Fake 'Documents', 'Customer message', 'invoice' SPAM, 'AdGholas' malvertising
FYI...
Fake 'Documents' SPAM - delivers Trickbot
-
https://myonlinesecurity.co.uk/spoo...nts-malspam-delivers-trickbot-banking-trojan/
5 Jul 2017 - "An email with the subject of 'Important Account Documents' pretending to come from Lloyds bank but
actually coming from a look-a-like domain Lloyds Bank Documents <no-reply@ lloydsbankdocs .co.uk>
with a malicious word doc attachment... So far we have only found 1 site sending these today:
lloydsbankdocs .co.uk
As usual they are registered via Godaddy as registrar and the emails are sent via IP
37.46.192.51 which doesn’t have any identifying details except AS47869 Netrouting in Netherlands...
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/lloyds-Important-Account-Documents.png
The word doc looks like:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/lloyds-bank-account-docs.png
AccountDocs
.doc - Current Virus total detections 7/57*. Payload Security** shows a download from
http ://pilotosvalencia .com/sergollinhols.png which of course is -not- an image file but a
-renamed- .exe file that gets renamed to fsrtat
.exe and autorun (VirusTotal 14/60***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...c0579567dd5e36b878c88379bef593a43f6/analysis/
**
https://www.hybrid-analysis.com/sam...dd5e36b878c88379bef593a43f6?environmentId=100
Contacted Hosts
81.169.217.4
167.114.174.158
197.248.210.150
***
https://www.virustotal.com/en/file/...6f99fb280b776de0236a722d39871270a11/analysis/
___
Fake 'Customer message' SPAM - delivers Trickbot
-
https://myonlinesecurity.co.uk/spoo...omer-message-malspam-delivers-banking-trojan/
5 July 2017 - "... delivering
banking Trojans is an email with the subject of 'Customer message' pretending to come from 'Nat West Bank' but actually
coming from a series of look alike domains - NatWest Bank Plc <alert@ natwest-serv478 .ml> with
a malicious word doc attachment... criminals sending these have registered various domains that look-like-genuine bank domains. Normally there are 3 or 4 newly registered domains that imitate-the-bank or some message sending service... we have found 6 but it is highly likely there could be hundreds, because they are -free- domains that don’t need any checkable registration details:
natwest-serv478 .ml >
81.133.163.165
natwest-serv347 .ml >
185.100.68.185
natwest-serv305 .ml >
72.21.246.90
natwest-serv303 .ml >
47.42.101.137
natwest-serv505 .ml >
98.191.98.153
natwest-serv490 .ml >
128.95.65.99
These are registered via freenom .com as registrar and the emails are sent
via a series of what are most likely compromised email accounts or mail servers:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/natwest_ip_spam_list.png
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/natwest-customer-message.png
The word doc looks like:
>
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/message_payment283_doc.png
message_payment283
.doc - Current Virus total detections 9/56*. Payload Security** shows a download from
http ://armor-conduite .com/34steamballons.png which of course is -not- an image file but a
renamed .exe file that gets renamed to nabvwhy
.exe and autorun (VirusTotal 16/62***) which is a slightly different -
Trickbot- payload... An alternative download location is
http ://teracom .co.id/34steamballons.png ...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...702392378cb20a0e26878242/analysis/1499266638/
message_payment283
.doc
**
https://www.hybrid-analysis.com/sam...530702392378cb20a0e26878242?environmentId=100
Contacted Hosts
202.169.44.149
94.42.91.27
***
https://www.virustotal.com/en/file/...87e61978f2d5449d79556e04342f508ff7f/analysis/
nabvwhy
.exe
armor-conduite .com:
193.227.248.241:
https://www.virustotal.com/en/ip-address/193.227.248.241/information/
>
https://www.virustotal.com/en/url/9...6a754f5144e5f27dfcacfcd75e172d62e47/analysis/
teracom .co.id:
202.169.44.149:
https://www.virustotal.com/en/ip-address/202.169.44.149/information/
>
https://www.virustotal.com/en/url/9...35511be0f6f464d42d114c41d4ee16add04/analysis/
___
'AdGholas' malvertising ...
-
https://blog.malwarebytes.com/cyber...rtising-thrives-shadows-ransomware-outbreaks/
July 5, 2017 - "... other threat actors have been quite active and perhaps even enjoyed this complimentary diversion. This is certainly true for the most prolific
-malvertising- gang of the moment, dubbed 'AdGholas'... A master of disguise, AdGholas has been flying right under the nose of several top ad networks while benefiting from the ‘first to move’ effect. Indeed, the -malvertising- operators are able to quickly roll out and activate a -fake- advertising infrastructure for a few days before getting banned...
>
https://blog.malwarebytes.com/wp-content/uploads/2017/06/certs.png
... We collected artifacts that show us the redirection between the AdGholas group and the Astrum exploit kit. This kind of -redirect- is highly conditional in order to evade the majority of ad scanners. While many malvertising actors do not care about cloaking, it is very important to others such as AdGholas because stealthiness is a strength that contributes to its longevity...
IOCs:
AdGholas:
expert-essays[.]com
jet-travels[.]com
5.34.180.73
162.255.119.165
Astrum Exploit Kit:
uniy[.]clamotten[.]com
comm[.]clamotten[.]com
comp[.]computer-tutor[.]info
lexy[.]computer-tutor[.]info
sior[.]ccnacertification[.]info
kvely[.]our-health[.]us
nuent[.]mughalplastic[.]com
mtive[.]linksaffpixel[.]com
cons[.]pathpixel[.]com
sumer[.]pathlinkaff[.]com
nsruc[.]ah7xb[.]com
ction[.]ah7xb[.]com
nstru[.]onlytechtalks[.]com
const[.]linksaffpixel[.]com
quely[.]onlytechtalks[.]com
coneq[.]modweave[.]com
94.156.174.11 ..."
(More detail at the malwarebytes URL above.)
___
Fake 'invoice' SPAM - delivers java adwind malware
-
https://myonlinesecurity.co.uk/fake-invoices-spreading-java-adwind/
4 Jul 2017 - "...
fake 'invoices' rather then their more usual method of fake 'MoneyGram' or 'Western Union money transfer' reports or updates...
Screenshot:
https://myonlinesecurity.co.uk/wp-content/uploads/2017/07/due-invoices.png
Payment Dunmore 27.26.170001
.jar (566kb) - Current Virus total detections 12/58*. MALWR**... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*
https://www.virustotal.com/en/file/...4901d8fbf29590563a6d8004/analysis/1499145423/
**
https://malwr.com/analysis/ZTI2MTE2MjIwYzBlNGNmNGIxMWMwZTBiNWE0NmNlNGE/
:fear::fear:
