SPAM frauds, fakes, and other MALWARE deliveries...

Fake 'Payment Summary', 'Optus agreement', 'ein Foto', 'SWIFT transfer' SPAM

FYI...

Fake 'Payment Summary' SPAM – PDF malware
- http://myonlinesecurity.co.uk/payme...e-for-201415-financial-year-fake-pdf-malware/
30 Sep 2015 - "An email with the subject of 'Payment Summary (Group Certificate) for 2014/15 financial year' pretending to come from payslip@ hss.health.nsw. gov.au with a zip attachment is another one from the current bot runs... The content of the email says :
Please find attached a copy of your 2014/15 Payment Summary (Group Certificate).
Note: You will receive a separate payment summary for each Health Agency you worked for during the 2014/15 financial year. Payment Summaries are also available in Employee Self Service.
Further information, including fact sheets ...
For taxation advice and information, visit ...
Thank you,
Recruitment and Employee Transactional Services
HealthShare NSW ...


30 September 2015: PAYG-EoY-2014-15-77015286-008001475.zip:
Extracts to: PAYG-EoY-2014-15-77015286-008001475.scr
Current Virus total detections 3/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...d84546a712d9241b6b4662e2/analysis/1443589224/
___

Fake 'Optus agreement' SPAM – PDF malware
- http://myonlinesecurity.co.uk/completed-optus-agreement-no-rdre-211363-fake-pdf-malware/
30 Sep 2015 - "An email with the subject of 'Completed: Optus agreement no RDRE-211363' pretending to come from DocuSign via DocuSign <dse_eu8@ docusign .net> with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/09/Completed-Optus-agreement-1024x647.png

30 September 2015: Optus agreement no RDRE-211363.zip:
Extracts to: Optus agreement no CDDO-248440.scr
Current Virus total detections 2/57* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...80e08c74b547e4b913ba74d3/analysis/1443586066/
___

Fake 'ein Foto' SPAM – jpg malware
- http://myonlinesecurity.co.uk/ein-foto-fake-jpg-malware/
30 Sep 2015 - "An email with the subject of 'ein Foto' pretending to come from Z@ t-mobile .de with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/09/ein-photo-1024x521.png

30 September 2015: 77895767_IMG ‘jpeg’.zip:
Extracts to: 77266374_IMG ‘jpeg’.JPEG.exe
Current Virus total detections 0/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper JPG (Image) file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...9d108fb21a44caa67dd03b0d/analysis/1443597445/
___

Fake 'SWIFT transfer' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/09/malware-spam-fw-incoming-swift-clyde.html
30 Sep 2015 - "This -fake- banking email comes with a malicious attachment:
From "Clyde Medina" [Clyde.Medina@ swift .com]
Date Wed, 30 Sep 2015 12:35:56 GMT
Subject FW : Incoming SWIFT
We have received this documents from your bank regarding an incoming SWIFT transfer.
CONFIDENTIAL NOTICE: The contents of this message, including any attachments, are
confidential and are intended solely for the use of the person or entity to whom
the message was addressed. If you are not the intended recipient of this message,
please be advised that any dissemination, distribution, or use of the contents of
this message is strictly prohibited. If you received this message in error, please
notify the sender. Please also permanently delete all copies of the original message
and any attached documentation. Thank you.


Attached is a file SWIFT_transfer.zip which contains a malicious executable SWIFT_transfer.scr which currently has a detection rate of 2/56*. Automated analysis is pending, although the payload is almost definitely Upatre/Dyre..."
* https://www.virustotal.com/en/file/...65f74cf662e60da779896e11/analysis/1443616096/
UPDATE: "The Hybrid Analysis report** shows Upatre/Dyre activity, including the malware phoning home to a familiar IP address of 197.149.90.166 in Nigeria which I recommend you -block- or monitor."
** https://www.hybrid-analysis.com/sam...d75ce65f74cf662e60da779896e11?environmentId=2
197.149.90.166: https://www.virustotal.com/en/ip-address/197.149.90.166/information/
2015-09-30
___

Optus DocuSign Spam
- http://threattrack.tumblr.com/post/130196981088/optus-docusign-spam
Sep 30, 2015 - "Subjects Seen
Completed: Optus agreement no AELT-773123
Typical e-mail details:
Carole Dean,
All parties have completed the envelope ‘Optus agreement no AELT-773123’.
Please find attached the signed agreement.


Malicious File Name and MD5:
Optus agreement no CDDO-248440.scr (ADCAED61174AF9FA4C1DB3F27A767316)


Screenshot: https://41.media.tumblr.com/fce5190eff6e1733726d81f67aa793d3/tumblr_inline_nvhoy953JK1r6pupn_500.png

Tagged: Optus, DocuSign, Upatre
___

ATM Skimmer Gang -firebombed- A/V Firm
- http://krebsonsecurity.com/2015/09/atm-skimmer-gang-firebombed-antivirus-firm/
Sep 29, 2015 - "... cybercime spills over into real-world, physical attacks... a Russian security firm whose operations were pelted with Molotov cocktail attacks after exposing an organized crime gang that developed and sold malicious software to steal cash from ATMs. The threats began not long after December 18, 2013, when Russian antivirus firm Dr.Web posted a writeup about a new Trojan horse program designed to steal card data from infected ATMs. Dr.Web received an email warning the company to delete all references to the ATM malware from its site. The anonymous party, which self-identified as the 'International Carders Syndicate', said Dr.Web’s ATM Shield product designed to guard cash machines from known malware 'threatens activity of Syndicate with multi-million dollar profit'... In an interview with KrebsOnSecurity, Dr.Web CEO Boris Sharov said the company did not comply with the demands. On March 9, 2014, someone threw a Molotov cocktail at the office of a third-party company that was distributing Dr.Web’s ATM Shield product. Shortly after that, someone attacked the same office again... After a third attack on the St. Petersburg office, a suspect who was seen running away from the scene of the attack was arrested but later released because no witnesses came forward to confirm he was the one who threw the bomb. Meanwhile, Sharov said Dr.Web detected two physical intrusions into its Moscow office... Sharov said Dr.Web analysts believe the group that threatened the attacks were not cyber thieves themselves but instead an organized group of programmers that had sold — but not yet delivered — a crimeware product to multiple gangs that specialize in cashing out hacked ATM cards... Sharov said he also believes that the group of malware programmers who sent the threats weren’t the same miscreants who threw the Molotov cocktails. Rather, Dr.Web maintains that those attacks were paid for and ordered over the Internet, for execution by strangers who answered a criminal help wanted ad... Sharov said his office got confirmation from a bank in Moscow that the team behind on the ATM Trojan that caused all the ruckus was operating out of Kiev, Ukraine. In the 18 months since then, the number of ATM-specific Trojans has skyrocketed, although the attackers seem to be targeting mainly Russian, Eastern European and European banks with their creations..."
(More detail at the krebsonsecurity URL above.)

:fear::fear: :mad:
 
Last edited:
Fake 'Please print' SPAM, Nuclear EK notes

FYI...

Fake 'Please print' SPAM - doc malware
- http://myonlinesecurity.co.uk/chelsee-gee-ucblinds-please-print-word-doc-malware/
1 Oct 2015 - "An email with the subject of 'Please print' pretending to come from 'Chelsee Gee <chelsee@ ucblinds .co.uk> with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Please-print-1024x742.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/02/Excel_macro_protected-mode-1024x604.png
01 October 2015 : Order-SO00653333-1.doc - Current Virus total detections 6/56 * . MALWR**
The Payload Security Hybrid analysis*** shows a download from www .ifdcsanluis .edu.ar/123/1111.exe [5]
(VirusTotal 1/57 [4]) which is most likely to be Dridex banking malware... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...2f83b4df3a1dc67764235256/analysis/1443691578/

** https://malwr.com/analysis/NTU0YzdhOWQyOTIyNDhlYjgwNjlhOWIwMDRkMGJkNWQ/

*** https://www.hybrid-analysis.com/sam...8599b2f83b4df3a1dc67764235256?environmentId=1

4] https://www.virustotal.com/en/file/...2deb80a636ac2e2465e9e9a0/analysis/1443690542/

5] "... There are frequently 5 or 6 download locations all delivering exactly the same malware..."

- http://blog.dynamoo.com/2015/10/malware-spam-please-print-chelsee-gee.html
1 Oct 2015 - "... received several copies of this, and the normal method is that there are several different email attachments.. 'will look at just one. Named Order-SO00653333-1.doc this file has a detection rate of 6/56*, and it contains this malicious macro... The Hybrid Analysis report** for this particular document shows the malware downloading from:
hobby-hangar .net/123/1111.exe
Other locations are:
miastolomza .pl/123/1111.exe
www .ifdcsanluis .edu.ar/123/1111.exe
www .norlabs .de/123/1111.exe
zahnrad-ruger .de/123/1111.exe
This binary has a VirusTotal detection rate of 2/56*** and the Hybrid Analysis report for that is here[4].
The payload is the Dridex banking trojan, and in fact this is the first Dridex I have seen in over a month after some of the alleged perpatrators were arrested[5].
Recommended blocklist:
miastolomza .pl
ifdcsanluis .edu.ar
norlabs .de
zahnrad-ruger .de
hobby-hangar .net
"
* https://www.virustotal.com/en/file/...96e841e454fd5791e56f67db/analysis/1443701260/

** https://www.hybrid-analysis.com/sam...b5d5a96e841e454fd5791e56f67db?environmentId=1

*** https://www.virustotal.com/en/file/...c4a357f5c785f23ea7450f43/analysis/1443701636/

4] https://www.hybrid-analysis.com/sam...ddbd2c4a357f5c785f23ea7450f43?environmentId=1

5] http://krebsonsecurity.com/2015/09/arrests-tied-to-citadel-dridex-malware/
___

Tax Refund Due HMRC – Phish ...
- http://myonlinesecurity.co.uk/tax-refund-due-hmrc-phishing/
1 Oct 2015 - "One of the major common subjects in a phishing attempt is 'Tax return' and 'tax refunds' where especially in UK, you need to submit your Tax Return online. This email with a subject of 'Tax Refund Due' pretending to come from HMRC is more unusual in that it is directly targeted at a user by your full correct name instead of the usual 'dear Tax Payer' or such similar generic title. This one wants your personal details, email address and your credit card and bank details as well as driving licence and National Insurance number . Many of them are also designed to specifically steal your email, Facebook and other social network log in details. The information from this -phish- can make a new version of you and cause untold damage... It will NEVER be a genuine email from HMRC so don’t ever fill in the html ( webpage) form that comes attached to the email. Some versions of this phish will have a -link- to a website that looks at first glance like the genuine HMRC website. That is also false:
Tax Refund
Dear [REDACTED]
This is a reminder that you have not yet claimed your refund of 265.48 GBP. We have calculated that this the amount you will be refunded. Press Request Refund below in order to complete your refund request.
Please wait 4 weeks after making an online claim and 6 weeks after making a postal claim before contacting HMRC about the payment.
Terms & Conditions | Policy | Freedom of Information


The links in the email go to http ://www .revenue-apply .gov.uk.medi7.xyz/Tax-Refund.php? where if you aren’t very wary you won’t notice the fact that it is -not- a genuine gov.uk site but one ending in .xyz another reason to be-wary of these new domains that can be anything. If you follow the link you see a webpage looking like:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Tax-Refund-Due_web_page.png
Once you fill in the details you are -bounced- on to the genuine HMRC site. All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email..."
___

Recent trends in Nuclear Exploit Kit activity
- https://isc.sans.edu/diary.html?storyid=20203
2015-10-01 - "Since mid-September 2015, I've generated a great deal of Nuclear exploit kit (EK) traffic after checking -compromised- websites. This summer, I usually found Angler EK. Now I'm seeing more Nuclear. Nuclear EK has also been sending -dual- payloads... I hadn't noticed it again from Nuclear EK until recently. This time, one of the payloads appears to be ransomware... To be clear, Nuclear EK isn't always sending two payloads, but I've noticed a dual payload trend with this recent increase in Nuclear EK traffic. Furthermore, on Wednesday 2015-09-30, the URL pattern for Nuclear EK's landing page changed... Like other EKs, Nuclear EK keeps evolving. We will continue to keep an eye on the situation and let you know of any significant developments. Packet captures of the 2015-09-30 Nuclear EK traffic are available..."
(More detail at the isc URL above.)
___

Commonwealth Bank NetBank Spam
- http://threattrack.tumblr.com/post/130271990733/commonwealth-bank-netbank-spam
Oct 1, 2015 - "Subjects Seen
First NetBank Third Party Payment
Typical e-mail details:
First NetBank Third Party Payment
Your first transfer to the following third party account(s) has been successfully processed:
From Account: **** **** **** 4362 MasterCard To Account(s): Raul Murphy 574-152 ***6782 Maestro $4,326.78 Credit help Date: 01/10/2015
Please check attached file for more information about this transaction.
Yours sincerely,
Commonwealth Bank of Australia


Malicious File Name and MD5:
CBA Third Party Payment 510569701.scr (3BBC3DBE68B6AB28F2516F8F814D8005)


Screenshot: https://36.media.tumblr.com/aa2ac3b404944698e722b7890bab7ed8/tumblr_inline_nvjro2JXzq1r6pupn_500.png

Tagged: Commonwealth Bank, Upatre

:fear::fear: :mad:
 
Last edited:
Fake 'SecureMail', 'PayPal' SPAM, PDF 'Phish'

FYI...

Fake 'SecureMail' SPAM - doc malware
- http://myonlinesecurity.co.uk/anz-bank-securemail-you-have-1-new-message-word-doc-malware/
2 Oct 2015 - "An email with the subject of 'SecureMail: You have 1 new message' pretending to come from ANZ Bank <secure@ anz .com> with a malicious word doc attachment is another one from the current bot runs... The email looks like:
You have received a secure message
Read your secure message by opening SecureMessage.doc. You will be prompted to open (view) the file or save (download) it to your computer. For best results, save the file first, then open it.
In order to view the attachment please open it using your email client (Microsoft Outlook, Mozilla Thunderbird, Lotus ).
First time users – will need to register after opening the attachment.
About Email Encryption please check our website ...


... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21.png
...
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/02/Excel_macro_protected-mode.png
... This particular version pretends to have a digital RSA key...
2 October 2015: SecureMail.doc - Current Virus total detections 11/56* ... Some antivirus companies are indicating that this is downloading Upatre which will in turn download Dyre or Dridex banking malware... Edit:.. the Upatre binary is -embedded- inside the word doc that gets extracted and run from %temp%/w1.exe (VirusTotal 21/56 **). So far I have only examined 1 version of this malware... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6bcb159019c41440f3437fda/analysis/1443754962/

** https://www.virustotal.com/en/file/...71a3213b46cdbc16a5af75b5/analysis/1443785738/
___

Fake 'PayPal' SPAM - fake app/Trojan
- http://net-security.org/malware_news.php?id=3119
2.10.2015 - "An email spam run impersonating PayPal is actively targeting German Android users and trying to trick them into downloading what is ostensibly the official PayPal app, but is actually a banking Trojan. The -fake email- looks pretty believable - the PayPal logo, (relatively) good German, some basic clean design - and some recipients were likely convinced into installing the app. According to Trend Micro researchers*, the malicious app is -not- hosted on Google Play. This is where the Android setting set on disallowing the installation of non-Market application can really save users. If a user proceeds with downloading and installing the app, the Trojan will ask to be made a "Device Administrator". This will help it hide from the user's sight and make it more difficult to remove, as well as allow it to perform a number of other changes:
> http://www.net-security.org/images/articles/paypal-fake-02102015.jpg
... The fake app/Trojan is able to perform UI hijacking, which will allow it to impersonate a number of legitimate apps when the user is required to enter their login credentials to perform an action. "Once the malware detects the real PayPal app is running, it will put up a fake UI on top of the real one, effectively hijacking the session and stealing the user’s PayPal credentials," they explained. The same thing happens when the victim tries to use the official online banking app of German Commerzbank, and several other banks popular in the country. Unfortunately for potential targets, the crooks behind this scheme are not only misusing the good name of PayPal to trick users into installing this Trojan. The same malware also comes disguised as Flash Player, game apps and adult apps. Users are advised to be careful about the apps they install (check the permissions it asks), and not to trust unsolicited emails urging them to download something."
* http://blog.trendmicro.com/trendlab...-mobile-banking-malware-posing-as-paypal-app/
___

'PDF version not supported' - Phish ...
- https://blog.malwarebytes.org/onlin...-pdf-version-is-not-supported-data-uri-phish/
Oct 2, 2015 - "We noticed a certain Bit .ly link getting some attention over the last few days, and stopped to take a closer look. The bit .ly link, which has had 1,901 clicks since September 7th (985 of occured over the last 3 days), shows numerous Email service referrers in the Bit.ly stats in relation to “Where this is being shared”. While we don’t have a copy of an -email- it seems a safe bet to think it would be one of those “You have an important document waiting” messages so beloved of spammers everywhere. We managed to find a hit for the Bit .ly link contained in a particular PDF document called “Scan002.pdf”. Piecing it all together, the run of play appears to be:
- Potential victim receives a “You have a document waiting” type missive via email (and possibly other channels).
- They either open an attached PDF document, or are linked to it directly (the latter would be a somewhat more cumbersome method).
- The PDF document, which does not appear to be malicious, displays the following:
> https://blog.malwarebytes.org/wp-content/uploads/2015/09/pdfphish3.jpg
'This PDF version is not supported. Click here to view online'
Clicking the Bit.ly link takes the clicker to
groovytouchmedia(dot)com/grail/pdnet(dot)html
From there, the URL will suddenly appear to make little sense to most people as it switches from something the above, to what may seem like a long line of gibberish:
> https://blog.malwarebytes.org/wp-content/uploads/2015/09/pdfphish1.jpg
What’s actually happening here is something called Data URI phishing, an attempt at disguising a phish attack from potential victims which we see every now and again*. After entering an email address and password, hitting the “Your Document” button leads to the following “Document has been removed” splash:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/pdfphish4.jpg
After this, the victim is forwarded on to the frontpage of a free file hosting service to complete the illusion. Regardless of how a “file waiting for you online” comes to your initial attention, always be wary and -never- hand over your login credentials to unfamiliar websites – especially if a random email should come into play. It simply isn’t worth the risk."
* https://blog.malwarebytes.org/fraud-scam/2015/01/avoid-this-outlook-phish/

groovytouchmedia(dot)com: 50.28.9.115: https://www.virustotal.com/en/ip-address/50.28.9.115/information/

>> https://www.virustotal.com/en/url/6...836c183679518f48744c4178aa106028295/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'FedEx delivery' SPAM

FYI...

Fake 'FedEx delivery' SPAM – JS malware
- http://myonlinesecurity.co.uk/fedex-international-next-flight-shipment-delivery-problem-js-malware/
Last revised or Updated on: 3rd Oct, 2015 - "An email with the subject of 'Shipment delivery problem #0000701821 [random numbered]' pretending to come from 'FedEx International Next Flight' with a zip attachment is another one from the current bot runs... The content of the email says :
Dear Customer,
We could not deliver your parcel.
You can review complete details of your order in the find attached.
Regards,
Johnny Cantrell,
Sr. Operation Agent...


... Other subjects in this set of malicious malspam include:
Problem with parcel shipping, ID:00000953180
Problems with item delivery, n.0000823595

Other senders pretend to be:
FedEx Standard Overnight
FedEx International MailService
...
2 October 2015: Delivery_Notification_0000701821.zip: Extracts to: Delivery_Notification_0000701821.doc.js
Current Virus total detections 2/57*... which should be contacting these 3 sites
alejandrosanchezvejar .com: 198.252.71.136: https://www.virustotal.com/en/ip-address/198.252.71.136/information/
icandymobile .com: 23.91.123.48: https://www.virustotal.com/en/ip-address/23.91.123.48/information/
laurenszedlak .com: 96.31.35.72: https://www.virustotal.com/en/ip-address/96.31.35.72/information/
... but doesn’t appear to be downloading any malware or actually contacting them (Payload Security Hybrid analysis**)
3 October 2015: Delivery_Notification_00000953180.zip:
Extracts to: Delivery_Notification_00000953180.doc.js
Current Virus total detections 8/57 ***... which contacts these 3 sites
clicks-tec .com: 96.31.35.72
dominaeweb .com: 174.36.231.69: https://www.virustotal.com/en/ip-address/174.36.231.69/information/
laurenszedlak .com: 96.31.35.72
... and downloads these files 74404411.exe (VirusTotal 4/57 [4]) and e13dbe35c0786[1].gif (VirusTotal 1/56 [5])
(Payload Security Hybrid analysis [6]) MALWR[7] Note: the automatic tools seem to have problems analysing these javascript files and aren’t getting the payload in many cases.
This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...a9409c36f03ecfd58e7ca486/analysis/1443817957/

** https://www.hybrid-analysis.com/sam...29cf3a9409c36f03ecfd58e7ca486?environmentId=1

*** https://www.virustotal.com/en/file/...50c3a9982ece5934d0908e0e/analysis/1443849155/

4] https://www.virustotal.com/en/file/...b72be968e93b82a854df9203/analysis/1443850296/

5] https://www.virustotal.com/en/file/...50c3a9982ece5934d0908e0e/analysis/1443849155/

6] https://www.hybrid-analysis.com/sam...ccd3850c3a9982ece5934d0908e0e?environmentId=1

7] https://malwr.com/analysis/MGY2YTliOWFlMzE2NGY4ZWFjZWQxOTRlNDU5NmM3NWM/

:fear::fear: :mad:
 
Fake 'Invoices' SPAM

FYI...

Fake 'Invoices' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-your-invoices-incident.html
5 Oct 2015 - "This -fake- financial spam is not from Incident Support Group Ltd but is instead a simple -forgery- with a malicious attachment:
From repairs@ isgfleet .co.uk
Date Mon, 05 Oct 2015 15:47:11 +0700
Subject Your Invoices - Incident Support Group Ltd
Please find attached your invoices from Incident Support Group Ltd. If you wish to
change the email address we have used please email repairs@ isgfleet .co.uk with the
correct details.


In the sample I saw, the attached file was 216116.xls which has a VirusTotal detection rate of 6/56* and contains this malicious macro... which then downloads a compenent from the following location:
agridiotiko .com/432/4535.exe
Note that at the time of writing, I only have one sample of this. There are usually several versions of the attachment in these spam runs, with different download locations. The malicious binary has a detection rate of 4/56**. The VirusTotal report and this Hybrid Analysis report[3] indicate traffic to:
84.246.226.211 (ELB Multimedia, France)
Blocking or monitoring traffic to and from the port would probably be prudent. The payload is most likely the Dridex banking trojan.
UPDATES: Other download locations spotted so far:
www .poncho-zwerfkatten .be/432/4535.exe "
* https://www.virustotal.com/en/file/...54ec0e8b3f7a8d3e1d67e758/analysis/1444035346/

** https://www.virustotal.com/en/file/...2b9cfde70296a4de7dca7f49/analysis/1444035400/
... Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/

3] https://www.hybrid-analysis.com/sam...2cd7e2b9cfde70296a4de7dca7f49?environmentId=1

agridiotiko .com: 80.67.28.152: https://www.virustotal.com/en/ip-address/80.67.28.152/information/

poncho-zwerfkatten .be: Could not find an IP address for this domain name.

- http://myonlinesecurity.co.uk/your-...port-group-ltd-excel-xls-spreadsheet-malware/
5 October 2015: 216116.xls
Current Virus total detections 7/56*
Downloads conserpa.vtrbandaancha .net/432/4535.exe (VirusTotal**)
* https://www.virustotal.com/en/file/...c30380a080306847f0fb0e8d/analysis/1444044622/

** https://www.virustotal.com/en/file/...2b9cfde70296a4de7dca7f49/analysis/1444040840/
... Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/

vtrbandaancha .net: Could not find an IP address for this domain name.

:fear::fear: :mad:
 
Last edited:
Fake 'Copy of Invoice(s)', 'BL Draft', 'WeTransfer' SPAM, 'Angler' EK disrupted

FYI...

Fake 'Copy of Invoice(s)' SPAM – doc malware
- http://myonlinesecurity.co.uk/copy-of-invoices-hammondsofknutsford-co-uk-word-doc-malware/
6 Oct 2015 - "An email with the subject of 'Copy of Invoice(s)' pretending to come from Anny Beckley <Anny@ hammondsofknutsford .co.uk> with a malicious word doc is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Copy-of-Invoices-1024x559.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/02/Excel_macro_protected-mode-1024x604.png
6 October 2015 : Q_46Q0VWHU4.DOC - Current Virus total detections 7/57*
Hybrid analysis** . ... A manual interpretation of the malicious macro gives me http ://measelaw .com/65yg3f/43g5few.exe which returns a 'not found' but a search by file name gives http ://rothschiller .net/~medicbt9/65yg3f3/43g5few.exe (VirusTotal 2/56 ***)... There appear to be 2 different files of that name on the server 1st one is 132 kb (VirusTotal 2/56 [4]) 2nd one is 285kb (VirusTotal 1/57 [5]). Further update: I am getting responses from the antivirus companies that the first file is Dridex... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...3d7363fd5571bfd9f8155610/analysis/1444120771/

** https://www.hybrid-analysis.com/sam...28ea23d7363fd5571bfd9f8155610?environmentId=5

*** https://www.virustotal.com/en/file/...50ca4ac85b85c11554aec863/analysis/1444126336/
...Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
92.123.225.120: https://www.virustotal.com/en/ip-address/92.123.225.120/information/

4] https://www.virustotal.com/en/file/...50ca4ac85b85c11554aec863/analysis/1444126336/
...Behavioural information
TCP connections
84.246.226.211
92.123.225.120


5] https://www.virustotal.com/en/file/...9a114500c83564a19f3eb93c/analysis/1444126999/
...Behavioural information
TCP connections
84.246.226.211
92.123.225.120


measelaw .com: 216.87.186.107: https://www.virustotal.com/en/ip-address/216.87.186.107/information/

rothschiller .net: 162.144.72.10: https://www.virustotal.com/en/ip-address/162.144.72.10/information/

- http://blog.dynamoo.com/2015/10/malware-spam-copy-of-invoices-anny.html
6 Oct 2015 - "This -fake- financial spam does not come from Hammonds of Knutsford but is instead a simple forgery with a malicious attachment:
From Anny Beckley [Anny@ hammondsofknutsford .co.uk]
Date Tue, 06 Oct 2015 12:29:23 +0430
Subject Copy of Invoice(s)
Please find attached a copy of Invoice Number(s) 82105


In the two samples that I have seen, the attached file was named Q_46Q0VWHU4.DOC with a VirusTotal detection rate of 7/56*. This document contains a malicious macro... which downloads a further component from the following location:
rothschiller .net/~medicbt9/65yg3f3/43g5few.exe
This currently has a detection rate of just 1/56** and it appears to be saved as %TEMP%\rrdDhhm.exe . Note that there are usually several different document versions spammed out with different download locations, but the payload is the same in every case.
Automated analysis is pending, but the payload is almost definitely the Dridex banking trojan."
* https://www.virustotal.com/en/file/...7daaac525c3dafceaee05cd5/analysis/1444127245/

** https://www.virustotal.com/en/file/...9a114500c83564a19f3eb93c/analysis/1444128214/
... Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
92.123.225.122: https://www.virustotal.com/en/ip-address/92.123.225.122/information/
___

Fake 'BL Draft' SPAM – PDF malware
- http://myonlinesecurity.co.uk/bl-draft-is-ready-for-review-cargosmart-fake-pdf-malware/
6 Oct 2015 - "An email with the subject of 'OOCL – B/L:4747679656(XIN YANG PU F2NM3) – BL Draft is Ready for Review' pretending to come from support@ cargosmart .com with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/BL-Draft-is-Ready-for-Review-1024x567.png

6 October 2015: 4747679656drft.zip: Extracts to: 4017334330drft.scr
Current Virus total detections 8/57* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...fab9b4ed0803117486fe761a/analysis/1444116810/
___

Fake 'WeTransfer' SPAM - malicious payload
- http://blog.dynamoo.com/2015/10/malware-spam-has-sent-you-file-via.html
6 Oct 2015 - "This -fake- "WeTransfer" spam comes with a malicious payload.
info@ucaqld .com .au has sent you a file via WeTransfer
1 message
WeTransfer 6 October 2015 at 13:36
To: [redacted]
info@ucaqld .com .au
sent you some files
‘Hey Nicole,
I have given you these federal reminder
Many thanks
Stacey'
Download
Files (101 KB total)
Document.doc
Will be deleted on
07 Oct, 2015
Get more out of WeTransfer, get Plus
About WeTransfer Contact= Legal Powered by Amazon Web Services


In this case, the malicious link is actually at..
storage-hipaa-2.sharefile .com/download.ashx?dt=dt3b07281f2b9440708a4b8a411e2f0e18&h=WAOCUIfIJJIYoHSVimogW83t4TXwSsltx0MYcStbmyQ%3d
The attachment is -malicious- in nature, but analysis is still pending. In the meantime, here is an initial Hybrid Analysis report*."
* https://www.hybrid-analysis.com/sam...01576c099930f464319d2a89bf486?environmentId=1
(See 'Malicious Indicators')

> https://www.virustotal.com/en/domain/storage-hipaa-2.sharefile.com/information/
"... This domain has been seen to resolve to the following IP addresses.
2015-06-08 54.208.209.126"
54.208.209.126: https://www.virustotal.com/en/ip-address/54.208.209.126/information/

- http://myonlinesecurity.co.uk/infobogoroch-com-has-sent-you-a-file-via-wetransfer-word-doc-malware/
6 Oct 2015 - "An email with the subject of 'info@ bogoroch .com has sent you a file via WeTransfer' pretending to come from WeTransfer <noreply@ wetransfer .com> with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...s-sent-you-a-file-via-WeTransfer-1024x848.png

The link behind the download is to https ://storage-hipaa-2.sharefile .com/download.ashx?dt=dt3b07281f2b9440708a4b8a411e2f0e18&h=WAOCUIfIJJIYoHSVimogW83t4TXwSsltx0MYcStbmyQ%3d
Other subjects seen in this malspam run include:
info@ bmonster .com has sent you a file via WeTransfer
info@ sundaymail .co.uk has sent you a file via WeTransfer
info@ bluepulse .com.au has sent you a file via WeTransfer
...
... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21.png
...
6 October 2015 2015 : Document.doc - Current Virus total detections 2/56*.
... which doesn’t connect to a webserver but has the Upatre binary embedded inside the word doc that gets extracted and run from %temp%\< random name >.exe (VirusTotal 2/56**). So far I have only examined 1 version of this malware... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...c099930f464319d2a89bf486/analysis/1444143437/

** https://www.virustotal.com/en/file/...ca36b584b5fc6d1769110079/analysis/1444140338/
___

Cisco security researchers disable big distributor of 'ransomware'
- http://www.reuters.com/article/2015/10/06/us-ransomware-cisco-idUSKCN0S01F020151006
Oct 6, 2015 - "... about half of computers infected with Angler were connecting to servers at a hosting provider in Dallas, which had been hired by criminals with stolen credit cards. The provider, Limestone Networks, pulled the plug on the servers and turned over data that helped show how Angler worked. The research effort, aided by carrier Level 3 Communications, allowed Cisco to copy the authentication protocols the Angler criminals use to interact with their prey. Knowing these protocols will allow security companies to cut off infected computers... Cisco said that since Limestone pulled the plug on the servers, new Angler infections had fallen off dramatically. Limestone's client relations manager told Reuters his company had unwittingly helped the spread of Angler before the Cisco investigation. Often sold in clandestine Internet forums or in one-to-one deals, exploit kits combine many small programs that take advantage of flaws in Web browsers and other common pieces of software. Buyers of those kits must also arrange a way to reach their targets, typically by sending spoof emails, hacking into websites or distributing malicious advertisements. Once they win control of a target's computer, exploit kit buyers can install whatever they want, including so-called ransomware. This includes a number of branded programs, also sold online, that encrypt users' computer files and demand payment to release them. -Talos- estimated that if three percent of infected users paid the ransom averaging $300, the criminals that had used the Limestone servers to spread Angler could have made about $30 million a year."
> http://blogs.cisco.com/security/talos/angler-exposed
Oct 6, 2015 - "... Angler is actually constructed in a proxy/server configuration. There is a single exploit server that is responsible for serving the malicious activity through multiple proxy servers. The proxy server is the system that users communicate with, allowing the adversary to quickly pivot and change while still shielding the exploit server from identification and exposure. Additionally, there is a health monitoring server that is conducting health checks, gathering information about the hosts that are being served exploits, and remotely erase the log files once they have been fetched. This health server revealed the scope and scale of the campaign, and helped allow us to put a monetary value on the activity. A single health server was seen monitoring 147 proxy servers over the span of a month and generating in excess of $3,000,000 USD in revenue. This single adversary was responsible for approximately half of the Angler activity we observed and is making more than $30,000,000 USD annually from Ransomware infections alone..."

- https://blog.opendns.com/2015/10/06/cisco-disrupts-major-ransomware-campaign/
Oct 6, 2015
> https://blog.opendns.com/wp-content/uploads/2015/10/IN_cisco-angler-infographic_100515.png

:fear::fear: :mad:
 
Last edited:
Fake 'Scanned document', 'Confirmation' SPAM

FYI...

Fake 'Scanned document' SPAM - malicious payload
- http://blog.dynamoo.com/2015/10/malware-spam-scanned-document-from-mx.html
7 Oct 2015 - "This -fake- scanned document has a malicious payload attached:
From: xerox@ victimdomain .tld
Reply-To: xerox@ victimdomain .tld
Date: 7 October 2015 at 10:08
Subject: Scanned document from MX-2600N
Reply to: xerox@ victimdomain .tld victimdomain .tld
> Device Name: Not Set
Device Model: MX-2600N
Location: Not Set
File Format: XLS MMR(G4)
Resolution: 200dpi x 200dpi


Attached file is scanned document in XLS format... Attached is a file in the format xerox@ victimdomain .tld_20151007_160214 .xls (where victimdomain.tld is the victim's own domain), which has a VirusTotal detection rate of 3/56*. This Excel file contains a malicious macro... which in THIS case downloads a binary from the following location:
alarmtechcentral .com/fw43t2d/98kj6.exe
There will be other versions of the XLS file which will download components from other locations, however the payload will be the same, and it currently has a detection rate of 2/56**. The VirusTotal report indicates traffic to:
84.246.226.211 (ELB Multimedia, France)
Blocking traffic to and from that IP is recommended. Automated analysis is pending, please check back later. The payload is probably the Dridex banking trojan.
UPDATE: Here are the Hybrid Analysis reports for the XLS file[3] and executable[4]."
* https://www.virustotal.com/en/file/...923d4e2d52bf78ab8683f5bb/analysis/1444209423/

** https://www.virustotal.com/en/file/...52482ea932c3b02c609f8c10/analysis/1444209808/
... Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
92.123.225.120: https://www.virustotal.com/en/ip-address/92.123.225.120/information/

3] https://www.hybrid-analysis.com/sam...feb56923d4e2d52bf78ab8683f5bb?environmentId=1

4] https://www.hybrid-analysis.com/sam...ebd5952482ea932c3b02c609f8c10?environmentId=3

alarmtechcentral .com: 69.195.85.248: https://www.virustotal.com/en/ip-address/69.195.85.248/information/

- http://myonlinesecurity.co.uk/scanned-document-from-mx-2600n-excel-xls-spreadsheet-malware/
7 Oct 2015 - "An email with the subject of 'Scanned document from MX-2600N' pretending to come from a printer or scanner at your own email domain with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
... Device Name: Not Set
Device Model: MX-2600N
Location: Not Set
File Format: XLS MMR(G4)
Resolution: 200dpi x 200dpi
Attached file is scanned document in XLS format.
Use Microsoft(R)Excel(R) to view the document.


... these pretend to be sent from these email addresses at your own email domain or company:
Xerox@
Canon@
Printer@
MX-2600N@

Other subjects include:
Scanned image from MX-2600N
Scanned file from MX-2600N

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
7 October 2015: canon @... _20151007_160214.xls - Current Virus total detections 3/57*
Payload Security Hybrid analysis** shows that this downloads what is almost certainly Dridex banking malware from http ://frozenfoods2004 .com/fw43t2d/98kj6.exe (VirusTotal 3/56***)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...2d1dcf0ee3b8a422d116cd13/analysis/1444209116/

** https://www.hybrid-analysis.com/sam...88f442d1dcf0ee3b8a422d116cd13?environmentId=1

*** https://www.virustotal.com/en/file/...52482ea932c3b02c609f8c10/analysis/1444209437/
... Behavioural information
TCP connections
84.246.226.211: https://www.virustotal.com/en/ip-address/84.246.226.211/information/
92.123.225.120: https://www.virustotal.com/en/ip-address/92.123.225.120/information/

frozenfoods2004 .com: 66.111.47.38: https://www.virustotal.com/en/ip-address/66.111.47.38/information/
___

Fake 'Confirmation' SPAM – doc malware
- http://myonlinesecurity.co.uk/red-funnel-ferries-confirmation-5838547-word-doc-malware/
7Oct 2015 - "An email that appears to come from 'Red Funnel Ferries' with the subject of 'Confirmation 5838547' pretending to come from post@ redfunnel .co.uk with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co.../red_funnel-Confirmation-5838547-1024x760.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
7 October 2015: 5838547.doc - Current Virus total detections 6/55*
Downloads the same Dridex banking malware from http ://frozenfoods2004 .com/fw43t2d/98kj6.exe that was described in today’s earlier malspam run** of malicious office docs with macros... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...d70d5e03a71d7b6e32f9c09e/analysis/1444215510/

** http://myonlinesecurity.co.uk/scanned-document-from-mx-2600n-excel-xls-spreadsheet-malware/
___

New Outlook mailserver attack steals massive number of passwords
Backdoor in Outlook Web Application operates inside target's firewall
- http://arstechnica.com/security/201...er-attack-steals-massive-number-of-passwords/
Oct 5, 2015 - "Researchers have uncovered advanced malware that can steal virtually all of a large organization's e-mail passwords by infecting its Outlook Web Application (OWA) mail server over an extended period of time. Researchers from security firm Cybereason discovered the malicious OWA module after receiving a call from an unnamed company that had more than 19,000 endpoints. The customer had witnessed several behavioral abnormalities in its network and asked Cybereason to look for signs of an infection. Within a few hours, the security firm found a suspicious DLL file loaded into the company's OWA server. While it contained the same name as a benign DLL file, this one was unsigned and was loaded from a different directory. The OWAAUTH.dll file contained a backdoor. Because it ran on the server, it was able to retrieve all HTTPS-protected server requests after they had been decrypted. As a result, the attackers behind this advanced persistent threat — the term given to malware campaigns that target a specific organization for months or years — were able to steal the passwords of just about anyone accessing the server. "The hackers in this case managed to gain a foothold into a highly strategic asset: the OWA server," Cybereason researchers wrote in a blog post published Monday*... Cybereason didn't say how widespread the attack is beyond it targeting the one customer. Chances are, malware as detailed as this isn't a one-off thing, so it wouldn't be surprising to see it hitting other large organizations."
* http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Labs-Analysis-Webmail-Sever-APT.pdf

- http://blogs.technet.com/b/exchange...-vulnerability-in-outlook-web-access-owa.aspx
7 Oct 2015

:fear::fear: :mad:
 
Last edited:
Fake 'Norfolk Dance', 'SwagBags Order', 'Deposit', 'eBay Invoice' SPAM

FYI...

Fake 'Norfolk Dance' SPAM – doc/xls malware
- http://myonlinesecurity.co.uk/receipt-from-norfolk-dance-word-doc-or-excel-xls-spreadsheet-malware/
8 Oct 2015 - "An email with the subject of 'Receipt from Norfolk Dance' pretending to come from <info@ norfolkdance .co.uk> with a malicious word doc attachment is another one from the current bot runs... Please find receipt for payment attached.
Many Thanks
Norfolk Dance
14 Chapel Field North
Norwich
Norfolk
NR2 1NY
Telephone: 01603 283399
E mail...


... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21.png
...
8 October 2015: Receipt.doc - Current Virus total detections 2/56*
Downloads the same Dridex Banking malware from the same locations as described in today’s earlier malspam run of malicious macro enabled word docs**...
** http://myonlinesecurity.co.uk/swagb...35-word-doc-or-excel-xls-spreadsheet-malware/
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...a7ba7628d7f2d9050722ad4f/analysis/1444298476/

- http://blog.dynamoo.com/2015/10/malware-spam-receipt-from-norfolk-dance.html
8 Oct 2015 - "This -fake- financial email is not from Norfolk Dance but is instead a simply -forgery- with a malicious attachment:
From "info" [info@ norfolkdance .co.uk]
Date Thu, 08 Oct 2015 12:39:28 +0300
Subject Receipt from Norfolk Dance
Please find receipt for payment attached.
Many Thanks
Norfolk Dance
14 Chapel Field North
Norwich
Norfolk
NR2 1NY
Telephone: 01603 283399
E mail...


Attached is a file Receipt.doc which I have seen in two different versions (VT detection rate 4/56* and 3/56**) each containing a different malicious macro... which download a malicious binary from one of the following locations:
katastimataone .com/bvcb34d/983bv3.exe
archives.wnpvam .com/bvcb34d/983bv3.exe
This is saved as %TEMP%\fDe12.exe and currently has a VirusTotal detection rate of 4/55***. The VirusTotal report indicates traffic to the following IP:
198.61.187.234 (Rackspace, US). I recommend that you block traffic to this IP. Automated analysis is pending (check back later) but the payload is almost definitely the Dridex banking trojan..."
* https://www.virustotal.com/en/file/...636c1c6d0f34de19914e1b29/analysis/1444298450/

** https://www.virustotal.com/en/file/...6960764a56ac8ff565ae7c86/analysis/1444298460/

*** https://www.virustotal.com/en/file/...f13354edc3339b6357c71549/analysis/1444298587/

katastimataone .com: 209.139.209.187: https://www.virustotal.com/en/ip-address/209.139.209.187/information/

wnpvam .com: 38.96.175.221: https://www.virustotal.com/en/ip-address/38.96.175.221/information/

198.61.187.234: https://www.virustotal.com/en/ip-address/198.61.187.234/information/
___

Fake 'SwagBags Order' SPAM - doc malware
- http://myonlinesecurity.co.uk/swagb...35-word-doc-or-excel-xls-spreadsheet-malware/
8 Oct 2015 - "An email with the subject of 'New Order Confirmation: 3535' pretending to come from SwagBags .biz <customerservices@ swagbags .biz> with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...Order-Confirmation-3535-SwagBags-1024x558.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content...
8 October 2015 : Invoice_3535.doc - Current Virus total detections 2/54*.
Both MALWR** and Payload security*** shows the download to be what looks like Dridex banking malware from http ://vsehochuti.unas .cz/bvcb34d/983bv3.exe (VirusTotal 1/56 [4])
Other download locations that I have been informed about are:
katastimataone .com/bvcb34d/983bv3.exe
swaineallen .uk/bvcb34d/983bv3.exe
archives.wnpvam .com/bvcb34d/983bv3.exe
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...735069d4cd0c82f8ca31fe50/analysis/1444293293/

** https://malwr.com/analysis/YzJkMjBlNGY0NzM0NDUzOTllNzMyMzI3NThhOTlhOTY/

*** https://www.hybrid-analysis.com/sam...f7938735069d4cd0c82f8ca31fe50?environmentId=1

4] https://www.virustotal.com/en/file/...f13354edc3339b6357c71549/analysis/1444293943/

unas .cz: 88.86.117.145: https://www.virustotal.com/en/ip-address/88.86.117.145/information/

katastimataone .com: 209.139.209.187: https://www.virustotal.com/en/ip-address/209.139.209.187/information/

swaineallen .uk: 94.136.40.15: https://www.virustotal.com/en/ip-address/94.136.40.15/information/

wnpvam .com: 38.96.175.221: https://www.virustotal.com/en/ip-address/38.96.175.221/information/
___

Fake 'Deposit' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-deposit-payment-frederico.html
8 Oct 2015 - "This -fake- financial email does not comes from Frederico Kessler but is instead a simple -forgery- with a malicious attachment:
From Frederico Kessler [Frederico.Kessler@ Gamesys .co.uk]
Date Thu, 08 Oct 2015 04:14:23 -0700
Subject Deposit Payment
Hi,
Attached is receipt of transfer regarding the deposit increase for our new contract
to the Cherry Tree Cottage.
Let me know if its all sorted.
Frederico Kessler
Product Owner | Games Platform
[cid:9DCD81C9-9267-4802-AAE1-B3AF9887E131]
[gamesysign]
4th Floor, 10 Piccadilly
London, W1J 0DD
Email...


Attached is a malicious Excel document named Payments Deposit.xls which comes in -five- different versions... each containing a slightly modifed macro... which downloads a malicious executable from the following locations:
archives.wnpvam .com/bvcb34d/983bv3.exe
swaineallen .uk/bvcb34d/983bv3.exe
katastimataone .com/bvcb34d/983bv3.exe
vsehochuti.unas .cz/bvcb34d/983bv3.exe
dmedei.3x .ro/bvcb34d/983bv3.exe
These download locations have been in use for a couple of other spam runs.. [2] but now the payload has been altered and has a VirusTotal detection rate of 3/56*. That VirtusTotal report and this Hybrid Analysis report** show traffic to:
198.61.187.234 (Rackspace, US). I recommend that you block traffic to that IP."
* https://www.virustotal.com/en/file/...8ea2956e6acfa76d0e82bd84/analysis/1444305640/
... Behavioural information
TCP connections
198.61.187.234: https://www.virustotal.com/en/ip-address/198.61.187.234/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/

** https://www.hybrid-analysis.com/sam...6a5c38ea2956e6acfa76d0e82bd84?environmentId=6

2] http://blog.dynamoo.com/2015/10/malware-spam-receipt-from-norfolk-dance.html

wnpvam .com: 38.96.175.221: https://www.virustotal.com/en/ip-address/38.96.175.221/information/

swaineallen .uk: 94.136.40.15: https://www.virustotal.com/en/ip-address/94.136.40.15/information/

katastimataone .com: 209.139.209.187: https://www.virustotal.com/en/ip-address/209.139.209.187/information/

unas .cz: 88.86.117.145: https://www.virustotal.com/en/ip-address/88.86.117.145/information/

3x .ro: 89.42.39.160: https://www.virustotal.com/en/ip-address/89.42.39.160/information/
___

Fake 'eBay Invoice' SPAM - PDF malware
- http://myonlinesecurity.co.uk/your-ebay-invoice-is-ready-fake-pdf-malware/
8 Oct 2015 - "An email with the subject of 'Your eBay Invoice is Ready' pretending to come from eBay <ebay@ ebay .com> with a zip attachment is another one from the current bot runs... The content of the email which shouldn’t fool anybody because it has -no- eBay logos or links and is totally in plain text, which EBay -never- sends because they want to grab you and get you on the eBay site spending money, says :
PLEASE DO NOT RESPOND – Emails to this address are not monitored or responded to.
Dear Customer,
Please open the attached file to view invoice.
If the attachment is in PDF format you may need Adobe Acrobat Reader to read or download this attachment...
This email has been scanned by the Symantec Email Security.cloud service.
This email and any attachment are intended solely for the addressee, are strictly confidential and may be legally privileged. If you are not the intended recipient...
Blah, blah, blah.

8 October 2015: ebay_4175127742232_081015.zip: Extracts to: ebay_4175127742232_081015.exe
Current Virus total detections 4/55* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...3f277aeeb86ca699ef747643/analysis/1444304267/
___

Fake 'HMRC Online Service Complaints' SPAM – PDF malware
- http://myonlinesecurity.co.uk/onlin...d-by-hm-revenue-and-customs-fake-pdf-malware/
8 Oct 2015 - "An email with the subject of 'Online Service Complaints – Submission received by HM Revenue and Customs' pretending to come from HMRC Complaints <helpdesk@ ir-efile .gov.uk> with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...ceived-by-HM-Revenue-and-Customs-1024x556.png

8 October 2015: HMRC.Complaint.zip: Extracts to: HMRC.Complaint.scr
Current Virus total detections 2/57* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...fd104ae7a7cb62c2c33c6818/analysis/1444302682/
___

Fake 'eFax' .doc attachment - malware
- https://isc.sans.edu/diary.html?storyid=20225
Last Updated: 2015-10-08 - "... Below is a screenshot from the malspam example Wayne sent us. Links in the email -all- went to the appropriate eFax URLs. The attached Word document is the -only- malicious part of the message:
> https://isc.sans.edu/diaryimages/images/2015-10-08-ISC-diary-image-01a.jpg
... Looking at the email headers, you'll find the recipient's email server received the message from a Unified Layer IP address at 67.222.39.168... The Word document has macros. If macros are enabled, the document will try to drop malware and infect the Windows host:
> https://isc.sans.edu/diaryimages/images/2015-10-08-ISC-diary-image-03.jpg
Below are indicators of compromise (IOCs) for the malware associated with this malspam:
185.42.15.7 - babsuptono .ru - POST /gate.php
151.236.10.194 - toftereventhi .ru - POST /gate.php
93.171.158.226 - buteventheckand .ru - POST /gate.php
136.243.24.4 - germantest.redsnapper .net - GET /m.exe
... Attachment name: fax_message_326-816-3257.doc
First submission: 2015-10-06 14:28:27 UTC
Virus Total link* - Hybrid-Analysis link** ..."
* https://www.virustotal.com/en/file/...ab3e09863f86fd13fb720dc2921621aa8a5/analysis/

** https://www.hybrid-analysis.com/sam...863f86fd13fb720dc2921621aa8a5?environmentId=2

185.42.15.7: https://www.virustotal.com/en/ip-address/185.42.15.7/information/
151.236.10.194: https://www.virustotal.com/en/ip-address/151.236.10.194/information/
93.171.158.226: https://www.virustotal.com/en/ip-address/93.171.158.226/information/
136.243.24.4: https://www.virustotal.com/en/ip-address/136.243.24.4/information/

"... same signature": https://www.hybrid-analysis.com/search?query=signatureid:network-1

:fear::fear: :mad:
 
Last edited:
Fake 'contract' SPAM, Fake game sites

FYI...

Fake 'contract' SPAM – doc/xls malware
- http://myonlinesecurity.co.uk/contract-word-doc-or-excel-xls-spreadsheet-malware/
8 Oct 2015 - "An email with the subject of 'contract' pretending to come from random companies and email addresses with a zip file containing a malicious word doc attachment is another one from the current bot runs... The email looks like:
Dear customer,
I’m sending you a new contract of the project (Double ordinary certificate)

-Or-
Dear customer,
I’m sending you a new contract of the project (Information about updated summary)


The name in brackets in the body of the email matches the name of the zip attachment that contains the word doc which also has random names... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21.png
...
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/02/Excel_macro_protected-mode.png

8 October 2015: Double ordinary certificate.zip - Extracts to: Collect corporate business inventories.doc
Current Virus total detections 3/56* ... which doesn’t connect to a webserver but has the Upatre binary embedded inside the word doc inside a rtf file that gets extracted and run from %temp%\w13.exe (VirusTotal 3/57**)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5218334fdae20fb48db69d03/analysis/1444322597/

** https://www.virustotal.com/en/file/...4196758f9623285de85af2e4/analysis/1444323758/
___

Fake 'GTA V for Mobile' sites lead to 'Surveys'
- https://blog.malwarebytes.org/online-security/2015/10/gta-v-for-mobile-sites-lead-to-surveys/
Oct 8, 2015 - "... GTA V used as -bait- in many cases... here's one which focuses on the allure of portability to reel in unsuspecting fans of the title. A number of sites are claiming to offer up mobile versions of the game, despite it requiring an Xbox 360 / Xbox One / PS3 / PS4 / decent gaming PC to run – not to mention the disk space taken up, which is a fair amount to say the least (you aren’t going to find many phones with -50GB- available just to be able to install a game). The sites in question are:
gta5forpsp(dot)com
androidgta5(dot)com
iosgta5(dot)com
Despite this, mobile gamers are being told they can run it on Android, iOS and PSP. The three sites we looked at all share similar designs, displaying what they claim to be GTA V running on the aforementioned devices and a download link:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/gtahandheld11.jpg
... they also use the well worn technique of saying “As seen on…” and listing numerous well known online publications (none of which appear to mention their mysterious version of GTA V)... the creators of the Grand Theft Auto titles, Rockstar Games, don’t mention a handheld version of GTA V anywhere either. It’s almost like it doesn’t exist. This is probably a good time to make a callback to that -50GB- game size, and then see how big one of the mobile downloads is:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/gtahandheld4.jpg
... If in doubt, check the official website of a game developer and discover straight from the source which platform your desired evening’s entertainment runs on. In the above case, there is -no- official version of GTA V for handhelds whatsoever..."

gta5forpsp(dot)com: 91.121.223.39: https://www.virustotal.com/en/ip-address/91.121.223.39/information/
androidgta5(dot)com: https://www.virustotal.com/en/url/0...8282323e8cc27dba4f2b52833cbe73653e1/analysis/
iosgta5(dot)com: https://www.virustotal.com/en/url/0...1b4e26ecc1b2015c8c178f4928323623744/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'DHL invoice' SPAM

FYI...

Fake 'DHL invoice' SPAM – doc/xls malware
- http://myonlinesecurity.co.uk/your-...21-word-doc-or-excel-xls-spreadsheet-malware/
9 Oct 2015 - "An email that appears to come from DHL with the subject of 'Your latest DHL invoice : MSE7396821' pretending to come from e-billing.uk1@ dhl .com with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...ur-latest-DHL-invoice-MSE7396821-1024x549.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21.png
...
9 October 2015 : MSE7396821.doc - Current Virus total detections 5/56*
Downloads a Dridex banking malware http ://roadmark .co.uk/fsf4fd32/8ik6sc.exe which is saved as %temp%\vtsabd.exe (VirusTotal 2/56**)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...56af0014f0448ccda8a8c223/analysis/1444382592/

** https://www.virustotal.com/en/file/...ea08d6a5e62965daf0d17374/analysis/1444382939/
... Behavioural information
TCP connections
86.105.33.102: https://www.virustotal.com/en/ip-address/86.105.33.102/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/

roadmark .co.uk: 88.208.252.196: https://www.virustotal.com/en/ip-address/88.208.252.196/information/

- http://blog.dynamoo.com/2015/10/malware-spam-your-latest-dhl-invoice.html
9 Oct 2015 - "... In the only sample I have seen, the attached file is named MSE7396821.doc and has a VirusTotal detection rate of 5/55*. This contains a malicious macro... which downloads a file from the following location:
flexicall .co.uk/fsf4fd32/8ik6sc.exe
There will undoubtedly be different versions of the document with different download locations. This binary is saved as %TEMP%\vtsAbd.exe and has a VirusTotal detection rate of 2/54**. That VirusTotal report, this Malwr report[3] and this Hybrid Analysis report[4] show network traffic to:
86.105.33.102 (Data Net SRL, Romania)
I recommend that you block traffic to and from that IP address. The payload appears to be the Dridex banking trojan."
* https://www.virustotal.com/en/file/...9a2f72a81a67b46fcdfd6f8a/analysis/1444381402/

** https://www.virustotal.com/en/file/...ea08d6a5e62965daf0d17374/analysis/1444381818/
... Behavioural information
TCP connections
86.105.33.102: https://www.virustotal.com/en/ip-address/86.105.33.102/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/

3] https://malwr.com/analysis/NTMwN2Q3OWVkZmFkNDg0ZWI5NGMwNzViOGNmYzIzOWU/

4] https://www.hybrid-analysis.com/sam...dde909a2f72a81a67b46fcdfd6f8a?environmentId=3

flexicall .co.uk: 109.228.12.96: https://www.virustotal.com/en/ip-address/109.228.12.96/information/

"... same signature": https://www.hybrid-analysis.com/sam...dde909a2f72a81a67b46fcdfd6f8a?environmentId=3

:fear::fear: :mad:
 
Last edited:
Fake 'Insurance', 'Water Services Invoice', 'Invoice 1377' SPAM

FYI...

Fake 'Insurance' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-insurance.html
12 Oct 2015 - "This spam does not come from No Letting Go but is instead a simple forgery with a malicious attachment.
From [accounts@ nolettinggo .co.uk]
Date Mon, 12 Oct 2015 11:43:16 +0330
Subject Insurance
Dear all
Please find attached insurance paperwork including EL certificate. Invoices
will follow at the beginning of November.
Regards
Karen


In the only sample I have seen so far, the attachment name is SKMBT_C36014102815580.doc which has a VirusTotal detection rate of 8/56*. This particular document contains this malicious macro... which downloads a malware component from the following location:
ukenterprisetours .com/877453tr/rebrb45t.exe
The usual pattern is that there are several different versions of the document downloading from different locations, but the payload is the same in all cases. This binary is saved as %TEMP%\gicage.exe and has a detection rate of 2/56**. That VirusTotal report and this Hybrid Analysis report[3] show network traffic to:
149.210.180.13 (TransIP BV, Netherlands)
I strongly recommend that you block or monitor traffic to this IP. The payload is the Dridex banking trojan..."
* https://www.virustotal.com/en/file/...3528bfbc7f836bfd813007ef/analysis/1444637908/

** https://www.virustotal.com/en/file/...f666275ac69190bbb94446dc/analysis/1444638547/
... Behavioural information
TCP connections
149.210.180.13: https://www.virustotal.com/en/ip-address/149.210.180.13/information/
92.123.225.120: https://www.virustotal.com/en/ip-address/92.123.225.120/information/

3] https://www.hybrid-analysis.com/sam...3b1263528bfbc7f836bfd813007ef?environmentId=3

ukenterprisetours .com: 46.20.120.64: https://www.virustotal.com/en/ip-address/46.20.120.64/information/

- http://myonlinesecurity.co.uk/nolettinggo-co-uk-insurance-word-doc-malware/
12 Oct 2015 - "An email that appears to come from nolettinggo .co.uk with the subject of 'Insurance' pretending to come from accounts@ nolettinggo .co.uk with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/insurance-nolettinggo-1024x497.png

... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
12 October 2015 : SKMBT_C36014102815580.doc - Current Virus total detections 7/55*
.. Downloads Dridex banking malware from http ://capricorn-cleaning .co.uk/877453tr/rebrb45t.exe
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6c24403b44b76abae76f9efa/analysis/1444635759/

capricorn-cleaning .co.uk: 109.108.129.21: https://www.virustotal.com/en/ip-address/109.108.129.21/information/
___

Fake 'Invoice' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-water-services-invoice.html
12 Oct 2015 - "This -fake- financial email is not from United Utilities but is instead a simple forgery with a malicious attachment:
From "UUSCOTLAND" <UUSCOTLAND@ uuplc .co.uk>
Date Mon, 12 Oct 2015 17:12:12 +0530
Subject Water Services Invoice
Good Morning,
I hope you are well.
Please find attached the water services invoice summary for the billing period of
12 September 2015 to 12 October 2015.
If you would like any more help, or information, please contact me...
Kind regards
Melissa
Melissa Lears
Billing Specialist
Business Retail
United Utilities Scotland
T: 0345 0726077 (26816)...
The information contained in this e-mail is intended only for the individual to whom it is addressed. It may contain legally privileged or confidential information or otherwise be exempt from disclosure. If you have received this Message in error or there are any problems, please notify the sender immediately and delete the message from your computer. You must not use, disclose, copy or alter this message for any unauthorised purpose...


Attached to the email is a file 12 October 2015 Invoice Summary.doc which comes in at least -four- different versions (VirusTotal results: [1] [2] [3] [4]) which contain a macro... Download locations spotted so far are:
ukenterprisetours .com/877453tr/rebrb45t.exe
eventmobilecatering .co.uk/877453tr/rebrb45t.exe
thewimbledondentist .co.uk/877453tr/rebrb45t.exe
cardiffhairandbeauty .co.uk/877453tr/rebrb45t.exe
All those download locations are on UK sites, but there are three apparently unrelated IP addresses in use:
46.20.120.64: https://www.virustotal.com/en/ip-address/46.20.120.64/information/
109.108.129.21: https://www.virustotal.com/en/ip-address/109.108.129.21/information/
213.171.218.221: https://www.virustotal.com/en/ip-address/213.171.218.221/information/
This is saved as %TEMP%\gicage.exe and has a VirusTotal detection rate of just 1/56[5]...
149.210.180.13 (TransIP BV, Netherlands)
86.105.33.102 (Data Net SRL, Romania)
I would recommend blocking traffic to both those IPs. The payload is the Dridex banking trojan.
Recommended blocklist:
149.210.180.13: https://www.virustotal.com/en/ip-address/149.210.180.13/information/
86.105.33.102: https://www.virustotal.com/en/ip-address/86.105.33.102/information/
.
1] https://www.virustotal.com/en/file/...276c65b55bf16254fdcf4057/analysis/1444652575/

2] https://www.virustotal.com/en/file/...8aa415aaa9138bb97abb22c7/analysis/1444652586/

3] https://www.virustotal.com/en/file/...9e46ad11aa140728f721b61e/analysis/1444652597/

4] https://www.virustotal.com/en/file/...3528bfbc7f836bfd813007ef/analysis/1444652607/

5] https://www.virustotal.com/en/file/...ba6ac1c278b0c160dd010802/analysis/1444652695/

- http://myonlinesecurity.co.uk/water...d-united-utilities-scotland-word-doc-malware/
12 Oct 10`5 - "An email that appears to come from United Utilities Scotland with the subject of 'Water Services Invoice' pretending to come from UUSCOTLAND <UUSCOTLAND@ uuplc .co.uk> with a malicious word doc attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Water-Services-Invoice-1024x690.png

.. DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
...
12 October 2015: 12 October 2015 Invoice Summary.doc - Current Virus total detections 8/55*
... Downloads from the same locations as described in today’s earlier malspam run** of malicious word docs, but delivers an updated Dridex version (VirusTotal 1/56 ***)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...8aa415aaa9138bb97abb22c7/analysis/1444654116/

** http://myonlinesecurity.co.uk/nolettinggo-co-uk-insurance-word-doc-malware/

*** https://www.virustotal.com/en/file/...ba6ac1c278b0c160dd010802/analysis/1444652695/
... Behavioural information
TCP connections
86.105.33.102: https://www.virustotal.com/en/ip-address/86.105.33.102/information/
191.234.4.50: https://www.virustotal.com/en/ip-address/191.234.4.50/information/
___

Fake 'Invoice 1377' SPAM - PDF malware
- http://myonlinesecurity.co.uk/invoice-1377-peachsoftware-co-uk-fake-pdf-malware/
12 Oct 2015 - "An email with the subject of 'Invoice 1377' pretending to come from info@ peachsoftware .co.uk with a zip attachment is another one from the current bot runs... The content of the email says:

Please see invoice attached

12 October 2015: invoice-1377.zip: Extracts to: invoice-1377.exe
Current Virus total detections 4/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...42c02f3bff9730fd7b9cf0ca/analysis/1444648227/
___

Suspected Iran-Based Hacker Group Creates Network of Fake LinkedIn Profiles
- http://www.secureworks.com/cyber-th...up-creates-network-of-fake-linkedin-profiles/
7 Oct 2015 - "Summary: While tracking a suspected Iran-based threat group known as Threat Group-2889[1] (TG-2889), Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a network of fake LinkedIn profiles. These convincing profiles form a self-referenced network of seemingly established LinkedIn users. CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering. Most of the legitimate LinkedIn accounts associated with the fake accounts belong to individuals in the Middle East, and CTU researchers assess with medium confidence that these individuals are likely targets of TG-2889.
Fake LinkedIn accounts: The 25 fake LinkedIn accounts identified by CTU researchers fall into two categories: fully developed personas (Leader) and supporting personas (Supporter). The table in the Appendix lists details associated with the accounts. The level of detail in the profiles suggests that the threat actors invested substantial time and effort into creating and maintaining these personas. The photos used in the fake accounts are likely of innocent individuals who have no connection to TG-2889 activity...
Legitimate endorsers of -fake- TG-2889 LinkedIn accounts by country:
> http://www.secureworks.com/assets/image_store/png/image007_500px.png
... Ongoing threat: Updates to profile content such as employment history suggest that TG-2889 regularly maintains these fake profiles. The persona changes and job alterations could suggest preparations for a new campaign, and the decision to reference Northrup Grumman and Airbus Group may indicate that the threat actors plan to target the aerospace vertical. It is likely that TG-2889 maintains personas that have not yet been identified, and that other threat groups also use this tactic. CTU researchers advise organizations to educate their users of the specific and general risks:
- Avoid contact with known fake personas.
- Only connect to personas belonging to individuals they know and trust.
- Adopt a position of sensible caution when engaging with members of colleagues' or friends' networks that they have not -verified- outside of LinkedIn.
When evaluating employment offers originating from LinkedIn, seek confirmation that the individual is legitimate by directly contacting the individual's purported employer. Organizations may want to consider policing abuse of their brand on LinkedIn and other social media sites..."

:fear::fear: :mad:
 
Last edited:
Fake 'Customer Invoice', 'Bank Payment' SPAM

FYI...

Fake 'Customer Invoice' SPAM - doc malware
- http://myonlinesecurity.co.uk/quickhostuk-customer-invoice-word-doc-malware/
13 Oct 2015 - "An email appearing to come from 'QuickHostUK' with the subject of 'Customer Invoice' pretending to come from QuickHostUK <info@ quickhostuk .com> with a malicious word doc or Excel XLS spreadsheet attachment is another one from the current bot runs... The email looks like:
Dear customer,
This is a notice that an invoice has been generated on 11/10/2015.
Your payment method is: Credit/Debit Card
Invoice #302673
Amount Due: £40.00GBP
Due Date: 18/10/2015
Invoice Items
Fully Managed Hosting – Starter (18/10/2015 – 17/11/2015) £40.00GBP
Sub Total: £40.00GBP
Credit: £0.00GBP
Total: £40.00GBP
Payment will be taken automatically on 18/10/2015 from your credit card on record with us. To update or change the credit card details we hold for your account please login...


13 October 2015: Invoice-302673.doc - Current Virus total detections 5/56*
... Which downloads Dridex banking malware from http ://thelureofnoma .com/~web/34fc34t45t/8ijfew.exe (VirusTotal 1/53**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...ccee7a081898420f9b627774/analysis/1444732952/

** https://www.virustotal.com/en/file/...a0ebeecd4bdaee002330f7b6/analysis/1444733145/

thelureofnoma .com: 69.72.240.66: https://www.virustotal.com/en/ip-address/69.72.240.66/information/
___

Fake 'Bank - Third Party Payment' SPAM – PDF malware
- http://myonlinesecurity.co.uk/commo...netbank-third-party-payment-fake-pdf-malware/
13 Oct 2015 - "An email appearing to come from 'Commonwealth Bank of Australia' with the subject of 'First NetBank Third Party Payment' pretending to come from NetBankNotification@ cba .com.au with a zip attachment is another one from the current bot runs... The content of the email says :
First NetBank Third Party Payment
Your first transfer to the following third party account(s) has been successfully processed:
From Account: **** **** **** 6439 MasterCard
To Account(s): Bonnie Sharpe 511-187 ***7654 AMEX $6,990.72 Assistance to Refugees
Date: 13/10/2015
Please check attached file for more information about this transaction.
Yours sincerely,
Commonwealth Bank of Australia
Please do not reply. To confirm this is a genuine email sent by the Bank, please check your inbox on the NetBank home page.
Message: 932750168


13 October 2015: CBA Third Party Payment 932750168.zip: Extracts to: CBA Third Party Payment 949078743.scr
Current Virus total detections 10/57*... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...f87ddfe3fdadc2545b0740f8/analysis/1444709718/

:fear::fear: :mad:
 
Last edited:
Flash 0-Day, Fake 'DocuSign', 'SMSF Gateway Svc Msg' SPAM, DRIDEX Takedown

FYI...

Flash 0-Day used in Pawn Storm...
>> http://blog.trendmicro.com/trendlab...e-flash-zero-day-used-in-pawn-storm-campaign/
Oct 14, 2015 - "... the attackers behind Pawn Storm are using a new Adobe Flash zero-day exploit in their latest campaign. Pawn Storm is a long-running cyber-espionage campaign known for its high-profile targets and usage of the first Java zero-day we’ve seen in the last couple of years... Based on our analysis, the Flash zero-day affects at least Adobe Flash Player versions 19.0.0.185 and 19.0.0.207... We have notified Adobe about our discovery and are working with them to address this security concern. Updates to this entry will be made once more information is available."

'Just released 10.13.2015 .'Suggest Flash be -disabled- immediately until a new fix/release from Adobe is available...

* 'Suggest Java be disabled, too. Next scheduled release of Java update due 10.20.2015.
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/10/13/patch-tuesday-october-2015
Oct 13, 2015 - "... Oracle will have their CPU later this month, on the 20th..."
___

Fake 'DocuSign' SPAM – PDF malware
- http://myonlinesecurity.co.uk/docusign-completed-optus-agreement-no-jtjw-650508-fake-pdf-malware/
14 Oct 2015 - "An email with the subject of 'Completed: Optus agreement no JTJW-650508' pretending to come from thiaminenz570@ cintas .com; on behalf of; 'DocuSign via DocuSign <dse_eu1@ docusign .net>' with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...mpleted-Optus-agreement_docusign-1024x780.png

14 October 2015: Optus agreement no JTJW-650508.zip: Extracts to: Optus agreement no LPRH-300726.scr
Current Virus total detections 6/56*... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...cacd0601c6263d064dac36b2/analysis/1444797213/
___

Fake 'SMSF Gateway Svc Msg' SPAM – PDF malware
- http://myonlinesecurity.co.uk/australia-post-smsf-gateway-service-message-fake-pdf-malware/
14 Oct 2015 - "An email with the subject of 'Australia Post SMSF Gateway Service Message' pretending to come from SMSF Gateway Team <SMSFGateway-NO-REPLY@ smsfmsg .auspost .com.au> with a zip attachment is another one from the current bot runs... The content of the email says:
We’re pleased to advise you that the Australia Post SMSF Gateway Service has received a superannuation contribution message.
The details of this message are in the attached PDF.
The contribution payment should appear in your nominated bank account with a payment reference number listed in the PDF to allow for easy reconciliation.
Kind Regards
The SMSF Gateway Team ...


14 October 2015: Contribution448772241.zip: Extracts to: Contribution308911799.scr
Current Virus total detections 4/56*... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...7b53bfc5d8c7e0f6d4ec272f/analysis/1444789129/
___

FBI, Security Vendors Partner for DRIDEX Takedown
- http://blog.trendmicro.com/trendlab...ce/us-law-enforcement-takedown-dridex-botnet/
Oct 13, 2015 - "Multiple command-and-control (C&C) servers used by the DRIDEX botnet have been taken down by the Federal Bureau of Investigation (FBI), following the action taken by the National Crime Agency (NCA) in the UK. US law enforcement officials obtained court orders that resulted in the seizure of multiple servers used by DRIDEX. This crippled the malware’s C&C network, which is used by the malware to send the stolen information to the cybercriminals and to download configuration files that include the list of targeted banks. Furthermore, charges have been made against Andrey Ghinkul, aka Andrei Ghincul and Smilex, the Moldovan administrator of the botnet. Taking down cybercriminals is no small feat. Tracking down and shutting down cybercrime operations requires the constant collaboration of researchers and law enforcement agencies, each providing their own expertise. The takedown of the command-and-control (C&C) network used by the banking malware DRIDEX is the latest example of that partnership’s success... DRIDEX has slowly been making a name for itself this past year and has been viewed as the successor to the Gameover Zeus (GoZ) malware. Its prevalence in the threat landscape can be attributed to its business model, P2P (peer-to-peer) architecture, and unique routines. Unlike other malware, DRIDEX operates using the BaaS (Botnet-as-a Service) business model. It runs several bot networks, each identified by a number and each containing a specific set of target banks. Our investigation revealed that its target banks mostly come from the US and Europe (particularly Romania, France, and the UK)... users in the US and the UK accounted for more than 35% of DRIDEX infections:
> https://blog.trendmicro.com/trendlabs-security-intelligence/files/2015/10/dridex.jpg
The P2P architecture of DRIDEX was built as an improved version of GoZ’s architecture. Learning from the GoZ takedown, creators of DRIDEX added a another layer in its architecture before the command-and-control (C&C) server. Apart from these, DRIDEX is also equipped to remove or hide tracks in the system. Similar to the Chthonic variant of ZBOT, it uses an invisible persistence technique which involves writing autostart reg key upon system shutdown and deleting autostart reg key upon system startup. However, only DRIDEX cleans up the stored configuration in the registry and changes the malware copy location. DRIDEX is easily spread using malicious email attachments, usually Microsoft Office documents that contain macros. The use of macros could be seen as one way of ensuring a higher chance of successful attacks. Macros are commonly used in automated and interactive documents. The feature is usually deactivated by default, but if it was already enabled prior to the attack, the attack commences without any additional requirements. Otherwise, the attack must use a strong social engineering lure in order to convince the user to enable the feature. Furthermore, we found that the macro code contains garbage and useless code... While the takedown of the C&C servers now prevents DRIDEX from executing malicious activities, total cleanup still requires users to ensure that DRIDEX has been removed from their systems..."

>>> http://www.justice.gov/usao-wdpa/pr/bugat-botnet-administrator-arrested-and-malware-disabled
Oct 13, 2015 - "... Victims of Bugat/Dridex may use the following webpage created by US-CERT for assistance in removing the malware:
> https://www.us-cert.gov/dridex ..."
Oct 13, 2015

:fear::fear: :mad:
 
Last edited:
Fake 'Scan' SPAM

FYI...

Fake 'Scan' SPAM - doc malware
- http://myonlinesecurity.co.uk/ray-white-scan-2015-10-14-52954-p-m-word-doc-malware/
15 Oct 2015 - "An email with the subject of '[Scan] 2015-10-14 5:29:54 p.m.' pretending to come from 'Ray White <rw@raylian .co.uk>' with a malicious word doc or Excel XLS spreadsheet attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Scan-2015-10-14-52954-pm-1024x357.png

15 October 2015: 2015-10-14 5-29-54 p.m..doc . Current Virus total detections 4/54*
... Which downloads Dridex banking malware from http ://23.229.157.230/~gwhill2377/86575765/6757645.exe (VirusTotal 0/53**)... DO NOT follow the advice they give to enable macros or enable editing to see the content. Most of these malicious word documents appear to be blank or look something like these images when opened in protected view mode, which should be the default in Office 2010, 2013 and 365:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/08/protected-view-macros_21-1024x412.png
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...1d66fd0495bbeedd6213130b/analysis/1444898925/

** https://www.virustotal.com/en/file/...3b90212ab222753f8c0f6e04/analysis/1444899628/
... Behavioural information
TCP connections
89.32.145.12: https://www.virustotal.com/en/ip-address/89.32.145.12/information/
88.221.14.138: https://www.virustotal.com/en/ip-address/88.221.14.138/information/

23.229.157.230: https://www.virustotal.com/en/ip-address/23.229.157.230/information/
> https://www.virustotal.com/en/url/d...4732ba0e5a907b791b894dc0a78621fd790/analysis/

- http://blog.dynamoo.com/2015/10/malware-spam-scan-2015-10-14-52954-pm.html
15 Oct 2015 - "This rather terse spam email has a malicious attachment. It does not come from Raylian but is instead a simple forgery:
From Ray White [rw@ raylian .co.uk]
Date Thu, 15 Oct 2015 10:56:35 +0200
Subject [Scan] 2015-10-14 5:29:54 p.m.
Amanda's attached.


In the only sample I saw, the attachment was named 2015-10-14 5-29-54 p.m..doc which has a VirusTotal detection rate of 4/56 and which contains this malicious macro... The Hybrid Analysis report* shows this particular version (there will be others) downloading a binary from:
sdhstribrnalhota .xf .cz/86575765/6757645.exe
Despite the apparently random name, this is a real business website (SDH Stříbrná Lhota) that has been compromised. This binary has a detection rate of just 2/56** and is saved as %TEMP%\CrowSoft1.exe. The Hybrid Analysis report*** for this indicates connections to:
89.32.145.12 (Elvsoft SRL, Romania / Coreix, UK)
195.154.251.123 (Online SAS / Iliad Entreprises / Poney Telecom, France)
The payload appears to be the Dridex banking trojan, still going strong despite reports of arrests in the crime gang responsible.
Recommended blocklist:
89.32.145.12
195.154.251.123

* https://www.hybrid-analysis.com/sam...425945630b63c3b93f60c1d1ce857?environmentId=1

** https://www.virustotal.com/en/file/...3b90212ab222753f8c0f6e04/analysis/1444903993/
... Behavioural information
TCP connections
89.32.145.12: https://www.virustotal.com/en/ip-address/89.32.145.12/information/
88.221.14.138: https://www.virustotal.com/en/ip-address/88.221.14.138/information/

*** https://www.hybrid-analysis.com/sam...e7e063b90212ab222753f8c0f6e04?environmentId=1

:fear::fear: :mad:
 
Last edited:
Fake 'DHL' SPAM, Backdoor Zegost delivered

FYI...

Fake 'DHL' SPAM - PDF malware
- http://myonlinesecurity.co.uk/dhl-australia-return-consignment-startrack-express-fake-pdf-malware/
16 Oct 2015 - "An email that appears to come from 'DHL Australia' with the subject of 'Return consignment AVD524417' pretending to come from DSC.AU.Returns@ dhl .com with a zip attachment is another one from the current bot runs... The content of the email says :
BOOKING OF YOUR CONTROLLED RETURN
Print off labels (on a LASER printer as this will ensure driver can scan barcode) and affix to carton.
Please ensure all other labels are removed from carton.
You can book your own freight by calling our Carrier Partner Startrack Express on 12 18 58 quoting Reference No. 524417
Alternatively, DHL will call within 3 business days after labels are sent to assist in booking in your freight for collection.
Quote the consignment Number that is on your labels (attached to your email with prefix AVD)
Startrack Express will provide you with a booking number, please retain this number.
Below is a mandatory TRANSFER SUMMARY. This must be completed prior to the arrival of driver; if not complete, this may result in a futile pick up.
Goods are required back into warehouse no later than 7 working days. Please ensure good are ready for collection.
STARTRACK EXPRESS TRANSFER SUMMARY REPORT ...


16 October 2015: FL-AVD524417.zip: Extracts to: FL-AVD084542.exe
Current Virus total detections 5/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...32941b07d9b47332f6ee6917/analysis/1444969428/
___

Backdoor Zegost delivered via Hacking Team exploit
- http://research.zscaler.com/2015/10/chinese-backdoor-zegost-delivered-via.html
Oct 16, 2015 - "... In past two months, we've spotted multiple instances of Zegost Backdoor Trojan installation attempts leveraging Hacking Team's Adobe Flash exploit (CVE-2015-5119) payload. These attacks do not appear to be targeted, but the payload involved in the infection cycle has some resemblance to recent APT payloads from HttpBrowser & the PlugX RAT family. Attack Chain: The infection cycle starts with a legitimate Chinese real estate and shopping site www[.]kongquechang[.]com, which appears to have been compromised by the attackers and contains an injected script. The injected script will cause a series of -redirects- leading to Hacking Team's exploit payload... Attackers are abusing the Chinese URL shortening service t .cn to -redirect- victims to the attack server and also Baidu's URL shortening service dwz .cn to deliver the Adobe Flash exploit payload... Below is the complete list of C&Cs it tries to connect.
80.247.233.18: https://www.virustotal.com/en/ip-address/80.247.233.18/information/
91.121.82.113: https://www.virustotal.com/en/ip-address/91.121.82.113/information/
69.164.213.85: https://www.virustotal.com/en/ip-address/69.164.213.85/information/
79.143.191.147: https://www.virustotal.com/en/ip-address/79.143.191.147/information/
199.241.30.233: https://www.virustotal.com/en/ip-address/199.241.30.233/information/
162.243.12.14: https://www.virustotal.com/en/ip-address/162.243.12.14/information/
188.93.73.90: https://www.virustotal.com/en/ip-address/188.93.73.90/information/
195.154.184.240: https://www.virustotal.com/en/ip-address/195.154.184.240/information/
Conclusion: The use of a legitimate certificate in signing malware executables to evade security detection is not new but is still very effective. The malware author aims to exploit the Code-Signing Certificate based whitelisting approach by signing their samples..."
(More detail at the zscaler URL at the top.)

kongquechang[.]com: Could not find an IP address for this domain name.

:fear::fear: :mad:
 
Last edited:
Fake 'Invoice / PO', 'Online banking app form' SPAM

FYI...

Fake 'Invoice / PO' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-cos007202-stephanie.html
19 Oct 2015 - "This -fake- financial spam does not come from Bombardier Transportation but is instead a simple -forgery- with a malicious attachment:
From "Stephanie Greaves" [sgreaves@ btros .co.uk]
Date Mon, 19 Oct 2015 12:06:42 +0430
Subject COS007202
Good morning,
Please see attached purchase order.
Kind regards,
Stephanie Greaves
Administration Apprentice
Bombardier Transportation (Rolling Stock) UK Ltd
Electronics, Cabling, & Interior Division
Litchurch Lane, Derby, DE24 8AD


Attached is a file COS007202.doc which comes in at least three different versions (VT results [1] [2] [3]) each containing a slightly different malicious macro... Analysis of the documents is pending, but they will almost definitely drop the Dridex banking trojan...
UPDATE: According to these Hybrid Analysis reports [4] [5] [6] , those macros download from the following locations:
euroagroec .com/35436/5324676645.exe
demo9.iphonebackstage .com/35436/5324676645.exe
webmatique .info/35436/5324676645.exe
The binary they download has a VirusTotal detection rate of 3/56[7] and is saved as %TEMP%\CrowSoft1.exe. Both the VirusTotal and Hybrid Analysis reports show what looks like malicious traffic going to:
157.252.245.49 (Trinity College Hartford, US)
I recommend that you -block- traffic to that IP..."
1] https://www.virustotal.com/en/file/...96975cead383459fabf05cf7/analysis/1445246850/

2] https://www.virustotal.com/en/file/...50fe04ed9ce6e96f1ff57212/analysis/1445246860/

3] https://www.virustotal.com/en/file/...701d5ca8c65c0de997f1d3e5/analysis/1445246874/

4] https://www.hybrid-analysis.com/sam...6334896975cead383459fabf05cf7?environmentId=3

5] https://www.hybrid-analysis.com/sam...cf4ce50fe04ed9ce6e96f1ff57212?environmentId=3

6] https://www.hybrid-analysis.com/sam...5debf701d5ca8c65c0de997f1d3e5?environmentId=1

7] https://www.virustotal.com/en/file/...08b4763d93165af20a8bb571/analysis/1445249638/
___

Fake 'Online banking app form' SPAM - PDF malware
- http://myonlinesecurity.co.uk/online-banking-application-form-crm-fake-pdf-malware/
19 Oct 2015 - "An email appearing to come from Nat West Leicester Business Banking Customer Support with the subject of 'Online banking application form********* CRM:013545192' (random numbers) pretending to come from 'NW – Leicester CRT <Leicester.CMT@ NatWest .com> with a zip attachment is another one from the current bot runs... The content of the email says:
Please find enclosed the requested online application form which
you will need to complete and return to myself via the post.
Kind Regards
Janine Lyles
Relationship Manager’s Assistant
Leicester Business Banking Customer Support
1st Floor
1 Granby Street
Leicester
LE1 6EJ
Tel: 0116 2752435
Fax: 0116 2575469
E Mail ...


19 October 2015: Online banking upd appl form.zip: Extracts to: Online banking upd appl form.scr
Current Virus total detections 3/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...3a077577b5888fc750743d33/analysis/1445250902/

:fear::fear: :mad:
 
Last edited:
Fake 'P.O.', 'NOTIFICATION' SPAM, Shifu banking trojan

FYI...

Fake 'P.O.' SPAM - PDF malware
- http://myonlinesecurity.co.uk/purch...trata-by-emerson-vicky-prod-fake-pdf-malware/
20 Oct 2015 - "An email appearing to come from Xstrata with the subject of 'PurchaseOrder DR67CV_30HJ' from 'Xstrata' by 'Emerson, Vicky (PROD)' pretending to come from XstrataQLD@ axis.ventyx .com with a zip attachment is another one from the current bot runs... The content of the email says :
Please find attached a PurchaserOder from Xstarta for your action. It has been sent via Mincom Axis.
This PurhcaseOrder is in PDF format and can be viewed with Adobe Acrobat Reader. You may ACCEPT or REJECT this PurchaseOrdre from this email by following the isntructions below. In either case, an email will be generated for you to send to the Buyer via Mincom Axis. Type in any notes or comments you wish to convey to the buyer in the email Body and send the email but do not modify any part of the email Subject.
To ACCEPT the whole PucrhaseOrder, click the following link and complete your details ...


20 October 2015: PurchaseOrder_9EP31W_52M1_707850624.zip: Extracts to: PurchaseOrder_816785634_036545298.exe
Current Virus total detections 6/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...2dfa330f9fbd2ef225372e56/analysis/1445314610/
___

Fake 'P.O.' SPAM - doc malware
- http://blog.dynamoo.com/2015/10/malware-spam-purchase-order-no-48847.html
20 Oct 2015 - "This -fake- financial spam comes with a malicious payload:
From Harminder Saund [MinSaund77@ secureone .co.uk]
Date Tue, 20 Oct 2015 16:08:53 +0700
Subject Purchase Order No: 48847
Attached is a copy of our Purchase Order number 48847
Harminder Saund
Secure One


The sender's email address varies slightly, for example:
MinSaund77@ secureone .co.uk
MinSaund92@ secureone .co.uk
MinSaund94@ secureone .co.uk
MinSaund013@ secureone .co.uk
Attached is a file PO_48847.DOC which I have seen two different versions of so far (VirusTotal [1] [2]) each containing a slightly different malicious macro... There are probably different versions of the document with different macros. Automated analysis is pending, however the payload is most likely the Dridex Shifu banking trojan. Please check back for updates..."
1] https://www.virustotal.com/en/file/...d2f7c1839ba94307934b1e91/analysis/1445335728/

2] https://www.virustotal.com/en/file/...7e370fea112b58a437a55577/analysis/1445335747/
UPDATE: So far, three download locations have been identified..
ladiesfirst-privileges .com/656465/d5678h9.exe
papousek.kvalitne .cz/656465/d5678h9.exe
pmspotter. wz.cz/656465/d5678h9.exe
This file is downloaded as %TEMP%\shhg32c.exe and it has a VirusTotal detection rate of 4/56*... The Hybrid Analysis reports [1] [2] indicate that it calls home to:
fat.uk-fags .top / 188.166.250.20 (Digital Ocean, Singapore)
I recommend that you -block- traffic to that IP."
* https://www.virustotal.com/en/file/...25c39798f44d7ff9d7b740e8/analysis/1445341067/

1] https://www.hybrid-analysis.com/sam...2131bd2f7c1839ba94307934b1e91?environmentId=3

2] https://www.hybrid-analysis.com/sam...6ae277e370fea112b58a437a55577?environmentId=3
___

Fake 'NOTIFICATION' SPAM - xls malware
- http://blog.dynamoo.com/2015/10/malware-spam-gomez-sanchezpostmailbella.html
20 Oct 2015 - "This spam comes with a malicious attachment:
From "GOMEZ SANCHEZ"[postmail@ bellair .net]
To
Date Tue, 20 Oct 2015 13:14:56 +0430
Subject victim@ victimdomain .tld
Congratulations
Print out the attachment file fill it and return it back by fax or email
Yours Sincerely
GOMEZ SANCHEZ


The "Subject" is the victim's own email address. Attached is a file FINAL NOTIFICATION.xls which comes (so far) in three different variants (VirusTotal [1] [2] [3]) contains one of -three- malicious macros... Analysis of the payload is pending, but is likely to be the Dridex Shifu banking trojan. Please check back later..."
1] https://www.virustotal.com/en/file/...cbb87554a056e97239900258/analysis/1445335252/
FINAL NOTIFICATION .xls - 4/56
2] https://www.virustotal.com/en/file/...05d949ae88f401e94c4b1a6a/analysis/1445335267/
FINAL NOTIFICATION-2 .xls - 4/54
3] https://www.virustotal.com/en/file/...14cf92586b8ecb65de756756/analysis/1445335281/
FINAL NOTIFICATION-3 .xls - 4/56
UPDATE: So far, three download locations have been identified..
ladiesfirst-privileges .com/656465/d5678h9.exe
papousek.kvalitne .cz/656465/d5678h9.exe
pmspotter.wz. cz/656465/d5678h9.exe
This file is downloaded as %TEMP%\shhg32c.exe and it has a VirusTotal detection rate of 4/56*... The Hybrid Analysis reports [1] [2] indicate that it calls home to:
fat.uk-fags .top / 188.166.250.20 (Digital Ocean, Singapore)
I recommend that you block traffic to that IP."
* https://www.virustotal.com/en/file/...25c39798f44d7ff9d7b740e8/analysis/1445341067/

1] https://www.hybrid-analysis.com/sam...3dd04cbb87554a056e97239900258?environmentId=3

2] https://www.hybrid-analysis.com/sam...764bd14cf92586b8ecb65de756756?environmentId=3

ladiesfirst-privileges .com: 159.253.148.199: https://www.virustotal.com/en/ip-address/159.253.148.199/information/

papousek.kvalitne .cz: 88.86.117.145: https://www.virustotal.com/en/ip-address/88.86.117.145/information/

pmspotter.wz. cz: 88.86.117.153: https://www.virustotal.com/en/ip-address/88.86.117.153/information/

Shifu banking trojan: http://news.softpedia.com/news/shif...rus-to-keep-other-malware-at-bay-490580.shtml

:fear::fear: :mad:
 
Last edited:
Fake 'E-Toll', 'Delayed tax return', 'INVOICE', 'PNC' SPAM, Chrome -clone- 'eFast'

FYI...

Fake 'E-Toll' SPAM – PDF malware
- http://myonlinesecurity.co.uk/your-e-toll-account-statement-fake-pdf-malware/
21 Oct 2015 - "An email with the subject of 'Your E-Toll account statement' pretending to come from RMSETollDontReply@ rms.nsw. gov.au with a zip attachment is another one from the current bot runs... The content of the email says:
Dear Valued Customer,
Please find attached your E-Toll account statement.
If you would like to claim Cashback please:
Simply login to your account and click on the ‘Claim Cashback’ link on the Account Overview screen. Follow the easy steps and submit your claim online. Please note: Online claims can only be completed on E-Toll accounts with online access.
Mail the E-Toll transaction statements that list your toll usage for eligible trips and a completed Cashback rebate form to the following address: Roads and Maritime Services M5 Cashback Locked Bag 3 Dubbo NSW 2830
Rebates must be claimed within 12 calendar months of the end of the Cashback quarter.
Thank you for choosing E-Toll
Regards
The E-Toll Team Roads and Maritime Services
To view documents in PDF format, you must have Adobe Acrobat PDF reader software version 5 or above installed on your computer.
This email was sent to you by Roads and Maritime Services. This is an unmonitored email address so please do not reply to this email...


21 October 2015: Oct 2015ST.zip: Extracts to: Oct 2015ST.exe
Current Virus total detections 3/55* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...ad85a9ce070fb464d428687a/analysis/1445398880/
___

Fake 'Delayed tax return' SPAM - PDF malware
- http://myonlinesecurity.co.uk/austr...ed-tax-returns-over-30-days-fake-pdf-malware/
21 Oct 2015 - "An email that appears to come from Australian Taxation Office with the subject of 'Delayed tax returns over 30 days' pretending to come from DelayedReturn <DelayedReturn@ ato. gov.au> with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...Delayed-tax-returns-over-30-days-1024x769.png

21 October 2015: TaxAgentReport516177320151020230248.zip: Extracts to: TaxAgentReport061836020151020223957.exe
Current Virus total detections 5/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...09429b9b090c415dd0d51f64/analysis/1445398912/
___

Fake 'INVOICE' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-invoice-for-payment_21.html
21 Oct 2015 - "This -fake- financial spam is not from Lancashire Police but is a simple -forgery- with what appears to be a malicious attachment.
From: Whitehead, Lyn [Lyn.Whitehead@ lancashire.pnn.police .uk]
Date: 21 October 2015 at 10:15
Subject: INVOICE FOR PAYMENT - 7500005791
Hello
Please find attached an invoice that is now due for payment.
Regards
Lyn
Lyn Whitehead (10688)
Business Support Department - Headquarters
Email: Lyn.Whitehead@ lancashire.pnn.police .uk ...


The attachment appears contain some sort of malicious OLE object rather than a macro, but so far I have not been able to analyse it. Furthermore, this document does not seem to open properly in other applications, so I suspect that it contains an unknown exploit. Analysis is still pending. The VirusTotal report shows a detection rate of zero. The Malwr report is inconclusive. Other analysis is pending please check back.
UPDATE 1: Another version of this is in circulation, also with zero detections at VirusTotal... The Hybrid Analysis for both samples in inconclusive...
UPDATE 2: An analysis of the documents shows an HTTP request to:
ip1.dynupdate.no-ip .com:8245
All this returns is the IP address of the computer opening the document. Although not malicious in itself, you might want to look out for it as an indicator of compromise...
UPDATE 4: The Hybrid Analysis reports for the documents can be found here [1] [2] [3] show that the macros... in the document download a binary from the following locations:
www .sfagan.co .uk/56475865/ih76dfr.exe
www .cnukprint .com/56475865/ih76dfr.exe
www .tokushu. co.uk/56475865/ih76dfr.exe
www .gkc-erp .com/56475865/ih76dfr.exe
At present this has a zero detection rate at VirusTotal*... Those reports in addition to this Malwr report[4] indicate malicious traffic to the following IPs:
89.32.145.12 (Elvsoft SRL, Romania / Coreix Ltd, UK)
119.47.112.227 (Web Drive Ltd, New Zealand)
195.154.251.123 (Online SAS / Iliad Entreprises / Poney Telecom, France)
157.252.245.49 (Trinity College Hartford, US)
The payload is probably the Shifu banking trojan.
Recommended blocklist:
89.32.145.12
119.47.112.227
195.154.251.123
157.252.245.49
"
1] https://www.hybrid-analysis.com/sam...7ce334e81d699db3307d79d3e77a5?environmentId=1

2] https://www.hybrid-analysis.com/sam...267230a1d462ff8f4a55784a89469?environmentId=1

3] https://www.hybrid-analysis.com/sam...41d838e83d17296013e6d00b2b621?environmentId=1

4] https://malwr.com/analysis/NjE3YmRhOWE4NzFjNGM2M2JkZDI2NTRkZDE2ZTk1ZDM/

* https://www.virustotal.com/en/file/...20c2b64e31e355b3f848c19a/analysis/1445428911/
... Behavioural information
TCP connections
119.47.112.227: https://www.virustotal.com/en/ip-address/119.47.112.227/information/
8.254.218.14: https://www.virustotal.com/en/ip-address/8.254.218.14/information/
195.154.251.123: https://www.virustotal.com/en/ip-address/195.154.251.123/information/
___

Fake 'PNC' SPAM - PDF malware
- http://myonlinesecurity.co.uk/your-pnc-bank-online-statement-is-ready-to-be-viewed-fake-pdf-malware/
21 Oct 2015 - "An email with the subject of 'Your PNC Bank Online Statement is ready to be viewed' pretending to come from PNCBank_Statements@ pnc .com with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-co...-Statement-is-ready-to-be-viewed-1024x550.png

21 October 2015: Statement_7208_10212015.zip: Extracts to: Statement_3374_10212015.zip.scr
Current Virus total detections 5/57* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/en/file/...656cd1ac41c31e7d4c633cf2/analysis/1445449142/
___

Chrome -clone- 'eFast' serves ads, collects info
- http://net-security.org/malware_news.php?id=3129
21.10.2015 - "A Google Chrome lookalike browser dubbed 'eFast' is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to malware. Posing as a legitimate application that will benefit users, eFast is actually only helpful to its creators - it sidelines other browsers, generates intrusive online ads (the creators are paid for each click), redirects users to potentially malicious pages, and monitors their Internet browsing activity, which is then sold to third party companies. "eFast Browser is mostly proliferated as a 'bundle' with other (mostly free) software," PC Risk's Tomas Meskauskas warns*. "Users do not expect bundled applications to be concealed, and thus, developers intentionally hide them within the 'Custom' or 'Advanced' settings. Users who rush the download/installation processes and skip this section often inadvertently install potentially unwanted programs. In doing so, they expose their systems to risk of infection and compromise their privacy"... During installation, eFast will attempt to -replace- Chrome if that is already installed, by deleting all the shortcuts to it on your taskbar and desktop. "To make sure that you will use your new browser, eFast makes itself the default browser and takes over some file-associations. File-associations are settings that determine which program will run when files with a certain extension are opened," Malwarebytes' Pieter Arntz explains**..."
* https://www.pcrisk.com/removal-guides/9480-ads-by-efast-browser
eFast Browser removal instructions

** https://blog.malwarebytes.org/online-security/2015/10/efast-browser-hijacks-file-associations/

:fear::fear: :mad:
 
Last edited:
Fake 'Invoice Summary.doc' SPAM, Fake Java, Email account PHISH, Apple Invoice PHISH

FYI...

Fake 'Invoice Summary.doc' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-water-services-invoice_22.html
22 Oct 2015 - "This -fake- invoice does not comes from United Utilities Scotland, but is instead a simple forgery with a malicious attachment...
From "UUSCOTLAND" [UUSCOTLAND@ uuplc. co.uk]
Date Thu, 22 Oct 2015 19:30:13 +0700
Subject Water Services Invoice
Good Morning,
I hope you are well.
Please find attached the water services invoice summary for the billing period of
22 September 2015 to 22 October 2015.
If you would like any more help, or information, please contact me on 0345 0726077.
Our office is open between 9.00am and 5.00pm Monday to Friday. I will be happy to
help you. Alternatively you can email me at uuscotland@uuplc.co.uk.
Kind regards
Melissa
Melissa Lears
Billing Specialist
Business Retail
United Utilities Scotland ...


So far I have seen -three different- versions of the attachment, all named 22 October 2015 Invoice Summary.doc with detection rates of about between 4/55 and 7/55 at VirusTotal [1] [2] [3] containing... malicious macros... Analysis of the documents is pending, but one key indicator is that the file appears to be saved as %TEMP%\bluezone3.exe. Check back later for updates."
1] https://www.virustotal.com/en/file/...fa0d0cf71892311d376b9cf5/analysis/1445520172/

2] https://www.virustotal.com/en/file/...0b86c92f036c979172730a21/analysis/1445520186/

3] https://www.virustotal.com/en/file/...6885f1e9f79ad7f895d67793/analysis/1445520199/

UPDATE 1: This VirusTotal report* also identifies the following download locations:
beauty.maplewindows .co.uk/t67t868/nibrd65.exe
dtmscomputers .co.uk/t67t868/nibrd65.exe
namastetravel .co.uk/t67t868/nibrd65.exe
This file has a VirusTotal detection rate of 2/54** and that report indicates network traffic to: 198.74.58.153 (Linode, US)
Further analysis is pending, in the meantime I suggest that you -block- traffic to the above IP."
* https://www.virustotal.com/en/file/...0b86c92f036c979172730a21/analysis/1445520186/

** https://www.virustotal.com/en/file/...082346392aa38186847dd033/analysis/1445521267/

198.74.58.153: https://www.virustotal.com/en/ip-address/198.74.58.153/information/
___

Fake Java "pop-ups for Download"
- https://blog.malwarebytes.org/online-security/2015/10/this-isnt-the-java-i-ordered/
Oct 22, 2015 - "... The downloaded file is called setup.exe and is recognized by a few scanners* that detect this file as potentially unwanted adware. (PUP.Optional.Media)... It installs a program called Media Downloader version 1.5:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/warning4w.png
The other one I want to show you is not actually a pop-up, but a background image that was made to look like one:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/site1w.png
Clicking this “Install” button downloads and prompts you to install a bundler that does install Java version 1.8.25 but not until they have offered the other components of the bundle. In this case I had to “Decline” Norton360, Weatherbug, PC Mechanic and Stormfall Age of War. Note that the latest version for my system is Version 8 Update 65. Version 8u25 is over a year old. Paying attention to the UAC prompt could have saved us some work here. Super IS (Fried Cookie Ltd.) somehow doesn’t have that official ring to it to convince me that this is the Java installer I was promised:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/UACpromptw.png
Probably triggered by the critical patch update that was released by Oracle there are some sites that use this opportunity to lure users into using Java prompt -lookalikes- or bundled installers (for outdated versions). As always, get your software from trusted sources..."
* https://www.virustotal.com/nl/file/...d3ea1bb9766253d8deb2453c6a282ab02a9/analysis/
___

