Fake 'Contract', 'DHL Delivery', 'Western Union' SPAM, 'Quota Exceeded' - Phish
FYI...
Fake 'Contract' SPAM - delivers trojan
-
https://myonlinesecurity.co.uk/mals...sword-protected-word-docs-delivering-malware/
4 Apr 2017 - "... malspam emails with
password protected word doc attachments. They come with various subjects and themes, but
they all contain -genuine- information about the recipient. Some like this one, only have the recipients full Name, Address and email address but some also contain genuine phone numbers, either landline or mobile numbers. An email with the subject of '[recipients name] Contract EFKP030417GD' pretending to come from random senders
with a malicious word doc attachment...
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/Contract-EFKP030417GD.png
victim.EFKP030417GD
.doc - eventually downloads
Ursnif (virustotal 10/60*) see VT comments for full details...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://virustotal.com/en/file/2e01...98534e2fddfd3bc21120c689/analysis/1491230132/
03EF8
.exe
Ursnif:
http://researchcenter.paloaltonetwo...snif-global-distribution-networks-identified/
"...
banking Trojan..."
___
Fake 'DHL Delivery' SPAM - delivers js malware
-
https://myonlinesecurity.co.uk/more-spoofed-dhl-delivery-malspam-delivers-malware/
4 Apr 2017 - "... an email with the subject of 'DHL Delivery' coming or pretending to come from DHL Express UK. These do look very realistic and if you are expecting a delivery today (many recipients will be) you can be very easily fooled by it... from the various reports are connections to various well known websites and webmail services like Google, Facebook, Yahoo, Nirsoft .com and what looks like attempted logins. The
javascript file is basically -obfuscated- by simple
reversing the url strings embedded in the file, so for example these reverse encoded strings embedded in the js file...
/6863daolnwod/se.aicnelapnerarpmoc//

