SPAM frauds, fakes, and other MALWARE deliveries...

Fake 'Invoice', 'Incoming Docs' SPAM, Locky ransomware campaign

FYI...

Fake 'Invoice' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake...-equestrian-centre-delivers-locky-ransomware/
4 Sep 2017 - "... Locky downloader... an email with the subject of 'Invoice INV-000379' from Property Lagoon Limited for Gleneagles Equestrian Centre (random numbers) pretending to come from a random name that matches the name in the email body but appearing to come from messaging-service@ post.xero .com...

Screenshot: https://myonlinesecurity.co.uk/wp-c...-Limited-for-Gleneagles-Equestrian-Centre.png

Invoice INV-000379.7z: Extracts to: INV-000626.vbs - Current Virus total detections 13/59*. Payload Security**
Locky download (VirusTotal ***). These all have a 7z attachment and a link-in-email-body to download the zip. The invoice amounts are random as well.... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...ac3e76ffe4f691201059883b/analysis/1504521374/
INV-000626.vbs

** https://www.hybrid-analysis.com/sam...ad0ac3e76ffe4f691201059883b?environmentId=100
DNS Requests
clubdeautores .es: 91.121.165.214

*** https://www.virustotal.com/en/file/...3770d61c338da4664993e7b1/analysis/1504516547/
BSmIimqLX.exe
___

Fake 'Invoice' SPAM - delivers Globeimposter ransomware
- https://myonlinesecurity.co.uk/fake...ugust-2017-delivers-globeimposter-ransomware/
4 Sep 2017 - "... an email with the subject of '45653946 – True Telecom Invoice for August 2017' (random numbers) pretending to come from billing@ true-telecom .com. This is coming via the Necurs botnet but instead of delivering Locky today, this 2nd malspam run is delivering Globeimposter ransomware... In the same way that today’s earlier malspam run that delivered Locky ransomware[1], these have a-link-in-the-body to download the zip and a zip (7z) attachment as well...
1] https://myonlinesecurity.co.uk/fake...-equestrian-centre-delivers-locky-ransomware/

Screenshot: https://myonlinesecurity.co.uk/wp-c...3946-True-Telecom-Invoice-for-August-2017.png

2017-08-45653946-Bill.7z: 2017-08-41840179-Bill.vbs - Current Virus total detections 8/57*. Payload Security**
Another version (VirusTotal 10/58***) | (Payload Security[4]) | downloaded & xor’d binary - VirusTotal 18/64[5] | Payload Security[6]...
The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...608d7f411604efd0b89ca24b/analysis/1504533698/
2017-08-41840179-Bill.vbs

** https://www.hybrid-analysis.com/sam...c75608d7f411604efd0b89ca24b?environmentId=100
DNS Requests
world-tour2000 .com: 103.53.172.3
naturofind .org: 85.192.177.103
www .world-tour2000 .com: 103.53.172.3
proyectogambia .com: 87.106.65.247

*** https://www.virustotal.com/en/file/...601c4f99911d1426a473bc7a134e7764b3b/analysis/
2017-08-92918095-Bill.vbs

4] https://www.hybrid-analysis.com/sam...911d1426a473bc7a134e7764b3b?environmentId=100
Contacted Hosts
49.50.240.107

5] https://www.virustotal.com/en/file/...7bb2b54469893150e3ea991826c81b56f47/analysis/
zojzoefi.exe

6] https://www.hybrid-analysis.com/sam...69893150e3ea991826c81b56f47?environmentId=100
___

Fake 'Incoming Docs' SPAM - delivers Trickbot
- https://myonlinesecurity.co.uk/more...assword-protected-word-doc-delivers-trickbot/
4 Sep 2017 - "An email with the subject of 'Important: Incoming BACs Documents' pretending to come from NatWest Bank but actually coming from a look-a-like domain Natwest <message@ natwestbacs .co.uk> or Natwest <message@ natwestbacs .com> with a password protected malicious word doc attachment is today’s latest spoof of a well-known company, bank or public authority delivering Trickbot banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-c...t-Incoming-BACs-Documents-spoofed-NatWest.png

SecureMessage.doc - Current Virus total detections 5/55*. Payload Security** | JoeSandBox***
This malware file downloads from
http ://6-express .ch/ser.png which of course is -not- an image file but a renamed .exe file that gets renamed to execute.exe (VirusTotal [4]). An alternative download location is
http ://checkpointsystems .de/ser.png
This email attachment contains a genuine word doc with a macro script that when run will infect you.
The word doc looks like:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/natWest_bacs_docs.png
DO NOT follow the advice they give to enable macros or enable editing to see the content..."
* https://www.virustotal.com/en/file/...9f630acf9a02f9c48e7f40a7/analysis/1493724795/
SecureMessage.doc

** https://www.hybrid-analysis.com/sam...7f19f630acf9a02f9c48e7f40a7?environmentId=100
Contacted Hosts
216.138.226.110
50.19.97.123
186.208.111.188
82.146.94.86


*** https://jbxcloud.joesecurity.org/analysis/355644/1/html

4] https://www.virustotal.com/en/file/...6db6941fdac35f2ca69c7ff4/analysis/1504524050/
ser.png

6-express .ch: 77.236.96.52: https://www.virustotal.com/en/ip-address/77.236.96.52/information/
> https://www.virustotal.com/en/url/7...8de01b83f81956521d6e1a4fc905665429f/analysis/

checkpointsystems .de: 87.106.183.214: https://www.virustotal.com/en/ip-address/87.106.183.214/information/
___

Locky ransomware campaign
- https://www.helpnetsecurity.com/2017/09/01/locky-returns-new-tricks/
Sep 1, 2017 - "... the newest variant adds the .lukitus extension to the encrypted files:
> https://www.helpnetsecurity.com/images/posts/email-locky-appriver.jpg
... AppRiver researchers explained*. The malware arrives in inboxes attached to emails with vague subject lines like “please print”, “documents”, “scans”, “images”, and so on, And, unfortunately for those who get infected, there are no publicly shared methods to reverse this Locky strain. The crooks behind this malware campaign are asking 0.5 Bitcoin to deliver the decryption key..."

* https://blog.appriver.com/2017/08/locky-ransomware-attacks-increase/
Aug 30, 2017 - "... In the past 24 hours we have seen over 23-million-messages sent in this attack, making it one of the largest malware campaigns that we have seen in the latter half of 2017... a massive malicious email campaign began attempting to reach their inboxes. A large spike in malware traffic began this morning just after 7 am CST... The emails utilized one of the following subject lines:
please print
documents
photo
images
scans
pictures

Each message comes with a ZIP attachment that contains a Visual Basic Script (VBS) file that is nested inside a secondary ZIP file..."
> https://blog.appriver.com/2017/05/you-can-defeat-ransomware/

:fear::fear: :mad:
 
Last edited:
Fake 'Scanning', 'Invoice' SPAM

FYI...

Fake 'Scanning' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/lock...o-come-from-random-names-tayloredgroup-co-uk/
5 Sep 2017 - "... Locky downloader... an email with the subject of 'Scanning' pretending to come from random names @ tayloredgroup .co.uk... These have a -link-in-the-body- of the email to download the malware as well as an email attachment. The link does -NOT- go to Dropbox but another compromised website, however the link is not correctly formed in this example so won’t open and gives warning in Outlook:
http ://dna-sequencing .org/MSG000-00090.7z

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/scanning_-taylored_group.png

SCNMSG00002704.7z: Extracts to: Invoice INV-000518.vbs - Current Virus total detections 13/59*.
Payload Security**... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...f6eeae13543b146f57e25dac/analysis/1504602932/

** https://www.hybrid-analysis.com/sam...d17f6eeae13543b146f57e25dac?environmentId=100
DNS Requests
pamplonarecados .com: 5.2.88.79: https://www.virustotal.com/en/ip-address/5.2.88.79/information/

dna-sequencing .org: 66.36.160.119: https://www.virustotal.com/en/ip-address/66.36.160.119/information/
> https://www.virustotal.com/en/url/d...4550f7e707ab9e68aa8556d87599c0e53fd/analysis/
MSG000-00090.7z

tayloredgroup .co.uk: 85.233.160.151: https://www.virustotal.com/en/ip-address/85.233.160.151/information/
> https://www.virustotal.com/en/url/d...e08cbca81fc99d1a8e6f5acecbfd31a074b/analysis/
__

> http://blog.dynamoo.com/2017/09/malware-spam-scanning-pretending-to-be.html
5 Sep 2017 - "This -spam- email pretends to be from tayloredgroup .co.uk but it is just a simple -forgery- leading to Locky ransomware. There is -both- a malicious attachment and -link- in the body text. The name of the sender varies.
Subject: Scanning
From: "Jeanette Randels" [Jeanette.Randels@tayloredgroup.co.uk]
Date: Thu, May 18, 2017 8:26 pm
https ://dropbox .com/file/9A30AA
Jeanette Randels DipFA
Taylored Group
26 City Business Centre
Hyde Street
Winchester
SO23 7TA
Members of the CAERUS Capital Group
www .tayloredgroup .co.uk
Office Number: 01962 826870
Mobile: 07915 612277
email: Jeanette.Randels@ tayloredgroup .co.uk
Taylored Financial Planning is a trading style of Jonathan & Carole
Taylor who are an appointed representative of Caerus Financial Limited...


Despite having what appears to be a Dropbox URL, the link actually goes to another site completely and downloads a .7z archive file containing a malicious VBS script. Attached is another .7z archive file with a slightly different evil VBS script inside.
Detection rates for the scripts are about 13/58 [1] [2]. Automated analysis [3] [4] [5] [6] shows -Locky- ransomware attempting to phone home to the following locations:
91.234.35.170 /imageload.cgi (FOP Sedinkin Olexandr Valeriyovuch aka thehost.ua, Ukraine)
109.234.35.75 /imageload.cgi (McHost.ru / VDSINA, Russia)
McHost is such a well-known purveyor of toxic-crap* that I recommend you block -all- of their ranges (plus I guess the related VDSINA ones), or even block-the-entire Webzilla AS35415**. You can find a list of the network ranges here**. Also thehost .ua also has a lot of crap*** and I would lean towards blocking-whole-network-ranges****.
Recommended minimum blocklist:
91.234.35.0/24
109.234.35.0/24
"
1] https://www.virustotal.com/en/file/...19fc1af60936e626e1e480f9/analysis/1504604787/
Invoice INV-000614.vbs

2] https://www.virustotal.com/en/file/...fe6bf6f3f905cf58eff6473e/analysis/1504604894/
MSG000-00090.vbs

3] https://malwr.com/analysis/ZDEzOWQ0ZmFkNGI0NDA2MDgzYzcyMzQxMDg3ZDY1OWU/
Hosts
193.227.248.241

4] https://malwr.com/analysis/MzhiNjQ0OTU3MWNlNGMxOWE5ZTg3YmVmNWZkZmQyZjI/
Hosts
109.234.35.75
91.234.35.170


5] https://www.hybrid-analysis.com/sam...c50fe6bf6f3f905cf58eff6473e?environmentId=100
DNS Requests
193.227.248.241

6] https://www.hybrid-analysis.com/sam...fd019fc1af60936e626e1e480f9?environmentId=100
DNS Requests
5.2.88.79

* http://blog.dynamoo.com/search?q=mchost

** https://bgp.he.net/AS35415#_prefixes

*** http://blog.dynamoo.com/search?q=Valeriyovuch

**** https://bgp.he.net/AS56485#_prefixes
___

Fake 'Invoice' SPAM - delivers Dridex
- https://myonlinesecurity.co.uk/fake...-view-malspam-delivers-dridex-banking-trojan/
5 Sep 2017 - "... an email with the subject of 'OnePosting Invoice Ready to View' pretending to come from SPECTUR LIMITED <members@ onenewpost .com>. This eventually delivers Dridex banking Trojan... set up by criminals to spread malware and imitate oneposting .com. onenewpost .com was registered on 4th September 2017 by a Chinese entity and is currently hosted on OVH...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/OnePosting-Invoice-Ready-to-View.png

The -link-in-the-body- of the email goes to a -compromised- or fraudulently set up OneDrive for business /SharePoint site...
https ://royalpay-my.sharepoint .com/personal/jamie_costello_royalpay_com_au/_layouts/15/guestaccess.aspx?docid=0b0e5809caadd404ab8e21e3a7322f232&authkey=AfQzKtINqI58J1P-xlw10eg
which downloads a zip containing a.js file...
N2398210.zip: Extracts to: IN2398210.js - Current Virus total detections 6/58*. Payload Security**
downloaded Dridex (VirusTotal 32/64***) (I can’t easily determine the actual download location of the Dridex payload. It does come from -another- compromised or fraudulent SharePoint site)... it appears that onenewpost .com is a domain set up by criminals to spread malware... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it...
* https://www.virustotal.com/en/file/...e19df691384850123625aa07/analysis/1504580504/

** https://www.hybrid-analysis.com/sam...d72e19df691384850123625aa07?environmentId=100

*** https://www.virustotal.com/en/file/...c18936b4be8f9a223202683c24462ce98c3/analysis/
MTXCLU.DLL

onenewpost .com: 188.165.209.31: https://www.virustotal.com/en/ip-address/188.165.209.31/information/

royalpay-my.sharepoint .com: 13.107.6.151: https://www.virustotal.com/en/ip-address/13.107.6.151/information/

:fear::fear: :mad:
 
Last edited:
Fake 'eBay invoice', 'Virgin Media bill' SPAM

FYI...

Fake 'eBay invoice' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake-ebay-invoice-delivers-locky-ransomware/
6 Sep 2017 - "... Locky downloader... an email with the subject of 'Your invoice for eBay purchases (83998749832384616#)' [random numbers] pretending to come from eBay <ebay@ ebay .us>. We are also seeing these pretending to come from all the other main English speaking eBay domains:
ebay@ ebay .com.au
ebay@ ebay .co.uk
ebay@ ebay .com ...

Screenshot: https://myonlinesecurity.co.uk/wp-c...oice-for-eBay-purchases-83998749832384616.png

eBay_Invoice_3476.js - Current Virus total detections 7/59*. Payload Security** | Downloads:
http ://homecarpetshopping .com/bxxomjv.exe (VirusTotal 13/61***)... The link-in-the-email body goes to one of numerous compromised sites. In this case it went to
http ://littleulearning .com/invoive.html
where it downloads an eBay_Invoice_####.js file from
http ://letoftheckhosa .info/invoicing.php
All of the compromised sites in these emails will download or try to download from this address. That creates a randomly numbered eBay_Invoice_.js file. The first 5 or 6 attempts gave me a 0 byte empty file until a working one was delivered... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...75654931389ad1183ec99f8c/analysis/1504698237/
eBay_Invoice_3476.js

** https://www.hybrid-analysis.com/sam...d0475654931389ad1183ec99f8c?environmentId=100
DNS Requests
195.123.218.58
91.234.137.145
91.215.186.147
208.79.200.218
62.149.161.147


*** https://www.virustotal.com/en/file/...2d818c30ad58316e5e998b5c/analysis/1504698766/
bxxomjv[1].exe

homecarpetshopping .com: 208.79.200.218: https://www.virustotal.com/en/ip-address/208.79.200.218/information/
> https://www.virustotal.com/en/url/7...6fd8a248c3b2a69014069d84bfba97cfb8b/analysis/

littleulearning .com: 66.36.166.87: https://www.virustotal.com/en/ip-address/66.36.166.87/information/
> https://www.virustotal.com/en/url/1...b7a2ff31c324e50c02d1a239f38b935ad0d/analysis/

letoftheckhosa .info: 47.88.55.29: https://www.virustotal.com/en/ip-address/47.88.55.29/information/
> https://www.virustotal.com/en/url/1...e3ce39c53879a47bea82eccdcb0469f742b/analysis/
___

Fake 'Virgin Media bill' SPAM - delivers Dridex
- https://myonlinesecurity.co.uk/fake...ready-malspam-delivers-dridex-banking-trojan/
6 Sep 2017 - "... an email with the subject of 'Your Virgin Media bill is ready' pretending to come from Virgin Media <webteam@ virginmediaconnections .com> which delivers Dridex banking trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Virgin-media-Bill.png

Virgin Media bill.zip: Extracts to: Virgin Media bill.js - Current Virus total detections 2/59*
Payload Security** | Dridex Payload VirusTotal 14/65*** | Payload Security[4] ... the criminals sending these have registered a look-a-like domain virginmediaconnections .com on 5th September 2017 using eranet .com as registrar and hosted on OVH 176.31.244.44. They are sending these emails from a whole-range-of-IP-addresses that pass email authentication for the -fake- domain virginmediaconnections .com...
The link-in-the-email goes to a compromised or fraudulently set up OneDrive for business/ SharePoint site where a zip file containing a .js file is downloaded. That eventually contacts http ://cabinetcharpentier .fr/css/style.png (which is -not- a png but a renamed .exe file) to download the Dridex banking Trojan...
https ://kobaltsystemsptyltd-my.sharepoint .com/personal/karen_kobaltsystems_com_au/_layouts/15/guestaccess.aspx?docid=1a0c9ac9effc046b6840207579a616453&authkey=AVRvpElPwHq48OG2zdkLMk8 ...
The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...34feebe18e23de3408d4f452/analysis/1504695675/
Virgin Media bill.js

** https://www.hybrid-analysis.com/sam...75334feebe18e23de3408d4f452?environmentId=100
DNS Requests
91.216.107.90

*** https://www.virustotal.com/en/file/...e50fcb12deeff638cbfad878/analysis/1504696253/
FFCa9j9ru.exe

4] https://www.hybrid-analysis.com/sam...366e50fcb12deeff638cbfad878?environmentId=100

176.31.244.44: https://www.virustotal.com/en/ip-address/176.31.244.44/information/

cabinetcharpentier .fr: 91.216.107.90: https://www.virustotal.com/en/ip-address/91.216.107.90/information/
> https://www.virustotal.com/en/url/0...457fac70a8e7549c4fb1d5e98816406d071/analysis/

kobaltsystemsptyltd-my.sharepoint .com: 13.107.6.151: https://www.virustotal.com/en/ip-address/13.107.6.151/information/

:fear::fear: :mad:
 
Last edited:
Fake 'FreeFax' SPAM

FYI...

Fake 'FreeFax' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake-freefax-from1707075536-delivers-locky-ransomware/
7 Sep 2017 - "... Locky downloader... an email with the subject of 'FreeFax From:1707075536' (random numbers) pretending to come from fax@ freefaxtoemail .net...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/FreeFax-From-1707075536.png

Fax_Message_7932180645.js - Current Virus total detections 12/59*. Payload Security** downloads from
http ://universodeljuguete .com/eusukll.exe (VirusTotal 15/65[3]) (Payload Security[4])...
This current series of downloaders have links-in-the-body of the email to numerous different -compromised- websites. This particular one went to
http ://coopstella .net/fax.html where there is an -iframe- that downloads the js file from
http ://leypart .su/fax.php where a randomly numbered Fax_Message_####.js file is created and downloaded...
The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6162412f7dbf92031f9d135d/analysis/1504782496/
Fax_Message_7932180645.js

** https://www.hybrid-analysis.com/sam...af96162412f7dbf92031f9d135d?environmentId=100
Contacted Hosts
94.127.190.141
62.109.12.221
47.88.55.29
98.124.251.75
98.124.252.66


3] https://www.virustotal.com/en/file/...c3530a30a2e56a790d180107/analysis/1504784148/
eusukll.exe

4] https://www.hybrid-analysis.com/sam...2c3c3530a30a2e56a790d180107?environmentId=100

universodeljuguete .com: 94.127.190.141: https://www.virustotal.com/en/ip-address/94.127.190.141/information/

coopstella .net: 185.58.7.72: https://www.virustotal.com/en/ip-address/185.58.7.72/information/

leypart .su: > https://check-host.net/check-dns?host=leypart.su - ??

:fear::fear: :mad:
 
Last edited:
Fake 'Amazon' SPAM

FYI...

Fake 'Amazon' SPAM - delivers Trickbot
- https://myonlinesecurity.co.uk/fake...has-been-dispatched-tries-to-deliver-malware/
12 Sep 2017 - "... coming from the Necurs botnet is an email with the subject of 'Your Amazon.co.uk order 172-3041149-3373628 has been dispatched' (random numbers) pretending to come from Amazon .co.uk <auto-shipping@ amazon .co.uk>...
UPDATE: found download site and it is Trickbot again...

Screenshot: https://myonlinesecurity.co.uk/wp-c...3041149-3373628-has-been-dispatched-email.png

The fake Amazon website looks like this. The Sign In button does go to a genuine Amazon .co.uk sign in page:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/paranda_uz_amazon_downloader-_site.png
Update: ... 'found a download location
http ://storiteller .com/3f3geuf.exe (VirusTotal 11/59*) (Payload Security**)... 'not certain if actually running the .js file will deliver the payload or whether the malware devs have messed up.
Further update: I am also being told about some versions downloading Locky via
http ://ruisi .fr/ddokslf.exe (VirusTotal 10/65[3]) (Payload Security[4])... 'really difficult to work out the payloads, when the .js files are created on the fly... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...084b4f70b9a360f7e7b2ba95/analysis/1505211474/
ORDER-467-3587106-1645978.js

** https://www.hybrid-analysis.com/sam...795084b4f70b9a360f7e7b2ba95?environmentId=100
Contacted Hosts
82.80.201.25
47.88.55.29


3] https://www.virustotal.com/en/file/...ee3f5e4ed5c29016b67e660a/analysis/1505213071/
3f3geuf.exe

4] https://www.hybrid-analysis.com/sam...7d9ee3f5e4ed5c29016b67e660a?environmentId=100

storiteller .com: 82.80.201.25: https://www.virustotal.com/en/ip-address/82.80.201.25/information/
> https://www.virustotal.com/en/url/6...f122d0bf2c49d09c448cf08990b5dc3c80a/analysis/

ruisi .fr: 195.154.227.5: https://www.virustotal.com/en/ip-address/195.154.227.5/information/
> https://www.virustotal.com/en/url/e...b73cb12734d0b4ce2c20671f6e779fe26e9/analysis/

:fear::fear: :mad:
 
Fake 'Invoice' SPAM

FYI...

Fake 'Invoice' SPAM - Necurs botnet delivers malware
- https://myonlinesecurity.co.uk/more-necurs-botnet-sent-fake-invoices-deliver-malware/
14 Sep 2017 - "... sent from the Necurs botnet is a typical generic spam email with the subject of 'Copy of Invoice 487391' (random numbers) pretending to come from Customer Service <service@ randomdomain .tld>. There is -no- attachment with these today, just a link-in-the-email body to a variety of -compromised- sites. The link will always go to <site name>/invoice .html which uses an -iframe- to download a random numbered invoice.js from
http ://wittinhohemmo .net/invoice.php (this site has been used in this malware campaign for at least 1 week now). The js file is different to the ones we have been seeing so far this week, they are much smaller (about 5kb) and using trivially obfuscated reverse strings to “hide” the download sites...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Copy-of-Invoice-487391.png

Sites I found are:
http ://multila .com/HJGFjhece3.exe
http ://vereouvir .pt/HJGFjhece3.exe
They use email addresses and subjects that will entice a user to read the email and follow the link.
Invoice-671398.js - Current Virus total detections 9/58*. Payload Security**
HJGFjhece3.exe (VirusTotal 10/63[3]) (Payload Security[4]). I cannot work out if this is Trickbot or Locky today so far. The behaviour so far seen doesn’t exactly match either malware. It might be damaged or not working properly or some sort of anti-sandbox /VM protection to it. My gut feeling is -Trickbot- based on similar behaviour over the last few days when run in a sandbox or VM... The basic rule is NEVER open any attachment -or- link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...dc1af809bc44118dff24b10c/analysis/1505376478/
Invoice-290134.js

** https://www.hybrid-analysis.com/sam...624dc1af809bc44118dff24b10c?environmentId=100
Contacted Hosts
203.74.203.14
47.89.254.1
80.172.241.21


3] https://www.virustotal.com/en/file/...efd70c2a8b06e05bee8e1e76/analysis/1505377027/
2193.exe

4] https://www.hybrid-analysis.com/sam...7adefd70c2a8b06e05bee8e1e76?environmentId=100

wittinhohemmo .net: 47.89.254.1: https://www.virustotal.com/en/ip-address/184.95.37.110/information/
> https://www.virustotal.com/en/url/2...050f52b792e8d26c5c33bf8aedfb2a4a393/analysis/

multila .com: 203.74.203.14: https://www.virustotal.com/en/ip-address/203.74.203.14/information/
> https://www.virustotal.com/en/url/3...fc7b0ecdfec172daf4056e92bd9d659fdbf/analysis/

vereouvir .pt: 80.172.241.21: https://www.virustotal.com/en/ip-address/80.172.241.21/information/
> https://www.virustotal.com/en/url/7...9d0fb7a024b44c1925fe4cd13f2cd2285de/analysis/

:fear::fear: :mad:
 
Last edited:
CCleaner 5.33 compromised, Fake 'Revised invoice', 'Status of invoice' SPAM

FYI...

CCleaner 5.33 compromised...
- https://www.helpnetsecurity.com/2017/09/18/hackers-backdoored-ccleaner/
Sep 18, 2017 - "... Piriform – the company that develops CCleaner and which has been recently acquired by AV maker Avast – has confirmed* that the 32-bit version of the v5.33.6162 of CCleaner and the v1.07.3191 of CCleaner Cloud were affected..."
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users
* https://www.piriform.com/news/relea...eaner-cloud-v1073191-for-32-bit-windows-users
Sep 18, 2017 - "We recently determined that older versions of our Piriform CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 had-been-compromised. We resolved this quickly and believe no harm was done to any of our users. This compromise only affected customers with the 32-bit version of the v5.33.6162 of CCleaner and the v1.07.3191 of CCleaner Cloud. No other Piriform or CCleaner products were affected. We encourage all users of the 32-bit version of CCleaner v5.33.6162 to download v5.34 here: download**. We apologize and are taking extra measures to ensure this does not happen again..."
** https://www.piriform.com/ccleaner/download/standard

- http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
Sep 18, 2017 - "... Talos recently observed a case where the download servers used by software vendor to distribute a legitimate software package were leveraged to deliver malware to unsuspecting victims. For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode-on-top of the installation of CCleaner... Given the potential damage that could be caused by a network of infected computers even a tiny fraction of this size we decided to move quickly. On September 13, 2017 Cisco Talos immediately notified Avast of our findings so that they could initiate appropriate response activities..."
Indicators of Compromise (IOCs):
... IP Addresses
216[.]126[.]225[.]148 "

216.126.225.148: https://www.virustotal.com/en/url/a...715c6abee55b3cb300b4654d30956a5d3a8/analysis/
___

Fake 'Revised invoice' SPAM - delivers malware
- https://myonlinesecurity.co.uk/re-r...s-to-delivers-malware-using-an-r24-extension/
18 Sep 2017 - "... an email with the subject of 'Re: Revised invoice' pretending to come from Sales <Sales@ machinery .com>... it comes with an .r24 extension which is completely unknown to windows. Examining the file in a hex editor shows it has a PK header which means it is a compressed (zip) file. Simply renaming the extension to .zip will allow the contents to be extracted and examined...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/re-revised-invoice.png

New Invoice.r24 (VirusTotal 9/62*): Extracts to: New Invoice.com - Current Virus total detections 15/65**
Payload Security***... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...7f32a9f147da57149adac96b/analysis/1505723811/
New Invoice.r24

** https://www.virustotal.com/en/file/...7af9f956f3d6cd740d00ecb3/analysis/1505723863/
New Invoice.com

*** https://www.hybrid-analysis.com/sam...c9f7af9f956f3d6cd740d00ecb3?environmentId=100
___

Fake 'Status of invoice' SPAM - leads to Locky
- http://blog.dynamoo.com/2017/09/malware-spam-status-of-invoice-with-7z.html
18 Sep 2017 - "This spam leads to Locky ransomware:
Subject: Status of invoice
From: "Rosella Setter" ordering@ [redacted]
Date: Mon, September 18, 2017 9:30 am
Hello,
Could you please let me know the status of the attached invoice? I
appreciate your help!
Best regards,
Rosella Setter
Tel: 206-575-8068 x 100
Fax: 206-575-8094
*NEW* Ordering@[redacted].com
* Kindly note we will be closed Monday in observance of Labor Day *


The name of the sender varies. Attached is a .7z archive file with a name similar to A2174744-06.7z which contains in turn a malicious .vbs script with a random number for a filename... Automated analysis of those two samples [1] [2] [3] [4] show this is Locky ransomware. Those two scripts attempt to download a component from:
yildizmakina74 .com/87thiuh3gfDGS?
miliaraic .ru/p66/87thiuh3gfDGS?
lanzensberger .de/87thiuh3gfDGS?
web-ch-team .ch/87thiuh3gfDGS?
abelfaria .pt/87thiuh3gfDGS?
An executable is dropped with a detection rate of 19/64[5] which Hybrid Analysis[6] shows is phoning home to:
91.191.184.158 /imageload.cgi (Monte Telecom, Estonia)
195.123.218.226 /imageload.cgi (Layer 6, Bulgaria)
.7z files are popular with the bad guys pushing -Locky- at the moment. Blocking them at your mail perimiter may help.
Recommended blocklist:
195.123.218.226
91.191.184.158
"
1] https://www.hybrid-analysis.com/sam...75ba5251f0862ecc8b95b2512de?environmentId=100
Contacted Hosts
85.95.237.29
195.123.218.226
91.191.184.158


2] https://www.hybrid-analysis.com/sam...40deefb11d360fb6912be84fbd8?environmentId=100
Contacted Hosts
194.150.248.56
91.191.184.158
195.123.218.226


3] https://malwr.com/analysis/Y2IxOTMwMjY3OGUyNGVjYmI4ODNiNzZjNjJjMmViYzQ/
5121669985.vbs

4] https://malwr.com/analysis/MGY4YzRmOWE2YTIxNDY3ZWE4NjZjYWE5NGJjZDA1ZmM/
25860394240.vbs

5] https://www.virustotal.com/en/file/...0ac94687e7687a1b91944d93c1d6527c8a7/analysis/
CJgBjTI.exe

6] https://www.hybrid-analysis.com/sam...e7687a1b91944d93c1d6527c8a7?environmentId=100
Contacted Hosts
91.191.184.158
195.123.218.226
216.58.209.228


85.95.237.29: https://www.virustotal.com/en/ip-address/85.95.237.29/information/

195.123.218.226
: https://www.virustotal.com/en/ip-address/195.123.218.226/information/

91.191.184.158: https://www.virustotal.com/en/ip-address/91.191.184.158/information/

:fear::fear: :mad:
 
Last edited:
Fake 'Order' SPAM

FYI...

Fake 'Order' SPAM - delivers Locky ykcol
- https://myonlinesecurity.co.uk/fake-herbalife-order-number-invoice-malspam-delivers-locky-ykcol/
19 Sep 2017 - "... Locky downloader... an email with the subject of 'HERBALIFE Order Number: 6N01000137' (random numbers) pretending to come from Herbalife <svc_apacnts_8169@ herbalife .com> (random numbers as well). Today’s version continues to use the 'ykcol' extension for encrypted files...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/HERBALIFE-Order-Number-6N01000137.png

6N01000137_1.7z: Extracts to: 6N01005710.vbs - Current Virus total detections 16/55*. Payload Security**
| downloads an encrypted txt file which is converted by the script to vtifOYBP.exe (VirusTotal 30/64***)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5bba634bb787321db9672cfa/analysis/1480616575/
-6dt874p53077.js

** https://www.hybrid-analysis.com/sam...b8aa94f98b6f883e63ef19f0814?environmentId=100
DNS Requests
isiquest1 .com - 178.33.107.201 - OVH, SAS - France
Contacted Hosts
178.33.107.201: https://www.virustotal.com/en/ip-address/178.33.107.201/information/
> https://www.virustotal.com/en/url/6...362d84c482d7af5aca97b9dbb6a92fa3c34/analysis/

*** https://www.virustotal.com/en/file/...50107cd7b5d5c6ac2ec76dbb3b06ed727f8/analysis/
JGHldb03m

:fear::fear: :mad:
 
Fake 'invoice' SPAM

FYI...

Fake 'invoice' SPAM - delivering Locky
- https://myonlinesecurity.co.uk/more...ices-delivering-locky-ransomware-again-today/
20 Sep 2017 - "... Locky downloaders... an email with the subject of 'Status of invoice A2178050-11' (random numbers) pretending to come from random names with a from address of ordering@ random companies. The subjects all start with 'Status of invoice A217' with 4 extra digits, then 2 digits...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Status-of-invoice-A2178050-11.png

A2178050-11.rar: Extracts to: 20080920_757068.vbs - Current Virus total detections*. Payload Security**.
Downloads
http ://mariamandrioli .com/RSkfsNR7? which is an executable file....
Frequently these are encrypted -txt- files that need converting to the .exe (VirusTotal 16/65[3])
Payload Security[4]). Other download sites for the malware binary include:
http ://ryterorrephat .info/af/RSkfsNR7
http ://hard-grooves .com/RSkfsNR7?
Other sites and a -different- locky binary - details have been posted by Racco42[5]on pastebin[6]...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5bba634bb787321db9672cfa/analysis/1480616575/
-6dt874p53077.js

** https://www.hybrid-analysis.com/sam...6d64f5d9da56525e30880051ff2?environmentId=100
Contacted Hosts
108.59.87.148

3] https://www.virustotal.com/en/file/...a7886a8e31be8a3ccd0e5617/analysis/1505896879/
RSkfsNR7.exe

4] https://www.hybrid-analysis.com/sam...245a7886a8e31be8a3ccd0e5617?environmentId=100

5] https://twitter.com/Racco42/status/910423167092629504

6] https://pastebin.com/F5K6BKQX

mariamandrioli .com: 108.59.87.148: https://www.virustotal.com/en/ip-address/108.59.87.148/information/
> https://www.virustotal.com/en/url/d...cdf51d333d4e65d58aa2176b704f633fdcd/analysis/

ryterorrephat .info: 54.187.116.55: https://www.virustotal.com/en/ip-address/54.187.116.55/information/
> https://www.virustotal.com/en/url/a...9bb812342a3112fc8f014eca1dc9c63b343/analysis/

hard-grooves .com: 54.187.116.55: https://www.virustotal.com/en/ip-address/54.187.116.55/information/

:fear::fear: :mad:
 
Fake 'Amazon Invoice' SPAM, 'CCleaner' follow up

FYI...

Fake 'Amazon Invoice' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake-amazon-marketplace-invoice-malspam-delivers-locky-ransomware/
21 Sep 2017 - "... Locky downloaders... an email with the subject of 'Invoice RE-2017-09-21-00102' (random last 6 digits) pretending to come from Amazon Marketplace <uJLHsSYOYmvOX@ marketplace.amazon .co.uk> (random characters before the @)...

Screenshot: https://myonlinesecurity.co.uk/wp-c...ketplace-Spam-email-with-Locky-downloader.png

RE-2017-09-21-00102.7z: Extracts to: RE-2017-09-21-00273.vbs - Current Virus total detections 14/58*:
Payload Security** | Downloads
http ://accuflowfloors .com/IUGiwe8? which is a txt file that is -renamed- to nVtcNP.exe (VirusTotal 22/63***)
Other download sites inside this VBS file are:
fulcar .info/p66/IUGiwe8 and
afradem .com/IUGiwe8? - There will be dozens of others in other versions...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...733e48b63d61af1cd0894906/analysis/1505983662/

** https://www.hybrid-analysis.com/sam...616733e48b63d61af1cd0894906?environmentId=100
Contacted Hosts
65.182.174.12

*** https://www.virustotal.com/en/file/...9206ec0bacac318523afbc53/analysis/1505984851/
TnipmOahC.exe

accuflowfloors .com: 65.182.174.12: https://www.virustotal.com/en/ip-address/65.182.174.12/information/
> https://www.virustotal.com/en/url/6...7afbe8fdcbb177c890ce6fcd459a38c8c18/analysis/

fulcar .info: https://check-host.net/check-dns?host=fulcar.info
[ http://blog.dynamoo.com/2017/09/malware-spam-invoice-re-2017-09-21.html
21 Sep 2017
Comment: ... This will be the Necurs botnet. IPs will be all over the place... blocking .7z files would probably not cause much a problem, these are commonly used for Locky right at the moment. ]

afradem .com: 178.255.99.134: https://www.virustotal.com/en/ip-address/178.255.99.134/information/
___

'CCleaner' Command and Control - follow up ...
- http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html
Sep 20, 2017 - "Talos recently published a technical analysis of a backdoor which was included with version 5.33 of the CCleaner application*. During our investigation we were provided an archive containing files that were stored on the C2 server. Initially, we had concerns about the legitimacy of the files. However, we were able to quickly verify that the files were very likely genuine based upon the web server configuration files and the fact that our research activity was reflected in the contents of the MySQL database included in the archived files. In analyzing the delivery code from the C2 server, what immediately stands out is a list of organizations, including Cisco, that were specifically targeted through delivery of a second-stage loader. Based on a review of the C2 tracking database, which only covers four days in September, we can confirm that at least 20 victim machines were served specialized -secondary- payloads...
* http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
... These new findings raise our level of concern about these events, as elements of our research point towards a possible unknown, sophisticated actor. These findings also support and reinforce our previous recommendation that those impacted by this supply chain attack should not simply remove the affected version of CCleaner or update to the latest version, but should restore from -backups- or -reimage- systems to ensure that they completely remove not only the backdoored version of CCleaner but -also- any other malware that may be resident on the system...
Conclusion: Supply chain attacks seem to be increasing in velocity and complexity. It's imperative that as security companies we take these attacks seriously. Unfortunately, security events that are not completely understood are often downplayed in severity. This can work counter to a victim's best interests. Security companies need to be conservative with their advice before all of the details of the attack have been determined to help users ensure that they remain protected. This is especially true in situations where entire stages of an attack go undetected for a long period of time. When advanced adversaries are in play, this is especially true. They have been known to craft attacks that avoid detection by specific companies through successful reconnaissance techniques. In this particular example, a fairly sophisticated attacker designed a system which appears to specifically target technology companies by using a supply chain attack to compromise a vast number of victims, persistently, in hopes to land some payloads on computers at very specific target networks..."
(More detail at the talosintelligence URL above.)

- https://www.helpnetsecurity.com/2017/09/21/ccleaner-compromise-targets/
Sep 21, 2017
>> https://www.helpnetsecurity.com/tag/ccleaner/

- https://blog.avast.com/progress-on-ccleaner-investigation
Sep 21, 2017

> https://www.askwoody.com/2017/is-your-ccleaner-safe-new-evidence-suggests-maybe-not/
Sep 21, 2017
> https://www.ghacks.net/2017/09/21/ccleaner-malware-second-payload-discovered/
Sep 21, 2017

:fear::fear: :mad:
 
Last edited:
Fake 'Forskolin' SPAM

FYI...

Fake 'Forskolin' SPAM - using spoofed email addresses
- https://myonlinesecurity.co.uk/another-forskolin-spam-email-campaign-using-spoofed-email-addresses/
22 Sep 2017 - "... malspam campaign again today pushing the crappy, scummy, useless 'Forskolin weight loss' junk... Some subjects in the original emails include (there are hundreds of variants): These pretend to be Facebook notifications about missed private messages or pending notifications:
You photos that will be deleted in 1 days
You have notification that will be removed in 5 hours
For You new message that will be removed in 6 days
Private message that will be deleted in 3 hours
You friend that will be deleted in 5 hours
You have notification that will be deleted in 7 days


The Hotmail emails look like:
- https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/hotmail_dmarc_rejects_email.png

The original emails look like these:
- https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/support_3.png

- https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/support_2.png

- https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/support_1.png

The links go to a multitude of -compromised- sites but all eventually end today on
http ://weight4forlossdiet-4tmz .world/en/caus/forskolin/?bhu=8mczFswKd5ZrUCttf15dChmqRGCWobCch
(with a different random reference number) where you see a page looking like this:
> https://myonlinesecurity.co.uk/wp-content/uploads/2016/04/weightloss-scam.png
This shows the importance of having correct authentication set up on your email server with DMARC* reporting, so you know when your email address is being spoofed and used in a mass malspam campaign:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/hotmail_dmarc_rejects2.png

* https://myonlinesecurity.co.uk/anot...server-sending-spam-why-you-should-use-dmarc/ "

weight4forlossdiet-4tmz .world: 192.254.79.249: https://www.virustotal.com/en/ip-address/192.254.79.249/information/
> https://www.virustotal.com/en/url/5...3df7644563529b750e59b62fa35fc96ec06/analysis/

:fear::fear: :mad:
 
Fake 'BL copy' SPAM

FYI...

Fake 'BL copy' SPAM - RTF exploit delivers malware
- https://myonlinesecurity.co.uk/fwd-...rtf-exploit-cve-2017-0199-to-deliver-malware/
24 Sep 2017 - "An email with the subject of 'Fwd: BL copy' coming from pedro.estaba@ cindu .com.ve with a malicious word doc attachment delivers malware using the RTF exploit CVE-2017-0199. The word doc is actually a RTF doc. It is highly likely that recipients will get a similar email with different senders and email body content, imitating various innocent companies. These download -multiple- different malwares.
> https://nvd.nist.gov/vuln/detail/CVE-2017-0199
Last Modified: 04/12/2017
CVSS v2 Base Score: 9.3 HIGH

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/BL-copy.png

The CVE-2017-0199 exploit was plugged in all supported versions of Microsoft Office back in April 2017, with additional fixes in subsequent Security updates including September 2017. If you have not applied the patches, then simply opening or even just -previewing- these word docs in your email client or windows explorer might be enough to infect you...

export.doc - Current Virus total detections 24/59[1]. Payload Security[2]. Both Payload Security and manual analysis shows a download of an HTA file from
http ://birsekermasali .com/hta/docs.hta (VirusTotal 15/59[3]) (Payload Security[4]) which contains encoded / encrypted commands to download
http ://birsekermasali .com/js/boss/payment.exe which is giving a 404.
I decided to dig around a bit on the open directories on birsekermasali .com and see what I could find. Trying
http ://birsekermasali .com/js/boss/ gave me a password required prompt, but trying the
http ://birsekermasali .com/hta/ gave me -2- additional -HTA- files:

allfiles.hta (VirusTotal 6/58[5]) (Payload Security[6]) which downloads
http ://birsekermasali .com/js/boss/invoices.exe (VirusTotal 38/65[7]) (Payload Security[8])
kelly.hta (VirusTotal 14/59[9]) (Payload Security[10]) Which downloads
http ://birsekermasali .com/js/kels/docs.exe (VirusTotal 46/65[11]) (Payload Security[12]) which in turn downloads
http ://birsekermasali .com/js/kels/dates.exe (VirusTotal 41/59[13]) (Payload Security[14])... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.virustotal.com/en/file/...c9b29068adc4893f74938258/analysis/1506187514/

2] https://www.hybrid-analysis.com/sam...becc9b29068adc4893f74938258?environmentId=100
Contacted Hosts
192.185.115.14

3] https://www.virustotal.com/en/file/...dee5a8c31f7cf97d16840782/analysis/1506231952/
docs[1].hta

4] https://www.hybrid-analysis.com/sam...8aa02718a15c915c5d4760e461c?environmentId=100
Contacted Hosts
192.185.115.14
74.125.206.106
162.221.190.147
209.9.53.57
69.172.201.153
198.54.116.113
213.167.231.2
112.175.232.227
23.227.38.64
121.127.250.125


5] https://www.virustotal.com/en/file/...02718a15c915c5d4760e461c/analysis/1506234023/
allfiles.hta

6] https://www.hybrid-analysis.com/sam...8aa02718a15c915c5d4760e461c?environmentId=100
Contacted Hosts
192.185.115.14
74.125.206.106
162.221.190.147
209.9.53.57
69.172.201.153
198.54.116.113
213.167.231.2
112.175.232.227
23.227.38.64
121.127.250.125


7] https://www.virustotal.com/en/file/...1786c0835c08445eb48eef96/analysis/1506170974/

8] https://www.hybrid-analysis.com/sam...8d81786c0835c08445eb48eef96?environmentId=100

9] https://www.virustotal.com/en/file/...2f13f39ef1b003c4f98e6b38/analysis/1506234037/
kelly.hta

10] https://www.hybrid-analysis.com/sam...9e22f13f39ef1b003c4f98e6b38?environmentId=100
Contacted Hosts
192.185.115.14
198.54.115.96


11] https://www.virustotal.com/en/file/...ed3827ac74c124ac272a0ec3/analysis/1506035556/
output.112274294.txt

12] https://www.hybrid-analysis.com/sam...21fed3827ac74c124ac272a0ec3?environmentId=100

13] https://www.virustotal.com/en/file/...0af349d2916dce027743aa4c/analysis/1506118256/

14] https://www.hybrid-analysis.com/sam...20a0af349d2916dce027743aa4c?environmentId=100

birsekermasali .com: 192.185.115.14: https://www.virustotal.com/en/ip-address/192.185.115.14/information/
> https://www.virustotal.com/en/url/c...6e904ca44e39f9e6936a1a22a86ece003a3/analysis/
> https://www.virustotal.com/en/url/d...a2d43719560433979e3440594aabdee7cbc/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Voice Message' SPAM

FYI...

Fake 'Voice Message' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake...ce-message-malspam-delivers-locky-ransomware/
25 Sep 2017 - "... Locky ransomware.... They are sticking with 'Voice Message' theme again today. It is an email with the subject of 'Message from 02031136950' (random phone number) pretending to come from server@ random number.um .broadviewnet .net. They all come from 'Message Server' and the email address is server@ random number.um .broadviewnet .net...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Message-from-02031136950.png

Voice Message(02031136950.7z: Extracts to: Voice Message(02090039814).vbs - Current Virus total detections 10/58*. Payload Security**. These -vbs- files download from a large number of -compromised- sites. This example contacts
asheardontheradiogreens .com/YTkjdJH7w1
tertrodefordown .info/af/YTkjdJH7w1
artplast .uz/YTkjdJH7w1?
where a txt file is downloaded. The file is a actually a renamed.exe file (VirusTotal 17/65***). With these if there is a ? at the end of a URL, you get a renamed.txt file. If there is no ? you get an .exe that has no extension... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...f6138e26e257736bb99fda1f/analysis/1506322168/
Voice Message(02090039814).vbs

** https://www.hybrid-analysis.com/sam...55af6138e26e257736bb99fda1f?environmentId=100
199.30.241.139

*** https://www.virustotal.com/en/file/...ef54a2219a04b9e7cb7d2a7a/analysis/1506322258/
YTkjdJH7w1.txt

asheardontheradiogreens .com: 199.30.241.139: https://www.virustotal.com/en/ip-address/199.30.241.139/information/
> https://www.virustotal.com/en/url/c...bb2452f11a94a0cc30baa6a31d847c205d7/analysis/

tertrodefordown .info: 49.51.36.73: https://www.virustotal.com/en/ip-address/49.51.36.73/information/
> https://www.virustotal.com/en/url/f...21cd2677d218a20e7a5d201206f8d4b0c52/analysis/

artplast .uz: 62.209.133.18: https://www.virustotal.com/en/ip-address/62.209.133.18/information/
> https://www.virustotal.com/en/url/2...78c10db173b806fa0a98d32f360bfdaf65d/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'eFax and Virgin Media' SPAM

FYI...

Fake 'eFax and Virgin Media' SPAM - deliver Dridex
- https://myonlinesecurity.co.uk/drid...d-via-fake-emails-from-efax-and-virgin-media/
26 Sep 2017 - "... Dridex Banking Trojans being delivered via malspam emails... The 2 that I have looked at so far are:
'Your Virgin Media bill is ready' coming from Virgin Media <webteam@ virginmedia.smebusinesslink .com>'
'Corporate eFax message' from “Unknown” – 4 page(s), Caller-ID: 44-161-261-1924 coming from eFax Corporate <message@ efax.inboundcop .com>
... the criminals sending these have registered look-a-like or plausible domains: they are actually using subdomains of these domains that make a recipient think that the emails are coming from a “proper” message sending service... The emails are just about identical to those on these 2 pages with the dates and amounts changed:
smebusinesslink .com on 24th September 2017 using eranet .com as registrar and hosted on OVH 188.165.217.40
> https://myonlinesecurity.co.uk/fake...am-delivers-smoke-sharik-dofoil-and-trickbot/
inboundcop .com on 24th September 2017 using eranet .com as registrar and hosted on OVH 188.165.232.177 ...
> https://myonlinesecurity.co.uk/fake...am-delivers-smoke-sharik-dofoil-and-trickbot/

They are sending these emails from a whole range of IP addresses (all tracking back to various subdomains of the 2 main -fraudulent- domains) under the control of these criminals that pass email authentication for the -fake- domains:
46.105.101.20
46.105.101.72
46.105.101.110
54.36.192.0/24
94.23.32.95
188.165.217.40
188.165.217.44
188.165.200.80
188.165.215.105
188.165.215.115
188.165.239.123
188.165.232.177
188.165.217.228
... The emails are just about identical to those on these 2 pages with the dates and amounts changed:
> 'Virgin Media Your Virgin Media bill is ready' ... and 'e Fax' ...
The link in the email goes to a -compromised- or fraudulently-set-up OneDrive for business/SharePoint site where a zip file containing a .js file is downloaded...

The virgin site is:
https ://grllen-my.sharepoint .com/personal/misaacs_grllen_com_au/_layouts/15/guestaccess.aspx?docid=0f577514318c64d3a83fdc412856063e6&authkey=AZhzom6O9TOyFzZv4HUJ6zM
where a .js file is downloaded. That downloads 46.105.102.161 /PDF/Virginmedia_bill_25_09_2017_3 .pdf
an innocent PDF file of a -genuine- Virgin media bill and displays that while at the same time downloads the Dridex banking Trojan in the background (I cannot determine the actual download location of the Dridex Trojan from the reports)
Virginmedia_bill_25_09_2017_3.zip: Extracts to: Virginmedia_bill_25_09_2017_3.js
Current Virus total detections 4/58[1]. Payload Security[2] | Dridex Payload - VirusTotal 13/61[3]|
Payload Security[4] |

The eFax site is:
https ://ucg1-my.sharepoint .com/personal/janet_lau_ucg_co_nz/_layouts/15/guestaccess.aspx?docid=0eab92172e4fb424093bc21e476a6a698&authkey=AT_9AE00prV_R0aRf9HYOtg
where another js file is downloaded. That also downloads an innocent PDF file from
188.165.193.38 /PDF/FAX_20170925_1401908954_6.pdf
saying it all about the Rural Payments agency and displays that while at the same time downloads the
-Dridex- banking Trojan in the background
(I cannot determine the actual download location of the Dridex Trojan from the reports)...:
FAX_20170925_1401908954_6.zip: Extracts to: FAX_20170925_1401908954_6.js
Current Virus total detections 7/59[5]: Payload Security[6] | Dridex Payload - VirusTotal 13/61[7] |
Payload Security[8] |
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.virustotal.com/en/file/...095459f60aafd28873b4f6fa/analysis/1506415697/
Virginmedia_bill_25_09_2017_3.js

2] https://www.hybrid-analysis.com/sam...8d9095459f60aafd28873b4f6fa?environmentId=100
Contacted Hosts
46.105.102.161
173.203.123.102
193.218.145.101
162.243.137.50
87.106.219.40


3] https://www.virustotal.com/en/file/...4097223a37bf2198bd045c3f/analysis/1506415824/

4] https://www.hybrid-analysis.com/sam...6334097223a37bf2198bd045c3f?environmentId=100
Contacted Hosts
173.203.123.102
193.218.145.101
162.243.137.50
87.106.219.40


5] https://www.virustotal.com/en/file/...bb40c049ae9b7cb0d7a4a5b0/analysis/1506418921/
FAX_20170925_1401908954_6.js

6] https://www.hybrid-analysis.com/sam...a69bb40c049ae9b7cb0d7a4a5b0?environmentId=100
Contacted Hosts
104.146.230.59
188.165.193.38
173.203.123.102
193.218.145.101
162.243.137.50
87.106.219.40


7] https://www.virustotal.com/en/file/...4097223a37bf2198bd045c3f/analysis/1506415824/

8] https://www.hybrid-analysis.com/sam...6334097223a37bf2198bd045c3f?environmentId=100
Contacted Hosts
173.203.123.102
193.218.145.101
162.243.137.50
87.106.219.40


grllen-my.sharepoint .com: 13.107.6.151: https://www.virustotal.com/en/ip-address/13.107.6.151/information/

ucg1-my.sharepoint .com: 13.107.6.151

188.165.217.40: https://www.virustotal.com/en/ip-address/188.165.217.40/information/

188.165.232.177: https://www.virustotal.com/en/ip-address/188.165.232.177/information/

:fear::fear: :mad:
 
Last edited:
Fake 'UPS' SPAM, Email credential phish, JavaScript - Stealer

FYI...

Fake 'UPS' SPAM - tries to deliver malware
- https://myonlinesecurity.co.uk/fake...ion-tracking-number-tries-to-deliver-malware/
27 Sep 2017 - "... malware downloaders... an email with the subject of 'UPS Ship Notification, Tracking Number 1Z51322Y3483221007' (random numbers) pretending to come from UPS Quantum View <pkginfo26@ ups .com> (random pkginfo numbers)...

Screenshot: https://myonlinesecurity.co.uk/wp-c...cation-Tracking-Number-1Z51322Y3483221007.png
... following the link gives you a webpage looking like one of these screenshots pressing login does different things or -nothing- depending on the site:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/fake_UPS_tracking.png

This is a slightly more complicated infection chain that usual. There are -dozens- of different sites in the emails -hidden- behind the shipment details link. A lot of them don’t do anything except display a -fake- UPS website. Some however are connecting via an -iframe- to download
http ://rateventrithathen .info/track.php which gave me TRACK-1Z68725Y5236890147.js
Current Virus total detections 2/59*. Payload Security** | Joe Security***
Neither online sandbox retrieved any payload, whether the sites are blocked or the JS is VM aware is unknown... The basic rule is NEVER open any attachment or link in email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...8850128a15f80d9a91d87dcc/analysis/1506504272/
TRACK-1Z68725Y5236890147.js

** https://www.hybrid-analysis.com/sam...f6f8850128a15f80d9a91d87dcc?environmentId=100
Contacted Hosts
49.51.36.73

*** https://jbxcloud.joesecurity.org/analysis/378185/1/html

rateventrithathen .info: 49.51.36.73: https://www.virustotal.com/en/ip-address/49.51.36.73/information/
> https://www.virustotal.com/en/url/3...803f0919d514c92c67669aa5850787764cf/analysis/
___

Email credential phish...
- https://myonlinesecurity.co.uk/emai...ment-and-fake-generic-proforma-invoice-scams/
27 Sep 2017 - "... seeing a series of “attacks” using Adobe as the lure. So far I have seen 2 different ones...

Screenshot:
1] https://myonlinesecurity.co.uk/wp-c...9/Fake-Emirates-Bank-Cash-Statement-email.png
This email has a genuine PDF attachment with a link to http ://bit .ly/2wTMuYg which will -redirect- you to
http ://cloudy-exch .pw/invoice/update.HTML. There is a warning on the bit.ly page that alerts to it being a phishing or malware site but will -still- allow you to visit the page by clicking-the-link:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/cash-statement_pdf.png
... However downloading the html file will open in Firefox only on the computer.
The page looks like this:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/cloudy_data_text_adobe.png
... where -if- you enter any details and press submit, you are redirected to https ://drive.google .com/file/d/0BxKSeHpNweSsWldNaGpUMDlHWW8/view
... where you see this -fake- statement:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/cash-statement_google_drive.png

The next -phishing-scam- works right out of the box with no effort:
2] https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Request-For-Proforma-Invoice-Urgent.png
This PDF attachment looks like:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Ugent-New-Order_pdf.png
Where -if- you follow the link you go to
https ://app-onlinedoc.000webhostapp .com/Inv-47654345584.php?code=2000500 where you see:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/000webhost_adobe_scam.png
Entering details tries to -redirect- you to
http ://alliancecr .com/skd/xendr.php , Where I get a 404 page not found (a quick look up shows the site registered by Godaddy in 2001, The DNS is managed by Cloudflare and there is no site found, so it is highly likely that Cloudflare have null routed the DNS already)... A quick look at the source code of the 000webhost page shows that it appears to try to send the information via Googlemail... Update: within minutes of reporting the 000webhost site, it was taken down. That is fast abuse response. I wish all webhosts were so quick and efficient..."

cloudy-exch .pw: 185.158.249.100: https://www.virustotal.com/en/ip-address/185.158.249.100/information/
> https://www.virustotal.com/en/url/5...fe9ad674bdf10981d9228dd14d88de837b8/analysis/

app-onlinedoc.000webhostapp .com: 145.14.145.6: https://www.virustotal.com/en/ip-address/145.14.145.6/information/

alliancecr .com: Could not find an IP address for this domain name...
___

JavaScript and Stealer DLL Variant in New Attacks
- http://blog.talosintelligence.com/2017/09/fin7-stealer.html
Sep 27, 2017 - "... a newly discovered -RTF- document family that is being leveraged by the FIN7 group (also known as the Carbanak gang) which is a financially-motivated group targeting the financial, hospitality, and medical industries. This document is used in -phishing- campaigns to execute a series of scripting languages containing multiple obfuscation mechanisms and advanced techniques to bypass traditional security mechanisms. The document contains messages enticing the user to click on an embedded object that executes scripts which are used to infect the system with an information stealing malware variant. This malware is then used to steal passwords from popular browsers and mail clients which are sent to remote nodes that are accessible to the attackers... The dropper variant that we encountered makes use of an LNK file to execute wscript.exe with the beginning of the JavaScript chain from a word document object...
Command and Control IPs"
104.232.34.36: https://www.virustotal.com/en/ip-address/104.232.34.36/information/
5.149.253.126: https://www.virustotal.com/en/ip-address/5.149.253.126/information/
185.180.197.20: https://www.virustotal.com/en/ip-address/185.180.197.20/information/
195.54.162.79: https://www.virustotal.com/en/ip-address/195.54.162.79/information/
31.148.219.18: https://www.virustotal.com/en/ip-address/31.148.219.18/information/
(More detail at the talosintelligence URL above.)

:fear::fear: :mad:
 
Last edited:
Fake 'Scan xxx' SPAM

FYI...

Fake 'Scan xxx' SPAM - Necurs sent Locky/Trickbot
- https://myonlinesecurity.co.uk/necu...-same-vbs-file-using-geo-location-techniques/
28 Sep 2017 - "... malware downloaders coming from the necurs botnet... email with the subject of 'Emailing: Scan0253' (random numbers) pretending to come from random names at your-own-email-address or company domain. Today they have changed delivery method and will give either Locky Ransomware or Trickbot banking Trojan depending on your IP address and country of origin...

Screenshot: https://myonlinesecurity.co.uk/wp-c...can0253-locky-and-trickbot-delivery-email.png

Scan0253.7z: Extracts to: Scan0277.vbs - Current Virus total detections 11/59*. Payload Security** |
In this particular VBS example there were 6 hard coded urls
“geeks-online .de/9hciunery8g?”,
”freevillemusic .com/9hciunery8g?” (VirusTotal 9/65[3]) (Payload Security[4]) Looks like Trickbot
“anarakdesert .com/LUYTbjnrf?”,
”americanbulldogradio .com/LUYTbjnrf?”
”sherylbro .net/p66/LUYTbjnrf” (VirusTotal 20/65[5]) (Payload Security[6]) This one is Locky
“poemsan .info/p66/d8743fgh” - Also Locky but a different file hash (VirusTotal 39/64[7]) (Payload Security[8])
The lookup services used are : “https ://ipinfo .io/json”,
”http ://www.geoplugin .net/json.gp”,
”http ://freegeoip .net/json/”
Update: thanks to Racco42[9] we have full list of currently known URLs posted on Pastebin[10]...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...f77a8fd0c664098f01ec7ea6/analysis/1506589221/
Scan0277.vbs

** https://www.hybrid-analysis.com/sam...d2ff77a8fd0c664098f01ec7ea6?environmentId=100
Contacted Hosts
216.239.38.21
178.237.36.10
205.204.66.82


3] https://www.virustotal.com/en/file/...99b668c7fde2919e0f685256/analysis/1506589359/

4] https://www.hybrid-analysis.com/sam...c1499b668c7fde2919e0f685256?environmentId=100

5] https://www.virustotal.com/en/file/...5ad591fea251c8eceda750a6/analysis/1506589526/

6] https://www.hybrid-analysis.com/sam...6f15ad591fea251c8eceda750a6?environmentId=100

7] https://www.virustotal.com/en/file/...a65419cd116faa672b11963c/analysis/1506591639/

8] https://www.hybrid-analysis.com/sam...1d5a65419cd116faa672b11963c?environmentId=100

9] https://twitter.com/Racco42/status/913339950015373312

10] https://pastebin.com/ahfN337m

> http://blog.dynamoo.com/2017/09/malware-spam-emailing-scan0xxx-from.html
28 Sep 2017 - "This -fake- 'document scan' delivers different malware depending on the victim's location...
... All these recent attacks have used .7z archive files which would require 7zip or a compatible program to unarchive. Most decent mail filtering tools should be able to block -or- strip this extension, more clever ones would be able to determine that there is a .vbs script in there and block on that too."

:fear::fear: :mad:
 
Last edited:
Fake 'invoice', 'Office 365 invoice', 'order' SPAM

FYI...

Fake 'invoice' SPAM - deliver Locky/Trickbot
- https://myonlinesecurity.co.uk/anot...ds-today-payload-embedded-in-a-large-js-file/
29 Sep 2017 - "... Locky downloaders... an email with a blank/empty subject pretending to come from random names and email addresses. The body content pretends to be an 'invoice' notification. There are -no- attachments with these emails but a link-in-the-email-body goes to various -compromised- sites to download a .js file. As far as I can tell the actual Locky payload is -embedded- inside the .js file. For some strange reason the js file is named voicemsg_random numbers.js which would indicate that this was intended or has also been used in a voice message scam attempt to deliver Locky as well. The other strange thing in this campaign is the url in the body. All the ones I received are broken and start with 'ttp://' but looking at the mailscanner they look normal with a -complete- html on my server they look -normal- with a complete html and start with the proper 'http://'...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/invoice-email-with-blank-subject.png

voicemsg_088436.js - 410.7 KB (420558 bytes) - Current Virus total detections 5/59*. Payload Security**
| drops 1102.exe 298.0 KB (305152 bytes) - VirusTotal 14/65[3] - Payload Security[4].
Nothing is actually detecting these as -Locky- Ransomware and in fact some AV on VirusTotal detect as
-Cerber- Ransomware. I am only calling these Locky based on the
moroplinghaptan .info/eroorrrs post request (giving a 404) shown in the Payload Security report. This has been a strong Indicator-of-Compromise (IOC) for Locky recently.
> Update: I am reliably informed that it depends on your IP address and location what malware you get. You will either get
-Locky- Ransomware or -Trickbot- banking Trojan embedded inside the .js file.
Some of the download sites in the emails include:
http ://resortphotographics .com/invoice.html
http ://somallc .com/invoice.html
http ://pinkyardflamingos .com/invoice.html
http ://agregate-cariera .ro/invoice.html
http ://sgtenterprises .com/invoice.html
http ://weloveflowers .co.uk/invoice.html
They all use an -iframe- to actually download from
http ://moroplinghaptan .info/offjsjs/ - This site has been used in a later Locky campaign today that was spoofing voicemessages...
The basic rule is NEVER open any attachment or -link- an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...4a56a6bcc3f0dc59e0fbf5c5/analysis/1506691940/
voicemsg_088436.js

** https://www.hybrid-analysis.com/sam...dbc4a56a6bcc3f0dc59e0fbf5c5?environmentId=100
Contacted Hosts
49.51.133.167
216.58.213.174


3] https://www.virustotal.com/en/file/...b2eedef93440d3806053fe35/analysis/1506692289/
1102.exe

4] https://www.hybrid-analysis.com/sam...94ab2eedef93440d3806053fe35?environmentId=100

moroplinghaptan .info: 49.51.133.167: https://www.virustotal.com/en/ip-address/49.51.133.167/information/
> https://www.virustotal.com/en/url/4...578043c23b4b13900814b08f0582fcba588/analysis/
___

Fake 'Office 365 invoice' - delivers Locky
- https://myonlinesecurity.co.uk/fake-office-365-invoice-delivers-locky-ransomware/
29 Sep 2017 - "The 3rd version I have seen today... Locky downloaders has gone back to a traditional zip (7z) attachment containing a vbs file. This is an email pretending to be an 'Office 365 Invoice' with the subject of 'Invoice' pretending to come from the -same-name- that is in the recipient field. Random names & email addresses...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/Invoice_O365.png

604173.7z: Extracts to: Invoice_930546166795.vbs - Current Virus total detections 10/58*. Payload Security**
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...11aa068d9f2611fd21825268/analysis/1506683968/

** https://www.virustotal.com/en/file/...11aa068d9f2611fd21825268/analysis/1506683968/
Contacted Hosts
185.57.172.213: https://www.virustotal.com/en/ip-address/185.57.172.213/information/
___

Fake 'order' SPAM - delivers malware
- https://myonlinesecurity.co.uk/fake-order-malspam-email-with-uue-attachment-delivers-malware/
29 Sep 2017 - "... malware today, all using -different- or unusual delivery methods. This next example is about an order confirmation. The attachment is a .uue attachment. Winzip says it can open .UUE files but only extracted a -garbled- encrypted/encoded txt file. Universal extractor extracted a working .exe file...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/09/pecindia_order_email.png

order290917.uue: (virusTotal 4/58*) - Extracts to: order290917.exe - Current Virus total detections 14/64**
Payload Security***... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...ac426c7871c60757b5b6818d/analysis/1506681970/
order290917.uue

** https://www.virustotal.com/en/file/...a3c4628fc3b6d1e618cbe837/analysis/1506696900/
order290917.exe

*** https://www.hybrid-analysis.com/sam...d4ba3c4628fc3b6d1e618cbe837?environmentId=100

:fear::fear: :mad:
 
Last edited:
Fake 'order' SPAM

FYI...

Fake 'order' SPAM - delivers malware
- https://myonlinesecurity.co.uk/another-fake-order-email-with-rtf-attachment-delivers-malware/
2 Oct 2017 - "An email with the subject of 'Fwd: Re: Order' pretending to come from info@ anashin .am with a malicious word doc attachment delivers malware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/10/order_02101777_doc_email.png

Order0210177.doc - Current Virus total detections 15/58*. Payload Security** downloads
http ://birsekermasali .com/hta/gen.hta (VirusTotal 15/57[3]) (Payload Security[4]) which in turn downloads
http ://birsekermasali .com/css_files/gen/quote.exe (VirusTotal 25/66[5]) (Payload Security[6])... This email attachment contains what appears to be a genuine word doc or Excel XLS spreadsheet with either a macro script or an embedded OLE object that when run will infect you... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...85e24645beb977967a01e322/analysis/1506949614/
Order0210177.doc

** https://www.hybrid-analysis.com/sam...ba585e24645beb977967a01e322?environmentId=100
DNS Requests
192.185.115.14

3] https://www.virustotal.com/en/file/...32d4eb19bf5cd8bc851a4af6/analysis/1506968237/
gen.hta

4] https://www.hybrid-analysis.com/sam...12032d4eb19bf5cd8bc851a4af6?environmentId=100
Contacted Hosts
192.185.115.14
198.187.29.143


5] https://www.virustotal.com/en/file/...0328234d26944e6d337df458/analysis/1506967286/
quote.exe

6] https://www.hybrid-analysis.com/sam...5420328234d26944e6d337df458?environmentId=100

birsekermasali .com: 192.185.115.14: https://www.virustotal.com/en/ip-address/192.185.115.14/information/
> https://www.virustotal.com/en/url/e...f6eca70518cf8355d62e69c902a96fc43f3/analysis/

> https://www.virustotal.com/en/url/d...7dd1ce727788e68ab696cbedbc8e9b26ef3/analysis/

:fear::fear: :mad:
 
Fake 'FedEx', 'Shipping', 'Cash Statement' SPAM

FYI...

Fake 'FedEx' SPAM - leads to info stealer
- https://isc.sans.edu/diary/rss/22888
2017-10-03 - "... On Monday 2017-10-02, I ran across malicious spam (malspam) pushing Formbook, an information stealer. Arbor Networks has a good article about Formbook here:
> https://www.arbornetworks.com/blog/asert/formidable-formbook-form-grabber/
... The email is disguised as a 'FedEx delivery notice'. It has a-link-to-a-compromised-website that's hosting malware. The link points to a supposed document for this fake delivery:
> https://isc.sans.edu/diaryimages/images/2017-10-03-ISC-diary-image-01.jpg
Clicking on-the-link (DON'T) returned a RAR archive. The RAR archive contains a Windows executable that's poorly-disguised as some sort of receipt... indicators seen during the infection from Formbook malspam on Monday 2017-10-02:
Email:
Date/Time: 2017-11-02 at 14:23 UTC
Subject: Re: Alert: FedEx OFFICE Delivery® ... 17-10-02, at 07:22:11 AM BA
From: "DOCUMENT2017" <gifcos@ tutanota.com>
Link from the email: hxxps ://superiorleather .co.uk/Receipt.r22

Traffic seen when retrieving the RAR archive:
185.46.121.66 [1] port 443 - superiorleather .co.uk - GET /Receipt.r22 ..."
1] 185.46.121.66: https://www.virustotal.com/en/ip-address/185.46.121.66/information/
> https://www.virustotal.com/en/url/9...0d6d6049cedc3bdc9497f1334c0dcfc6369/analysis/
Post-infection traffic:
47.90.52.201 port 80 - www .shucancan .com - GET /ch/?id=[80 character ID string]
52.87.61.120 port 80 - www .ias39 .com - GET /ch/?id=[80 character ID string]
66.206.43.242 port 80 - www .fairwaytablet .com - GET /ch/?id=[80 character ID string]
103.38.43.236 port 80 - www .chunsujiayuan .com - GET /ch/?id=[80 character ID string]
104.250.134.156 port 80 - www .ebjouv .info - GET /ch/?id=[80 character ID string]
104.31.80.135 port 80 - www .dailyredherald .com - GET /ch/?id=[80 character ID string]
153.92.6.50 port 80 - www .beykozevdenevenakliyatci .com - GET /ch/?id=[80 character ID string]
162.242.173.39 port 80 - www .238thrift .com - GET /ch/?id=[80 character ID string]
180.178.39.66 port 80 - www .et551 .com - GET /ch/?id=[80 character ID string]
195.154.21.65 port 80 - www .lesjardinsdemilady .com - GET /ch/?id=[80 character ID string]
198.54.114.238 port 80 - www .prfitvxnfe .info - GET /ch/?id=[80 character ID string]
199.34.228.59 port 80 - www .craigjrspestservice .com - GET /ch/?id=[80 character ID string]

162.242.173.39 port 80 - www .238thrift .com - POST /ch/
198.54.114.238 port 80 - www .prfitvxnfe .info - POST /ch/ "
(More detail @ the isc URL above.)

> http://www.malware-traffic-analysis.net/2017/10/03/index.html
___

Fake 'Shipping' SPAM - delivers malware
- https://myonlinesecurity.co.uk/fake...arrangement-process-malspam-delivers-malware/
3 Oct 2017 - "... an email with the subject of 'Re: Shipping arrangement process' pretending to come from Valero .com but coming from Anna Brugt <dhen.ordonez@ ritetrend .com.ph>...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/10/Shipping-arrangement-process.png

There is a-link-in-the-email body to
http ://www.oysterpublicschool .com//hy/reciept/_outputC9E322F.exe which gives a 404,
but there is also a RAR attachment with a file of the same name. It is highly likely that other versions of this email will have a different download link, that might be active.

_outputC9E322F.rar: Extracts to: _outputC9E322F.exe - Current Virus total detections 15/66*. Payload Security**
The basic rule is NEVER open any attachment -or- link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...be97ecdc8db6b8d711f7102f/analysis/1507051011/
_outputC9E322F.exe

** https://www.hybrid-analysis.com/sam...023be97ecdc8db6b8d711f7102f?environmentId=100
Contacted Hosts
109.169.89.11

oysterpublicschool .com: 192.185.115.66: https://www.virustotal.com/en/ip-address/192.185.115.66/information/
___

Fake 'Cash Statement' SPAM - delivers malware
- https://myonlinesecurity.co.uk/cash-statement-of-account-10032017-malspam-delivers-malware/
3 Oct 2017 - ... Malware downloaders... an email with the subject of 'Cash Statement of Account 10/03/2017' coming from Front Desk <reception@ st-timsrc .org>...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/10/Cash-Statement-of-Account-10-03-2017.png

The email has a pdf attachment with a link to
https ://goo .gl/4tzM3b which redirects to
http ://uae-moneyremit .top/plugins/cfare.html where you seen a page like this asking you to install a plugin to view the page:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/10/plugin_needed.png

Pressing install will download
https ://www.dropbox .com/s/piw5k38lytremqz/firefoxplugin_install.exe (VirusTotal 13/64*) (Payload Security**)

We have had a series of these emails recently (28 September 2017) was DAY END CASH PAYMENT REPORT AS ON 28/09/2017 which delivered fxplugin_install.exe (VirusTotal 44/65[3]) (Payload Security[4]) which was netwire RAT...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...45641cdd15de59c2296ca04d/analysis/1507058018/
firefoxplugin_install.exe

** https://www.hybrid-analysis.com/sam...d5045641cdd15de59c2296ca04d?environmentId=100
Contacted Hosts
5.206.227.248

3] https://www.virustotal.com/en/file/...f06df2de28e055be74c2252b/analysis/1506917666/

4] https://www.hybrid-analysis.com/sam...8e6f06df2de28e055be74c2252b?environmentId=100
Contacted Hosts
85.159.233.23

:fear::fear: :mad:
 
Last edited:
Fake 'Copy of invoice', 'Payment Confirmation' SPAM

FYI...

Fake 'Copy of invoice' SPAM - delivers Locky
- https://myonlinesecurity.co.uk/fake...r-invoice-attached-delivers-locky-ransomware/
4 Oct 2017 - "... Locky downloaders... an email with the subject of 'Copy of invoice A5165059014. Please find your invoice attached' pretending to come from online@ screwfix .com...

Screenshot: https://myonlinesecurity.co.uk/wp-c...5059014-Please-find-your-invoice-attached.png

InvoiceA5165059014.7z: Extracts to: Invoice558727316499528791952132.vbs - Current Virus total detections 6/59*
Payload Security** downloads from one of these hard coded locations in this vbs. (There will be numerous others):
“spazioireos .it/8etyfh3ni?”,
”derainlay .info/p66/8etyfh3ni”,
”turfschiploge .nl/8etyfh3ni?” (VirusTotal 16/65[3])...

> Update: current list of known download sites PASTEBIN(a) thanks to Racco42(b)
a) https://pastebin.com/ajXf4k0f
b) https://twitter.com/Racco42

The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6a8170a14fc9c527b13ab751/analysis/1507106667/
Invoice558727316499528791952132.vbs

** https://www.hybrid-analysis.com/sam...f3d6a8170a14fc9c527b13ab751?environmentId=100
Contacted Hosts
81.29.205.233

3] https://www.virustotal.com/en/file/...3dd24422940c28cc8fd22ac2/analysis/1507107227/

spazioireos .it: 81.29.205.233: https://www.virustotal.com/en/ip-address/81.29.205.233/information/

derainlay .info: https://en.wikipedia.org/wiki/Fast_flux

turfschiploge .nl: 46.235.43.11: https://www.virustotal.com/en/ip-address/46.235.43.11/information/
___

Fake 'Payment Confirmation' SPAM - delivers java adwind
- https://myonlinesecurity.co.uk/fake-xpress-money-payment-confirmation-delivers-java-adwind/
4 Oct 2017 - "... -fake- financial themed emails containing java adwind or Java Jacksbot attachments or -links- to download them. I have previously mentioned many of these HERE[1]...
1] https://myonlinesecurity.co.uk/?s=java+adwind

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/10/Xpress-Money-Payment-Confirmation.png

Xpress Money Payment Confirmation.jar (462kb) - Current Virus total detections 16/62*. Payload Security**...
All the links-in-the-email (including the -image- of an XLS file) go to the-same-url (guaranteed to be a compromised site), where the all the site content is now about QTUM, a -bitcoin- exchange. I have been seeing several compromised malware delivery sites recently with all their content changed to the QTUM content) to download a zip file:
http ://restaurantelburladero .com/Xpress Money Payment Confirmation.z (.z is a file extension that many unzipping utilities will extract from, although not commonly used)... The basic rule is NEVER open any attachment or link in an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...50ee38e5f54918b9b41137ac/analysis/1507035357/
Scan 2017100323 114727.xls Here.JAR

** https://www.hybrid-analysis.com/sam...c4950ee38e5f54918b9b41137ac?environmentId=100
Contacted Hosts
216.58.209.238

restaurantelburladero .com: 5.2.88.79: https://www.virustotal.com/en/ip-address/5.2.88.79/information/
> https://www.virustotal.com/en/url/a...cb7f8c9316b5e478594bfe9e1bafd31fc97/analysis/
___

'Dnsmasq' - multiple vulnerabilities
> https://www.helpnetsecurity.com/2017/10/03/dnsmasq-flaws/
Oct 3, 2017
> https://www.kb.cert.org/vuls/id/973527
2 Oct 2017
> http://www.securitytracker.com/id/1039474
Oct 2 2017

:fear::fear: :mad:
 
Last edited:
Back
Top