2/56.exe (VirusTotal 9/55[5])... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...712a9c54d5442dbc0d5f2056/analysis/1484760601/

** https://www.hybrid-analysis.com/sam...75f712a9c54d5442dbc0d5f2056?environmentId=100

*** https://www.hybrid-analysis.com/sam...6d57ebe5fdbdebce79dcc4aae6f?environmentId=100
35.164.68.81
91.237.247.24
194.31.59.5
52.88.7.60
35.161.88.115


4] https://www.virustotal.com/en/file/...7ebe5fdbdebce79dcc4aae6f/analysis/1484757035/

5] https://www.virustotal.com/en/file/...ea5f0c8e7009f6cc7087e1f7/analysis/1484758078/

unwelcomeaz .top: 35.164.68.81: https://www.virustotal.com/en/ip-address/35.164.68.81/information/
54.149.186.25: https://www.virustotal.com/en/ip-address/54.149.186.25/information/
___

Fake 'signature required' SPAM - delivers hancitor
- https://myonlinesecurity.co.uk/spoofed-signature-required-on-the-contract-delivers-hancitor/
18 Jan 2017 - "An email pretending to come from a firm of -lawyers- with the subject of 'RE: settlement' pretending to come from a random firm of lawyers with a link-that-downloads a malicious word doc delivers hancitor [1]...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/bracewell.png

18 January 2017: contract_submit.doc - Current Virus total detections 3/53*. Payload Security**...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.fireeye.com/blog/threat-research/2016/09/hancitor_aka_chanit.html

* https://www.virustotal.com/en/file/...6397e70a691731ab2cc453cd/analysis/1484759676/

** https://www.hybrid-analysis.com/sam...6866397e70a691731ab2cc453cd?environmentId=100
Contacted Hosts
23.23.117.228
109.120.170.116
188.212.255.49
78.47.141.185


:fear::fear: :mad:
 
Last edited:
Fake 'Insolvency Service' SPAM, Twitter accts compromised

FYI...

Fake 'Insolvency Service' SPAM - delivers Cerber
- http://blog.dynamoo.com/2017/01/malware-spam-insolvency-service.html
19 Jan 2017 - "This malware spam in unusual in many respects. The payload may be some sort of ransomware (UPDATE: this appears to be Cerber ).

Screenshot: https://3.bp.blogspot.com/-CvAb-Wcw...1M8qP5VMHXIT8GpKcwtgCLcB/s1600/insolvency.png

Sample subjects are:
LSV 354EMPU31 - Investigations Inquiry Reminder
JXI 647TESR39 - Investigations Inquiry Reminder
SHV 622WYXP68 - Investigations Inquiry Notice
QPY 661APWZ41 - Investigations Inquiry Notice
FHF 338SYBV85 - Investigations Inquiry Notice
EGY 318NHAR12 - Investigations Inquiry Notification
IZJ 296CNWP92 - Investigations Inquiry Notice
All the senders I have seen come from the chucktowncheckin .com domain. Furthermore, all of the sending servers are in the same /24: 194.87.216.* .. All the servers have names like kvm42.chapelnash .com in a network block controlled by Reg .ru in Russia. The link-in-the-email goes to some hacked WordPress site or other, then ends up on a subdomain of uk-insolvencydirect .com e.g. 2vo4 .uk-insolvencydirect .com/sending_data/in_cgi/bbwp/cases/Inquiry.php - this is a pretty convincing looking page spoofing the UK government, asking for a CAPTCHA to download the files:
> https://3.bp.blogspot.com/-qn0cYVJb...oSs17T8hRW54qbPkaSwCLcB/s1600/gov-uk-fake.png
Entering the CAPTCHA downloads a ZIP file (e.g. 3d6Zy.zip) containing a malicious Javascript (e.g. Inquiry Details.js)... Hybrid Analysis* of the script is rather interesting, not least because it performs NSLOOKUPs against OpenDNS servers (which is a really weird thing to do give that OpenDNS is a security tool). The script downloads a component from www .studiolegaleabbruzzese .com/wp-content/plugins/urxwhbnw3ez/flight_4832.pdf and then drops an EXE with an MD5 of e403129a69b5dcfff95362738ce8f241 and a detection rate of 5/53**. Narrowing the Hybrid Analysis down to just the dropped EXE, we can see these peculiar OpenDNS requests as the malware tries to reach out to:
soumakereceivedthiswith .ru (176.98.52.157 - FLP Sidorenko Aleksandr Aleksandrovich, Russia)
sectionpermiathefor .ru (151.0.42.255 - Online Technologies, Ukraine)
programuserandussource .ru (does not resolve)
maytermsmodiall .ru (does not resolve)
... I recommend that you block email traffic from:
194.87.216.0/24
-and- block web traffic to
uk-insolvencydirect .com
studiolegaleabbruzzese .com
176.98.52.157
151.0.42.255
"
* https://www.hybrid-analysis.com/sam...86b5f8faf346e860b1d2b41309e?environmentId=100
Contacted Hosts
62.149.142.206
208.118.235.148
208.67.222.222
5.58.153.190


** https://virustotal.com/en/file/ff06...c264263786b5f8faf346e860b1d2b41309e/analysis/
___

Verified Twitter accounts compromised ...
- https://blog.malwarebytes.com/cyber...itter-accounts-compromised-get-busy-spamming/
Jan 18, 2017 - "Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. In theory, it should be somewhat tricky to compromise those accounts – it wouldn’t really help Twitter if their theoretically appealing verified accounts were firing out Viagra spam all day long. Brand reputation and all that. And yet…in the space of a few hours last week, we had multiple verified users hitting the 'I’ve been compromised' wall of doom and gloom... 'rogue tweets' were, in theory, being sent to a combined audience of around 200,000+ people which could have been disastrous if the links had contained malicious files. Thankfully, these links were “just” porn spam and sunglasses, but the danger for something much worse is always present where a compromise is concerned. People trust the verified ticks in the same way they probably let their guard down around sponsored tweets, and in both cases a little trust can be a bad thing... scammers are doing it, always pay attention when your favorites start firing out URLs. Links are meant to be clicked, but that doesn’t mean we have to leap before looking – Twitter works best with shortened URLs, but you can usually see where they lead:
> https://blog.malwarebytes.com/cybercrime/2015/09/obfuscated-urls-where-is-that-link-taking-you/
Whether you’re verified or not, keep your wits about you and have a hopefully stress free experience on that most popular of social networks."

:fear::fear: :mad:
 
Last edited:
Fake 'Western Union' SPAM

FYI...

Fake 'Western Union' SPAM - delivers java Adwind/Jacksbot
- https://myonlinesecurity.co.uk/spoo...for-all-agents-delivers-java-adwind-jacksbot/
20 Jan 2017 - "... -fake- financial themed emails containing java adwind or Java Jacksbot attachments. I have previously mentioned many of these HERE:
> https://myonlinesecurity.co.uk/?s=java+adwind
The email looks like:
From: WU-IT Department <csc.it.westernunion@ gmail .com>
Date: Fri 20/01/2017 02:02
Subject: WUPOS Agent Portal Upgrade For All Agents
Attachment: Update Manual & Agent Certificate .pdf
Dear All,
Western Union ,IT Department data is posting upgrade for new version of WUPOS.Please download attachment by clicking the link.as seen below, run the file and go ahead of checking western union intermediate screen
Before doing that please read directives in attachments then map the Western Union user ID in the Symex application and proceed. Please let me know if you face any issue. Thanks & Regards, IT Department Western Union Internet United Kingdom PO Box 8252 London United Kingdom W6 0BX..."


Screenshot: https://myonlinesecurity.co.uk/wp-c...Agent-Portal-Upgrade-For-All-Agents-email.png

The attached PDF looks like:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/wupos_pdf.png

The link-in-the-PDF is to http ://phrantceena .com/wp-content/plugins/Update%20Manual%20&%20Agent%20Certificate%20.zip which will give you -2- identical (although named differently) java.jar files. Agent certificate & branch details..jar and Wupos manual and update file..jar ..

20 January 2017: Agent certificate & branch details..jar (323kb) Current Virus total detections 26/55*
Payload Security **... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5d7b63a63b30a8f365d6d2b1/analysis/1484897128/

** https://www.hybrid-analysis.com/sam...30c5d7b63a63b30a8f365d6d2b1?environmentId=100
Contacted Hosts
83.243.41.200

phrantceena .com: 66.147.244.127: https://www.virustotal.com/en/ip-address/66.147.244.127/information/

:fear::fear: :mad:
 
Sage 2.0 ransomeware

FYI...

Sage 2.0 ransomeware
- https://isc.sans.edu/diary.html?storyid=21959
2017-01-21 - "On Friday 2017-01-20, I checked a malicious spam (malspam) campaign that normally distributes Cerber ransomware. That Friday it delivered ransomware I'd never seen before called 'Sage'. More specifically, it was 'Sage 2.0'... Sage is yet another family of ransomware in an already crowded field. It was noted on BleepingComputer forums back in December 2016 [1, 2]...
1] https://www.bleepingcomputer.com/forums/t/634978/sage-file-sample-extension-sage/

2] https://www.bleepingcomputer.com/forums/t/634747/sage-ransomware-sage-support-help-topic/

... Emails from this particular campaign generally have -no- subject lines, and they always have -no- message text. The only content is a zip attachment containing a Word document with a malicious macro that downloads and installs ransomware. Sometimes, I'll see a .js file instead of a Word document, but it does the same thing... attachments are often double-zipped. They contain -another- zip archive before you get to the Word document or .js file...
Example of a Word document with a malicious macro:
> https://isc.sans.edu/diaryimages/images/2017-01-21-ISC-diary-image-05.jpg
Another example of the Word document with a malicious macro:
> https://isc.sans.edu/diaryimages/images/2017-01-21-ISC-diary-image-06.jpg
The Word document macros or .js files are designed to download and install ransomware. In most cases on Friday, the ransomware was Sage 2.0... Under default settings, an infected Windows 7 host will present a UAC window before Sage continues any further. It keeps appearing until you click 'yes':
UAC pop-up caused by Sage: https://isc.sans.edu/diaryimages/images/2017-01-21-ISC-diary-image-12.jpg
The infected Windows host has an image of the decryption instructions as the desktop background. There's also an HTML file with the same instructions dropped to the desktop. The same HTML file is also dropped to any directory with encrypted files. ".sage" is the suffix for all encrypted files:
Desktop of an infected Windows host: https://isc.sans.edu/diaryimages/images/2017-01-21-ISC-diary-image-13.jpg
... Following the decryption instructions should take you to a Tor-based domain with a decryptor screen. On Friday, the cost to decrypt the files was $2,000 US dollars (or 2.22188 bitcoin):
The Sage 2.0 decryptor: https://isc.sans.edu/diaryimages/images/2017-01-21-ISC-diary-image-15.jpg
... When the callback domains for Sage didn't resolve in DNS, the infected host sent UDP packets sent to over 7,000 IP addresses...
Below are IOCs for Sage 2.0 from Friday 2017-01-20:
Ransomware downloads caused by Word document macros or .js files:
54.165.109.229 port 80 - smoeroota .top - GET /read.php?f=0.dat
54.165.109.229 port 80 - newfoodas .top - GET /read.php?f=0.dat
84.200.34.99 port 80 - fortycooola .top - GET /user.php?f=0.dat
Post-infection traffic:
54.146.39.22 port 80 - mbfce24rgn65bx3g .er29sl .in - POST /
66.23.246.239 port 80 - mbfce24rgn65bx3g .er29sl .in - POST /
mbfce24rgn65bx3g .rzunt3u2 .com (DNS queries did not resolve)
Various IP addresses, UDP port 13655 - possible P2P traffic...
... not sure how widely-distributed Sage ransomware is. I've only seen it from this one malspam campaign, and I've only seen it one day so far. I'm also not sure how effective this particular campaign is. It seems these emails can easily be -blocked- so few end users may have actually seen Sage 2.0. Still, Sage is another name in the wide variety of existing ransomware families. This illustrates how profitable ransomware remains for cyber criminals..."
(More detail at the isc URL at the top of this post.)

:fear::fear: :mad:
 
Fake 'Tiket alert' SPAM

FYI...

Fake 'Tiket alert' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/spoofed-fbi-tiket-alert-delivers-locky-ransomware/
23 Jan 2017 - "An email spoofing the FBI with the subject of 'Tiket alert 331328222' pretending to come from random senders with a malicious word doc downloads locky ransomware... The email looks like:
From: Ngoc Trane <dpeupyl0386@ eiv .cl>
Date: Mon 23/01/2017 13:14
Subject: Tiket alert 331328222
Attachment: information.doc
From: FBI service [dpeupyl0386@ fbi .com]
Date: Mon, 23 Jan 2017 14:14:09 +0100
Subject: Tiket alert
Look at the attached file for more information.
Assistant Vice President, FBI service
Management Corporation


23 January 2017: information.doc - Current Virus total detections 5/54*
Payload Security** shows a download from http ://unwelcomeaz .top/2/56.exe (VirusTotal 3/56***).
Payload Security[4]. Last week this site[1] was delivering Locky ransomware, which is continuing today. It also looks like this Locky version is trying to download & install opera browser as well... The actual 56.exe pretends to be an adobe flash player 13 file... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://myonlinesecurity.co.uk/spoo...on-case-no-malspam-delivers-locky-ransomware/

* https://www.virustotal.com/en/file/...07013f5f97180a1fc84d001e/analysis/1485177870/

** https://www.hybrid-analysis.com/sam...61107013f5f97180a1fc84d001e?environmentId=100

*** https://www.virustotal.com/en/file/...8ea5f45b93544b35db4e98f3/analysis/1485178446/

4] https://www.hybrid-analysis.com/sam...e508ea5f45b93544b35db4e98f3?environmentId=100
Contacted Hosts
46.17.40.234
52.88.7.60
54.240.162.210
35.161.88.115
91.198.174.192
91.198.174.208


unwelcomeaz .top: 35.164.68.81: https://www.virustotal.com/en/ip-address/35.164.68.81/information/
> https://www.virustotal.com/en/url/8...d3a01b830fd0d4e4008dd9206dc5de0c689/analysis/
154.16.247.115: https://www.virustotal.com/en/ip-address/154.16.247.115/information/
> https://www.virustotal.com/en/url/8...d3a01b830fd0d4e4008dd9206dc5de0c689/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Refund Unsuccessful', 'DHL Shipment', 'Online-Shop', 'Final payment' SPAM

FYI...

Fake 'Refund Unsuccessful' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/refund-unsuccessful-malspam-delivers-locky/
24 Jan 2017 - "... an email with the subject of 'Refund Unsuccessful 03246113' (random numbers) pretending to come from random companies, names and email addresses with a word doc attachment in the format of which delivers Locky ransomware... The email looks like:
From: Stefania Collyer <heg64423837@ zinchospitality .com>
Date: Tue 24/01/2017 01:53
Subject: Refund Unsuccessful 03246113
Attachment: information.doc
Your order has been cancelled, however we are not able to proceed with the
refund of $ 1371.48
All the information on your case 527312277 is listed in the document below.


Locky binary (virustotal 24/55*)
Macro (VirusTotal 26/55**)
Antivirus detections on these are still terrible, 24 hours after being submitted... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...8ea5f45b93544b35db4e98f3/analysis/1485240808/

** https://www.virustotal.com/en/file/...03f29c7a61107013f5f97180a1fc84d001e/analysis/
___

Fake 'DHL Shipment' SPAM - delivers Cerber
- https://myonlinesecurity.co.uk/spoofed-dhl-shipment-notification-delivers-cerber-ransomware/
24 Jan 2017 - "... an email with the subject of 'DHL Shipment Notification: 6349701436' pretending to come from DHL Customer Support <support@ dhl .com> delivers Cerber ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/DHL-Shipment-Notification.png

There are several different named attachments with this campaign. _Dhl_expr. DATE20170120.zip -EXPRESS -Date20170120.zip and probably other variants.
All extract to the same named .js file: Pickup – DOMESTIC EXPRESS-Date,23 Jan 17.pdf.js...

9 January 2017: P_rek.zip: Extracts to: Pickup – DOMESTIC EXPRESS-Date,23 Jan 17.pdf.js
Current Virus total detections 9/54*. Payload Security** shows a download from
http ://bonetlozano .com/kvst.exe (VirusTotal 7/56***) which from the network noise looks like Cerber ransomware, although neither Payload Security nor any Antivirus on Virus total detect it as Cerber... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...08a89128b32e2f8b826f1279/analysis/1485239971/

** https://www.hybrid-analysis.com/sam...27008a89128b32e2f8b826f1279?environmentId=100
Contacted Hosts (695)

*** https://www.virustotal.com/en/file/...d6cc76b5e41a700de7dafe2d/analysis/1485168150/

bonetlozano .com: 217.76.130.248: https://www.virustotal.com/en/ip-address/217.76.130.248/information/
> https://www.virustotal.com/en/url/f...b5af42af03e0bb2674a6772c7045132865c/analysis/
___

Fake 'Online-Shop' SPAM - delivers malware
- https://myonlinesecurity.co.uk/bestellung-online-shop-auftr-nr-02132596-malspam-delivers/
24 Jan 2017 - "... email with the subject of 'Bestellung Online-Shop Auftr.Nr 02132596' (random numbers) coming or pretending to come from random companies, names and email addresses zip attachment containing a very heavily obfuscated JavaScript file which delivers an unknown malware... One of the emails looks like:
From: waldemar.wysocki@ gmx .de
Date: Tue 24/01/2017 10:53
Subject: Bestellung Online-Shop Auftr.Nr 02132596
Attachment: ea00ba32a5.zip
Bestellung Nr.: 02132596 Datum: 24.01.2017


24 January 2017: -Bestellpositionen[alle Preise in EUR].zip: Extracts to: -Bestellpositionen[alle Preise in EUR].pdf.js - Current Virus total detections 1/55*
Payload Security** shows a download from volleymultdom .biz/fsgdhyrer6cdve8rv7hdsvkekvhbsdjh/cfhr.exe (VirusTotal 7/57***)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...fb45eac0e5cc8c58dc117134/analysis/1485255695/

** https://www.hybrid-analysis.com/sam...ff7fb45eac0e5cc8c58dc117134?environmentId=100
Contacted Hosts
162.144.125.170
212.2.153.190


*** https://www.virustotal.com/en/file/...71ff5ec2af459e272bf3939f599bfbc1684/analysis/

volleymultdom .biz: 162.144.125.170: https://www.virustotal.com/en/ip-address/162.144.125.170/information/
___

Fake 'Final payment' SPAM - delivers malware
- https://myonlinesecurity.co.uk/spoo...malspam-delivers-yet-another-unknown-malware/
24 Jan 2017 - "... common email template pretending to come from HMRC, threatening enforcement action to recover unpaid tax... Update: being told this is Zurgop and Zbot spy...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/01/hmrc-final-payment-request.png

24 January 2017: Statement of Liabilities_7.doc - Current Virus total detections 3/54*
Payload Security** shows a download from http ://sergiosuarezgil .com/adobe_upd7.exe (VirusTotal 4/56***)
Payload Security[4].. nothing gives any real clue what it is or what it does... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...996ffe6cd99221c82c093836/analysis/1485264589/

** https://www.hybrid-analysis.com/sam...12b996ffe6cd99221c82c093836?environmentId=100
Contacted Hosts
198.20.102.131

*** https://www.virustotal.com/en/file/...764a2b00c6e8110e6ed81979/analysis/1485260445/

4] https://www.hybrid-analysis.com/sam...f393d5d2a91b14a3eed7df51af1?environmentId=100
Contacted Hosts
23.63.140.108
193.104.215.58
185.162.9.59
212.227.91.231
104.87.224.175
82.192.75.161
37.252.227.51
178.77.120.104
169.50.71.245


sergiosuarezgil .com: 198.20.102.131: https://www.virustotal.com/en/ip-address/198.20.102.131/information/
> https://www.virustotal.com/en/url/e...a0227789035e323d599c1ff36d3e65efedc/analysis/
6/64

email return URL: hmrcgsigov .org: 93.190.140.136: https://www.virustotal.com/en/ip-address/93.190.140.136/information/
Country - NL << Fraud
___

Android malware returns, gets >2M downloads on Google Play
- http://arstechnica.com/security/201...urns-gets-2-million-downloads-on-google-play/
1/23/2017 - "A virulent family of malware that infected more than 10 million Android devices last year has made a comeback, this time hiding inside Google Play apps that have been downloaded by as many as 12 million unsuspecting users. HummingWhale, as the professionally developed malware has been dubbed, is a variant of HummingBad, the name given to a family of malicious apps researchers documented in July invading non-Google app markets. HummingBad attempted to override security protections by exploiting unpatched vulnerabilities that gave the malware root privileges in older versions of Android. Before Google shut it down, it installed more than 50,000 fraudulent apps each day, displayed 20 million malicious advertisements, and generated more than $300,000 per month in revenue..."
> http://blog.checkpoint.com/2017/01/23/hummingbad-returns/

:fear::fear: :mad:
 
Last edited:
Fake 'DHL' SPAM, Sage 2

FYI...

Fake 'DHL' SPAM - delivers banking Trojan
- https://myonlinesecurity.co.uk/spoo...rcial-invoice-delivers-ursnif-banking-trojan/
25 Jan 2017 - "... an email with the subject of 'DHL prepared commercial invoice 9500238176 902694287308' (random numbers) pretending to come from ebillingcmf.td@ DHL .COM that delivers ursnif banking Trojan... One of the emails looks like:
From: ebillingcmf.td@ DHL .COM
Date: Wed 25/01/2017 07:49
Subject: DHL prepared commercial invoice 9500238176 902694287308
Attachment: Commercial.Form.25.01.2017.CVS.zip
Attached notice amount customs charges
Dear Customer,
Attached your invoice in PDF format, dated 25/01/2017 and csv files for shipments and services provided by DHL Express.
You can also display the details of his account and the historical invoices online.
In case of substantial problems in the Annex, contact support at: support@dhl.com
We expect to receive payment within the prescribed period, as indicated on the invoice.
We send our thanks for having taken advantage of DHL Express services.
Best regards,
DHL Express


25 January 2017: Commercial.Form.25.01.2017.CVS.zip: Extracts to: Commercial.Form.25.01.2017.CVS.wsf
Current Virus total detections 7/54*. Payload Security** shows a download of an encrypted file from
http :// www .cp4 .de/cp4/2401.exe ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...11c8456c4cfebce7e86cde47/analysis/1485330508/

** https://www.hybrid-analysis.com/sam...07f11c8456c4cfebce7e86cde47?environmentId=100
Contacted Hosts (16)
81.169.145.165
192.229.221.24
195.93.42.3
195.93.42.2
217.79.188.60
207.200.74.133
217.79.188.46
37.157.6.252
172.227.147.7
152.163.56.3
217.79.188.60
64.12.235.98
151.101.192.249
107.22.179.226
104.94.37.243
104.74.100.205

___

Sage 2 ransomware - spreading in UK via malspam emails
- https://myonlinesecurity.co.uk/sage-2-ransomware-now-spreading-in-uk-via-malspam-emails/
25 Jan 2017 - "... new entry to the market. Sage 2.0 ransomware. They are using the same basic email template telling you the order was cancelled but cannot give a refund. There are also 'ACH Blocked transaction' emails also spreading the same sage 2.0 ransomware. The security community has been warning about Sage2.0 ransomware for a few days now, but today is the first day we have seen malspam emails targeting UK users. All the emails so far received have contained the same zip file containing a very heavily encoded/obfuscated javascript file document_1.zip - there also appear to be 2 other files with no names inside the zip that don’t automatically extract and are probably there as padding or left over artefacts. They just appear to contain a list of txt characters, possibly a tracking identity or even the decryption key. I am attaching a couple of different document_1.zip versions to a zip file for researchers to look at P/W ”infected”
25 jan_sage2 zip. Some subjects seen include:
' Refund Unsuccessful 26485806 ( random numbers)
Blocked Transaction. Case No 15120544 ( random numbers)
Re:
Fw: '

One of the emails looks like:
Body content with 'Refund Unsuccessful' or 'FW' and 'RE:'
Your order has been cancelled, however we are not able to proceed with the
refund of $ 1460.01
All the information on your case 652661070 is listed in the document below.

Body content with 'Blocked Transaction'. 'Case No nnnn'
The Automated Clearing House transaction (ID: 085112046), recently initiated
from your online banking account, was rejected by the other financial
institution.
Canceled ACH transaction
ACH file Case ID 07677730
Transaction Amount 1436.17 USD
Sender e-mail obqeygua57341@ scaledagile .com
Reason of Termination See attached statement


25 January 2017: document_1.zip: Extracts to: doc_details_jOiqRJ.js - Current Virus total detections 7/54*
Payload Security** doesn’t show any download or file action, but the VT comments by @techhelplist[3] shows a download of sage 2.0 from http ://affections .top/ff/55.exe (VirusTotal 9/56[4]). Payload Security[5]... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...b22549bcdbc0f317f9e0d27c/analysis/1485324653/

** https://www.hybrid-analysis.com/sam...254b22549bcdbc0f317f9e0d27c?environmentId=100

3] https://twitter.com/Techhelplistcom/status/824053746829291520

4] https://www.virustotal.com/en/file/...9001db1892bd9178382afd7d/analysis/1485304233/

5] https://www.hybrid-analysis.com/sam...dac9001db1892bd9178382afd7d?environmentId=100
54.149.186.25: https://www.virustotal.com/en/ip-address/54.149.186.25/information/
> https://www.virustotal.com/en/url/1...22aca3b7dfbbb2441b958fcf97a841509d1/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'USPS', 'Microsoft' SPAM

FYI...

Fake 'USPS' SPAM - delivers Sage 2 ransomware
- https://myonlinesecurity.co.uk/spoo...cel-malspam-now-delivering-sage-2-ransomware/
26 Jan 2017 - "... Sage 2 ransomware has started to use the same email template that we see daily that normally delivers Locky ransomware and Kovter Trojans HERE:
> https://myonlinesecurity.co.uk/spoofed-fedex-and-usps-kovter-and-locky-sites/
... The only noticeable difference between the 2 campaigns (until you actually analyse the files inside the zip attachments) is the file size and file names. In the Locky/Kovter versions they were using .js files but now use lnk files... Locky /Kovter use a file name something like Delivery-Receipt-3793490.zip that extracts to another zip file Delivery-Receipt-3793490.doc..zip that eventually extracts to Delivery-Receipt-3793490.doc.lnk where the numbers change with each email received. There are numerous different download sites for the malware each day. Sage 2 ransomware uses a static named file for all emails, currently Delivery-Details.zip extracting to Delivery-Details.js - There is one download site each day... One of the emails looks like:
From: USPS Ground <uwawsne253468@ netpetar .com>
Date: Thu 26/01/2017 02:04
Subject: Delivery problem, parcel USPS #40088683
Attachment: Delivery-Details.zip
Hello,
Your item has arrived at Thu, 26 Jan 2017 03:04:09 +0100, but our courier
was not able to deliver the parcel.
You can download the shipment label attached!
All the best.
Leisha Marshman – USPS Support Agent.


26 January 2017: Delivery-Details.zip: Extracts to: Delivery-Details.js - Current Virus total detections 14/53*
Payload Security** shows a download from http ://affections .top/ff/55.exe (VirusTotal 14/56***) (Payload Security [4])... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...333cc205ed54ba7de92dad81/analysis/1485410870/

** https://www.hybrid-analysis.com/sam...709333cc205ed54ba7de92dad81?environmentId=100

*** https://www.virustotal.com/en/file/...9bb82fd17cc8f45f213f3e3a/analysis/1485413961/

4] https://www.hybrid-analysis.com/sam...1169bb82fd17cc8f45f213f3e3a?environmentId=100
Contacted Hosts
54.211.245.199

affections .top: 54.165.5.111: https://www.virustotal.com/en/ip-address/54.165.5.111/information/
Country US / Autonomous System 14618 (Amazon.com, Inc.)
> https://www.virustotal.com/en/url/1...22aca3b7dfbbb2441b958fcf97a841509d1/analysis/
52.203.213.69: https://www.virustotal.com/en/ip-address/52.203.213.69/information/
___

Fake 'Microsoft' SPAM - delivers malware
- https://myonlinesecurity.co.uk/spoofed-blank-microsoft-email-delivers-an-unknown-malware/
26 Jan 2017 - "A blank/empty email pretending to come from Microsoft with a subject like 'RE: 23337 Microsoft Free 23337' with zip attachment that extracts to another zip file that in turn contains a malicious word doc...
Update: I am being told it is Ursnif banking Trojan... Update again: ... weird. This site is delivering different malware, almost at random it seems. Each visit gives a -different- file, although always the same name read.doc or read.php - currently all are 243kb but all have different file #. So far we have seen Cerber, Ursnif and the original unknown malware... The email looks like:
From: tcmf.microsoft <suard-c@ vendome .pf>
Date: Thu 26/01/2017 16:00
Subject: RE: 23337 Microsoft Free 23337
Attachment: 55554546637489.zip


Body content: totally blank/empty

> https://www.reverse.it/sample/aa895...284a451a86e1ec945ebf43eb919?environmentId=100
Contacted Hosts
208.67.222.222
195.5.126.248
46.150.69.43
188.27.92.82


> https://www.hybrid-analysis.com/sam...7f69a778e4bc1b5f954486a0350?environmentId=100
Contacted Hosts (576)

26 January 2017: 55554546637489.zip: extracts to: 4446_ZIP.zip extracts to 4446.doc
Current Virus total detections 2/55*. Payload Security shows a download from
http ://vvorootad .top/read.php?f=0.dat which delivers read.doc (which is -not- a doc file, although having an icon looking like a word doc, but a renamed .exe) (VirusTotal 9/57**). Payload Security***... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6c32cbbf2df5eebf4d06639f/analysis/1485447397/

** https://www.virustotal.com/en/file/...c95a23edfd47e6e648bfa954/analysis/1485448703/

*** https://www.hybrid-analysis.com/sam...347c95a23edfd47e6e648bfa954?environmentId=100

vvorootad .top: 52.203.115.53: https://www.virustotal.com/en/ip-address/52.203.115.53/information/
> https://www.virustotal.com/en/url/1...b8c9592ccc49b6d8c8c599f820808f76629/analysis/
35.165.86.173: https://www.virustotal.com/en/ip-address/35.165.86.173/information/
> https://www.virustotal.com/en/url/d...0dbfd6888a73e7ad306c0667a64d8131339/analysis/
___

Spyware on a Chromebook ??
- http://www.computerworld.com/article/3161765/chrome-os/spyware-on-a-chromebook.html
Jan 25, 2017 - "... According to Google*, it means the extension 'can enable, disable, uninstall or launch themes, extensions, and apps you have installed'. Uninstall and disable other extensions? Are you kidding me? Why does Chrome even allow this? Web browsers do -not- allow a page on one website to interact with a page on another. Why does Chrome let an extension from Developer A disable or uninstall one from Developer B? Perhaps worse, is that Chrome does not warn, at installation time, about the modification to the New Tab page. This is inexcusable. And here's a sentence I never expected to write. When it comes to extensions modifying the New Tab page, Chrome on Windows is more secure than Chrome on Chrome OS..."
* https://support.google.com/chrome_webstore/answer/186213?hl=en

(More detail at the computerworld URL above.)

:fear::fear: :mad:
 
Last edited:
Phish - using PDF attachments

FYI...

Phish - using PDF attachments
- https://blogs.technet.microsoft.com...engineering-techniques-using-pdf-attachments/
Jan 26, 2017 - "... deceitful PDF attachments are being used in email phishing attacks that attempt to steal your email credentials. Apparently, the heightened phishing activity that we have come to expect every year during the holiday season has not subsided. Unlike in other spam campaigns, the PDF attachments we are seeing in these phishing attacks do not contain malware or exploit code. Instead, they rely on social engineering to lead you on to phishing pages, where -you- are then asked-to-divulge sensitive information...
Example 1: One example of the fraudulent PDF attachments is carried by email messages that pretend to be official communication, for instance, a quotation for a product or a service, from a legitimate company. These email messages may spoof actual people from legitimate companies in order to fake authenticity:
> https://msdnshared.blob.core.windows.net/media/2017/01/120.jpg
When you open the attachment, it’s an actual PDF file that is made to appear like an error message. It contains an instruction to “Open document with Microsoft Excel”. But it’s actually a link to a website:
> https://msdnshared.blob.core.windows.net/media/2017/01/PDF-example-1-screenshot-1.png
Clicking the link opens your browser and brings you to a website, where the social engineering attack continues with a message that the document is protected because it is confidential, and therefore you need to sign in with your email credentials:
> https://msdnshared.blob.core.windows.net/media/2017/01/PDF-example-1-screenshot-2.png
... Don’t open attachments or click-links in suspicious emails. Even if the emails came from someone you know, if you are not expecting the email, be wary about opening the attachment, because spam and phishing emails may spoof the sender..."
(More detail at the blogs.technet.microsoft URL at the top of this post.)

:fear::fear: :mad:
 
Netflix Scam

FYI...

Netflix Scam delivers Ransomware
- http://blog.trendmicro.com/trendlabs-security-intelligence/netflix-scam-delivers-ransomware/
Jan 29, 2017 - "Netflix has a 93 million-strong subscriber base in more than 190 countries, so it’s unsurprising that cybercriminals want a piece of the pie. Among their modus operandi: stealing user credentials that can be monetized in the underground, exploiting vulnerabilities, and more recently infecting systems with Trojans capable of pilfering the user’s financial and personal information. What other purposes can stolen Netflix credential serve? Offer them up as bargaining chip to fellow cybercriminals, for instance. Or more nefariously, use them as lure to trick certain users into installing malware (and turn a profit in the process).
If you’re planning to free ride your way into binge-watching your favorite shows on Netflix, think again. Your computer’s files may end up getting held hostage instead. We came across a -ransomware- (detected by Trend Micro as RANSOM_ NETIX.A) luring Windows/PC users with a Netflix account via a login generator, one of the tools typically used in software and account membership piracy. These programs are usually found on suspicious websites sharing cracked applications and access to premium/paid web-based services:
(The ransom note displayed as wallpaper in the affected system)
> https://blog.trendmicro.com/trendlabs-security-intelligence/files/2017/01/netflix-ransomware1.jpg
(One of the ransom notes with instructions to victims)
> https://blog.trendmicro.com/trendlabs-security-intelligence/files/2017/01/netflix-ransomware2.jpg
(Fake Netflix Login Generator)
> https://blog.trendmicro.com/trendlabs-security-intelligence/files/2017/01/netflix-ransomware3.jpg
(The prompt window after clicking “Generate Login”)
> https://blog.trendmicro.com/trendlabs-security-intelligence/files/2017/01/netflix-ransomware4.jpg
The ransomware starts as an executable (Netflix Login Generator v1.1.exe) that drops another copy of itself (netprotocol.exe) and then executed afterwards. Clicking the “Generate Login” button leads to another prompt window that purportedly has the login information of a genuine Netflix account. RANSOM_NETIX.A uses these fake prompts/windows as distraction while it performs its encryption routine on 39 file types under the C:\Users directory... The ransomware employs AES-256 encryption algorithm and appends the encrypted files with the .se extension. The ransom notes demand $100 worth of Bitcoin (0.18 BTC) from its victims... Interestingly, the ransomware terminates itself if the system is -not- running Windows 7 or Windows 10... This highlights the significance for end users to keep their subscription accounts safe from crooks. Keep to your service provider’s security recommendations. More importantly, practice good security habits: beware of -emails- you receive pretending to be legitimate, regularly update your credentials, use two-factor authentication, and download -only- from official sources... Does getting your important files encrypted worth the piracy? Netflix’s premium plan costs around $12 per month, and allows content to be streamed in four devices at the same time. Compare that with $100 you need to pay in order to get your files decrypted. Getting them back isn’t guaranteed either, as other ransomware families have shown... Bad guys need only hack a modicum of weakness for which no patch is available — the human psyche. Social engineering is a vital component in this scam, so users should be smarter: don’t download -or- click-ads promising the impossible. If the deal sounds too good to be true, it usually is."

:fear::fear: :mad:
 
Back
Top