Email account credentials - PHISH
- http://myonlinesecurity.co.uk/email-account-credentials-phishing/
22 Oct 2015 - "I came across this slightly different email -phishing- attempt this morning... The original email is quite bland, but just enticing enough to persuade a user to click and fill in the forms...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/weebly_phishing_email-1024x338.png

If you did follow the link, you would see a webpage looking like this:
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/weebly_phishing_fillfree-1024x565.png
This site is hosted on a free hosting company weebly .com. Unfortunately these free hosts have minimal checks and it is easy to put up almost anything that can infect a user or act as a phishing site. Weebly does eventually respond to abuse reports but in my experience they are quite slow and take a long time to think about whether the site contravenes their T&Cs. Do -not- fill in the forms otherwise your email account will be compromised. You -never- need to give your email account password to anybody."
___

Apple Invoice - Phish
- https://blog.malwarebytes.org/fraud-scam/2015/10/steer-clear-of-this-apple-invoice-phish/
Oct 22, 2015 - "... a blatant attempt to swipe your payment information. Couched in the well-worn guise of a supposed Apple Store refund, the mail wants potential victims to hand over their Apple ID / password and then a chunk of personal / payment details:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/applephis01.jpg
... Of course, you probably did not authorise any sort of purchase for a “CoPilot Premium HD” which is exactly the “Oh no my money, I must retrieve it” reaction they’re banking on (unless you actually did buy one of these, in which case things might get a little confusing). Nothing will have people rushing to click buttons and hand over information faster than the possibility of someone making unauthorised payments – clicking the refund links will take them to a -fake- login, via a -redirect- on a potentially compromised t-shirt website. The phish pages themselves are located at
aut0carhire(dot)com/index/user12-appleid/index(dot)html
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/applephish1.jpg
After handing over Apple ID credentials, the victim is taken to the next step which involves them giving name, address, DOB and full payment information:
> https://blog.malwarebytes.org/wp-content/uploads/2015/10/applephish2.jpg
... Unfortunately, hitting the “Cancel Transaction” button here would be pretty much the exact opposite of cancelling a transaction and victims could expect to see many more actual payments suddenly leaving their bank account. If you have this sitting in your mailbox, delete it. If you’ve already sent the scammers your details, notify your bank and cancel the card – while keeping an eye out for any dubious payments. Apple themed phish scams are a popular choice for criminals, and whether faced with iTunes logins, “Find my phone” fakeouts, iCloud shenanigans or payment receipts such as the one above, recipients should be wary and – if in doubt – head to -official- Apple pages* to find out if a payment really is being processed."
* http://www.apple.com/shop/account/home

aut0carhire(dot)com: 97.74.181.128: https://www.virustotal.com/nl/ip-address/97.74.181.128/information/
>> https://www.virustotal.com/nl/url/6...a6a5f725086915baaa08db3094f72d0f05e/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'cleaning invoice', 'Credit Note', 'Receipt for Payment' SPAM, Paypal PHISH

FYI...

Fake 'cleaning invoice' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-cleaning-invoice-deborah.html
23 Oct 2015 - "This -fake- financial spam comes with a malicious attachment:
From "deborah Sherer" [thesherers@ westnet .co.uk]
Date Fri, 23 Oct 2015 17:03:19 +0700
Subject cleaning invoice
Hello
attached is invoice for payment
thanks
Deborah Sherer
---
This email has been checked for viruses ...


Attached is a file Cleaning022958.doc which comes in three different versions (VirusTotal results [1] [2] [3]) containing a macro... and downloads a malicious binary from one of the following locations:
www .bhtfriends .org/tydfyyur54/43e67tko.exe
zomb.webzdarma .cz/tydfyyur54/43e67tko.exe
nisanyapi .com/tydfyyur54/43e67tko.exe
This is saved as %TEMP%\lenderb2.exe and has a VirusTotal detection rate of just 1/55* (that's just a generic detection by Kaspersky). That VirusTotal report plus this Hybrid Analysis report** show network traffic to:
195.154.251.123 (Online SAS / Iliad Entreprises / Poney Telecom, France)
Private sources also identify these following IPs as part of the C2 infrastructure:
157.252.245.49 (Trinity College Hartford, US)
198.74.58.153 (Linode, US)
68.168.100.232 (Codero, US)
The payload appears to be the Dridex banking trojan.
Recommended blocklist:
195.154.251.123
157.252.245.49
198.74.58.153
68.168.100.232
"
1] https://www.virustotal.com/en/file/...6bd0a8437ddb7d8e5c93df7b/analysis/1445595890/

2] https://www.virustotal.com/en/file/...743f3e415db491389edc5344/analysis/1445595902/

3] https://www.virustotal.com/en/file/...caa15eca8383417843ba716f/analysis/1445595912/

* https://www.virustotal.com/en/file/...59713ae68ec018f65ab174d0/analysis/1445595923/

** https://www.hybrid-analysis.com/sam...0fb4059713ae68ec018f65ab174d0?environmentId=1
___

Fake 'Credit Note' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-credit-note-cn-06536-from.html
23 Oct 2015 - "This -fake- financial spam has a malicious attachment:
From: Accounts [message-service@ post.xero .com]
Date: 23 October 2015 at 15:08
Subject: Credit Note CN-06536 from Trump Hotels & Casino Resorts Inc. for [redacted] (2752)
Hi Mattie,
Attached is your credit note CN-06536 for 8954.41 GBP.
This has been allocated against invoice number
If you have any questions, please let us know.
Thanks,
Avnet, Inc.


The message is neither from Avnet, Xero or Trump Hotels, but is a simple forgery. Attached is a file Credit Note CN-06536.doc .. but it's actually a -ZIP- file rather than a DOC file. Whoops. Renaming the .DOC to .ZIP creates a valid archive, and the executable inside is named Credit Note CN-83607.exe and has a VirusTotal detection rate of 4/55*. VT identifies this as Upatre which implies that the payload is the Dyre banking trojan... the current version of Update/Dyre phones home to 197.149.90.166 (Cobranet, Nigeria) which I strongly recommend you block.
UPDATE: The Hybrid Analysis report is here**, reporting the Nigerian IP and also showing that the malware saves itself as:
%TEMP%\homebast.exe
C:\Windows\mLunoMqU.exe "
* https://www.virustotal.com/nl/file/...2165119cba49a300427a1761/analysis/1445609013/

** https://www.hybrid-analysis.com/sam...97c712165119cba49a300427a1761?environmentId=1

197.149.90.166: https://www.virustotal.com/nl/ip-address/197.149.90.166/information/
___

Fake 'Scan Data' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-docucentre-v-c6675-t2-scan.html
23 Oct 2015 - "This -fake- document scan appears to originate from within the victim's own organisation, but doesn't. Instead it comes with a malicious attachment.
From: DocuCentre-V C6675 T2 [reception@ victimdomain .com]
Reply-to: reception@ victimdomain .com
Date: 23 October 2015 at 09:23
Subject: Scan Data from FX-D6DBE1
Number of Images: 1
Attachment File Type: DOC
Device Name: DocuCentre-V C6675 T2
Device Location:


Attached is a file 22102015160213-0001.doc which comes in a few different versions. The payload is Dridex and all the files and downloaded binaries are the same as used in this spam run*."
* http://blog.dynamoo.com/2015/10/malware-spam-cleaning-invoice-deborah.html
___

Fake 'Receipt for Payment' SPAM - PDF malware
- http://myonlinesecurity.co.uk/thank...etaxusa-receipt-for-payment-fake-pdf-malware/
23 Oct 2015 - "An email saying 'Thank you for filing your taxes with FreeTaxUSA' with the subject of 'Receipt for Payment' pretending to come from random companies and email addresses with a zip attachment is another one from the current bot runs...

Screenshot: http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/Receipt-for-Payment-1024x939.png

23 October 2015: unjammed black fly.zip: Extracts to: 9842548_2377731824.exe
Current Virus total detections 2/56* . This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a proper PDF file instead of the .exe file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustotal.com/nl/file/...231caf959c091d8ac95aa527/analysis/1445596923/
___

Western Union Business Solutions Spam
- http://threattrack.tumblr.com/post/131744694803/western-union-business-solutions-spam
Oct 23, 2015 - "Subjects Seen:
Order 49746970 Booked - Western Union Business Solutions Online FX for Corporate
Typical e-mail details:
Please be advised that Order 49746970 totaling 70,494.00 USD has been booked on Oct 23 2015.
Click on the attached file to view details of the order or to print a receipt.
This email was sent by Western Union Business Solutions. We respect your right to privacy.
Thank you for using Western Union Business Solutions.
Sincerely,
Western Union Business Solutions


Malicious File Name and MD5:
westernunion_order_receipt.exe (E4510056BB38A37EE7AE485AA6C4B36A)


Screenshot: https://40.media.tumblr.com/356fe0f2e0891dc75b6dceac7dd39ac8/tumblr_inline_nwobc8fpqk1r6pupn_500.png

Tagged: Western Union, Upatre
___

Paypal - PHISH... again.
- http://myonlinesecurity.co.uk/paypal-your-account-access-is-limited-phishing/
23 Oct 2015 - "... There are a few major common subjects in a phishing attempt involving either PayPal or your Bank or Credit Card, with a message saying some thing like:
There have been unauthorised or suspicious attempts to log in to your account, please verify
Your Account Access Is Limited
Your account has exceeded its limit and needs to be verified
Your account will be suspended !
You have received a secure message from < your bank>
We are unable to verify your account information
Update Personal Information
Urgent Account Review Notification
We recently noticed one or more attempts to log in to your PayPal account from a foreign IP address
Confirmation of Order


Screenshot: http://myonlinesecurity.co.uk/wp-co...l-Your-Account-Access-Is-Limited-1024x780.png

... the links to the -phishing- website are behind the 'update your info' button or the 'update now' link... The eventual site is the highlighted part of the very long url which goes via googleadservices. Now many phishers have been using google search links to persuade a recipient to click-a-link. Hovering over the link in an email will show google which most people would think was safe... The only way is look at the address bar and in the -Genuine- PayPal site, when using Internet Explorer the entire address bar is in green. (in Chrome or Firefox, only the padlock symbol on the left of the browser is green)...
> http://myonlinesecurity.co.uk/wp-content/uploads/2015/10/reactivepay_paypal_phish.png
This one wants your personal details, your Paypal account log in details and your credit card and bank details. Many of them are also designed to specifically steal your email, facebook and other social network log in details..."
___

Fake 'Notice to Appear' SPAM - malicious attachment
- http://blog.dynamoo.com/2015/10/malware-spam-notice-to-appear.html
22 Oct 2015 - "This -fake- legal spam comes with a malicious attachment:
From: District Court
Date: 22 October 2015 at 19:03
Subject: Notice to Appear
Notice to Appear,
This is to inform you to appear in the Court on the October 27 for your case hearing.
Please, prepare all the documents relating to the case and bring them to Court on the specified date.
Note: The case may be heard by the judge in your absence if you do not come.
You can review complete details of the Court Notice in the attachment.
Sincerely,
Michael Newell,
District Clerk


Attached is a file Notice_to_Appear_00800614.zip which in turn contains a malicious script Notice_to_Appear_00800614.doc.js... This obfuscated script translates into something a bit more understandable which clearly references the following domains:
www .flowarrior .com
www .abama .org
littlefacesofpanama-association .com
The Hybrid Analysis report* shows that it downloads a file as %TEMP%\5883173.exe which has a VirusTotal detection rate of 5/55** (possibly Cridex). It references the following IPs as being highly suspect:
91.121.108.77 (OVH, France)
78.24.220.229 (TheFirst-RU, Russia)
A -large- number of IPs are queried... I have not had the chance to check those individual IP addresses, but I recommend that you -block- the following two at least:
91.121.108.77
78.24.220.229
"
* https://www.hybrid-analysis.com/sam...e33d5429ecb2a1e7e6470103c898f?environmentId=1

** https://www.virustotal.com/nl/file/...868f8720d8fa7e4f99c82f05/analysis/1445547994/

> https://www.virustotal.com/nl/url/3...e18acbeb95cf9caa6f02cffc8a785c51464/analysis/
___

G DATA Malware Report H1 2015
- https://www.gdata-software.com/g-da...ses-malware-report-for-the-first-half-of-2015
Oct 22, 2015 - "... G DATA, is releasing their H1 2015 Malware Report, which looks at malware over the first half of 2015. Among the findings, researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the total number of malware strains this year is expected to be well above the level of 2014, with the U.S., China and France hosting the most malicious and fraudulent websites. In looking more closely at the banking industry, researchers found that Wells Fargo was the most frequently targeted financial services company by banking Trojans, and the Swatbanker family was the mostly frequently seen banking Trojan in the 6 month period, followed by the ZeuS family... websites related to the healthcare industry were most frequently classified as malicious (26.6 percent), with technology and telecom a distant second. The most commonly seen malware campaign was “Money Rain,” promising various ways to easily acquire money. While this campaign was seen on websites for all of the categories researched, 37 percent of the websites that were clearly connected to Money Rain were in the healthcare industry. Also of note, a new category, personal ads and dating, was revealed to be in the top 10 list of most prevalent malicious and fraudulent websites.
> https://static.gdatasoftware.com/11...egories_H1_2015_v1_EN_HL_lowres_48890w417.jpg
Additional Key Findings Include:
• The "Top 10" list of prevented malware attacks is dominated by adware and Potentially Unwanted Programs (PUP). Dealply and Graftor are the most prevalent families in this field.
• Ukraine is new to the Top 10 list of countries most frequently found to be hosting malicious websites with 5% of the activity, putting the country in fourth place. This could potentially be due to the political havoc occurring in this region.
• Exploits for vulnerabilities are now being integrated into exploit kits after just a few days. Users who do not keep their systems up-to-date will easily fall victim to cyber criminals.
• The vulnerabilities in Adobe Flash were most frequently abused to silently and automatically attack and compromise PCs (Exploit)..."
PDF - Full report: https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_PCMWR_H1_2015_EN.pdf

> https://static.gdatasoftware.com/11...e_count_H1_2015_v1_EN_HL_lowres_48866w800.jpg

:fear::fear: :mad:
 
Last edited:
Back
Top