tth
/7184daolnwod/moc.leuftnuocsidupe//

tth
/4372daolnwod/moc.puorgcmc//

tth
/4819daolnwod/ku.oc.nimdagcc.www//

tth
/8522daolnwod/xm.moc.zenitramoderfla.www//

tth
Transform to:
http ://www .alfredomartinez .com.mx/download2258/ :
162.144.80.161:
https://www.virustotal.com/en/ip-address/162.144.80.161/information/
>
https://www.virustotal.com/en/url/c...eaef89007d471c88445fc0320dbf2a67052/analysis/
http ://www .ccgadmin .co.uk/download9184/ :
193.238.80.70:
https://www.virustotal.com/en/ip-address/193.238.80.70/information/
>
https://www.virustotal.com/en/url/8...578ae461ce663889a3777ccb57252315435/analysis/
http ://cmcgroup .com/download2734/ :
216.218.207.100:
https://www.virustotal.com/en/ip-address/216.218.207.100/information/
>
https://www.virustotal.com/en/url/d...3f2fcaad40dace46365a7a4929e8490798c/analysis/
http ://epudiscountfuel .com/download4817/ :
69.175.87.139:
https://www.virustotal.com/en/ip-address/69.175.87.139/information/
>
https://www.virustotal.com/en/url/2...fc5330723030c92a7e1b6089ad1e7e38783/analysis/
http ://comprarenpalencia .es/download3686/ :
149.202.107.130:
https://www.virustotal.com/en/ip-address/149.202.107.130/information/
>
https://www.virustotal.com/en/url/d...c8ac768f375b23fbbbdb814f46cb32dd5f9/analysis/
...
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/dhl-delivery-malspam-email.png
The link in the email goes to http ://atvicon .com/OXF31666g/ where you see an open directory. Selecting index.php gives you the download of the .js file (VirusTotal 12/56*). The payload Security report** of this .js file shows lots of other urls associated with this malware & downloads, some of which
give an immediate download of the .js file. The Payload Security report shows a download of a file named 2tlj63ijo
.exe (VirusTotal 28/61***) (Payload Security[4]) ... my -manual- download gave me (VirusTotal 8/62[5]) Payload Security[6] ... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...07cc17fc6e01b38374bbcce7/analysis/1491300071/
DHL__Report__5238760711__Di__April__04__2017
.js
**
https://www.hybrid-analysis.com/sam...7dcf5212f2dc6336ca19007cc17fc6e01b38374bbcce7
Contacted Hosts
216.218.207.100
87.106.105.76
67.205.128.122
***
https://www.virustotal.com/en/file/...51b2457b4a00463d6c3745682b98a276f92/analysis/
2tlj63ijo
.exe
4]
https://www.hybrid-analysis.com/sam...4a00463d6c3745682b98a276f92?environmentId=100
Contacted Hosts
87.106.105.76
67.205.128.122
5]
https://www.virustotal.com/en/file/...392c964613d0004188e61c84/analysis/1491300282/
5960
.exe
6]
https://www.hybrid-analysis.com/sam...e01392c964613d0004188e61c84?environmentId=100
Contacted Hosts
87.106.105.76
67.205.128.122
atvicon .com:
67.222.136.31:
https://www.virustotal.com/en/ip-address/67.222.136.31/information/
___
Fake 'Western Union' SPAM - delivers java adwind
-
https://myonlinesecurity.co.uk/spoo...-verification-on-142017-delivers-java-adwind/
4 Apr 2017 - "... -fake- financial themed emails containing
java adwind or Java Jacksbot attachments... Unlike today’s slightly earlier Java Adwind malspam spoofing Bank of Bahamas*, this one does have a new Java Adwind version at the end of the complicated delivery chain...
*
https://myonlinesecurity.co.uk/spoo...ation-of-funds-transfer-delivers-java-adwind/
Screenshot:
https://myonlinesecurity.co.uk/wp-c...78-MTCN-18-Funds-Verification-on-1_4_2017.png
These contain a genuine PDF that has a link to the site to download a zip file. First the pdf looks like:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/mtcn_wu_pdf.png
The link today goes to:
http ://publikasi-fbio .ukdw .ac.id/css/WesternUnion_Fund_Verification_As_of_1st_April_2017.htm
where you see this page with instructions trying to make you think it is genuine with yet another download link:
http ://publikasi-fbio .ukdw .ac.id/css/WesternUnion_Fund_Verification_As_of_1st_April_2017.zip
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/spoofedWU_downloadpage.png
AWD020025 MTCN 25 Funds Verification
.jar (478kb) Current Virus total detections 11/58*: MALWR**
details.jar (119kb) Current Virus total detections 5/55***: Payload Security[4]... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...7a43df604dc68988e6397df6/analysis/1491283408/
AWD020025 MTCN 25 Funds Verification
.jar
**
https://malwr.com/analysis/N2JkYTE4ZmZhN2IyNGFmNWJjMGY4ZDQwYmE2NTFiOGU/
***
https://www.virustotal.com/en/file/...cf28f511c33086d008a419f7/analysis/1476250143/
4]
https://www.hybrid-analysis.com/sam...776cf28f511c33086d008a419f7?environmentId=100
publikasi-fbio .ukdw .ac.id:
119.235.252.122:
https://www.virustotal.com/en/ip-address/119.235.252.122/information/
>
https://www.virustotal.com/en/url/c...38d1bda8c5be50a59f2048071e297f1f960/analysis/
___
'Quota Exceeded' - Phish
-
https://myonlinesecurity.co.uk/spoo...n-com-quota-exceeded-please-add-now-phishing/
4 Apr 2017 - "...
phishing attempts for email credentials...:
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/Quota-Exceeded-Please-Add-Now.png
If you follow the -link- inside-the-email you see a webpage looking like this:
http ://maharajasweet .com/flash/bestdomain/?email=victim@domain.com :
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/maharahjasweet_webmail_phish.png
... recognize familiar details like our email address or domain name... look at the -real- address in the URL bar at the top of the page:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/maharahjasweet_webmail_phish2.png
After you input your email address and password, you get a 'success' page:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/04/success.png
... whether it is a straight forward attempt, like this one, to -steal- your personal, bank, credit card or email and social networking log in details... the final IP address outside of your network in the Received: fields can be trusted as others can be -spoofed- ..."
maharajasweet .com:
209.200.238.28:
https://www.virustotal.com/en/ip-address/209.200.238.28/information/
>
https://www.virustotal.com/en/url/2...785f1271b369dc8163a78caa51861e05373/analysis/
:fear::fear:
