SPAM frauds, fakes, and other MALWARE deliveries...

WannaCry Ransomware, Fake 'invoice' SPAM

FYI...

Indicators Associated With WannaCry Ransomware
- https://www.us-cert.gov/ncas/alerts/TA17-132A
Last revised: May 15, 2017 - "... According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan. The software can run in as many as 27 different languages. The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours... Initial reports indicate the hacker or hacking group behind the WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol (RDP) compromise or through the exploitation of a critical Windows SMB vulnerability. Microsoft released a security update for the MS17-010* (link is external) vulnerability on March 14, 2017. Additionally, Microsoft released patches for Windows XP, Windows 8, and Windows Server 2003 (link is external) operating systems on May 13, 2017. According to open sources, one possible infection vector is via phishing emails...
* https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
March 14, 2017
The WannaCry ransomware received and analyzed by US-CERT is a loader that contains an AES-encrypted DLL. During runtime, the loader writes a file to disk named “t.wry”. The malware then uses an embedded 128-bit key to decrypt this file. This DLL, which is then loaded into the parent process, is the actual Wanna Cry Ransomware responsible for encrypting the user’s files. Using this cryptographic loading method, the WannaCry DLL is never directly exposed on disk and not vulnerable to antivirus software scans...
Precautionary measures to mitigate ransomware threats include:
- Ensure anti-virus software is up-to-date.
- Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.
- Scrutinize -links- contained in -e-mails- and do -not- open -attachments- included in unsolicited e-mails.
- Only download software – especially free software – from sites you know and trust.
- Enable automated patches for your operating system and Web browser..."
(More detail at the us-cert URL at the top of this post.)

WannaCry/WannaCrypt Ransomware Summary
- https://isc.sans.edu/diary.html?storyid=22420
2017-05-15
___

> http://blog.talosintelligence.com/2017/05/wannacry.html#more
May 12, 2017 - "... Umbrella* prevents DNS resolution of the domains associated with malicious activity..."
* https://umbrella.cisco.com/
... aka 'OpenDNS' - FREE:
>> https://www.opendns.com/setupguide/#/?new=home-free

Test -after- setups: https://welcome.opendns.com/
___

Fake 'invoice' SPAM - delivers pdf attachment jaff ransomware
- https://myonlinesecurity.co.uk/more-fake-invoice-malspam-with-pdf-attachments-deliver-malware/
15 May 2017 - "An email pretending to be an invoice coming from random senders with a PDF attachment that drops a malicious macro enabled word doc...
Update: confirmed as Jaff ransomware (VirusTotal 5/61*) (Payload Security**)...

Screenshot: https://myonlinesecurity.co.uk/wp-c.../fake-invoice_with-pdf-atatchment-malspam.png

... An alternative docm file that was extracted confirms it to be jaff ransomware downloads
ecuamiaflowers .com/hHGFjd encrypted txt (Payload Security[3]) (VirusTotal 13/56[4]) JoeSandbox[/5]... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5da78d868f57c84197689287/analysis/1494846406/

** https://www.hybrid-analysis.com/sam...90d5da78d868f57c84197689287?environmentId=100
Contacted Hosts
47.91.107.213

3] https://www.hybrid-analysis.com/sam...760a22b8df9967b99b0aa050387?environmentId=100
Contacted Hosts
107.180.14.32
47.91.107.213


4] https://www.virustotal.com/en/file/...9ae319c75fe6909c60e10496/analysis/1494844454/

5] https://jbxcloud.joesecurity.org/analysis/271421/1/html

ecuamiaflowers .com: 107.180.14.32: https://www.virustotal.com/en/ip-address/107.180.14.32/information/
> https://www.virustotal.com/en/url/b...b512dfbef4e5247fd11f2cc9eee13685814/analysis/

h552terriddows .com: 47.91.107.213: https://www.virustotal.com/en/ip-address/47.91.107.213/information/
> https://www.virustotal.com/en/url/5...006e0932e61f0be7c39857f883ed3b42c85/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'invoice', 'pdf attachments' SPAM

FYI...

Fake 'invoice' SPAM - downloads Cerber ransomware
- https://myonlinesecurity.co.uk/blank-email-with-fake-invoice-attachment-tries-to-deliver-malware/
16 May 2017 - "... an empty/blank email with the subject of 'Re: invoice 28769' coming or pretending to come from random companies, names and email addresses with a semi-random named zip attachment that contains another zip that in turn contains a .js file... downloads Cerber ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/invoice28769.png

... I am reliably informed[1] that with a couple of minor fixes to correct the malware developers mistakes this downloads Cerber ransomware from
hxxp ://mdnchdbde .pw/search.php which delivers a file 1 (VirusTotal 6/59*) (Payload Security**)... 'certain that they will fix it in the next malspam run. These criminal gangs often send a small spam run out to “test the waters” and when they don’t get any expected result they double check & fix the errors ready for the next spam run.

262647732.zip: extracts to 27000_packed.zip: which in turn Extracts to: 27000.js
Current Virus total detections 0/57[3]: Payload Security[4] Joebox[5] - none of the online sandboxes managed to get any download location or malware content from the .js file... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://twitter.com/Techhelplistcom/status/864350538112016385

* https://www.virustotal.com/en/file/...4dc7e25954656f93a4dde861/analysis/1494912080/

** https://www.hybrid-analysis.com/sam...4034dc7e25954656f93a4dde861?environmentId=100
Contacted Hosts (1088)

3] https://www.virustotal.com/en/file/...abdc1e3f2b774c61e7ff8909/analysis/1494910036/

4] https://www.hybrid-analysis.com/sam...903abdc1e3f2b774c61e7ff8909?environmentId=100

5] https://jbxcloud.joesecurity.org/analysis/271922/1/html

mdnchdbde .pw: 35.163.27.202: https://www.virustotal.com/en/ip-address/35.163.27.202/information/
> https://www.virustotal.com/en/url/9...9e4820537da3266013a5643fe4ac77f809c/analysis/
___

Fake 'pdf attachments' SPAM - delivers Jaff ransomware
- https://myonlinesecurity.co.uk/pdf-...r-own-email-address-delivers-jaff-ransomware/
16 May 2017 - "... series of emails with pdf attachments that drops a malicious macro enabled word doc is an email with the subject of 'Emailing: 2650032.pdf' (random numbers) pretending to come from random names at your-own-email-address that delivers Jaff ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/Emailing-2650032_pdf.png

2650032.pdf - Current Virus total detections 8/54*: Payload Security**... drops EYRCUD.docm
(VirusTotal 8/59***) (Payload Security[4])... downloads an encrypted txt file from
http ://personalizar .net/Nbiyure3 which is converted by the script to galaperidol8.exe ... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...23429d4fc8204c8606a2d565/analysis/1494926923/

** https://www.hybrid-analysis.com/sam...eeb23429d4fc8204c8606a2d565?environmentId=100
Contacted Hosts
81.88.57.70
47.91.107.213


*** https://www.virustotal.com/en/file/...4b5594ab3320481211e0acfd/analysis/1494927173/

4] https://www.hybrid-analysis.com/sam...a314b5594ab3320481211e0acfd?environmentId=100
Contacted Hosts
81.88.57.70
47.91.107.213


personalizar .net: 81.88.57.70: https://www.virustotal.com/en/ip-address/81.88.57.70/information/
> https://www.virustotal.com/en/url/2...35045ec9e077915b19dd3505581741774c2/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Secure Message' SPAM, Adobe phish

FYI...

Fake 'Secure Message' SPAM - delivers trickbot
- https://myonlinesecurity.co.uk/fake...ew-bankline-secure-message-delivers-trickbot/
17 May 2017 - "An email with the subject of 'You have received a new Bankline Secure Message' pretending to come from Bankline RSA but actually coming from a look-a-like domain Bankline RSA <SecureMessage@ banklinersa .co.uk> with a malicious word doc attachment... delivering Trickbot banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/fake-bankline-secure-message.png

... criminals sending these have registered various domains that look like genuine bank domains. Normally there are 3 or 4 newly registered domains that imitate the bank or some message sending service that can easily be confused with a legitimate organisation in some way that send these. So far we have only found 1 domain today banklinersa .co.uk. As usual they are registered via Godaddy as registrar and for a change the emails are sent via rackspace hosting not the usual citynetwork AB in Sweden. They are currently using IP numbers 104.130.29.210, 172.99.115.203, 172.99.115.216, 172.99.115.23, 104.239.169.15, 104.130.29.243, 104.130.29.245, 172.99.115.29...

SecureMessage.doc - Current Virus total detections 4/56*. Payload Security** downloads from
http ://ocysf .org/wp-content/GktpotdC7dyTH1aoroa.png which of course is -not- an image file but a renamed .exe file that gets -renamed- to a .exe and autorun (VirusTotal 10/60***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...35812dcb485407d92aaa4c68/analysis/1495019899/

** https://www.hybrid-analysis.com/sam...5fd35812dcb485407d92aaa4c68?environmentId=100
Contacted Hosts
50.87.146.185
107.22.214.64
95.104.2.225
192.157.238.15


*** https://www.virustotal.com/en/file/...610a4a8f0639511a7a417132/analysis/1495019988/

ocysf .org: 50.87.146.185: https://www.virustotal.com/en/ip-address/50.87.146.185/information/
> https://www.virustotal.com/en/url/a...835486a020fae99d4bd20b068e1e26d6f8a/analysis/
___

Adobe account - Phish
- https://myonlinesecurity.co.uk/adobe-account-phishing-scam-using-text-data-urls/
17 May 2017 - "... 'thought this was going to be some newer malware delivery method, but it is only -phishing- for email credentials, which of course is also extremely serious and very bad.
NOTE: This phishing scam only works in Google Chrome. Internet Explorer will not open data:text/html urls and gives a 'cannot display' page message. Firefox refuses to display anything - just a white screen with the original url in the address bar...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/Bank-Details-Adobe-phishing-email.png

This email has a genuine PDF attachment that contains a blurred out image of an invoice with the prompt to view the Secured PDF Online Document on Adobe:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/invoice1246_pdf.png
-If- you click on the blurred image you get a pop up warning about links. When you follow the link inside the pdf it sends you to http ://tiny .cc/tis7ky which immediately -redirects- to
http ://qualifiedplans .com/administrator/components/com_smartformer/plugins/tiny_mce/plugins/inlinepopups/skins/clearlooks2/img/phmho/
where it downloads/opens a data:text url that displays a web page on your computer -not- an external site looking like:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/timed_out.png
After you press OK you get what looks-like an Adobe Business sign in page with what looks-like a download button. I inserted the usual set of fake details & pressed download, expecting some sort of malware to appear, but no it just -bounced- me on to the genuine Adobe page while your stolen data is sent to http ://setas2016 .com/image/catalog/Katalog/files/pageConfig/PDF3/index/adobe.php
With a bit of digging around We have discovered the compete phish is also hosted on http ://setas2016 .com/image/catalog/Katalog/files/pageConfig ...
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/adobe_sign_in.png
The data:text/html file is available for download via Payload Security*. It is in the extracted files section named urlref_httptiny .cctis7ky ..."
* https://www.hybrid-analysis.com/sam...7f56402e0b6b807191af30d913f?environmentId=100

setas2016 .com: 87.118.140.114: https://www.virustotal.com/en/ip-address/87.118.140.114/information/
> https://www.virustotal.com/en/url/4...3ddeb40319ce43a2dc51b316f2d3b57fab9/analysis/
___

ICS-ALERT-17-135-01A
Indicators Associated With WannaCry Ransomware (Update A)
> https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-135-01A
Original release date: May 15, 2017 | Last revised: May 16, 2017
"... updated alert is a follow-up to the original alert titled ICS-ALERT-17-135-01 Indicators Associated With WannaCry Ransomware that was published May 15, 2017, on the NCCIC/ICS-CERT web site..."
(More detail at the URL above.)

:fear::fear: :mad:
 
Last edited:
Fake 'UPS', 'FedEx' SPAM

FYI...

Fake 'UPS' SPAM - delivers banking Trojan
- https://myonlinesecurity.co.uk/fake...oc-attachment-delivers-ursnif-banking-trojan/
18 May 2017 - "... some are being delivered with the word -doc- attachment, but about half are just getting the email body with an -HTML- attachment which has the same details as the email body and no word doc attachment... the details with an email with the subject of 'Fwd: UPS Worldwide Saver Notification' pretending to come from various random names @ yahoo. es -or- .de -or- .pt -or- from random@ hotmail .es -or- de . We are also seeing a sprinking from other free webmail services like web .de with a malicious word doc attachment with a random number delivers ursnif banking Trojan. I am also seeing other parcel delivery companies like TNT and unnamed delivery services also being imitated and -spoofed- in this campaign. The TNT ones are zips with word docs inside. -All- of them today are using embedded OLE objects rather than macros to deliver Ursnif banking and password stealing Trojans.
Update: Now seeing some coming through with zip attachments containing .js files
Some subjects include:
TNT Express – Documents – RL54413826 ( random numbers)
Order Processed
Export Scan
Fwd: UPS Worldwide Saver Notification ...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/fake-UPS-worldwide-saver.png

These word docs contain 2 images of what pretend to be another word doc and an xls file both pretending to be invoices, However they are embedded ole objects and drop 2 different named but identical .js files when clicked on:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/doc60_embedded-ole-objects.png
The TNT version has a slightly different email content and word attachment, although still downloading from the -same- urls as other versions:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/tnt-delivery-doc.png
...

doc60 for clearance.doc - Current Virus total detections 0/58*. Payload Security** drops a js file
(VirusTotal 1/22***) (Payload Security[4]) downloads from one of these 2 locations:
http ://dacera .net/horizont.cv -or- http ://raimco .com/case.sub
and gets converted/renamed to a working .exe file (VirusTotal 9/61[5])

TNT version: RL82670483822.zip extracts to RL02993847001.doc VirusTotal 0/57[6]| Payload Security[7]

Zip/JS version: QPABA0MCY0D2.zip extracts to 1A029837T2990101.pdf.js VirusTotal 3/57[8]|
Payload Security[9] ... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...663caa2254220a0186d94c46/analysis/1495100198/

** https://www.hybrid-analysis.com/sam...2b9663caa2254220a0186d94c46?environmentId=100
Contacted Hosts
2.17.22.36

*** https://www.virustotal.com/en/file/...848ac6242aa3f18d856d1fd3/analysis/1495100566/

4] https://www.hybrid-analysis.com/sam...b7c848ac6242aa3f18d856d1fd3?environmentId=100
Contacted Hosts
54.149.71.19
77.104.189.47


5] https://www.virustotal.com/en/file/...e1d7d3aa5c54e9ed8ba056c6fcee518889a/analysis/

6] https://www.virustotal.com/en/file/...d4a5b996a6d6def0cfa80900/analysis/1495101803/

7] https://www.hybrid-analysis.com/sam...99cd4a5b996a6d6def0cfa80900?environmentId=100

8] https://www.virustotal.com/en/file/...4d4d8b9972afa6f7a2c1d63b/analysis/1495102966/

9] https://www.hybrid-analysis.com/sam...1164d4d8b9972afa6f7a2c1d63b?environmentId=100

dacera .net: 54.149.71.19: https://www.virustotal.com/en/ip-address/54.149.71.19/information/
> https://www.virustotal.com/en/url/c...42aec5fe198113049aa77b797da93949b60/analysis/

raimco .com: 77.104.189.47: https://www.virustotal.com/en/ip-address/77.104.189.47/information/
> https://www.virustotal.com/en/file/...e1d7d3aa5c54e9ed8ba056c6fcee518889a/analysis/

dacera .net/horizont.cv
> https://www.virustotal.com/en/url/c...42aec5fe198113049aa77b797da93949b60/analysis/

raimco .com/case.sub
> https://www.virustotal.com/en/url/8...3172b654ae007eab3690f9db2eb94bec432/analysis/
___

Fake 'FedEx' SPAM - delivers -kovter- malware
- https://myonlinesecurity.co.uk/big-changes-in-fedex-fake-delivery-emails-now-using-macros/
18 May 2017 - ""An email with the subject of 'FedEx Parcel #262844740, Delivery Unsuccessful' pretending to come from FedEx Customer Service <tamawuv52640888@ soie. in> (random email addresses) with a malicious word doc attachment delivers multiple malware... 'used to seeing these -fake- FedEx and other parcel delivery services emails, but they usually contain zip files and js files. It is -unusual- to have word macro attachments...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/fake-fedex-delivery.png

The instructions and image in the macro laden word doc have also -changed- from previous versions:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/info-delivery-doc.png

info_delivery.doc - Current Virus total detections 5/58*. Payload Security** shows a download from
http ://regereeeeee .com/gate2.php?ff1 which appears to be a massive encrypted txt file (833kb) which appears to drop -kovter- (b215.exe ***) (VirusTotal 14/61[4])... This email attachment contains what appears to be a genuine word doc or Excel XLS spreadsheet with either a macro script -or- an embedded OLE object that when run will infect you... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...930a9b86df6ed68dde1645b557c0cdc2b00/analysis/

** https://www.hybrid-analysis.com/sam...df6ed68dde1645b557c0cdc2b00?environmentId=100
Contacted Hosts (424)

*** https://www.hybrid-analysis.com/sam...ils-74eea724091a2638d3d4c395c5c0183af2e4be850
Contacted Hosts (424)

4] https://www.virustotal.com/en/file/...cf4f61ab86c0a499c3edb736/analysis/1495118313/

regereeeeee .com: 13.58.26.56: https://www.virustotal.com/en/ip-address/13.58.26.56/information/
> https://www.virustotal.com/en/url/a...255ca4b563d91bda084b37747ea8aa5b9d4/analysis/

> https://www.virustotal.com/en/url/9...9ce0ef653716586e0ccbf72a3ae9049c005/analysis/
___

WannaCry Fact Sheet
- https://www.us-cert.gov/ncas/current-activity/2017/05/17/ICS-CERT-Releases-WannaCry-Fact-Sheet
Last revised: May 18, 2017
>> https://ics-cert.us-cert.gov/sites/...ts/ICS-CERT_FactSheet_WannaCry_Ransomware.pdf
"... Systems that have installed the MS17-010 patch* are -not- vulnerable to the exploits..."
* https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
March 14, 2017

:fear::fear: :mad:
 
Last edited:
Fake 'blank' SPAM

FYI...

Fake 'blank' SPAM - doc/js attachment delivers ransomware
- https://myonlinesecurity.co.uk/blan...ded-js-delivers-globeimposter-2-0-ransomware/
21 May 2017 - "An empty/blank email with no subject pretending to come from jhavens@ mt .gov with a zip file that contains malicious word doc with an embedded OLE object delivers GlobeImposter 2.0 ransomware...
The email looks like:
From: jhavens@ mt .gov
Date: Sun 21/05/2017 13:34
Subject: none
Attachment: 625855442530.zip
Body content:
totally blank/empty


625855442530.zip - extracts to 1.doc - Current Virus total detections 0/56*. Payload Security**
- drops a js file... (BR16E2~1 .JS) - VirusTotal 2/56[3] | Payload Security[4] downloads from
http ://oldloverfg .top/admin.php?f=2 which gave yez348746.tae (VirusTotal 12/61[5]) | Payload Security[6]
While encrypting your files the js file drops this html file with instructions how to pay the ransom & retrieve your files. They are charging 1 bitcoin which is currently approx. $2000 USD...
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/GlobeImposter-ransom-note.png
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...a2bd06af0397ba5c000217fe/analysis/1495370663/

** https://www.hybrid-analysis.com/sam...a5ba2bd06af0397ba5c000217fe?environmentId=100
Contacted Hosts
47.91.93.208

3] https://www.virustotal.com/en/file/...8bf2b528cf67aac293eca67c/analysis/1495370901/

4] https://www.hybrid-analysis.com/sam...ed18bf2b528cf67aac293eca67c?environmentId=100
Contacted Hosts
47.91.93.208

5] https://www.virustotal.com/en/file/...e9a3afcde30b36391fd2df1e/analysis/1495371343/

6] https://www.hybrid-analysis.com/sam...1b6e9a3afcde30b36391fd2df1e?environmentId=100

oldloverfg .top: 47.91.93.208: https://www.virustotal.com/en/ip-address/47.91.93.208/information/
> https://www.virustotal.com/en/url/5...11626ec496fd6a9a84f599c9c6f53f94e46/analysis/

:fear::fear: :mad:
 
Fake 'Invoice' SPAM

FYI...

Fake 'Invoice' SPAM - delivers ransomware
- https://myonlinesecurity.co.uk/copy-of-invoice1234567-coming-from-noreply-delivers-jaff-ransomware/
22 May 2017 - "... series of emails with pdf attachments that drops a malicious macro enabled word doc is an email with the subject of 'Invoice 43412591' (random numbers) pretending to come from noreply@ random companies that delivers Jaff ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/Copy-of-Invoice-43412591.png

43412591.PDF - Current Virus total detections 13/56*. Payload Security** - drops QDLCPQKK.doc
(VirusTotal 10/58[3]) (Payload Security [4]) downloads an encrypted txt file from
http ://primary-ls .ru/jhg6fgh which is converted by the script to buzinat8.exe (VirusTotal 7/58[5])
There are 4 hardcoded (slightly obfuscated) download sites in the macro (there will be more in other versions)
primary-ls .ru\jhg6fgh
brotexxshferrogd .net\af\jhg6fgh
herrossoidffr6644qa .top\af\jhg6fgh
joesrv .com\jhg6fgh
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...a8070c7af64a66c9f0897bec/analysis/1495454756/

** https://www.hybrid-analysis.com/sam...c8ea8070c7af64a66c9f0897bec?environmentId=100
Contacted Hosts
141.8.195.87
217.29.63.199


3] https://www.virustotal.com/en/file/...fc1a6bdf51da4ec956b7ac71/analysis/1495455867/

4] https://www.hybrid-analysis.com/sam...479fc1a6bdf51da4ec956b7ac71?environmentId=100
Contacted Hosts
141.8.195.87
217.29.63.199


5] https://www.virustotal.com/en/file/...1bcc16f8f063c4b9c200f8b4/analysis/1495455099/

primary-ls .ru: 141.8.195.87: https://www.virustotal.com/en/ip-address/141.8.195.87/information/
> https://www.virustotal.com/en/url/7...f43d24e5a702fad8ec056543925c724d7c3/analysis/

:fear::fear: :mad:
 
Jaff ransomware

FYI...

Jaff ransomware gets a makeover: fake -invoice- theme
- https://isc.sans.edu/forums/diary/Jaff+ransomware+gets+a+makeover/22446/
2017-05-24 - "Since 2017-05-11, a new ransomware named 'Jaff' has been distributed through malicious spam (malspam) from the 'Necurs botnet':
> https://securityintelligence.com/the-necurs-botnet-a-pandoras-box-of-malicious-spam/
This malspam uses PDF -attachments- with 'embedded Word documents' containing -malicious- macros. Victims must open the PDF attachment, -agree- to open the embedded Word document, then -enable- macros on the embedded Word document to -infect- their Windows computers:
> https://isc.sans.edu/diaryimages/images/2017-05-24-ISC-diary-image-01.jpg
Prior to -Jaff- we've seen waves of malspam using the same PDF attachment/embedded Word doc scheme to push
-Locky- ransomware. Prior to that, this type of malspam was pushing -Dridex-. With all the recent news about
-WannaCry- ransomware, people might forget Jaff is an ongoing threat. Worse yet, some people might not know about it at all since its debut about 2 weeks ago. Jaff has already gotten a makeover, so an infected host looks noticeably different now... The emails: This specific wave of malspam used a -fake- invoice theme... I collected -20- emails... these emails -all- have PDF attachments, and each one contains an embedded Word document. The Word document contains malicious-macros designed to -infect- a Windows computer:
> https://isc.sans.edu/diaryimages/images/2017-05-24-ISC-diary-image-05.jpg
The embedded Word document with malicious macros:
> https://isc.sans.edu/diaryimages/images/2017-05-24-ISC-diary-image-06.jpg
Follow the entire infection chain, and you'll see minimal network traffic compared to other types of malware. The Word macros generate an initial URL to download an encoded Jaff binary, then we see one other URL for post-infection callback from an infected host... My infected host asked for 0.35630347 bitcoin as a ransom payment:
> https://isc.sans.edu/diaryimages/images/2017-05-24-ISC-diary-image-14.jpg
... Much of this malspam is easy to spot among the daily deluge of spam most organizations receive. However, this PDF attachment/embedded Word doc scheme is likely an attempt to bypass spam filtering... as long as it's profitable for the criminals behind it, we'll continue to see this type of malspam..."
> http://www.malware-traffic-analysis.net/2017/05/24/index.html
(More detail at the isc URL at the top of this post.)

:fear::fear: :mad:
 
Fake 'receipt', 'Reminder' SPAM

FYI...

Fake 'receipt' SPAM - delivers Jaff ransomware
- https://myonlinesecurity.co.uk/more-jaff-ransomware-delivered-via-fake-receipts-or-payments-emails/
25 May 2017 - "... emails with pdf attachments that drops a malicious macro enabled word doc is an email with various subjects along the line of 'receipt, payment, payment receipt' etc. (random numbers) pretending to come from donotreply@ random email addresses and companies that delivers Jaff ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/receipt-4830.png

P4830.pdf - Current Virus total detections 12/56*. Payload Security** drops ELMIRJX.doc
(VirusTotal 4/23[3]) (Payload Security[4]) downloads an encrypted txt file from
http ://dreamybean .de/TrfHn4 which should be converted by the script to bruhadson8.exe (unfortunately payload security is showing this as a tiny data file, so something is going wrong there and there must be an anti-analysis element to the malware). There are 4 hardcoded (slightly obfuscated) download sites in the macro (there will be more in other versions)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...bf5de0bbfa59b0982c59b75d/analysis/1495710733/

** https://www.hybrid-analysis.com/sam...e8abf5de0bbfa59b0982c59b75d?environmentId=100
Contacted Hosts
81.169.145.160

3] https://www.virustotal.com/en/file/...542b99e5ec5eb718283659d4/analysis/1495710997/

4] https://www.hybrid-analysis.com/sam...3fd542b99e5ec5eb718283659d4?environmentId=100
Contacted Hosts
81.169.145.160

dreamybean .de: 81.169.145.160: https://www.virustotal.com/en/ip-address/81.169.145.160/information/
> https://www.virustotal.com/en/url/6...455dddd54b57ad8082c211e481083f61cf5/analysis/
> https://www.virustotal.com/en/url/a...963fdc203c209cd16d3f61cb804645675f3/analysis/
___

Fake 'Reminder' SPAM - RTF file exploits deliver malware
- https://myonlinesecurity.co.uk/fake...ng-cve-2017-0199-exploits-to-deliver-malware/
25 May 2017 - "... RTF files this time using the CVE-2017-0199* vulnerability that was fixed in April 2017** and again extra added protections by the May 2017 security updates***. If you haven’t got round to applying these essential patches yet, then go & do it NOW...
* https://nvd.nist.gov/vuln/detail/CVE-2017-0199

** https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199

*** https://portal.msrc.microsoft.com/e...tedetail/bc365363-f51e-e711-80da-000d3a32fc99

... email with the subject of '2nd Reminder Final Demand – Notice of Legal Intention' pretending to come from creditcontrol@ bookatable .com with a malicious word doc attachment eventually delivers sharik/smoke loader after a convoluted download system involving .hta files and PowerShell...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/spoofed-bookatable-email.png

294616_05152017.rtf - Current Virus total detections 28/57[1]. Payload Security[2] downloads an HTA file from
http :// 185.162.8.231 :64646/logo.doc (VirusTotal 0/57[3]) which in turn uses powershell to download
http :// 185.162.8.231 :64646/00001.exe (VirusTotal 48/59[4]) (Payload Security[5])... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.virustotal.com/en/file/...778a2407136af031ca9242e9/analysis/1494977406/

2] https://www.hybrid-analysis.com/sam...160778a2407136af031ca9242e9?environmentId=100
Contacted Hosts
185.162.8.231: https://www.virustotal.com/en/ip-address/185.162.8.231/information/
> https://www.virustotal.com/en/url/e...6fde5e612325717f2ac7e40665ed658fd1a/analysis/
> https://www.virustotal.com/en/url/2...a85c6a5c7bb2278132dd6fe0b41c12655f4/analysis/

3] https://www.virustotal.com/en/file/...dc833ed6a29b298d812fb8d9/analysis/1494854940/

4] https://www.virustotal.com/en/file/...cacba454f467a205d7c06e1a/analysis/1495445391/

5] https://www.hybrid-analysis.com/sam...123cacba454f467a205d7c06e1a?environmentId=100
Contacted Hosts
185.141.25.27
193.104.215.58


:fear::fear: :mad:
 
Last edited:
Fake 'DHL' SPAM

FYI...

Fake 'DHL' SPAM - delivers js malware
- https://myonlinesecurity.co.uk/fake-dhl-tracking-number-for-shipment-malspam-delivers-ransomware/
27 May 2017 - "... an email with the subject of 'DHL Tracking Number for shipment 97 93745 186' (random numbers) pretending to come from DHL Corporation with a link in email body to download a file...
Update: Thanks to Antelox* we now have an unpacked version of the malware which is being detected as a corebot / zbot variant (VirusTotal 10/59**) ... Microsoft describes this as TrojanProxy: Win32/Malynfits.A***...
* https://twitter.com/Antelox/status/868414436264071168
... after lots of different tweets and conversations, found this from Brad (MalwareTraffic) confirming corebot with a nice writeup by him:
> http://www.malware-traffic-analysis.net/2017/05/26/index.html

** https://www.virustotal.com/en/file/...efaae03e02cf007f3bd16eb2/analysis/1495880747/

*** https://www.microsoft.com/security/...nProxy:Win32/Malynfits.A&ThreatID=-2147245786

Screenshots(a): https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/dhlmailsystem_IE.png

(b): https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/dhlmailsystem.png

invoice-0063827410370260857-000001870346531780753154078347.pdf.js - Current Virus total detections 5/56[1]
Payload Security[2] shows a download of various files from the same server one being auvrq.exe
(VirusTotal 20/61[3]) (Payload Security[4])... The link in email body (in the working versions) goes to
http ://dhlmailsystem .com/documentdir/777126146374729609489374827 where you get slightly different behaviour depending on what browser you use to visit. If you use Internet Explorer or Google Chrome, you get a zip file containing a .js file. Using Firefox you get the .js file itself... you first see a page like this (b) with a message saying 'preparing download' with a countdown marker. When it reaches 0 the message becomes a -link- saying “click here to download if not started automatically” and the malware file is delivered... The basic rule is NEVER open any attachment -or- link in an email, unless you are expecting it..."
1] https://www.virustotal.com/en/file/...d7c50d76b7ee06a9b7a1b10f/analysis/1495836615/

2] https://www.hybrid-analysis.com/sam...fd0d7c50d76b7ee06a9b7a1b10f?environmentId=100
Contacted Hosts
89.223.27.247

3] https://www.virustotal.com/en/file/...c995aa0105e7428478dbbb20/analysis/1495865017/

4] https://www.hybrid-analysis.com/sam...ecdc995aa0105e7428478dbbb20?environmentId=100

dhlmailsystem .com: 89.223.27.247: https://www.virustotal.com/en/ip-address/89.223.27.247/information/
> https://www.virustotal.com/en/url/7...8969d1192730f293d5d2ca3072593672a6e/analysis/

:fear::fear: :mad:
 
Fake 'documents', 'Notification' SPAM

FYI...

Fake 'documents' SPAM - xls attachment delivers malware
- https://myonlinesecurity.co.uk/documents-malspam-delivers-unknown-malware/
30 May 2017 - "An email with the subject of 'documents' pretending to come from random senders with a malicious word doc or Excel XLS spreadsheet attachment delivers malware... Some subjects in this malspam campaign include ...
inv. payment
documents


Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/document-austin.png

61759684.xls - Current Virus total detections 6/56*: Payload Security** wasn’t able to decode or decrypt the macro but a very quick & easy manual examination shows downloads from
http ://cautiousvirus .com/mbtrf.exe (VirusTotal 7/60[3]) (Payload Security[4])... The macro in the xls document is trivially encoded by using reverse strings... Opening the XLS attachment gives this -fake- invoice:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/61759684_xls.png
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...e504c73c14febcab6fd783a4/analysis/1496135720/

** https://www.hybrid-analysis.com/sam...7dce504c73c14febcab6fd783a4?environmentId=100

3] https://www.virustotal.com/en/file/...7714ecc7ff8818b28d7ab2e0cecbe14f973/analysis/

4] https://www.hybrid-analysis.com/sam...ff8818b28d7ab2e0cecbe14f973?environmentId=100

cautiousvirus .com: 54.91.240.28: https://www.virustotal.com/en/ip-address/54.91.240.28/information/
> https://www.virustotal.com/en/url/3...ef691ce47382962431495e342c5f27c12c0/analysis/
___

Fake 'Notification' SPAM - delivers malware
- https://myonlinesecurity.co.uk/fake...ion-of-direct-debit-of-fees-delivers-malware/
30 May 2017 - "An email with the subject of 'Notification of direct debit of fees' pretending to come from HM Land Registry but actually coming from a look-alike domain... with a malicious word doc attachment... -spoof- of a well known company, bank or public authority delivering malware...

Screenshot: https://myonlinesecurity.co.uk/wp-c...stry-Notification-of-direct-debit-of-fees.png

Opening the word doc (in protected mode where it is safe) gives this which tries to convince you it is genuine:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/fake-landregistry-doc.png

apl053017_045894595.doc - Current Virus total detections 5/56*. Payload Security** shows a download from
http ://200.7.105.13 /jpon13.exe (VirusTotal 7/60***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...1c8d854fb1c082717729eaf3/analysis/1496147244/

** https://www.hybrid-analysis.com/sam...ee71c8d854fb1c082717729eaf3?environmentId=100
Contacted Hosts
200.7.105.13
184.87.218.172
185.141.25.27


*** https://www.virustotal.com/en/file/...f551f6bb17c9b96a42295c5d/analysis/1496137829/

200.7.105.13: https://www.virustotal.com/en/ip-address/200.7.105.13/information/
> https://www.virustotal.com/en/url/5...9191b8c5b18f63f6185f40b2c78b87137cb/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Flash Update'

FYI...

Fake 'Flash Update' - malware
- https://myonlinesecurity.co.uk/fake-flash-player-alerts-from-legitimate-websites/
31 May 2017 - "... I was reading a page on my local newspaper... 'got a divert and a big red warning:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/05/fake-flash.png
... the page I was diverted to (a -fake- flash player update page) is
https ://izaiye-interactive .net/6141452444727/01296f4851adb85de3a1ad2335c429c8/52ebc0f94a7674f6db533556c202e52f.html
... They are using a ssl prefix HTTPS but there is -no- padlock in the url to confirm this. An HTA file is automatically downloaded (or attempted to be) (VirusTotal 6/55*) (Payload Security**) - if allowed to run unfettered this hta file would download and autorun:
https ://izaiye-interactive .net/6141452444727/1496218715917605/FlashPlayer.jse
(VirusTotal [3]) (Payload Security[4])... similar attack recently documented:
> https://myonlinesecurity.co.uk/fake-flashplayer-update-via-exploit-using-adverts-on-legit-site/
9 Apr 2017
...izaiye-interactive .net was registered yesterday on 30 May 2017 using what are obviously -fake- registrants details via PUBLICDOMAINREGISTRY .COM and hosted on 206.221.189.43 reliablesite .net ..."
* https://www.virustotal.com/en/file/...09c67a7d7ea858db432c30fa/analysis/1496218758/
FlashPlayer.hta

** https://www.hybrid-analysis.com/sam...8b809c67a7d7ea858db432c30fa?environmentId=100
Contacted Hosts
206.221.189.43

3] https://www.virustotal.com/en/file/...5f5763b2db01a42d0c7fdef9/analysis/1496219889/
FlashPlayer.jse

4] https://www.hybrid-analysis.com/sam...7d15f5763b2db01a42d0c7fdef9?environmentId=100
Contacted Hosts
206.221.189.43
192.35.177.195
109.120.179.92
84.42.243.20
215.88.149.224
132.121.74.105
209.17.219.21


izaiye-interactive .net: Could not find an IP address for this domain name. (May have been taken down.)

206.221.189.43: https://www.virustotal.com/en/ip-address/206.221.189.43/information/
> https://www.virustotal.com/en/url/7...87a4a23eef0a639edad0d597606ae90607d/analysis/

> https://www.virustotal.com/en/url/6...d1d8a83edcaddb8b104db63afe4a8e94594/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'FedEx USPS UPS' SPAM

FYI...

Fake 'FedEx USPS UPS' SPAM - delivers Kovter and ransomware
- https://myonlinesecurity.co.uk/fake...ns-continue-to-deliver-kovter-and-ransomware/
1 Jun 2017 - "... malware via the “cannot deliver your parcel notifications” or “check where your parcel is”
-spoofing- FedEx, DHL, UPS, USPS etc. have changed the delivery method. The emails are still very similar to the ones we are used to seeing with this sort of subject line:
USPS issue #06914074: unable to delivery parcel
Parcel #006514814 shipment problem, please review
USPS parcel #3150281 delivery problem
Courier was not able to deliver your parcel (ID006976677, USPS)
Parcel 05836911 delivery notification, USPS
Delivery Status Notification

... What has changed is the -attachment- to the emails contains the malware. These now contain an HTML attachment that when opened displays a webpage on your computer that pretends to be a Microsoft Word online website and says you need to download the 'MSOffice365 Webview Plugin update', with a -blurry-image- of scrambled writing in the background with this message prominantly displayed:
'This document cannot be read in your browser. Download and install latest plugin version':
> https://i2.wp.com/myonlinesecurity.co.uk/wp-content/uploads/2017/06/fedex_msoffice_webview.png?ssl=1

Email screenshot: https://i2.wp.com/myonlinesecurity..../fedex-delivery-status-notification.png?ssl=1

... 'previously described in THIS post from Mid April 2017* which shows the obfuscated/encoded nature of the files and how to decode/de-obfuscate them... At that time they linked to a remote website using the -fake- MSOffice365 scam. These malware gangs use a mix-and-match of different techniques to try to stay one step ahead of researchers and antivirus companies and gain more victims:
* https://myonlinesecurity.co.uk/changes-to-fake-usps-delivery-messages-delivering-malware/
... Infection chain from 31 May 2017:
1. FedEx-Delivery-Details-ID-8AXP4QH0.doc.html attachment (VirusTotal 2/56[1]) (Payload Security[2])
2. Install-MSOffice365-WebView-Plugin-Update-0.165.11a.zip extracts to:
3. Install-MSOffice365-WebView-Plugin-Update-0.165.11a.exe.js (VirusTotal 8/55[3]) (Payload Security[4])
Counter.js (VirusTotal 5/56[5]) which downloads 2 files pretending to be png (image files that are -renamed- .exe files) 1.exe currently Cerber -Ransomware- (VirusTotal 8/61[6]) (Payload Security[7]) 2.exe currently Kovter
(VirusTotal 12/60[8]) (Payload Security[9]). The 5 sites embeded in the original webview plugin.js are:
leadsfunnel360 .com
khushsingh .com
kskazan .ru
moodachainzgear .com
thegreenbook .ca
... where you get counter.js ... that when decrypted gives these 5 sites:
sharplending .com
moodachainzgear .com
buildthenewcity .biz
valdigresta .com
leadsfunnel360 .com
... Where <sitename)/counter/?1 gives the Cerber ransomware and <sitename)/counter/?2 gives Kovter... the js files try to contact the sites in order they are listed. It then tries each combination of sitename/counter/etc. and if any site fails to respond, then moves to next site in the list and continues to do that until the counter.js & the actual malware files are downloaded-and-run on the victim’s computer... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.virustotal.com/en/file/...740bbdb549b653a451c11e03/analysis/1496239829/
FedEx-Delivery-Details-ID-8AXP4QH0.doc.html

2] https://www.hybrid-analysis.com/sam...adb740bbdb549b653a451c11e03?environmentId=100

3] https://www.virustotal.com/en/file/...0d36ac2b4f4169582c1a2557/analysis/1496240000/
Install-MSOffice365-WebView-Plugin-Update-0.165.11a.exe.js

4] https://www.hybrid-analysis.com/sam...67c0d36ac2b4f4169582c1a2557?environmentId=100
Contacted Hosts (1279)

5] https://www.virustotal.com/en/file/...4471eafac748d14df19b9bed/analysis/1496296754/
COUNTER[1].js

6] https://www.virustotal.com/en/file/...81f2889288f87b36d0255862/analysis/1496240581/
60[1].png

7] https://www.hybrid-analysis.com/sam...83f81f2889288f87b36d0255862?environmentId=100
Contacted Hosts (1089)

8] https://www.virustotal.com/en/file/...fb57ddf0372db7e7a581fdaf/analysis/1496240649/
11.exe

9] https://www.hybrid-analysis.com/sam...d69fb57ddf0372db7e7a581fdaf?environmentId=100
Contacted Hosts (413)

leadsfunnel360 .com: 50.63.124.1: https://www.virustotal.com/en/ip-address/50.63.124.1/information/
> https://www.virustotal.com/en/url/a...56f1d6925071604b460503eb097643cfb18/analysis/
khushsingh .com: 72.167.131.40: https://www.virustotal.com/en/ip-address/72.167.131.40/information/
> https://www.virustotal.com/en/url/a...3dae7c5b0905e52c356079cd856ac03101d/analysis/
kskazan .ru: 87.236.19.130: https://www.virustotal.com/en/ip-address/87.236.19.130/information/
> https://www.virustotal.com/en/url/a...44b29f0425b5b1dd4b127740278660213ca/analysis/
moodachainzgear .com: 173.201.92.128: https://www.virustotal.com/en/ip-address/173.201.92.128/information/
> https://www.virustotal.com/en/url/2...25e181754d70b174bc238c2d92484e5fc14/analysis/
thegreenbook .ca: 50.62.160.59: https://www.virustotal.com/en/ip-address/50.62.160.59/information/
> https://www.virustotal.com/en/url/5...70571f550bd182e1715de60b53c842d1d29/analysis/

sharplending .com: 184.168.55.1: https://www.virustotal.com/en/ip-address/184.168.55.1/information/
> https://www.virustotal.com/en/url/5...c10972ef043d818321a374c86eb0e1ff398/analysis/
moodachainzgear .com: 173.201.92.128: https://www.virustotal.com/en/ip-address/173.201.92.128/information/
> https://www.virustotal.com/en/url/2...25e181754d70b174bc238c2d92484e5fc14/analysis/
buildthenewcity .biz: 50.62.114.1: https://www.virustotal.com/en/ip-address/50.62.114.1/information/
> https://www.virustotal.com/en/url/d...c97607137efc94972b5d0f7551831fb047e/analysis/
valdigresta .com: 64.202.169.211: https://www.virustotal.com/en/ip-address/64.202.169.211/information/
> https://www.virustotal.com/en/url/b...fac6ae698da0cf864ae002a9fcfa671b8b0/analysis/
leadsfunnel360 .com: 50.63.124.1: https://www.virustotal.com/en/ip-address/50.63.124.1/information/
> https://www.virustotal.com/en/url/a...56f1d6925071604b460503eb097643cfb18/analysis/

:fear::fear::fear: :mad:
 
Last edited:
Fake 'Invoice', 'Message' SPAM

FYI...

Fake 'Invoice' SPAM - delivers Dridex
- https://myonlinesecurity.co.uk/fake...m-with-macros-delivers-dridex-banking-trojan/
2 Jun 2017 - "... emails with -pdf- attachments that drops a malicious macro enabled word doc is an email with the subject of 'Invoice INV-0790' (random numbers) pretending to come from random names and email address that delivers Dridex banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/invoice-inv-0790.png

Invoice INV-0790.pdf - Current Virus total detections 12/56*. Payload Security** drops 231GEOHJWMQN935.docm
(VirusTotal 10/59[3]) (Payload Security[4]) downloads an encrypted txt file from
http ://lanphuong .vn\hH60bd which is converted by the script to miniramon8.exe
(VirusTotal 8/62[5]) (Payload Security[6]).
There are 4 hardcoded (slightly obfuscated) download sites in the macro (there will be more in other versions)
lanphuong .vn\hH60bd
newserniggrofg .net\af\hH60bd
resevesssetornument .com\af\hH60bd
mountmary .ca\hH60bd
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...a2e81e6d593c7d8f5cc2846d/analysis/1496395482/

** https://www.hybrid-analysis.com/sam...89fa2e81e6d593c7d8f5cc2846d?environmentId=100
Contacted Hosts
112.213.85.78
185.141.25.23
147.32.5.111
192.99.108.183
31.193.131.147


3] https://www.virustotal.com/en/file/...f29396b9c07fc365b409df48/analysis/1496395712/

4] https://www.hybrid-analysis.com/sam...009f29396b9c07fc365b409df48?environmentId=100
Contacted Hosts
112.213.85.78
185.141.25.23
147.32.5.111
192.99.108.183
31.193.131.147


5] https://www.virustotal.com/en/file/...b78f014d5fd3e76d769cc82c/analysis/1496396221/

6] https://www.hybrid-analysis.com/sam...9c3b78f014d5fd3e76d769cc82c?environmentId=100
Contacted Hosts
185.141.25.23
147.32.5.111
192.99.108.183
31.193.131.147


lanphuong .vn: 112.213.85.78: https://www.virustotal.com/en/ip-address/112.213.85.78/information/
> https://www.virustotal.com/en/url/1...d10533b79e4d30657905f4c1000d440a0ad/analysis/
___

Fake 'Message' SPAM - delivers Dridex
- https://myonlinesecurity.co.uk/more...o-come-from-copier-at-your-own-email-address/
2 Jun 2017 - "... emails with -pdf- attachments that drops a malicious macro enabled word doc is a blank/empty email with the subject of 'Message from KM_C224e' pretending to come from a -copier- at your email address that delivers Dridex banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/Message-from-KM_C224e.png

The payload & websites are exactly the -same- as described in today’s earlier Dridex malspam run using fake invoices*..."
* https://myonlinesecurity.co.uk/fake...m-with-macros-delivers-dridex-banking-trojan/
2 Jun 2017

:fear::fear: :mad:
 
Last edited:
Fake 'Invoice' SPAM, 'WakeMed' Phish

FYI...

Fake 'Invoice' SPAM - delivers Dridex
- https://myonlinesecurity.co.uk/spoo...-named-holmes-delivers-dridex-banking-trojan/
5 Jun 2017 - "... emails with random numbered -pdf- attachments that drops a malicious macro enabled word doc is an email with the subject of 'Invoice' pretending to come from a random first name Holmes at random email addresses but the body of the email imitates John Miller Ltd...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/invoice_John-Miller_-Holmes.png

... the PDF actually having some content that makes it almost look real:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/invoice_129303_pdf.png

A4 Inv_Crd 21297.pdf - Current Virus total detections 9/56*. Payload Security**
drops Invoice_129302.docm (VirusTotal 8/59[3]) (Payload Security[4]) downloads an encrypted txt file from
http ://spaceonline .in\8yfh4gfff which is converted by the script to miniramon8.exe (VirusTotal 13/61[5])...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...f9da022a3847c6cea7398edd/analysis/1496654801/

** https://www.hybrid-analysis.com/sam...41df9da022a3847c6cea7398edd?environmentId=100
Contacted Hosts
111.118.212.86
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177


3] https://www.virustotal.com/en/file/...8cfac14ba23c1d340749a196/analysis/1496654938/

4] https://www.hybrid-analysis.com/sam...30e8cfac14ba23c1d340749a196?environmentId=100
Contacted Hosts
111.118.212.86
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177


5] https://www.virustotal.com/en/file/...f6514b8a6f10017a1e4b76c7591c3785e97/analysis/

spaceonline .in: 111.118.212.86: https://www.virustotal.com/en/ip-address/111.118.212.86/information/
> https://www.virustotal.com/en/url/e...85e141b21e848a3adcc9835481a2dcc915b/analysis/
___

- http://blog.dynamoo.com/2017/06/malware-spam-john-miller-limited-invoice.html
5 Jun 2017 - "This spam pretends to come from John Miller Ltd (but doesn't) and comes with a malicious payload. The domain mentioned in the email does -not- match the company being spoofed, and varies from message to message.

Screenshot: https://3.bp.blogspot.com/-mxosSM7W...07MruQaudiFufUbW5ZgCLcB/s1600/john-miller.png

The attachment currently has a detection rate of about 9/56*. As is common with some recent attacks, the PDF actually contains an embedded Microsoft Office document. Hybrid Analysis** shows the malicious file downloading a component from cartus-imprimanta .ro/8yfh4gfff (176.126.200.56 - HostVision SRL, Romania) although other -variants- possibly exist. A file is dropped (in the HA report called miniramon8.exe) at detection rate of 11/61***. According to the Hybrid Analysis report, that attempts tom communicate with the following IPs:
192.48.88.167 (Tocici LLC, US)
89.110.157.78 (netclusive GmbH, Germany)
85.214.126.182 (Strato AG, Germany)
46.101.154.177 (Digital Ocean, Germany)
The payload is not clear at this time, but it will be nothing good.
Recommended blocklist:
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177
"
* https://virustotal.com/en/file/d9a9...d9e11a6a019574e058c89fcc/analysis/1496654625/

** https://www.hybrid-analysis.com/sam...ca0d9e11a6a019574e058c89fcc?environmentId=100
Contacted Hosts
176.126.200.56
192.48.88.167
89.110.157.78
85.214.126.182
46.101.154.177


*** https://virustotal.com/en/file/c7dc...0017a1e4b76c7591c3785e97/analysis/1496655625/

cartus-imprimanta .ro: 176.126.200.56: https://www.virustotal.com/en/ip-address/176.126.200.56/information/
> https://www.virustotal.com/en/url/3...101e57d0066bc85c2b6859f4baab6570dc3/analysis/
___

'WakeMed' Phish
REAL 'WakeMed': http://www.wakemed.org/contact-us
Raleigh, NC 27610

FAKE/Phish: https://myonlinesecurity.co.uk/wake...ome-where-else-very-poor-attempt-at-phishing/
5 June 2017

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/WakeMed-SERVICE-DESK.png

"... If you follow the link you see a very badly designed webpage, complete with spelling errors, obviously created by a non English speaker, looking like this:
(from: http ://itupdat.tripod .com/)
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/tripod_phish.png

... the spam -email- is a -compromised- (may be spoofed) Canadian Nova Scotia Department of Education address... these emails use Social engineering tricks to persuade you to open the attachments that come with the email..."

itupdat.tripod .com: 209.202.252.101: https://www.virustotal.com/en/ip-address/209.202.252.101/information/
> https://www.virustotal.com/en/url/5...de1f68208b74edfc163827452b7c580ddb7/analysis/

ccrsb .ca: 142.227.247.226: https://www.virustotal.com/en/ip-address/142.227.247.226/information/
___

Police dismantle crime network - online payment SCAMS
- https://www.helpnetsecurity.com/2017/06/05/police-dismantle-organised-crime-network/
June 5, 2017 - "The Polish National Police, working in close cooperation with its law enforcement counterparts in Croatia, Germany, Romania and Sweden, alongside Europol’s European Cybercrime Centre (EC3), have smashed a Polish organised crime network suspected of online payment scams and money laundering... Operation MOTO on 29-31 May 2017 resulted in 9 arrests including the criminal network’s masterminds, as well as 25 house searches in Poland. The perpetrators were advertising online cars as well as construction or agricultural machinery/vehicles, but never delivered the advertised goods to interested buyers, despite having received advance fee payments..."

:fear::fear: :mad:
 
Last edited:
Fake 'Invoice', blank/empty, 'Message' SPAM, Office365 - Phish

FYI...

Fake 'Invoice' SPAM - pdf attachments drop malware
- https://myonlinesecurity.co.uk/more...drop-a-word-macro-delivering-banking-malware/
7 Jun 2017 - "... emails with -pdf- attachments that drop a malicious macro enabled word doc... email with the subject of '32_Invoice_2220' (random numbers at start and end of invoice) pretending to come from random names and email addresses that delivers what looks like either Dridex or Emotet banking malware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/jaff_invoice.png

001_8951.pdf - Current Virus total detections 12/54*: Payload Security** drops 690UICEBVOFF735.docm
... downloads an encrypted txt file from
http ://micolon .de/7gyb3ds which is converted by the script to krivokor8.exe
(VirusTotal 8/61[3]) (Payload Security[4])...
* https://www.virustotal.com/en/file/...82cf4358147ef0599c25eb96/analysis/1496825964/
001_0673.pdf

** https://www.hybrid-analysis.com/sam...df682cf4358147ef0599c25eb96?environmentId=100
Contacted Hosts
81.169.145.167
37.120.182.208
194.87.234.99
192.157.238.15
185.23.113.100
178.33.146.207


3] https://www.virustotal.com/en/file/...59e0059ad3cd3083acff7fb4174b0b3d40c/analysis/
krivokor8 - Copy.exe

4] https://www.hybrid-analysis.com/sam...d3cd3083acff7fb4174b0b3d40c?environmentId=100
Contacted Hosts
216.218.206.69

The -macros- in this example are very different to the ones we have previously seen. There are 3 hardcoded (slightly obfuscated) download sites in -each- macro (The first I examined had these 3):
micolon .de/7gyb3ds
essentialnulidtro .com/af/7gyb3ds
suskunst .dk/7gyb3ds
Thanks to Racco42[5], -other- download sites found include:
5] https://twitter.com/Racco42/status/872384811301834752
http ://adproautomation .in/7gyb3ds
http ://camberwellroofing .com.au/7gyb3ds
http ://caperlea .com/7gyb3ds
http ://choralia .net/7gyb3ds
http ://chqm168 .com/7gyb3ds
http ://essentialnulidtro .com/af/7gyb3ds
http ://luxcasa .pt/7gyb3ds
http ://micolon .de/7gyb3ds
http ://musee-champollion .fr/7gyb3ds
http ://mytraveltrip .in/7gyb3ds
http ://saheser .net/7gyb3ds
http ://sanftes-reiten .de/7gyb3ds
http ://shopf3 .com/7gyb3ds
http ://shreekamothe .com/7gyb3ds
http ://spocom .de/7gyb3ds
http ://sumbermakmur .com/7gyb3ds
http ://surgideals .com/7gyb3ds
http ://suskunst .dk/7gyb3ds
http ://sutek-industry .com/7gyb3ds
http ://svagin .dk/7gyb3ds
http ://xinding .com/7gyb3ds ...
... Malware IP's: https://pastebin.com/arUi7B1H
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
___

Fake blank/empty SPAM - delivers Trickbot
- https://myonlinesecurity.co.uk/more...scan_1234-doc-attachments-as-a-delivery-lure/
7 Jun 2017 - "... an email with a blank/empty subject as well as a completely empty email body pretending to come from random senders with a malicious word doc attachment delivers Trickbot... One of the email looks like:
From: random senders
Date: Wed 07/06/2017 13:15
Subject: none
Attachment: SCAN_0636.doc


Body content: Totally Blank/Empty

SCAN_0636.doc - Current Virus total detections 12/59*. Payload Security** downloads an encrypted txt file from
http ://beursgays .com\7gyb3ds
Still delivering the same krivokor8.exe (VirusTotal 9/61[3]) (Payload Security[4]) which is Trickbot banking Trojan.
So far We have found these additional sites:
essentialnulidtro .com\af\7gyb3ds
martos .pt\7gyb3ds
castvinyl .ru\7gyb3ds ...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5e7ee35021d57b24a5355c2f/analysis/1496837651/

** https://www.hybrid-analysis.com/sam...9015e7ee35021d57b24a5355c2f?environmentId=100
Contacted Hosts
178.237.37.40
50.19.227.215
185.86.150.185


3] https://www.virustotal.com/en/file/...59e0059ad3cd3083acff7fb4174b0b3d40c/analysis/

4] https://www.hybrid-analysis.com/sam...d3cd3083acff7fb4174b0b3d40c?environmentId=100
Contacted Hosts
216.218.206.69

beursgays .com: 178.237.37.40: https://www.virustotal.com/en/ip-address/178.237.37.40/information/
> https://www.virustotal.com/en/url/f...332cf8035949b3fd0ef229369c163c3e378/analysis/

essentialnulidtro .com: 119.28.85.128: https://www.virustotal.com/en/ip-address/119.28.85.128/information/
> https://www.virustotal.com/en/url/4...65fb82c4807e6c585c59f55b49ae4f21088/analysis/

martos .pt: 91.198.47.86: https://www.virustotal.com/en/ip-address/91.198.47.86/information/
> https://www.virustotal.com/en/url/1...e0bab045d15053e6cf3db77f4de2a62aefd/analysis/

castvinyl .ru: 89.111.176.244: https://www.virustotal.com/en/ip-address/89.111.176.244/information/
> https://www.virustotal.com/en/url/f...36d5d5fea22f179e64d142ad5a945bf690f/analysis/
___

Fake 'Message' SPAM - delivers ransomware
- https://myonlinesecurity.co.uk/mess...nt-delivers-new-version-of-cerber-ransomware/
7 Jun 2017 - "... using 'Message from KM_C224e'... using the same subject and email template but with a zip attachment containing an .exe file... pretends to come from copier @ your-own-email-domain... Confirmed: this is JAFF ransomware...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/Message-from-KM_C224e_-zip-version.png

SKM_C224e03215953284.zip: Extracts to: SKM_C224e9930.exe - Current Virus total detections 12/61*
Payload Security** | MALWR***... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...032c844208de77172cac084d/analysis/1496843658/

** https://www.hybrid-analysis.com/sam...44c032c844208de77172cac084d?environmentId=100
Contacted Hosts
52.15.162.35

*** https://malwr.com/analysis/ZmE3YjMxMDg2OTIzNDdhZThkYjFiZGQxZTI4NzZlOTM/
Hosts
52.15.162.35: https://www.virustotal.com/en/ip-address/52.15.162.35/information/
> https://www.virustotal.com/en/url/7...82099de4e2f7e63460dfb13ba9823d1b9a6/analysis/
___

Office365 - Phish
- https://myonlinesecurity.co.uk/fake-o365-message-important-upgrade-is-required-phishing/
7 Jun 2017 - "... pretends to be a message from Microsoft Office365 saying 'your mailbox is full'...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/O365_upgrade_phishing-email.png

-If- you follow the link in the email, you first get sent to:
http ://ronaldsinkwell .com.br/js/Office365/Secure/ where you get an immediate -redirection- ... and you see a webpage looking like this:
http ://www .ftc-network .com/js/Microsoft/Office365/ :
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/ftc_network_O365_phishing.png

... All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email..."

ronaldsinkwell .com.br: 192.185.214.91: https://www.virustotal.com/en/ip-address/192.185.214.91/information/
> https://www.virustotal.com/en/url/9...b7f66f76dada043f009674090e1c9caff52/analysis/

ftc-network .com: 103.13.240.186: https://www.virustotal.com/en/ip-address/103.13.240.186/information/
> https://www.virustotal.com/en/url/b...ab429d5fc43c6ca0b51bd3e322200fd1b26/analysis/

:fear::fear::fear: :mad:
 
Last edited:
Fake 'eFax' SPAM

FYI...

Fake 'eFax' SPAM - delivers smoke/sharik/dofoil and Trickbot
- https://myonlinesecurity.co.uk/fake...am-delivers-smoke-sharik-dofoil-and-trickbot/
7 June 2017 - "An email with the subject of 'eFax message from 0300 200 3835' – 2 pages pretending to come from efax but actually coming from a look-alike-domain eFax <message@ mail.efaxcorporate254 .top> with a malicious word doc attachment...
mail.efaxcorporate254 .top was registered on 5 June 2017 via publicdomainregistry .com using what are obviously -fake- details and hosted on a Russian server 185.186.141.227. Other -variants- of the domain are hosted on other IPs in the ‘109.248.200.0 – 109.248.203.255′ and ‘185.186.140.0 – 185.186.143.255’ ranges. Other -variants- of this were registered between 1st and 5th June 2017...

Screenshot: https://myonlinesecurity.co.uk/wp-c...6/eFax-message-from-0300-200-3835-2-pages.png

FAX_20170607_1496754696_302.doc - Current Virus total detections 7/57* Payload Security** shows a download from
http ://5.149.250.240 /jun7.exe gets -renamed- to Pvmzgo.exe and autorun (VirusTotal 35/61[3]) Payload Security[4]. The malware on http ://5.149.250.240 is being updated at frequent intervals (currently still using jun7.exe) but I have seen 2 different versions since I originally posted... VirusTotal 10/59[5] 14/61[6] Payload Security[7]... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...50f086d5028d40a2fd7895ee/analysis/1496851706/

** https://www.hybrid-analysis.com/sam...ad850f086d5028d40a2fd7895ee?environmentId=100
Contacted Hosts
5.149.250.240
185.159.128.150


3] https://www.virustotal.com/en/file/...ba811a42f3182053aa34ce75e7295b87736/analysis/

4] https://www.hybrid-analysis.com/sam...f3182053aa34ce75e7295b87736?environmentId=100
Contacted Hosts
95.101.187.176
185.159.128.150


5] https://www.virustotal.com/en/file/...f2560d7639d464fd5a56e9e6/analysis/1496866638/
jun7_exe

6] https://www.virustotal.com/en/file/...bfe24225ed313aa9ea674aa9/analysis/1496899315/
jun7.exe

7] https://www.hybrid-analysis.com/sam...d77bfe24225ed313aa9ea674aa9?environmentId=100
Contacted Hosts
212.227.91.231
193.104.215.58
185.159.128.150


> Update 8 June 2017: -another- run of same email...
fax_20170608_96784512_336.doc - Current Virus total detections 5/55[8]. Payload Security[9] shows a download from
http ://185.81.113.94 /jun8.exe gets -renamed- to Gqkdau.exe and autorun
(VirusTotal 14/61[10]) Payload Security[11]...
8] https://www.virustotal.com/en/file/...a6a2a4da8f8cf9cf77c1bc52/analysis/1496913428/

9] https://www.hybrid-analysis.com/sam...fafa6a2a4da8f8cf9cf77c1bc52?environmentId=100
Contacted Hosts
185.81.113.94
185.159.128.150
192.150.16.117


10] https://www.virustotal.com/en/file/...d1cf7bb45fbdf9b64b076b4b/analysis/1496924193/
jun8.exe

11] https://www.hybrid-analysis.com/sam...74fd1cf7bb45fbdf9b64b076b4b?environmentId=100
Contacted Hosts
185.81.113.94: https://www.virustotal.com/en/ip-address/185.81.113.94/information/
> https://www.virustotal.com/en/url/f...3f5f4d0408d40b6787fc1937e82be5b40e6/analysis/
185.81.113.94 /jun8.exe
___

More Fake 'eFax' SPAM - delivers malware via ole rtf exploit
- https://myonlinesecurity.co.uk/another-fake-efax-email-delivers-malware-via-ole-rtf-exploit/
8 Jun 2017 - "Another -fake- eFax email... subject of 'eFax message from 116 – 921 – 1271' – 5 pages pretending to come from eFax Inc <noreply@ efax .com> with a zip attachment containing a malicious word doc...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/eFax-message-from-116-921-1271-5-pages.png

QSVN19945204621.zip extracts to pxsmnxd.doc - Current Virus total detections 11/57*. Payload Security**...
... 'found an embedded ole object in the rtf file. It will be using a recent rtf exploit... This email attachment contains what appears to be a genuine word doc or Excel XLS spreadsheet with either a macro script or an embedded OLE object that when run will infect you... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...8600a3c977574142600cac8a/analysis/1496924661/
pxsmnxd.doc

** https://www.hybrid-analysis.com/sam...0ac8600a3c977574142600cac8a?environmentId=100
Contacted Hosts
5.196.42.122: https://www.virustotal.com/en/ip-address/5.196.42.122/information/
> https://www.virustotal.com/en/url/7...4624cb0122032b62caee39e01fc0de9a263/analysis/

:fear::fear::fear: :mad:
 
Last edited:
Fake 'Credit Note' SPAM

FYI...

Fake 'Credit Note' SPAM - delivers malware
- https://myonlinesecurity.co.uk/fake...ed-copy-credit-note-malspam-delivers-malware/
9 Jun 2017 - "... an email with the subject of 'Copy Credit Note' coming or pretending to come from Anna Mills anna.mills@ random email addresses with a semi-random named zip attachment which contains another zip file which delivers a wsf file eventually delivering what looks like emotet banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/anna_mills.png

1763904.zip extracts to AA-213-RR.zip: Extracts to: AA-213-RR.wsf - Current Virus total detections 11/55*
Payload Security** shows a download of an encrypted file from
http ://sellitni .com/hjgf677??RqtfrQRDh=FirlRSoaCC which is converted by the script to emsjwIjFro1.exe
(VirusTotal 22/61[3]) which suggests it might be emotet banking malware (Payload Security[4])...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...7e438c5304300972fff4de3d/analysis/1496999598/
AA-213-RR.wsf

** https://www.hybrid-analysis.com/sam...72e7e438c5304300972fff4de3d?environmentId=100
Contacted Hosts
188.165.220.204: https://www.virustotal.com/en/ip-address/188.165.220.204/information/
> https://www.virustotal.com/en/url/1...124d6b5ae33c138ab91fbf2a6b89236be34/analysis/

3] https://www.virustotal.com/en/file/...fe2d76c898a985fd205ffadc8f816af0ba0/analysis/

4] https://www.hybrid-analysis.com/sam...98a985fd205ffadc8f816af0ba0?environmentId=100

:fear::fear: :mad:
 
Last edited:
Fake 'invoice' SPAM

FYI...

Fake 'invoice' SPAM - delivers malware
- https://myonlinesecurity.co.uk/more-invoice-malspam-delivers-malware-using-wsf-files/
12 Jun 2017 - "... an email with the subject of 'Invoice PIS0120650' (random numbers) coming or pretending to come from NoReplyMailbox @ random companies, names and email addresses with a zip attachment which matches the subject that contains another zip file, containing a WSF file which eventually delivers what looks like it will turn out to be either Dridex or Trickbot banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/Invoice-PIS0120650.png

InvoicePIS0120650.zip: extracts to LZTFBQLX6G.zip which Extracts to: LZTFBQLX6G.wsf
Current Virus total detections 12/56*. Payload Security** shows a download of an encrypted file from
http ://ythongye .com/8yhf2ui? which is converted by the script to wvHyIX1.exe
(VirusTotal 19/60[3]) Payload Security[4]... found 4 -different- WSF files amongst the 150 zips received:
LZTFBQLX6G.wsf - Current Virus total detections 12/56[5]
IZ7JAG6.wsf - Current Virus total detections 11/55[6]
MVUN1W9FO1.wsf - Current Virus total detections 14/56[7]
TOTAHZEQT.wsf - Current Virus total detections 14/56[8]
Manual examination of the various WSF scripting files received shows these download Locations for the malware
(obfuscated in the WSF file using base64 encoding & extra padding):
78tguyc876wwirglmltm .net/af/8yhf2ui > 119.28.85.128
e67tfgc4uybfbnfmd .org/af/8yhf2ui > 119.28.85.128
sacrecoeur.bravepages .com/8yhf2ui? > 66.219.202.10
ythongye .com/8yhf2ui? > 103.249.108.128
sheekchilly .com/8yhf2ui? > 103.21.59.174
lamartechnical .com/8yhf2ui? > 216.97.233.44
syrianchristiancentre .org/8yhf2ui? > 103.21.58.130
skveselka .wz.cz/8yhf2ui > 185.64.219.7
svadba-tamada .de/8yhf2ui > 81.169.145.148
aacom .pl/8yhf2ui? > 193.239.206.248
smartzaa .com/8yhf2ui? > 103.21.58.252
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...8ccfe21d6a6c92f46844ae20/analysis/1497289622/
LZTFBQLX6G.wsf

** https://www.hybrid-analysis.com/sam...dac8ccfe21d6a6c92f46844ae20?environmentId=100
Contacted Hosts
103.249.108.128

3] https://www.virustotal.com/en/file/...3fe4037baa4526a9c16959b43c754743277/analysis/

4] https://www.hybrid-analysis.com/sam...dac8ccfe21d6a6c92f46844ae20?environmentId=100
Contacted Hosts
103.249.108.128

5] https://www.virustotal.com/en/file/...8ccfe21d6a6c92f46844ae20/analysis/1497289622/

6] https://www.virustotal.com/en/file/...b3edf7bc3a8f00a7977b2d4a/analysis/1497281678/

7] https://www.virustotal.com/en/file/...83b6f71de072da6ad2b0ab83/analysis/1497294665/

8] https://www.virustotal.com/en/file/...bd1528e107a9a81ec51cfc14/analysis/1497294745/

:fear::fear: :mad:
 
Last edited:
Fake 'Emailing' SPAM, 'Google Drive' - Phish

FYI...

Fake 'Emailing' SPAM - delivers pdf malware
- https://myonlinesecurity.co.uk/mals...opping-macro-excel-xls-files-deliver-malware/
14 Jun 2017 - "... an email with the subject of 'Emailing: 288639672' (random numbers) pretending to come from random names and email address that delivers some sort of malware. Over the last couple of weeks these have switched between Jaff ransomware, Dridex banking Trojans and Trickbot banking Trojan...

Screenshot: https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/emailing-288639672.png

288639672.pdf Current Virus total detections 11/56*. Payload Security** drops 000049764694.xlsm
(VirusTotal 11/56[3]) (Payload Security[4]). JoeSandbox[5]: downloads an encrypted txt file from
http ://mailblust .com\98tf77b which is converted by the script to fungedsp8.exe (VirusTotal 8/60[6])..
There are 4 hardcoded (slightly obfuscated) download sites in the macro (there will be more in other versions)
mailblust .com\98tf77b > 162.251.85.92
78tguyc876wwirglmltm .net\af\98tf77b > 119.28.85.128
randomessstioprottoy .net\af\98tf77b > 119.28.85.128
3456group .com\98tf77b > 69.49.96.24
... Other sites found so far have been posted HERE:
- https://twitter.com/coldshell/status/874943588412653568
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...5e53bc724f9832d040cd4aa3/analysis/1497432816/

** https://www.hybrid-analysis.com/sam...3d05e53bc724f9832d040cd4aa3?environmentId=100
Contacted Hosts
162.251.85.92

3] https://www.virustotal.com/en/file/...5e53bc724f9832d040cd4aa3/analysis/1497432816/

4] https://www.hybrid-analysis.com/sam...c829bd13c04bcf988d062e320fc?environmentId=100
Contacted Hosts
162.251.85.92

5] https://jbxcloud.joesecurity.org/analysis/291764/1/html

6] https://www.virustotal.com/en/file/...95cdfe2503cf77fe5678e395/analysis/1497433869/
___

'Google Drive' - Phish
- https://myonlinesecurity.co.uk/important-document-google-drive-email-credential-phishing-scam/
14 Jun 2017 - "... phishing attempts for email credentials... pretends to be a message saying 'log in to Google Drive' to get some documents that have been sent to you...

Screenshot: https://myonlinesecurity.co.uk/wp-c.../IMPORTANT-DOCUMENT-google-drive-phishing.png

If you follow the link (all are identical) you see a webpage looking like this:
https ://www.mealcare .ca/gdrive/drive/drive/auth/view/share/ - but it is HTTPS so it is “safe“. That is nothing you give to the criminal can be intercepted, so your email log in details can’t be stolen by another criminal on the way. Remember a green padlock HTTPS does NOT mean the site is safe. All it means is secure from easy interception between your computer and that site:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/mealcare_google_phish1.png

After you select 'click here' on this identical copy of the Google drive page (if you are not looking at the url bar) you get:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/mealcare_google_phish2.png

After you input your details you get sent to a 404 not found page on Morgan Stanley website. I can only assume the phisher tried to link originally to a genuine pdf on Morgan Stanley who quickly removed it:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/mealcare_morgan_stanley_404.png ..."

mealcare .ca: 77.104.162.117: https://www.virustotal.com/en/ip-address/77.104.162.117/information/
> https://www.virustotal.com/en/url/1...2b602880ba3924da27cbee2112ecffc8939/analysis/

:fear::fear: :mad:
 
Last edited:
Fake 'Moneygram' SPAM

FYI...

Fake 'Moneygram' SPAM - delivers java adwind
- https://myonlinesecurity.co.uk/fw-m...-20th-june-2017-malspam-delivers-java-adwind/
15 Jun 2017 - "... a slightly different subject and email content to previous ones... These have a genuine PDF attachment with a -link- in it that downloads a zip containing the malware. The link goes to
https ://www.domingosdandreaimoveis .com.br/wp-admin/images/Moneygram.transactions.12thJune.2017.zip
which is almost certainly a compromised wordpress site...

Screenshot: https://myonlinesecurity.co.uk/wp-c...-Maintenance-Schedule-From-20th-June-2017.png

The pdf looks like:
> https://myonlinesecurity.co.uk/wp-content/uploads/2017/06/moneyschedule_pdf.png

Moneygram.transactions.12thJune.2017.jar (474kb) - Current Virus total detections 21/55*. Payload Security**...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustotal.com/en/file/...6ea68e4d72e5422067de999a/analysis/1497502711/

** https://www.hybrid-analysis.com/sam...47c6ea68e4d72e5422067de999a?environmentId=100
Contacted Hosts
185.120.144.148

domingosdandreaimoveis .com.br: 187.45.187.122: https://www.virustotal.com/en/ip-address/184.95.37.110/information/

:fear::fear: :mad:
 
Back
Top