Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

SPAM frauds, fakes, and other MALWARE deliveries...


  • Please log in to reply
2072 replies to this topic

#1711 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 04 May 2016 - 05:54 AM

FYI...

Fake 'info' SPAM - JS malware downloads Locky
- https://myonlinesecu...ownloads-locky/
4 May 2016 - "A -blank- email with the subject of 'info' pretending to come from asisianu@ pauleycreative .co.uk with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: asisianu@ pauleycreative .co.uk
Date: Wed 04/05/2016 14:20
Subject: info
Attachment: info.zip


Body content: Totally blank/empty

4 May 2016: info.zip: Extracts to: document_copy.js - Current Virus total detections 5/57*
.. MALWR** shows a download of Locky ransomware from
 http ://tasox .eu/v/log.php?f=403 (VirusTotal 5/57***). I was unable to get any malware myself direct from the website. The downloaded malware came from MALWR.
Update: It looks like this is actually part of the recent Angler kit malspam campaign, where the gate link is malspammed out. Then it -redirects- via an -iframe- to another site then bounces on the Angler site, where it downloads Locky or whichever other Malware/Trojan/Ransomware it wants to infect you or compromise you with... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462350988/

** https://malwr.com/an...GM4YWVmODEyMGU/
Hosts
212.47.208.164: https://www.virustot...64/information/
>> https://www.virustot...afe12/analysis/
138.201.95.72: https://www.virustot...72/information/

*** https://www.virustot...sis/1462351541/
TCP connections
31.184.197.126: https://www.virustot...26/information/
___

Fake 'scan10001' SPAM - JS malware delivers Locky
- https://myonlinesecu...livers-locky-b/
4 May 2016 - "An email with the subject of 'Emailing: scan10001' pretending to come from Ahmed Al-Zamil <ahmed.al-zamil@ torathuna .com> with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: Ahmed Al-Zamil <ahmed.al-zamil@ torathuna .com>
Date: Wed 04/05/2016 12:16
Subject: Emailing: scan10001
Attachment: scan10001.rar
    Your message is ready to be sent with the following file or link
    attachments:
    scan10001
    Note: To protect against computer viruses, e-mail programs may prevent
    sending or receiving certain types of file attachments. Check your e-mail
    security settings to determine how attachments are handled.


4 May 2016: scan10001.rar: Extracts to: 2016-80506_2016052.js - Current Virus total detections 23/56*
... downloads Locky ransomware from
 kochgruppe-franken .de/09u87tgy (VirusTotal 3/56**) which is exactly the -same- Locky version as described in THIS earlier post[1], so they will be using the same download locations in both campaigns... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1441173827/

** https://www.virustot...sis/1462360492/

1] https://myonlinesecu...-macro-malware/

kochgruppe-franken .de: 81.169.145.160: https://www.virustot...60/information/
>> https://www.virustot...2388d/analysis/
___

Fake 'transaction history' SPAM - JS malware downloads Locky
- https://myonlinesecu...-it-js-malware/
4 May 2016 - "An email with the subject of 'RE: ' pretending to come from random names & email addresses with a zip attachment is another one from the current bot runs which downloads Locky ransomware... has a massive 525kb js file inside the zip. The zip actually contains 3 identical copies of the same file... One of the  emails looks like:
From:  Zackary Ramsey <RamseyZackary1901@ anno1911 .nl>
Date:Wed 04/05/2016 16:21
Subject: Re:
Attachment: transactions_632.zip
    Hi, beavers
    Your balance and recent transaction history is attached to this mail. Please verify it
    Regards,
    Zackary Ramsey


4 May 2016: transactions_632.zip: Extracts to: 51434_51434.js - Current Virus total detections 1/56*
.. MALWR** shows a download of Locky ransomware from
 http ://richmondsofa .com/v6yhsa (VirusTotal 5/56***).. The basic rule is NEVER open any attachment to an email, unless you are expecting it...:
* https://www.virustot...sis/1462376280/

** https://malwr.com/an...zE3Zjc1ZDU1Yjg/
Hosts
46.30.212.96: https://www.virustot...96/information/

>> https://www.virustot...d3183/analysis/
185.22.67.108: https://www.virustot...08/information/

*** https://www.virustot...sis/1462376825/
TCP connections
185.22.67.108
___

CBS-affiliated TV Stations expose Visitors to Angler EK / Malvertising
- https://blog.malware...er-exploit-kit/
May 4, 2016 = "A rogue advertiser managed to subvert the Taggify self-serve ad platform to push the Angler exploit kit to unsuspecting visitors of two CBS affiliated TV stations. One in St. Louis called KMOV, and the other WBTV, is located in Charlotte, North Carolina. This malvertising attack leveraged a familiar technique of -hijacking- GoDaddy accounts to create various subdomains pointing to malicious servers. These are used to host the ad content (JavaScript, image, etc.) but also to hide malicious code and alternate between clean and infected adverts depending on multiple factors (time of day, user agent, IP blacklist, etc). While the main malvertising domain was actually parked (its name was registered but there is no relevant content) the subdomain is happily hosting an ad banner:
> https://blog.malware...n_subdomain.png
Web crawlers and scanners will be served the ‘normal’ ad banner, genuine users will be handed an extraneous iframe, -redirecting- to the infamous Angler exploit kit:
> https://blog.malware...016/05/Flow.png
Attack flow:
    Publisher: kmov .com
    Ad platform: data.rtbfy .com/rtb2?{redacted}
    Rogue advertiser: som.barkisdesign .com/creatives/tag.js?cp=309505341&domain=kmov .com
    Angler EK: parkwateavereverende .fredricholmgren .se/sinuously/0679/31/74/283325.html?utm_source=kmov .com
The Angler exploit kit has been known to actively push its own version of ransomware, dubbed CryptXXX as well as other types of malware via the Bedep Trojan. The best line of defense against malvertising and ransomware attacks remains a combination of safe practices (regular updates, backups) and layered protection (Anti-Malware, Anti-Exploit). We have informed the ad platform, publisher and GoDaddy about this attack which was still ongoing at the time of posting.
IOCs:
    som .barkisdesign .com
    199.255.137.197: https://www.virustot...97/information/

parkwateavereverende .fredricholmgren .se: 46.30.212.217:
- https://www.virustot...17/information/
>> https://www.virustot...03d5a/analysis/
___

Big data breaches found at major Email services
- http://www.reuters.c...s-idUSKCN0XV1I6
May 4, 2016 - "Hundreds-of-millions of -hacked- usernames and passwords for email accounts and other websites are being traded in Russia's criminal underworld, a security expert told Reuters. The discovery of 272.3 million stolen accounts included a majority of users of Mail.ru (MAILRq.L), Russia's most popular email service, and smaller fractions of Google (GOOGL.O), Yahoo (YHOO.O) and Microsoft (MSFT.O) email users, said Alex Holden, founder and chief information security officer of Hold Security*. It is one of the biggest stashes of stolen credentials to be uncovered since cyber attacks hit major U.S. banks and retailers two years ago.
Holden was previously instrumental in uncovering some of the world's biggest known data breaches, affecting tens of millions of users at Adobe Systems (ADBE.O), JPMorgan (JPM.N) and Target (TGT.N) and exposing them to subsequent cyber crimes. The latest discovery came after Hold Security researchers found a young Russian hacker bragging in an online forum that he had collected and was ready to give away a far larger number of stolen credentials that ended up totaling 1.17 billion records. After eliminating duplicates, Holden said, the cache contained nearly 57 million Mail.ru accounts - a big chunk of the 64 million monthly active email users Mail.ru said it had at the end of last year. It also included tens of millions of credentials for the world's three big email providers, Gmail, Microsoft and Yahoo, plus hundreds of thousands of accounts at German and Chinese email providers..."
* http://holdsecurity....llector_breach/

> http://arstechnica.c...ta-is-98-bogus/
May 6, 2016
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 08 May 2016 - 09:55 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#1712 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 05 May 2016 - 05:23 AM

FYI...

https://blogs.msdn.c...2006&GroupKeys=
“… be aware that malware that connects using an IP address instead of a domain name will -not- be blocked when you use just domain name lists…”

Fake 'Statement' SPAM - leads to Dridex
- http://blog.dynamoo....e-attached.html
5 May 2016 - "This -fake- financial spam leads to malware. Details change slightly from email to email:
    From:    Administrator [adminHb@ victimdomain .tld]
    Date:    5 May 2016 at 11:29
    Subject:    Statement 6BBC0E
    Please See Attached

    Scanned by MailDefender Plus, powered by Symantec Email Security.cloud ...
    This email has been checked for viruses by Avast antivirus software...


It must be safe.. scanned by both Symantec and Avast! Well, of course that's just BS and the attached DOC file leads to malware, specifically the -same- payload as seen in this slightly earlier spam run*."
* http://blog.dynamoo....-scan-data.html
5 May 2016 - "This -fake- document scan appears to come from within the victim's own domain (but this is just a simple forgery) and has a malicious attachment:
    From:    DocuCentre-IV [DocuCentre1230@ victimdomain .tld]
    Date:    5 May 2016 at 10:27
    Subject:    Scan Data
    Number of Images: 1
    Attachment File Type: PDF ...


Details vary slightly from message to message. Attached is a DOC file (not a PDF) starting with PIC, DOC or IMG in the samples I have seen plus a random number. Typical VirusTotal detection rates are 6/56 [1].. [6]. Various automated analyses of these documents [7].. [17] show a binary being downloaded from the following locations:
fm1.ntlweb .org/87hcnrewe
iconigram .com/87hcnrewe
www .sammelarmband .de/87hcnrewe
hospice.psy .free.fr/87hcnrewe
This dropped file has a detection rate of 5/46*. This Hybrid Analysis** and this DeepViz report*** show subsequent network traffic to:
192.241.252.152 (Digital Ocean, US)
195.169.147.26 (Culturegrid.nl, Netherlands)
70.164.127.132 (Southland Technology, US)
The characteristics of the payload suggest this is the Dridex banking trojan.
Recommended blocklist:
192.241.252.152
195.169.147.26
70.164.127.132
"
1] https://www.virustot...14fab/analysis/

6] https://www.virustot...dc46b/analysis/

7] https://malwr.com/an...DRlY2FjNzYwZjM/

17] https://www.hybrid-a...environmentId=4

* https://www.virustot...sis/1462442350/

** https://www.hybrid-a...environmentId=1

*** https://sandbox.deep...24e194d6388e68/

- https://myonlinesecu...-macro-malware/
5 May 2016 - "An email with the subject of 'Scan Data' pretending to come from DocuCentre-IV <DocuCentre071@ your- email-address > with a malicious word doc attachment is another one from the current bot runs... The email looks like:
From: DocuCentre-IV <DocuCentre071@ your-email-address >
Date: Thu 05/05/2016 10:26
Subject: Scan Data
Attachment: SCAN000209053.doc
    Number of Images: 1
    Attachment File Type: PDF


Or version 2 (administrator version):
    Please See Attached

    Scanned by MailDefender Plus, powered by Symantec Email Security.cloud ...
    This email has been checked for viruses by Avast antivirus software...


5 May 2016: SCAN000209053.doc - Current Virus total detections 5/56*
.. MALWR** shows a download from
 http ://www.sammelarmband .de/87hcnrewe (VirusTotal ***).. MALWR (on that) is inconclusive but looks like either Locky ransomware or Dridex banking Trojan... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1462440302/

** https://malwr.com/an...WFmOTgwMWE1ZTI/
Hosts
81.169.145.92: https://www.virustot...92/information/
>> https://www.virustot...0fc85/analysis/

sammelarmband .de: 81.169.145.92

*** https://www.virustot...b6b3e/analysis/
___

Fake 'Certificate UPDATE' SPAM - JS malware
- https://myonlinesecu...ess-js-malware/
5 May 2016 - "An email pretending to be a notification that you need to update your webmail certificate with the subject of 'Certificate UPDATE' pretending to come from 'Incoming Fax <Incoming.Fax@ your-own-email-domain > with a zip attachment is another one from the current bot runs... The attachment name matches the certificate number in the body of the email...

Screenshot: https://myonlinesecu...TE-1024x613.png

5 May 2016: Certificate_9298-4437-QBXB-3356-CUBF-3728.zip: Extracts to: Certificate.js
Current Virus total detections 4/54*:  MALWR** shows a download from
 http ://www .valvedistributors .com.au/wp-content/uploads/2016/04/certificateA79EF99W89Q7.exe (VirusTotal 3/55***)
.. MALWR[4]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462443505/

** https://malwr.com/an...WUyMzJlM2U4NDY/
Hosts
104.28.27.13: https://www.virustot...13/information/
>> https://www.virustot...55852/analysis/

*** https://www.virustot...sis/1462446273/

4] https://malwr.com/an...TI3ZDY2MzE0Nzk/
___

Fake 'Refund Unsuccessful' SPAM - JS malware
- https://myonlinesecu...und-js-malware/
5 May 2016 - "An email with the subject of 'Refund Unsuccessful C1CE' [random characters] pretending to come from  random senders with a zip attachment is another one from the current bot runs which downloads some malware... One of the emails looks like:
From: Adriane Casson <CassonAdriane21541@ bob-bike .com>
Date: Thu 05/05/2016 13:37
Subject: Refund Unsuccessful C1CE
Attachment: copy_gr_695715.zip
    Your order has been cancelled, however, we are not able to proceed with the refund of $140,47.
    All the information on your case C1CE is listed in the document below.


5 May 2016: copy_gr_695715.zip: Extracts to: doc_QZOImnHYub.js - Current Virus total detections 1/55*
.. MALWR** shows a download from
 http ://jtapecustom .com/adm.exe (VirusTotal 4/56***)... possibly Dridex, but might be Locky... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462452122/

** https://malwr.com/an...WRmODkxY2ZkM2E/
Hosts
162.13.162.105: https://www.virustot...05/information/
>> https://www.virustot...9b1da/analysis/

*** https://www.virustot...sis/1462452536/
___

Fake 'Ticket' SPAM - JS malware delivers Locky
- https://myonlinesecu...delivers-locky/
5 May 2016 - "... a -blank- email with the subject of 'Ticket' pretending to come from random names @ gmail .com with a zip attachment is another one from the current bot runs which downloads Locky ransomware... they have just spoofed the @Gmail address... One of the  emails looks like:
From: Justine walker <Everette6879@ gmail .com>
Date: Thu 05/05/2016 17:18
Subject: Ticket
Attachment: TICKET-T007054882478807.zip


Body content: totally -blank-

5 May 2016: TICKET-T007054882478807.zip: Extracts to: VA4309497433399300.js - Current Virus total detections 1/55*
A manual analysis shows a download of Locky from
 lovesanimals .com/09y8hb7v6y7g (VirusTotal 2/55**)  MALWR[3] | Payload Security[/4]
Other download sites found so far include:
    buntrocks .com/09y8hb7v6y7g - 64.22.106.154
    www .semann .de/09y8hb7v6y7g - 81.169.145.77
    http ://svitpokrivli .com/09y8hb7v6y7g - 91.203.144.46
    http ://drdianateachertraining .com/09y8hb7v6y7g - 74.220.207.114
    advocacyhealthcare .com/09y8hb7v6y7g - 162.144.5.3
    barebooger .com/09y8hb7v6y7g - 162.210.102.65
... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462465832/

** https://www.virustot...sis/1462464264/

3] https://malwr.com/an...jJiYjk4MzE5Njc/

4] https://www.hybrid-a...environmentId=4
Contacted Hosts
138.201.95.72: https://www.virustot...72/information/
>> https://www.virustot...b0b7d/analysis/
___

Fake 'Your ID card has been found' SPAM - doc macro malware
- https://myonlinesecu...-macro-malware/
5 May 2016 - "An email with the subject of 'Your ID card has been found' pretending to come from random email addresses with a malicious word doc RTF attachment is another one from the current bot runs... The attachment name is created by prepending the recipients name (the first part before the @ in the email address to _copy/ details/scan_random numbers .rtf). The email looks like:
From: Alois.Lorenz7@ ozsu .com.tr
Date: Thu 05/05/2016 18:15
Subject: Your ID card has been found
Attachment: amy.hewitt_copy_792752.rtf
    Hello, we have found your ID card on April 29th, 2016.
    Please review the scanned version let us know if it’s yours.


5 May 2016: amy.hewitt_copy_792752.rtf - Current Virus total detections 3/56*
.. MALWR shows a download from
 http ://911.sos-empleados .net/newera/walkthisland/greenland.php which gave me sashagrey.jpg (-not- a jpg but a renamed .exe) (VirusTotal 4/56**).. DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1462468652/

** https://www.virustot...sis/1462469305/

911.sos-empleados .net: 31.131.22.156: https://www.virustot...56/information/
>> https://www.virustot...e6bc3/analysis/
___

Fake 'Someone Might Be Using Your Account' SPAM - doc macro malware leads to Dridex
- https://myonlinesecu...eads-to-dridex/
5 May 2016 - "An email with the subject of 'Someone Might Be Using Your Account 022FCF' [random characters] pretending to come from random names and email addresses with a malicious word doc rtf -or- a zip file attachment is another one from the current bot runs... The email looks like:
From: Jenna Lynn <LynnJenna657@ etoz .com.my>
Date:
Subject: Someone Might Be Using Your Account 022FCF
Attachment: [either word rtf doc like fininfo_38955.rtf -or- zip file like derek_account_39115.zip]
    Your account was access on April 12, 2016 at 09:07 PM from Barcelona, Spain.
    Please, confirm the details and check the security report enclosed.


5 May 2016: fininfo_38955.rtf - Current Virus total detections 3/56*
.. MALWR** shows a download from
 http ://911.sos-empleados .net/newera/walkthisland/greenland.php which is the same as THIS post[1]
5 May 2016: derek_account_39115.zip extracts to: details_G1xAIwQEscaW4ULy.js
Current Virus total detections 1/56***. MALWR**** shows a download from
 http ://jtapecustom .com/adm.exe Which is the -same- malware as THIS post[2].."
* https://www.virustot...sis/1462472152/

** https://malwr.com/an...TEyNmZiMDAxYTU/
Hosts
31.131.22.156

*** https://www.virustot...sis/1462472608/

**** https://malwr.com/an...TNmNmFlOGNhYjM/
Hosts
162.13.162.105

1] https://myonlinesecu...-macro-malware/

2] https://myonlinesecu...und-js-malware/
___

Fake 'online order' SPAM - doc rtf macro malware
- https://myonlinesecu...-macro-malware/
4 May 2016 - "An email with the subject of 'Thank you! Your online order was placed successfully' pretending to come from random names and email addresses with a malicious word RTF doc attachment is another one from the current bot runs... The email looks like:
From: Hickman.Fuchs82@ vsepaketi .ru
Date: Wed 04/05/2016 19:48
Subject: Thank you! Your online order was placed successfully
Attachment: rechn_comerz(052016)_5964.rtf
    Thank you for shopping with Sumitomo Mitsui Financial Group Inc
    Your order status was changed to [PROCESSING]. You can view order details in the document attached
    We’ll send you email once the goods will be passed to delivery notifying the status change to [DISPATCHED]
    If you have any queries do not hesitate to contact us via email or telephone.
    Kind Regards,
    Hickman Fuchs
    Sumitomo Mitsui Financial Group Inc ...


4 May 2016: rechn_comerz(052016)_5964.rtf - Current Virus total detections 2/56*
.. MALWR** shows a download from
 http ://sin.grupo-integral .co/lexisnexis/search/bgreport.php which gave me _Locky_5300ad7f.exe (VirusTotal ***)
.. MALWR[4]... Update: I am assured that this is Locky ransomware.. the failure of MALWR to analyse it is due to VM awareness, so it acts different... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1462389649/

** https://malwr.com/an...DE2MjA4YTVhMjg/
Hosts
146.120.89.47: https://www.virustot...47/information/
>> https://www.virustot...c1c6f/analysis/

*** https://www.virustot...cc1a0/analysis/

4] https://malwr.com/an...GNjYzMzNzQxOGE/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 05 May 2016 - 01:30 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1713 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 06 May 2016 - 05:36 AM

FYI...

Fake 'Upcoming Payment' SPAM - JS malware delivers Dridex
- https://myonlinesecu...elivers-dridex/
6 May 2016 - "An email with the subject of 'Upcoming Payment – 1 Month Notice' pretending to come from random senders and email addresses  with a zip attachment is another one from the current bot runs which downloads Dridex. In exactly the same way as THIS[1] earlier Malspam run, the encrypted JavaScript file contains a long list of compromised sites that the Dridex banking Trojan is downloaded from...
1] https://myonlinesecu...eads-to-dridex/
One of the  emails looks like:
From: Mona Gates <GatesMona02@ ideadigitale .org>
Date: Thu 05/05/2016 23:20
Subject: Upcoming Payment – 1 Month Notice
Attachment: user_data_37776.zip
    Please, be informed regarding the upcoming payment ID:30724, which must be paid in full until the June 1st, 2016.
    Additional information is enclosed in the file down below.


6 May 2016: user_data_37776.zip: Extracts to: details_uQG07BLH189.js - Current Virus total detections 1/56*
.. MALWR** shows a download of Dridex banking trojan from a long list of sites (VirusTotal 7/55***). Sites discovered listed inside the encrypted js file include: (other versions of this might well include other sites):
    http ://fashionpoppers .com/adm.exe - 66.147.244.66
    http ://sky-hero .com/adm.exe - 213.186.33.171
    http ://wbsrainwater .com/adm.exe - 91.146.109.184
    http ://burnspots .com/adm.exe - 160.153.32.229
    http ://wholesalejaipurkurti .com/adm.exe - 46.166.163.195
    http ://bedbugsurvivalguide .com/adm.exe - 54.241.22.111
    http ://clearancezone .com.au/adm.exe - 184.164.156.210
    http ://asiandukan .co.uk/adm.exe - 192.186.200.169
    http ://ribastiendaonline .com/adm.exe - 185.92.247.46
    http ://hogcustom .co.uk/adm.exe - 213.246.109.8
    http ://shopnutri .com.br/adm.exe - 177.12.173.166
    http ://metersdirect .com.au/adm.exe - 52.64.39.102
    http ://buyemergencylight .com/adm.exe - 192.117.12.154
    http ://lcdistributing .com/adm.exe - 192.249.113.43
    http ://liftmaxthailand .com/adm.exe - 119.59.120.32
    http ://millersportsaspen .com/adm.exe - 23.235.220.84
    http ://hkautosports .com/adm.exe - 205.134.241.120
    http ://syntechcs .co.uk/adm.exe - 188.65.114.122
    http ://presspig .com/adm.exe - 70.40.220.100
    http ://lojaturbo .com.br/adm.exe - 81.19.185.200
... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462487086/

** https://malwr.com/an...DJjMWJmNDc1OGQ/
Hosts
213.246.109.8
213.186.33.171
192.117.12.154
185.92.247.46
81.19.185.200
52.64.39.102
177.12.173.166
184.164.156.210
91.146.109.184
119.59.120.32
192.249.113.43
70.40.220.100
188.65.114.122
66.147.244.66
192.186.200.169
23.235.220.84
54.241.22.111
46.166.163.195
160.153.32.229
205.134.241.120


*** https://www.virustot...sis/1462507119/
___

Fake 'New Payment Received' SPAM - JS malware delivers Dridex
- https://myonlinesecu...elivers-dridex/
6 May 2016 - "Continuing with the overnight Malspam runs is yet another -Dridex- dropper with a long list of sites embedded inside the encrypted JavaScript file. This is an email with the subject of 'New Payment Received' pretending to come from random senders and email addresses with a zip attachment containing an encrypted JavaScript file... One of the  emails looks like:
From: Kathie Miller <MillerKathie8660@ fixed-189-252-187-189-252-125 .iusacell .net>
Date: Fri 06/05/2016 02:01
Subject: New Payment Received
Attachment: caution_rob_522737.zip
    You have just received a new payment! Trans number 97407. For more information please review the transaction report enclosed.


6 May 2016: caution_rob_522737.zip: Extracts to: cash_q9rTBHi225.js - Current Virus total detections 1/56*
.. MALWR** shows a download of Dridex banking Trojan from the same list of sites in THIS[1] post.
1] https://myonlinesecu...elivers-dridex/
.. This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462497274/

** https://malwr.com/an...2JlYjc4NmI1Zjk/
Hosts
213.246.109.8
213.186.33.171
192.117.12.154
185.92.247.46
81.19.185.200
52.64.39.102
177.12.173.166
184.164.156.210
91.146.109.184
119.59.120.32
192.249.113.43
70.40.220.100
188.65.114.122
66.147.244.66
192.186.200.169
23.235.220.84
54.241.22.111
46.166.163.195
160.153.32.229
205.134.241.120

___

Fake '50 transactions' SPAM - JS malware delivers Locky
- https://myonlinesecu...delivers-locky/
6 May 2015 - "An email with the subject of 'Re: ' pretending to come from random senders with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: Helen Velazquez <VelazquezHelen20082@ sas-pt .com>
Date: Fri 06/05/2016 09:46
Subject: Re:
Attachment: spreadsheet_98B.zip
    Good evening driver,
    As promised, I have attached the spreadsheet contains last 50 transaction and your account actual balance.
    Regards,
    Helen Velazquez


6 May 2016: spreadsheet_98B.zip: Extracts to: transactions 11791799.js - Current Virus total detections 23/56*
.. MALWR doesn’t shows any downloads but a manual analysis gives me a download from
 http ://girls.web-planet .su/hs93jaks (VirusTotal 3/55**).. This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1441173827/

** https://www.virustot...sis/1462525419/
TCP connections
185.22.67.108: https://www.virustot...08/information/

girls.web-planet .su: 217.107.34.231: https://www.virustot...31/information/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 06 May 2016 - 06:23 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1714 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 09 May 2016 - 09:41 AM

FYI...

Fake KPN SPAM - CTB-Locker Ransomware
- https://blog.malware...cker-infection/
May 9, 2016 - "... an email claiming to be from KPN – a Dutch provider of internet, television, and phone – claiming an amount so high that it should raise questions or at least your blood pressure. We can safely assume that it is intended to peak the receivers curiosity enough to get them to click-one-of-the-links in the mail:
> https://blog.malware...016/05/mail.png
... The spam template is an exact replica of mail KPN sends out to clients. But the “From” address is “KPN-betaalafspraak[AT]kpn[DOT]com” where real ones should come from... The three links all point to the same web address www2[DOT]uebler-gmbh[DOT]de, which is a site that belongs to a German job coaching firm. We informed them of the fact that their site is being used for this, but haven’t heard back yet. We have also informed the Dutch provider KPN through the normal channels, which probably means we will only get an automated response. Clicking-the-links in the mail will result in the download of a zip file containing a file called “Factuur 00055783-63845853.PDF.exe” showing up with a PDF icon. This is a well-known trick to deceive users that have file extensions set to “Hide extensions for known file types” into thinking that they are about to open a (harmless) document... Double-clicking the file will result in the start of the CTB locker ransomware. It creates a copy of the executable with a different name (here hlbvlli.exe) in the %Temp% folder and the creation of a Scheduled Task that will trigger that copied file every time the compromised system boots... After encryption, users are presented with the below ransom note:
> https://blog.malware...5/CTBlocker.png
... these tricks as ransomware is becoming a bigger and more prevalent threat -every- day..."

www2[DOT]uebler-gmbh[DOT]de: 217.114.79.125: https://www.virustot...25/information/
>> https://www.virustot...7a6db/analysis/
___

Fake 'IMPORTANT TRANSACTION' SPAM - delivers malware
- https://myonlinesecu...sendout-review/
9 May 2016 - "An email that appears to come from Western Union with the subject of 'FWD:IMPORTANT TRANSACTION SENDOUT REVIEW' pretending to come from InternationalOperations@ ababank .com <spil@ tim .spil .co.id> with a zip attachment is another one from the current bot runs which delivers malware...

Screenshot: https://myonlinesecu...UT-1024x533.png

9 May 2016: Sendout-Transaction.zip: Extracts to: -2- identical files GRACE..jar and GRACE. MTCN9863521938- Copy.jar -  Current Virus total detections 21/57*.. MALWR** ... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462811540/

** https://malwr.com/an...mZlN2Q4ZTY3Njk/
___

Locky gets clever
- https://www.fireeye....ets_clever.html
May 9 2016 - "... Locky is aggressively distributed via a JavaScript-based downloader sent as an attachment in spam emails, and may have overshadowed the Dridex banking Trojan as the top spam contributor. FireEye Labs recently observed a new development in the way this ransomware communicates with its control server.  Recent samples of Locky are once again being delivered via “Invoice”-related email campaigns, as seen in Figure 1:
1] https://www.fireeye....y Jain/Fig1.png
 When the user runs the attached JavaScript, the JavaScript will attempt to download and execute the Locky ransomware payload from hxxp :// banketcentr .ru/v8usja. This new Locky variant was observed to be highly evasive in its network communication. It uses both symmetric and asymmetric encryption – unlike previous versions that use custom encoding – to communicate with its control server... Crimeware authors are constantly improving their malware. In this case, we see them evolving to protect their malware while maximizing its infection potential. Locky has moved from using simple encoding to obfuscate its network traffic to a complex encryption algorithm using hardware instructions that are very hard to crack. These types of advancements highlight the importance of remaining vigilant against suspicious emails and using advanced technologies to prevent infections..."

banketcentr .ru: 81.177.141.15: https://www.virustot...15/information/
>> https://www.virustot...97324/analysis/
___

Malvertising Blogspot: Scams, Adult Content and EK's
- https://blog.malware...d-exploit-kits/
May 9, 2016 - "... malvertising can and does target free blogging platforms as well. Just this morning, our friends at Virus Bulletin Martijn Grooten and Adrian Luca wrote about some sites hosted on Google’s Blogspot service pushing tech support scams:
> https://www.virusbul...d-support-scam/
We also caught some malicious activity on the Blogger platform this past week via the PLYmedia ad network. Some Blogspot websites clearly abuse the platform and stuff ads everywhere:
> https://blog.malware...blogger_ads.png
When browsing that Blogspot site, we were automatically -redirected- to an adult page, which is definitely not good if you have kids around:
> https://blog.malware.../05/match99.png
... There were also some -redirections- to the Angler-exploit-kit via -fake- advertisers using the fingerprinting technique:
    Ad network: wafra.adk2x .com/ul_cb/imp?p=70368645&size=300×250&ct=html&ap=1300&u=http%3A%2F%2Fzcdnz.blogspot.com%2F2016%2F04%2Ffut-azteca13.html&r=http%3A%2F%2Fzcdnz.blogspot.com%2F2016%2F04%2Ffut-azteca13.html&iss=0&f=1
    Rogue ad server: advertising.servometer .com/pagead/re136646/ad.jsp?click=%2F%2Fwafra.adk2x.com%2{redacted}
    Google Open Referer: bid.g.doubleclick .net/xbbe/creative/click?r1=http%3A%2F%2Fstewelskoensinkeike.loanreview24.com%2FScKOygTMtj_rlf_qIEgRYCq.aspx
    Angler EK landing: stewelskoensinkeike.loanreview24 .com/?k=pREU&o=gQ1U2eo&f=&t=MHl&b=O83rsW&g=&n=9rYB42&h=&j=aCYeE9iDym_Ao_T25Uhszm
... We have alerted Google about this issue and contacted PLYmedia to let them know about that rogue advertiser."

wafra.adk2x .com: 104.154.33.56
130.211.124.223
104.197.69.2
104.197.148.20
104.197.4.140
146.148.73.59
146.148.57.82
130.211.160.193
146.148.47.149
104.197.27.39
104.154.52.119
130.211.124.66


advertising.servometer .com: 51.255.17.36

stewelskoensinkeike.loanreview24 .com: Could not find an IP address for this domain name.
___

Hooplasearch and nt. hooplasearch .com Ads
- http://www.bleepingc...ooplasearch-ads
May 6, 2016 - "'Hoopla Search' is a browser hijacker program from the Adware.BrowseFox family that hijacks your browser's default search engine and installs addons and extensions that inject advertisements in web pages and search results. 'Hoopla Search' uses these addons or extensions to -inject- advertisements into the search results on search engines such as Google and Yahoo. When the extension is installed, it will also display its own Hoopla Search page instead of your default home page..."
(Removal instructions at the bleepingcomputer URL above.)
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 09 May 2016 - 03:23 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1715 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 10 May 2016 - 05:14 AM

FYI...

Fake 'Draft Receipt' SPAM - malicious doc attachment
- https://myonlinesecu...edraft-receipt/
10 May 2016 - "An email pretending to be a receipt containing terrible spelling or typing mistakes with the subject of 'Re:Draft Receipt' pretending to come from Awad S.Yafie <yinengchem@ yeah .net> with a malicious word doc attachment is another one from the current bot runs...

Screenshot: https://myonlinesecu...pt-1024x614.png

The malicious word doc shows a blurred image that contains an embedded OLE object that will drop and run a file if you are unwise enough to follow their suggestion to double click to see content:
> https://myonlinesecu...ly-1024x535.png

10 May 2016: Draft-MSK-001.docx - Current Virus total detections 15/56*
.. MALWR** which contains an embedded OLE object ..Properly.exe (VirusTotal 21/56***).. MALWR[4]
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1462832094/

** https://malwr.com/an...ThjYjNlOTNmM2I/

*** https://www.virustot...sis/1462830481/

4] https://malwr.com/an...zU0OWIyNjY3ZTU/
___

Fake 'RE: ' SPAM - js malware downloads Locky
- https://myonlinesecu...leads-to-locky/
10 May 2016 - "An email with the subject of 'RE: ' pretending to come from random senders with a zip attachment is another one from the current bot runs... One of the  emails looks like:
From: Therese Slater <SlaterTherese8877@ pldt .net>
Date: Tue 10/05/2016 09:42
Subject: RE:
Attachment: wire_xls_AA8.zip
    hi rob,
    As I promised, the information you requested is attached.
    Regards,
    Therese Slater


10 May 2016: wire_xls_AA8.zip: Extracts to: transactions 30248504.js - Current Virus total detections 5/57*
.. MALWR** shows a download of Locky ransomware from
 http ://jediff .com/fgh7hd (VirusTotal 7/57***) MALWR[4]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462870370/

** https://malwr.com/an...TExODY0ZWI4YzI/
Hosts
160.153.76.133: https://www.virustot...33/information/
>> https://www.virustot...b3f55/analysis/
185.82.202.170: https://www.virustot...70/information/

*** https://www.virustot...sis/1462871373/

4] https://malwr.com/an...WZiZTM4YTYyOTY/
Hosts
193.124.185.87: https://www.virustot...87/information/

jediff .com: 160.153.76.133

- http://blog.dynamoo....cument-you.html
10 May 2016 - "This fairly brief spam has a malicious attachment:
    From:    Alexandra Nunez
    Date:    10 May 2016 at 21:10
    Subject:    Re:
    hi [redacted],
    As promised, the document you requested is attached
    Regards,
    Alexandra Nunez


The name of the sender varies. Attached is a ZIP file with a name export_xls_nnn.zip or wire_xls_nnn.zip (where nnn are random letters and numbers) which contains multiple copies of the same malicious .js file (all apparently beginning urgent). These scripts download slightly different binaries from several locations including:
4hotdeals .com.au/j47sfe
stationerypoint .com.au/cnb3kjd
floranectar .com.au/er5tsd
togopp .com/vbg5gf
printjuce .com/rt5tdf
designitlikeal .com/cvb3ujd
There are probably many more download locations. The typical detection rate for these binaries is about 12/56 [1] [2]... and automated analysis [6] [7]... shows network traffic to:
5.34.183.40 (ITL, Ukraine)
185.82.202.170 (Host Sailor, United Arab Emirates / Romania)
185.14.28.51 (ITL, Netherlands)
92.222.71.26 (OVH, France)
88.214.236.11 (Overoptic Systems, UK / Russia)
The payload is Locky ransomware
Recommended blocklist:
5.34.183.40
185.82.202.170
185.14.28.51
92.222.71.26
88.214.236.11
"
1] https://www.virustot...846ba/analysis/
TCP connections
92.222.71.26

2] https://www.virustot...9c5a5/analysis/
TCP connections
185.82.202.170

6] https://malwr.com/an...jc1N2Q1NjkzZTY/
Hosts
185.82.202.170

7] https://malwr.com/an...zdmMGM0ZTIyZDU/
Hosts
185.14.28.51
___

Fake 'credit card statement' SPAM - malicious attachment leads to Locky
- https://myonlinesecu...to-this-e-mail/
10 May 2016 - "An email with the subject of 'FW: 'pretending to come from random senders with a zip attachment is another one from the current bot runs which downloads what looks like Dridex banking Trojan...

Update: according to Payload Security[6] the dropped malware is Locky...

This set of emails has a zip attachment that extracts to an HTA file which is an Internet explorer specific scripting file wrapped inside a standard HTML file that the browser runs. It probably can run however in Chrome, Firefox and any other browser in use. This HTA file is -obscufated- and encodes a long list of malware URLs inside it... One of the  emails looks like:
From: Roselia Bellgrove <BellgroveRoselia914@ digicable .in>
Date: Tue 10/05/2016 10:05
Subject: FW:
Attachment: bruxner_copy_873488.zip
    Please find your monthly credit card statement attached to this e-mail.
    We would also like to let you know that your negative balance has reached a maximum limit.


10 May2016: bruxner_copy_873488.zip: Extracts to: details_v35xnsfc24.hta - Current Virus total detections 0/57*
.. MALWR** doesn’t show any downloads BUT JSUnpack[3] gives me the list of download locations, some of which are live and some are not responding, giving me 403 errors (VirusTotal 2/57[4]) MALWR[5]...
sky-hero .com/ad.exe - 213.186.33.171
buyemergencylight .com/ad.exe - 192.117.12.154
ribastiendaonline .com/ad.exe - 185.92.247.46
clearancezone .com.au/ad.exe - 184.164.156.210
zanvair .co.uk/ad.exe - 82.165.151.207
myfashionfavourites .com/ad.exe - 185.66.171.8
anustyle .co.uk/ad.exe - 46.30.212.102
metersdirect .com.au/ad.exe - 52.64.39.102
atlfitness .com.br/ad.exe - 179.107.83.250
shopnutri .com.br/ad.exe - 177.12.173.166
homesdreams .com/ad.exe - 188.40.28.173
liftmaxthailand .com/ad.exe - 119.59.120.32
new-exhibitions.heckfordclients .co.uk/ad.exe - 95.142.152.194
airconditioning-outlet .co.uk/ad.exe - 87.106.53.6
shoppingsin .com/ad.exe - 142.4.49.157
magnumautomotivo .com.br/ad.exe - 186.202.153.10
melodyderm .com/ad.exe - 23.235.196.128
metersdirect .com.au:80/ad.exe - 52.64.39.102
outletsmarcas .com/ad.exe - 67.20.76.133
shoesmackers .com/ad.exe - 74.220.207.142
store.pinkupcape .com/ad.exe - 67.231.106.60
vizyt-shop .com/ad.exe - 136.243.204.62
warehousestudiochicago .com/ad.exe - 166.62.10.30
mikronjoalheria .com.br/ad.exe - 162.213.193.150
getdattee .com/ad.exe - 50.63.119.14
videale .com.br/ad.exe  —– 403 error / 186.202.126.233
pgkdistribution .co.uk/ad.exe - 160.153.50.192
aw-store .com/ad.exe - 160.153.33.104
gmdengineering .com.au/ad.exe - 103.38.10.109
lyintl .com/ad.exe - 23.229.242.166
fashionpoppers .com/ad.exe - 66.147.244.66
cenasuniformes .com.br/ad.exe - 200.98.197.36
merlindistribuidora .com.br/ad.exe - 186.202.153.108
.. This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, will look like a DOC or other normal file instead of the .exe/JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462871863/

** https://malwr.com/an...WY4NGRlY2UwYzU/

3] http://jsunpack.jeek...2e81e80a5f0df22

4] https://www.virustot...sis/1462872640/

5] https://malwr.com/an...DQxMWY1NjA2ZDA/

6] https://www.hybrid-a...vironmentId=100
Contacted Hosts
217.12.199.94: https://www.virustot...94/information/
>> https://www.virustot...70ebe/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 10 May 2016 - 03:12 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1716 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 11 May 2016 - 06:14 AM

FYI...

Fake 'Emailing: Photo' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
11 May 2016 - "An email with the subject of 'Emailing: Photo 05-11-2016, 82 95 82' [random numbers] pretending to come from Your-own-email-address with a zip attachment is another one from the current bot runs which downloads Locky Ransomware... One of the  emails looks like:
From: your own email address
Date: Wed 11/05/2016 10:10
Subject: Emailing: Photo 05-11-2016, 82 95 82
Attachment: Photo 05-11-2016, 82 95 82.zip
    Your message is ready to be sent with the following file or link
    attachments:
    Photo 05-11-2016, 82 95 82
    Note: To protect against computer viruses, e-mail programs may prevent
    sending or receiving certain types of file attachments. Check your e-mail
    security settings to determine how attachments are handled.


11 May 2016: Photo 05-11-2016, 82 95 82.zip: Extracts to: Photo 05-11-2016, 42 11 82.js
Current Virus total detections 2/56* | Hybrid analysis** | MALWR*** shows a download of Locky ransomware from
 http ://gesdes .com/87yg7yyb (VirusTotal 5/57[4]) MALWR[5]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC / PDF / JPG or other common file instead of the .EXE / .JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1462957811/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
23.229.156.225
88.214.236.11
5.34.183.40


*** https://malwr.com/an...mI0YTE1M2NhNjQ/
Hosts
23.229.156.225

4] https://www.virustot...sis/1462958159/

5] https://malwr.com/an...WE5MjJhN2NkY2I/

gesdes .com: 23.229.156.225: https://www.virustot...25/information/
>> https://www.virustot...c8232/analysis/

- http://blog.dynamoo....05-11-2016.html
11 May 2016 - "This spam comes with a malicious attachment:
    From:    victim@ victimdomain .tld
    To:    victim@ victimdomain .tld
    Date:    11 May 2016 at 12:39
    Subject:    Emailing: Photo 05-11-2016, 03 26 04
    Your message is ready to be sent with the following file or link
    attachments:
    Photo 05-11-2016, 03 26 04
    Note: To protect against computer viruses, e-mail programs may prevent
    sending or receiving certain types of file attachments.  Check your e-mail
    security settings to determine how attachments are handled.


It appears to come from the sender's own email address, but this is a simple forgery (explained here*). Attached is a ZIP file with a name similar to Photo 05-11-2016, 03 26 04.zip (the numbers in the attachment
match the references in the email). It contains a .js file with a similar name.
* http://blog.dynamoo....yself-spam.html
Trusted third-party analysis (thank you!) shows the various scripts downloading from:
51941656 .de.strato-hosting .eu/87yg7yyb
67.222.43.30 /87yg7yyb
developinghands .com/87yg7yyb
gesdes .com/87yg7yyb
helpcomm .com/87yg7yyb
neihan8 .tk/87yg7yyb
oldtimerfreunde-pfinztal .de/87yg7yyb
otakutamashi .cl/87yg7yyb
sarikamisotelleri .com/87yg7yyb
This drops a file with a detection rate of 3/56*. This is likely to be Locky ransomware, a full analysis is pending. However an earlier Locky campaign today phoned home to:
185.82.202.170 (Host Sailor, United Arab Emirates)
88.214.236.11 (Overoptic Systems, UK / Russia)
5.34.183.40 (ITL, Ukraine)
According to a DeepViz report**, this sample has identical characteristics.
Recommended blocklist:
185.82.202.170
88.214.236.11
5.34.183.40
"
* https://www.virustot...sis/1462969284/

** https://sandbox.deep...85990d77a918a7/
___

Fake 'attached document' SPAM - JS attachment leads to malware
- https://myonlinesecu...delivers-locky/
11 May 2016 - "A series of emails with random subjects pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs... UPDATE: none of the automatic analysers are actually showing Locky, so it might be Dridex... Some of the subjects seen include:
    Re: employees
    Re: paychecks
    Re: other names
    Re: company
    Re: Items
    Re: build assemblies
    Re: transfers
    Re: credit memos
    Re: checks
    Re: estimates
    Re: Chart of Accounts
    Re: receive payments
    Re: credit card charges
    Re: item receipts
    Re: Vendors ...
One of the  emails looks like:
From: Nelda Morton <MortonNelda80048@ static .vnpt.vn>
Date: Wed 11/05/2016 10:34
Subject: Re: employees
Attachment:
    hello [ recipients name]
    You may refer to the attached document for details.
    Regards,
    Nelda Morton


11 May 2016: vendors_0A591E.zip: Extracts to: -3- identical .js files - urgent 802194.js
Current Virus total detections 4/57* | Payload Security** | MALWR*** shows a download of Locky Ransomware from
 http ://compfixuk .co.uk/uy3hds (VirusTotal 11/57[4]) MALWR[/5] | Payload Security[6]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for  a genuine  DOC / PDF / JPG or other common file instead of the .EXE / .JS file it really is, so making it much more likely for you to accidentally open it and be infected..."

* https://www.virustot...sis/1462960440/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
185.14.28.51
88.214.236.11
185.82.202.170


*** https://malwr.com/an...jJmMjE3MWU4YWE/
Hosts
81.201.141.119
92.222.71.26


4] https://www.virustot...sis/1462960706/

5] https://malwr.com/an...WIyMTUyNGFlNmQ/
Hosts
185.14.28.51
88.214.236.11


6] https://www.hybrid-a...vironmentId=100
Contacted Hosts
92.222.71.26

compfixuk .co.uk: 81.201.141.119: https://www.virustot...19/information/
>> https://www.virustot...056fb/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 11 May 2016 - 05:01 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1717 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 May 2016 - 04:12 AM

FYI...

Fake 'application' SPAM - JS malware attachment
- https://myonlinesecu...ur-application/
12 May 2016 - "Another email with the subject of 'FW: ' pretending to come from random senders with a zip attachment is another one from the current bot runs... One of the  emails looks like:
From: Fannie Strickland <StricklandFannie70829@ hostviper .in>
Date: Thu 12/05/2016 00:37
Subject: FW:
Attachment: xerox.device1_copy_885254.zip
    We have reviewed your application #885254 and would like to let you know that some imporant information is missing. Please, review the file attached and complete the highlighted parts to finalize the application process.


12 May 2016: xerox.device1_copy_885254.zip: Extracts to: confirm_bpwmj.js - Current Virus total detections 6/57*
.. MALWR** shows a download from
 http ://panthai .com.br/NtJx6X (VirusTotal 5/57***) MALWR[4] | Payload Security[5]
Other sites found include: http ://festlanddesign .com/qcinTX but it looks like this particular Dridex malspam run drops multiple different file # as well as random file names... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for  a genuine  DOC / PDF / JPG or other common file instead of the .EXE / .JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463028499/

** https://malwr.com/an...DkwMDQ3NzBkYjk/
Hosts
200.98.201.219

*** https://www.virustot...sis/1463012592/

4] https://malwr.com/an...mVhN2JmMzcyNWY/

5] https://www.hybrid-a...vironmentId=100
Contacted Hosts
24.199.222.250
213.192.1.171
188.120.253.193
162.251.84.219


panthai .com.br: 200.98.201.219: https://www.virustot...19/information/
>> https://www.virustot...a6d6e/analysis/

festlanddesign .com: 176.28.36.108: https://www.virustot...08/information/
>> https://www.virustot...63e6b/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 12 May 2016 - 09:33 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1718 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 May 2016 - 09:44 AM

FYI...

Separate 0-day vulns under attack
- http://arstechnica.c...dows-and-flash/
5/10/2016 - "... something that doesn't happen every day: the disclosure of -two- zero-day vulnerabilities, one in the Microsoft operating system[1] and the other in Adobe's Flash Player[2]. The Windows bug is being actively exploited in the wild, making it imperative that users install fixes that Microsoft released today as part of its May Patch Tuesday. Cataloged as CVE-2016-0189*, the security flaw allows attackers to surreptitiously execute malicious code when vulnerable computers visit booby-trapped websites...
* https://web.nvd.nist...d=CVE-2016-0189
Last revised: 05/11/2016 - '... Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site...'
7.6 HIGH
... Separately, Adobe officials warned that a newly discovered Flash** vulnerability also gives attackers the ability to remotely hijack machines. It was first reported by researchers from security firm FireEye, and exploits exist in the wild...
** https://web.nvd.nist...d=CVE-2016-4117
Last revised: 05/13/2016 - '... Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016...'
10.0 HIGH
... in-the-wild attacks reported by Symantec[3]... FireEye published a blog post[4]... that described how attackers managed to infect-more-than-100-organizations in North America using a zero-day vulnerability. The bug, however, was CVE-2016-0167, a privilege escalation flaw that Microsoft fixed*** in -last- month's Patch Tuesday..."
*** https://technet.micr...y/ms16-039.aspx

1] http://technet.micro...lletin/MS16-051
May 10, 2016
https://technet.micr...curity/ms16-053
May 10, 2016 - Applies to:
Windows Server 2008 R2 Service Pack 1
Windows Server 2008 Service Pack 2
Windows Vista Service Pack 2
2] https://helpx.adobe..../apsb16-15.html
May 12, 2016
3] http://www.symantec....cks-south-korea
10 May 2016
4] https://www.fireeye....ment-cards.html
May 11, 2016
___

Tech Support Imposters ...
- https://blog.malware...e-are-they-now/
May 13, 2016 - "... Fraud is still fraud, no matter how long your disclaimer is. Takedowns have been sent, and Malwarebytes will continue to monitor for the next time this group tries again. For more information on what you should know about tech support scammers to defend yourself, please check out the article here."
> https://blog.malware...-support-scams/

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 13 May 2016 - 02:07 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1719 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 May 2016 - 05:25 AM

FYI...

Fake 'Attached Picture' SPAM - attachment leads to malware
- https://myonlinesecu...-email-address/
16 May 2016 - "Another empty-blank-email email with the subject of 'Attached Picture' pretending to come from   copier/scanner/[random numbers] @ your-own-email-address with a zip attachment is another one from the current bot runs which downloads what is likely to be Dridex... One of the  emails looks like:
From: copier [random numbers] @ your own email address
Date: Mon, 16 May 2016 10:05:40
Subject: Attached Picture
Attachment: mandy@ ... _0779_436592056.zip


Body content: Blank/Empty

11 May 2016:       Current Virus total detections 23/56* - MALWR** shows a download of an -unknown- malware from
 http ://www.puertasjoaquin .com/987t5t7g?VOoIYjOJwN=BpMuEo (VirusTotal 2/57***) MALWR[4] | Payload Security[5]
None of the auto analysers are able to give a definite result as to what the malware is. It is more likely to be Dridex banking Trojan rather than Locky ransomware, when this happens... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1441173827/

** https://malwr.com/an...zRkZTNhNDc5MzY/
Hosts
81.88.48.79

 

*** https://www.virustot...sis/1463394033/

4] https://malwr.com/an...DYxODFkMTUyMTE/

5] https://www.hybrid-a...vironmentId=100

puertasjoaquin .com: 81.88.48.79: https://www.virustot...79/information/
>> https://www.virustot...8f547/analysis/
___

Fake 'spreadsheet' SPAM - malicious attachment
- http://blog.dynamoo....ed-revised.html
16 May 2016 - "This spam has a malicious attachment:
    From:    Britney Hart
    Date:    16 May 2016 at 13:15
    Subject:    Re:
    hi [redacted]
    I have attached a revised spreadsheet contains customers. Please check if it's correct
    Regards,
    Britney Hart


Other variations of the body text seen so far:
I have attached a revised spreadsheet contains general journal entries. Please check if it's correct
I have attached a revised spreadsheet contains estimates. Please check if it's correct

Attached is a ZIP file with three identical malicious .js files. The ones I have seen so far download from
fundaciontehuelche .com.ar/897kjht4g34
thetestserver .net/fg45g4g
technobuz .com/876jh5g4g4
There are probably other download locations. Each one downloads a slightly different binary (VirusTotal prognosis [1] [2]..) and automated analysis [5] [6].. shows the malware phoning home to:
188.127.231.124 (SmartApe, Russia)
31.184.197.72 (Petersburg Internet Network, Russia)
92.222.71.26 (RunAbove / OVH, France)
149.202.109.202 (Evgenij Rusachenko aka lite-host.in, Russia / OVH, France)
The payload is Locky ransomware.
Recommended blocklist:
188.127.231.124
31.184.197.72
92.222.71.26
149.202.109.202
"
1] https://www.virustot...sis/1463401158/

2] https://www.virustot...sis/1463401746/

5] https://malwr.com/an...WIzZjIxNjgyYmY/

6] https://malwr.com/an...WFmMDY3MTU5MjY/
___

Fake 'Anti-Fraud' SPAM - delivers Locky ransomware
- https://myonlinesecu...delivers-locky/
16 May 2016 - "An email that pretends to alert you to strange activity on your credit card, with the subject of  'Anti-Fraud System-332571' [random numbered] pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: Mirabel Orton <OrtonMirabel31@ une .net.co>
Date: Mon 16/05/2016 17:10
Subject: Anti-Fraud System-332571
Attachment: bruxner_data_332571.zip
    We have noticed a strange activity. Please, confirm the transaction made from your card and listed in the document attached.


16 May 2016: bruxner_data_332571.zip: Extracts to:  post_scan_rhgzp.js - Current Virus total detections 23/56*
.. MALWR** shows a download of Locky ransomware from
 http ://steeldrill .com.au/Cs0St6.exe (VirusTotal 6/57***) MALWR[4] | Payload Security[/5]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/ PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1441173827/

** https://malwr.com/an...WIxODc0ZjFjY2U/
Hosts
203.143.85.203

*** https://www.virustot...sis/1463415891/

4] https://malwr.com/an...2VlNzM3ZDZkY2E/

5] https://www.hybrid-a...vironmentId=100
Contacted Hosts
217.12.199.151: https://www.virustot...51/information/
>> https://www.virustot...3e18e/analysis/

steeldrill .com.au: 203.143.85.203: https://www.virustot...03/information/
>> https://www.virustot...26b0e/analysis/
___

Fake 'Security report' SPAM - malicious attachment
- https://myonlinesecu...ecurity-report/
16 May 2016 - "An email with the subject of 'Security report' pretending to come from random senders with a zip attachment is another one from the current bot runs... Looks like Locky... One of the  emails looks like:
From: Gwennie Patron <PatronGwennie32083@ babygate .net>
Date: Mon 16/05/2016 18:55
Subject: Security report
Attachment:
    Hello ,due to the technical problems associated with our security system, we kindly ask our customers to review the recent report in order to approve your last transactions. Thanks


16 May 2016: securityx062CBD2.zip: Extracts to: data_xe2q2mizervx.js - Current Virus total detections 2/57*
.. Payload security** shows a download  from one of these 3 locations
  mantisputters .com/s7LUXu.exe | blueoxaladdin .com/pArFOY.exe | produtosvivabem .com.br/51aIMi.exe
(VirusTotal 3/57[3]) MALWR[4] | Payload Security [5]... This is another one of the spoofed icon files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463421357/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
52.4.223.98
65.23.141.248
186.202.59.80


3] https://www.virustot...sis/1463422004/

4] https://malwr.com/an...TlkMmJhZmUyNTc/

5] https://www.hybrid-a...vironmentId=100

mantisputters .com: 52.4.223.98: https://www.virustot...98/information/
>> https://www.virustot...242e0/analysis/

blueoxaladdin .com: 65.23.141.248: https://www.virustot...48/information/
>> https://www.virustot...198f2/analysis/

produtosvivabem .com.br: 186.202.59.80: https://www.virustot...80/information/
___

Lloyds bank - Phish
- https://myonlinesecu...-works-so-well/
16 May 2016 - "... the phishers use domain names that are so believable and the registrars allow them to register the domains...

Screenshot: https://myonlinesecu...sh-1024x786.png

The link in the email goes to http ://bank-update .com/personal/logon/ ... It even has the Lloyds bank icon in url bar. All they needed to do to make it 100% believable was either add a cheap or free SSL certificate or use a padlock symbol as an icon instead of the Lloyds black horse icon:
> https://myonlinesecu...te-1024x588.png
This asks you for your user name & password and then 3 characters from your secret information ( as does the genuine Lloyds bank) then full secret information and phone number, then secret information, phone number and password, then -bounces- you to genuine Lloyds bank site."

bank-update .com: 66.225.198.23: https://www.virustot...23/information/
>> https://www.virustot...fe67b/analysis/
104.128.234.224: https://www.virustot...24/information/
>> https://www.virustot...01bb4/analysis/
___

Capital One - Phish
- https://myonlinesecu...apital-one-360/
16 May 2016 - "... more difficult to detect phishing attempt this time... Many card companies and banks do send PDF files as attachments with credit card statements. Some no doubt will have links to the bank website. Starts with a  Blank email.

Screenshot: https://myonlinesecu...tal_one_pdf.png

The link in the PDF goes to http ://demelos .com.au/classes/commons/config/actionnn.htm which sends you on to  http ://https-secure-capitalone360 .com-myaccount-banking.demelos .com.au/e8ea76f546cb0ea35cc83e95d7ae37eb/  
where you see this webpage and it goes on to atypical phishing page asking for loads of personal & private details that compromise you completely.":
> https://myonlinesecu...sh-1024x656.png

demelos .com.au: 27.121.64.122: https://www.virustot...22/information/
>> https://www.virustot...7858b/analysis/

>> https://www.virustot...20e77/analysis/
___

The Million-Machine 'Clickfraud' Botnet
- http://www.computerw...-computers.html
May 16, 2016 - "... The click-fraud botnet earns its creators money through Google's AdSense for Search program, according to researchers from security firm Bitdefender*. The affiliate program, intended for website owners, allows them to place a Google-powered custom search engine on their websites to generate revenue when users click on ads displayed in the search results... Strategies have changed dramatically in the past few years, with new approaches... this botnet's operators -intercept- Google, Bing, and Yahoo searches performed by users on their own computers and replace the legitimate results with those generated by their custom search engine. They do this using a malware program that Bitdefender products detect as Redirector.Paco. Since mid-September 2014, Redirector.Paco has infected more than 900,000 computers worldwide, mainly from India, Malaysia, Greece, the U.S., Italy, Pakistan, Brazil, and Algeria, the Bitdefender researchers said in a blog post Monday*..."
* https://labs.bitdefe...ckfraud-botnet/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 16 May 2016 - 02:51 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1720 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 17 May 2016 - 06:27 AM

FYI...

Fake Multiple subjects SPAM - attachments delivering Locky ransomware
- https://myonlinesecu...cky-ransomware/
17 May 2016 - "... Locky ransomware emails overnight with varying subjects all pretending to come from random senders with either zip attachments or word doc macro attachments... Some of the subjects seen include:
    Your .pdf document is attached
    Re:
    Hedy Castaneda
    Dara Keith

The word doc ones have a subject that matches the alleged sender. One of the  emails with a word doc attachment looks like:
From: Dara Keith <admin@ hk-mst .com>
Date: Tue 17/05/2016 04:49
Subject: Dara Keith
Attachment: 706-d4390-lncnvy.dotm
    Hello
    Please find the report attached to this message. The Payment should appear in 1-2 days.  
    Dara Keith

Alternative body content
    Please review the report attached to this email. The Transfer will be posted within one day.  
    Best regards


17 May 2016: 706-d4390-lncnvy.dotm - Current Virus total detections 2/57* 2/56[1] 2/57[2].. MALWR [a] [b1].. doesn’t show any downloads. It is likely that the download sites will match the other Locky downloaders using zip attachments. I am waiting for full analysis...
Update: finally got an analysis from Payload security[7] of 1 of the word doc files which shows a download from
 xlstrategy .com/ch.jpg?Ux=43 which is a genuine jpg, however the jpg contains malware -embedded- inside it, which is extracted via the malicious-macro and a VBS file that the macro creates (VirusTotal 4/57[8]). This actually is Dridex banking trojan not Locky.
7] https://www.hybrid-a...vironmentId=100
Contacted Hosts
107.180.20.71: https://www.virustot...71/information/
>> https://www.virustot...45ac2/analysis/

8] https://www.virustot...sis/1463492903/

* https://www.virustot...sis/1463461891/

1] https://www.virustot...sis/1463467476/

2] https://www.virustot...sis/1463467521/

a] https://malwr.com/an...jE1M2UxMTAyOWY/

b1] https://malwr.com/an...mFlNDc3OWM2ZDQ/

One of the  emails with a zip  attachment looks like:
From: Your own email address
Date: Tue 17/05/2016 01:38
Subject: Your .pdf document is attached
Attachment: D948699.zip


Body content: Blank/Empty email body

17 May 2016: D948699.zip: extracts to 20160516_38064087_27108995.js - Current Virus total detections 9/57[3]
.. downloads from hrlpk .com/7834hnf34?XrkJSbPOxS=klrLzHBbOX (VirusTotal 11/56[4])
3] https://www.virustot...sis/1463459479/

4] https://www.virustot...sis/1463457732/
TCP connections
217.12.199.151: https://www.virustot...51/information/

hrlpk .com: 203.124.43.226: https://www.virustot...26/information/
>> https://www.virustot...33020/analysis/

Another one of the emails with a zip attachment looks like:
From: Ryan Solomon <SolomonRyan332@ cparsons .net>
Date: Tue 17/05/2016 01:42
Subject: Re:
Attachment: sales orders_BEA6B3A2.zip
    hi vbygry
    Please refer to the attached document contains sales orders
    Let me know if it’s correct
    Regards,
    Ryan Solomon


17 May 2016: sales orders_BEA6B3A2.zip: extracts to history 8426558.js - Current Virus total detections 6/57[5]
.. downloads from http ://fundacionbraun .com/gh567jj56 (VirusTotal 11/57[6]) The zip attachment here contains 3 identical copies of the .js file all padded with loads of //// to confuse analysis and make them look much bigger than they are...
5] https://www.virustot...sis/1463462139/

6] https://www.virustot...sis/1463447956/
TCP connections
188.127.231.124: https://www.virustot...24/information/

fundacionbraun .com: 209.126.254.163: https://www.virustot...63/information/
>> https://www.virustot...b5ac4/analysis/

This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
___

Fake 'car booking' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
17 May 2016 - "... an email with the subject of 'FW: ' pretending to be a notification of a car booking and also pretending  to come from random senders with a zip attachment containing a nemucod javascript downloader is also another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: Jo-Ann Crowe <CroweJo-Ann0223@ londonrelax .co.uk>
Date: Tue 17/05/2016 07:54
Subject: FW:
Attachment: copy-20160517122213.zip
    Thank you for booking you car with us, we hope you enjoy our service. Rental agreement is enclosed to this e-mail. 


17 May 2016: copy-20160517122213.zip: Extracts to: data_vevbypapxx.js - Current Virus total detections 4/57*
.. MALWR** shows a download of Locky ransomware from
 http ://myfloralkart .com/MwtBk1.exe (VirusTotal 21/56***).... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463468058/

** https://malwr.com/an...jQ5MDc4NWY4ZmM/
Hosts
198.57.205.1: https://www.virustot....1/information/
128.199.120.158
176.58.99.126: https://www.virustot...26/information/

*** https://www.virustot...sis/1463463109/

myfloralkart .com: 128.199.120.158: https://www.virustot...58/information/
>> https://www.virustot...feb16/analysis/
___

Fake 'contract' SPAM - downloads Locky
- https://myonlinesecu...ntract-with-us/
17 May 2016 - "... email with the subject of 'FW: ' pretending to come from random senders with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: Susann Faitele <FaiteleSusann335@ webtravelmarket .com>
Date: Tue 17/05/2016 11:34
Subject: FW:
Attachment: security-20160517160422.zip
    Thanks for choosing our company and signing a contract with us, we’re sending you a copy as promised.


17 May 2016: security-20160517160422.zip: Extracts to -2- different files data_veivommzha.js
  Current Virus total detections 4/57* and archive_doctomjjz.js (VirusTotal 4/56**) - MALWR [1] [2] shows a download of  Locky ransomware from one of these sites (VirusTotal 4/56[3])
   http ://soco-care .be/zcHRd8.exe
   http ://delicadinha .com.br/MSr7Uy.exe
   http ://pro.monbento .com/8Uya5I.exe
This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463481488/

** https://www.virustot...sis/1463481291/

1] https://malwr.com/an...WQ4MTIyN2Q0Y2Y/
Hosts
201.94.232.185: https://www.virustot...85/information/
>> https://www.virustot...fe960/analysis/
79.174.131.11: https://www.virustot...11/information/
>> https://www.virustot...91bd0/analysis/
188.165.125.141: https://www.virustot...41/information/
>> https://www.virustot...f09b0/analysis/

2] https://malwr.com/an...zVhMmQ4NDJmYjg/
Hosts
201.94.232.185
79.174.131.11
188.165.125.141


3] https://www.virustot...sis/1463485442/
___

Fake 'Per E-Mail' SPAM - malicious attachment is Locky ransomware
- http://blog.dynamoo....ail-senden.html
17 May 2016 - "This German-language -spam- comes with a malicious attachment. It appears to come from the victim themselves, but this is just a simple-forgery.
    From: victim@ victimdomain .tld
    Date:    17 May 2016 at 13:28
    Subject:    Per E-Mail senden: DOC0000329040
    Folgende Dateien oder Links können jetzt als Anlage mit Ihrer Nachricht
    gesendet werden:
    DOC0000329040


Attached is a ZIP file that matches the reference number in the subject and body text. I have only seen one sample, downloading a binary from:
katyco .net/0uh8nb7
The VirusTotal detection rate is 4/57*, the comments in that report indicate that this is Locky ransomware and the C&C servers are at:
188.127.231.124 (SmartApe, Russia)
176.53.21.105 (Radore Veri Merkezi Hizmetleri, Turkey)
217.12.199.151 (ITL, Ukraine)
107.181.174.15 (Total Server Solutions, US)
Recommended blocklist:
188.127.231.124
176.53.21.105
217.12.199.151
107.181.174.15
"
* https://www.virustot...065d5/analysis/
Comments:
> https://myonlinesecu...delivers-locky/
17 May 2016
>> https://malwr.com/an...TU2NjViZDNhM2Q/
Hosts
203.162.53.112: https://www.virustot...12/information/

katyco .net: 203.162.53.112
___

Fake 'BILL' SPAM - downloads Locky
- https://myonlinesecu...e-mills-co-ltd/
17 May 2016 - "An email with the subject of 'BILL' pretending to come from Store-Nellimarla Jute Mills Co Ltd. <yfstore857@ slsenterprise .com> with a malicious Excel XLS spreadsheet attachment is another one from the current bot runs downloading Locky... The email looks like:
From: . <yfstore857@ slsenterprise .com>
Date:
Subject: BILL
Attachment:
    Sir,
     Please find the attached file.


17 May 2016: Bill_481575758.xls - Current Virus total detections 6/57*
.. MALWR** shows a download from
 http ://seahawkexports .com/89yg67no (VirusTotal ***).. DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1463496996/

** https://malwr.com/an...zk0MGFkYzk4MjE/
Hosts
43.242.215.197: https://www.virustot...97/information/
>> https://www.virustot...46167/analysis/

*** https://www.virustot...sis/1463500609/

seahawkexports .com: 43.242.215.197
___

Tech Support Scammers - 'Screen Lockers'
- https://blog.malware...screen-lockers/
May 17, 2016 - "... -bogus- browser locks and -fake- AV alerts which are mostly an annoyance and can somewhat easily be disabled... But things have been changing with more serious malware-like techniques to force people into calling rogue tech support call centres. We previously saw a case of fake Blue Screen Of Death (BSOD) actually locking-up people’s desktops and now there is a growing demand for such ‘products’. Below is a Facebook post advertising a 'locker' specifically designed for tech support scams. It tricks users into thinking their Windows license has expired and blocks them from using their computer:
> https://blog.malware.../FB_posting.png
To be clear, this is -not- a fake browser pop up that can easily be terminated by killing the application or restarting the PC. No, this is essentially a piece of malware that starts automatically, and typical Alt+F4 or Windows key tricks will -not- get rid of it. There is an entire ecosystem to distribute these tech support lockers, which includes bundling them into affiliate (Pay Per Install) applications. What you -thought- was a PC optimizer or Flash-Player-update turns out to be a bunch of useless toolbars and, in some cases, one of these lockers. Another reason yet, if there weren’t enough already to -stay-away- from-adware-supported-programs... This is a -fake- Windows update but the average user will probably not see the difference. More troubling is the next screen that comes up and effectively -disables-the-computer- because of an expired license key. The message looks legitimate with the license key and computer name being retrieved from the victim’s actual computer:
> https://blog.malware...2016/05/key.png
The only recourse it seems is to call the toll-free number for assistance. As you can imagine, these fake Windows programs are great leads for tech support call centres waiting to collect the credit card numbers of unsuspecting users. We called the number (1-844-872-8686) provided on the locked screen and after much back and forth, the technician revealed a hidden functionality to this locker... However, the rogue ‘Microsoft technician’ would not proceed any further until we paid the $250 fee to unlock the computer, which we weren’t going to... these Windows lockers are a real pain to get rid of and until you do so, your computer is completely unusable. Just in the past few days we have noticed more and more users complaining about these new lockers. This increased sophistication means that people can no longer simply rely on common sense or avoid the typical cold calls from ‘Microsoft’. Now they need to also have their machines protected from these attacks because scammers have already started manufacturing malware tailored for what is essentially plain and simple extortion over the phone..."
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 17 May 2016 - 11:27 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#1721 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 18 May 2016 - 06:15 AM

FYI...

Fake 'DOC' SPAM - JS malware
- https://myonlinesecu...-email-address/
18 May 2015 - "Another email with the subject of 'Emailing: DOC 05-18-2016, 04 49 68' [random numbered] pretending to come from  your own email address with a zip attachment is another one from the current bot runs... slightly different subjects all with random numbers after the date
    Emailing: Picture 05-18-2016, 34 57 55
    Emailing: DOC 05-18-2016, 04 49 68
    Emailing: Image 05-18-2016, 12 20 14
    Emailing: photo 05-18-2016, 60 93 51

... One of the  emails looks like:
From: Your own email address
Date: Wed 18/05/2016 11:31
Subject: Emailing: DOC 05-18-2016, 04 49 68
Attachment: DOC 05-18-2016, 04 49 68.zip
    Your message is ready to be sent with the following file or link
    attachments:
    DOC 05-18-2016, 04 49 68
    Note: To protect against computer viruses, e-mail programs may prevent
    sending or receiving certain types of file attachments. Check your e-mail
    security settings to determine how attachments are handled.


18 May 2016: DOC 05-18-2016, 04 49 68.zip: Extracts to: HWC4703756.js - Current Virus total detections 6/57*
.. MALWR** shows a download from feedconsumer.upfrontjournal .com/erg54g4?ooGXPymBM=fNULIh (VirusTotal 3/56***)
  Payload security[4] shows this downloads a further file from diolrilk .at/files/cyAOiY.exe (virustotal 1/57[5])
 which makes this more likely to be Dridex banking Trojan rather than a ransomware version... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine  DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463568343/

** https://malwr.com/an...WI1NzVlYzBhYmQ/
Hosts
173.236.177.29: https://www.virustot...29/information/

*** https://www.virustot...sis/1463567581/
TCP connections
109.235.139.64: https://www.virustot...64/information/
31.8.133.98: https://www.virustot...98/information/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
109.235.139.64: https://www.virustot...64/information/
5.105.221.126: https://www.virustot...26/information/

5] https://www.virustot...sis/1463569252/
___

Fake 'Invoice' SPAM - JS malware drops Dridex
- https://myonlinesecu...5-drops-dridex/
18 May 2016 - "An email with the subject of 'Invoice 1723-812595' [random numbered] pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs which contains what looks like the embedded Dridex binary inside the 274 kb .JS file in a base 64 encoded section... One of the  emails looks like:
From: Vasquez.Jaspero@ hcrltd .com.br
Date: Wed 18/05/2016 11:54
Subject: Invoice 1723-812595
Attachment: Invoice 1723-812595.zip
    Hi,
    Please find attached copy of invoice SN04359806 as requested. I would be grateful if you could reply to this email to ensure I have sent it to the correct address.
    Kind Regards, Jasper Vasquez


18 May 2016: Invoice 1723-812595.zip: Extracts to: invoice_6126.js - Current Virus total detections 1/57*
.. MALWR** shows no downloads but shows the dropped bin file in base64 encoding (VirusTotal 3/57***)
.. Payload security[4] gives some more information, but not much... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463569142/

** https://malwr.com/an...TUzM2MzZjU2Nzk/

*** https://www.virustot...sis/1463570330/

4] https://www.hybrid-a...vironmentId=100
___

Fake 'DHL shipment' SPAM - doc malware
- https://myonlinesecu...mation-re-send/
18 May 2016 - "An email with the subject of 'shipment address confirmation (re-send)' pretending to come from info <info@ dhl-services .com> with a zip attachment that extracts to a  malicious word doc is another one from the current bot runs... The email looks like:
From: info <info@ dhl-services .com>
Date: Wed 18/05/2016 14:25
Subject: shipment address confirmation (re-send)
Attachment: dhl shipment #000516.zip
    Dear all
    After reviewing your shipment BL container number; we need to confirm, did your company change shipment address? If yes, attach you can find the information to re-confirm your shipment address.
    We require your quick confirmation and reply to this development
    Regards.
    Alice M. York,
    5/17/2016
    Oversea Frieght Information Manager,
    WorldWide Delivery Services DHL ...


18 May 2016: dhl shipment #000516.zip: extracts to shipment details.doc - Current Virus total detections 12/55*
.. MALWR** didn’t show any download but a manual analysis showed a download from
 http ://revery.5gbfree .com/rollas/wanfile.exe which is saved to %APPDATA%\flash.exe and autorun (VirusTotal 8/57***)
 MALWR[4].. DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1463526808/

** https://malwr.com/an...zFlZjBkMWFmNjY/

*** https://www.virustot...sis/1463526879/

4] https://malwr.com/an...WI1MTg3MzM2YTI/
Hosts
23.94.151.38: https://www.virustot...38/information/

revery.5gbfree .com: 209.90.88.138: https://www.virustot...38/information/
>> https://www.virustot...6265d/analysis/
___

Fake 'Remittance Advice' SPAM - doc malware
- https://myonlinesecu...ded-ole-object/
18 May 2016 - "An email with the subject of 'Remittance Advice' pretending to come from random senders and email addresses with a malicious word doc attachment is another one from the current bot runs... The email looks like:
From: Diana Raveche <Diana@ lappgroup .com>
Date: Tue 17/05/2016 15:33
Subject: Remittance Advice
Attachment: 59350_Copy_PS13149_(1).docx
    Dear Sirs,
    Please find attached remittance advice(s) for reconciliation.
    Should you have any queries, kindly contact the address below
    Best regards
    Daniel  Sefah
    Treasurer
    Manganese Company Limited


18 May 2016: 59350_Copy_PS13149_(1).docx - Current Virus total detections 16/56*
.. MALWR** contains an embedded OLE object that when extracted gives 'Double Click on file to view clear Swift' copy.exe (VirusTotal 14/56***) MALWR[4] which shows a connection to
 http ://cf34064.tmweb .ru/cgi-bin/eke/gate.php which gave a 404 when I tried, which might mean it has been taken down or it insists on a referrer from the actual word doc or the extracted malware which several antiviruses detect as a fareit password stealer Trojan. Payload security doesn’t give much more useful info either...
> https://myonlinesecu...py-1024x549.png
... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1463574035/

** https://malwr.com/an...GQ3YTlhNGNhMjc/

*** https://www.virustot...sis/1463574066/

4] https://malwr.com/an...TE2MDUwMzIzZjM/
Hosts
92.53.118.64: https://www.virustot...10/information/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 18 May 2016 - 01:42 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1722 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 19 May 2016 - 05:47 AM

FYI...

Fake 'Thank you' SPAM - JS malware attachment
- https://myonlinesecu...ndom-companies/
19 May 2016 - "An email with the subject of 'Thank you!' pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs which downloads some unknown malware... One of the  emails looks like:
From: Stevie Fry <FryStevie3913@ divtec .ch>
Date:  Thu 19/05/2016 10:49
Subject: Thank you!
Attachment: webmaster_order_04FDEC03.zip
    Hello webmaster,
    Please find enclosed invoice no. 871824
    Thank you for your order.
    We look forward to doing business with you again.
    Regards,
    Stevie Fry
    Pioneer Natural Resources Company


19 May 2016: webmaster_order_04FDEC03.zip: Extracts to: -4- identical copies of history_048.js
Current Virus total detections 6/56*. MALWR** shows a download from
 http ://dub3tv .com/2e22dfs (VirusTotal 2/56***). Payload Security[4] | Malwr[5]. Nothing so far is actually telling us what the payload is, but it is likely to be either Locky or Dridex... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine  DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463654399/

** https://malwr.com/an...Tk4MWVhYmRmNWU/
Hosts
184.168.107.21: https://www.virustot...21/information/

*** https://www.virustot...sis/1463654794/

4] https://www.hybrid-a...vironmentId=100

5] https://malwr.com/an...TkxYTc5MGU1ZjU/
___

Fake 'WhatsApp' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
19 May 2016 - "An email with the subject of 'You got a voice message!' pretending to come from WhatsApp <Cleo477@ gmx .de> with a zip attachment is another one from the current bot runs which downloads Locky Ransomware...

Screenshot: https://myonlinesecu...ge-1024x522.png

19 May 2016: MSG0002959373787821.wav.zip: Extracts to: MSG00033066464574474.wav.js
Current Virus total detections 8/56*. MALWR** shows a download of Locky from
  http ://denzil .com.au/grh5444tg?WKInfNTzzF=VQkztyPupI (VirusTotal 4/56***)... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine WAV/DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463652406/

** https://malwr.com/an...DNmMmNiMzVlMmY/
Hosts
223.130.27.201
89.108.84.155
92.63.87.48


*** https://www.virustot...sis/1463653169/
TCP connections
92.63.87.48: https://www.virustot...48/information/

denzil .com.au: 223.130.27.201: https://www.virustot...01/information/
>> https://www.virustot...571b5/analysis/
___

Fake 'Scanned image' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
19 May 2016 - "Another email pretending to come from your-own-email-domain with the subject of 'Scanned image' pretending to come from admin <southlandsxxxx@ victimdomain .tld> with a zip (rar) attachment is another one from the current bot runs which downloads Locky Ransomware... One of the  emails looks like:
From: admin <southlandsxxxx@ victimdomain .tld>
Date: Thu 19/05/2016 19:52
Subject: Scanned image
Attachment: MSG00087072.rar
    Image data in PDF format has been attached to this email.


19 May 2016: MSG00087072.rar: Extracts to: MSG0004219280705535.js - Current Virus total detections 9/57*
.. MALWR** shows a download of Locky ransomware from
 freesource .su/437gfinw2 (VirusTotal 3/56***)
Other sites found include:
freesource .su/437gfinw2 - 136.243.176.66
der-werbemarkt .de/437gfinw2 - 85.158.182.96
criticalcontactinfo .com/437gfinw2 - 192.73.242.42
empiredeckandfence .com/437gfinw2 - 192.185.225.43
... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463686171/

** https://malwr.com/an...GEzMzQyMDYwYjU/
Hosts
92.63.87.48

*** https://www.virustot...sis/1463684566/
TCP connections
92.63.87.48: https://www.virustot...48/information/

freesource .su: 136.243.176.66: https://www.virustot...66/information/
>> https://www.virustot...d14ab/analysis/
der-werbemarkt .de: 85.158.182.96: https://www.virustot...96/information/

criticalcontactinfo .com: 192.73.242.42: https://www.virustot...42/information/

empiredeckandfence .com: 192.185.225.43: https://www.virustot...43/information/
___

White hats bake TeslaCrypt master key into universal decryptor
Ransomware authors appear to have given up...
- http://www.theregist...rsal_decryptor/
19 May 2016 - "The authors of the TeslaCrypt ransomware have handed over their master keys in what appears to be a decision to kill off the net menace. An Eset researcher noticed the gradual decline of TeslaCrypt and, posing as a victim, asked the malware authors for a key. The authors surprisingly offered a free master key and the security wonk quickly produced a free universal decryption tool*. It means victims of two of the worst ransomware tools can decrypt their files for free, with Kaspersky white hats producing a decryption tool yesterday** for the Cryptxxx malware..."
* http://download.eset...ptDecryptor.exe

** http://www.theregist...txxx_decrypted/

- http://support.eset.com/kb6051/
Last Revised: May 19, 2016

Identify the ransomware you’re dealing with...
> https://id-ransomwar...m.com/index.php
"This service currently detects 87 different ransomwares..."
Updated 05/19/2016

> http://www.bleepingc...decryption-key/
May 18, 2016
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 19 May 2016 - 03:53 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1723 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 May 2016 - 06:21 AM

FYI...

Fake 'refund' SPAM - leads to Locky
- http://blog.dynamoo....ow-up-with.html
20 May 2016 - "This spam comes from random senders and has a malicious attachment. Here is an example:
    From:    Frederic Spears
    Date:    20 May 2016 at 10:29
    Subject:    Re:
    Hi [redacted],
    I wanted to follow up with you about your refund.
    Please find the attached document
    Regards,
    Frederic Spears
    CBS Corporation


The company name and sender's name varies from message to message. Attached is a ZIP file which contains elements of the recipient's name, which in turn contains one of a variety of malicious scripts. Out of the samples I have seen, I have so far found download locations of:
delicious-doughnuts .net/oqpkvlam
dev.hartis .org/asvfqh2vn
dugoutdad .com/0ygubbvvm
craftbeerventures .nl/hgyf46sx
babamal .com/av2qavqwv
forshawssalads .co.uk/af1fcqav
Only three of those download locations work so far (VirusTotal results [1] [2]..) and automated analysis of those [4] [5].. shows behaviour consistent with Locky ransomware. All of those reports show the malware phoning home to:
91.219.29.106 (FLP Kochenov Aleksej Vladislavovich / uadomen.com, Ukraine)
51.254.240.89 (Relink LLC, Russia / OVH, France)
138.201.118.102 (Hetzner, Germany)
Recommended blocklist:
91.219.29.106
51.254.240.89
138.201.118.102
"
1] https://virustotal.c...sis/1463737477/
TCP connections
91.219.29.106

2] https://virustotal.c...sis/1463738300/
TCP connections
91.219.29.106

4] https://malwr.com/an...2E5MDNjNDEyZGQ/
Hosts
138.201.118.102

5] https://malwr.com/an...DNkODA2N2U1MDk/
Hosts
138.201.118.102

- https://myonlinesecu...leads-to-locky/
20 May 2016 - "Another email in the long line of nemucod JavaScript downloaders with the subject of 'Re: ' pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: I wanted to follow up with you about your refund
Date: Fri 20/05/2016 10:24
Subject: Re:
Attachment: rob_refund_947CDB34.zip
    Hi rob,
    I wanted to follow up with you about your refund.
    Please find the attached document
    Regards,
    Inez Castro
    Workday, Inc.


20 May 2016: rob_refund_947CDB34.zip: Extracts to: history.6725.js.js - Current Virus total detections 5/57*
 downloads from http ://carseatcoverwarehouse .com.au/zzvmvae (VirusTotal 6/57**). Payload Security***
Some other sites found include:
 http ://delicious-doughnuts .net/oqpkvlam – currently 404 for me
 http ://carseatcoverwarehouse .com.au/zzvmvae
 http ://dev.hartis .org/asvfqh2vn
 http ://honeystays .co.za/sajaafafa
 http ://dvphysio .com.au/g0bpicjhbv
... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463736198/

** https://www.virustot...sis/1463736629/
TCP connections
51.254.240.89

*** https://www.hybrid-a...vironmentId=100
Contacted Hosts
192.185.198.215
92.63.87.48
51.254.240.89


delicious-doughnuts .net - 213.160.76.117: https://www.virustot...17/information/
>> https://www.virustot...746aa/analysis/
carseatcoverwarehouse .com.au - 192.185.198.215: https://www.virustot...15/information/
>> https://www.virustot...4b119/analysis/
dev.hartis .org - 212.1.214.102: https://www.virustot...02/information/
>> https://www.virustot...b94ba/analysis/
honeystays .co.za - 188.40.0.214: https://www.virustot...14/information/
>> https://www.virustot...7b905/analysis/
dvphysio .com.au - 192.185.182.18: https://www.virustot...18/information/
>> https://www.virustot...006f9/analysis/
___

Ubiquiti AirOS routers hit with worm
- https://www.helpnets...-backdoor-worm/
May 20, 2016 - "A worm targeting wireless network equipment developed by US-based Ubiquity Networks has already managed to compromise thousands of routers across the world. To spread it, whoever is behind these attacks is exploiting an old bug* in airOS, the firmware that runs on the company’s networking devices... According to Symantec researchers**, once it leverages the exploit, the worm copies itself on the device and creates a backdoor account... Ubiquity has provided a list of devices/firmware versions that are safe from the exploit, and has advised users of others to update their firmware. They have also provided a removal tool[3] for the worm, which also has the option to upgrade firmware to the latest version (5.6.5)."
* https://community.ub...ed/ba-p/1300494

** http://www.symantec....it-worm-attacks

3] https://community.ub...se/ba-p/1565949
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 20 May 2016 - 11:18 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1724 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 May 2016 - 04:52 AM

FYI...

Fake 'invoice' SPAM - leads to Locky
- https://myonlinesecu...leads-to-locky/
23 May 2016 - "... an email with the subject of 'Re: ' pretending to come from random senders and email addresses with a zip attachment is another one which downloads Locky ransomware... One of the  emails looks like:
From: Elizabeth Simpson <SimpsonElizabeth4937@ anapest .com>
Date: Mon 23/05/2016 09:15
Subject: Re:
Attachment: copy_invoice_17DF6BE6.zip
    Hi jipy,
    Please find attached the file we spoke about yesterday.
    Thank you,
    Elizabeth Simpson
    Deutsche Bank AG


23 May 2016: copy_invoice_17DF6BE6.zip: Extracts to: history.8519.js.js.js - Current Virus total detections 1/57*
 MALWR** shows a download of Locky from
 http ://stylelk .com/12opjwfh (VirusTotal 0/56***). MALWR[4] which is -altered- by the javascript to create
 gCBkMdFX463HMBEP.exe (VT 5/57[5]). MALWR [6]. Manual analysis shows also alternative download locations from
 maibey .com/bakcy9s (VT 0/56[7]), bekith .com/twe4puv (VT 0/55[8])... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE / .JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1463991056/

** https://malwr.com/an...zdlMmI2ZjE0NWI/
Hosts
160.153.71.230
31.41.44.45
92.63.87.53
176.31.47.100
188.166.168.250
178.63.238.188


*** https://www.virustot...sis/1463992536/

4] https://malwr.com/an...Dc0OGUyMjAzNjY/

5] https://www.virustot...sis/1463993646/
TCP connections
92.63.87.53
31.41.44.45
188.166.168.250
176.31.47.100
178.63.238.188


6] https://malwr.com/an...mVkZDZmNWQ3YmE/
Hosts
188.166.168.250
176.31.47.100
92.63.87.53
31.41.44.45
178.63.238.188


7] https://www.virustot...sis/1463991121/

8] https://www.virustot...sis/1463992820/

- http://blog.dynamoo....ached-file.html
23 May 2016 - "This spam appears to come from random senders, and leads to Locky ransomware:
    From:    Graham Roman
    Date:    23 May 2016 at 11:59
    Subject:    Re:
    Hi [redacted]
    Please find attached the file we spoke about yesterday.
    Thank you,
    Graham Roman
    PCM, Inc.


Attached is a ZIP file starting with copy_invoice_ and then a random sequence. This contains a malicious script file which in the sample I analysed downloads an obfuscated binary from:
oakidea .com/by2eezw8
islandflavaja .com/0p1nz
dragqueenwig .com/itukabk
Automated analysis of the script [1] [2] shows it dropping a file klA1KMQj2D.exe which has a VirusTotal detection rate of 5/56*. Those prior reports plus these additional analyses of the binary [3] [4] [5] show network traffic to:
188.166.168.250 (Digital Ocean, UK)
31.41.44.45 (Relink Ltd, Russia)
92.63.87.53 (MWTV, Latvia)
Those reports all demonstrate clearly that this is Locky ransomware, although the barely encrypted downloaded binaries are a -new- feature.  Those prior reports plus these additional analyses of the binary [3] [4] [5] show network traffic to:
188.166.168.250 (Digital Ocean, UK)
31.41.44.45 (Relink Ltd, Russia)
92.63.87.53 (MWTV, Latvia) ...
UPDATE: Trusted third-party analysis (thank you) shows some additional download locations...
... One additional C2 server:
176.31.47.100 (Unihost, Seychelles / OVH , France)
Recommended blocklist:
188.166.168.250
31.41.44.45
92.63.87.53
176.31.47.100
"
1] https://malwr.com/an...WM0NDA0YzY4Nzg/
Hosts
216.70.68.223
92.63.87.53


2] https://www.hybrid-a...vironmentId=100
Contacted Hosts
188.166.168.250

* https://virustotal.c...sis/1464002438/
TCP connections
188.166.168.250

3] https://sandbox.deep...a69742244b5890/

4] https://malwr.com/an...jIzNTgyZWMwZWU/
Hosts
188.166.168.250

5] https://www.hybrid-a...vironmentId=100
Contacted Hosts
31.41.44.45
188.166.168.250

___

Fake 'bank account deleted' SPAM - malicious attachment
- http://blog.dynamoo....t-has-been.html
23 May 2016 - "This alarming looking spam has a malicious attachment:
    From:    Bradyrian Hassell
    Date:    23 May 2016 at 14:00
    Subject:    Account Deleted
    Your bank account has been deleted, more information attached.


I have only seen a single copy of this and the ZIP file attached was corrupt, however, it is very likely that this is a variant of the Locky ransomware run from earlier today*."
* http://blog.dynamoo....ached-file.html
___

DMA Locker 4.0 – Known Ransomware preps for Massive Distribution
- https://blog.malware...e-distribution/
23 May 2016 - "... Behavioral analysis: In contrast to the previous versions, DMA Locker 4.0 cannot encrypt files offline. It needs to download the public RSA key from its C&C. That’s why, if the file has been opened on the computer without the internet connection, it will just install itself and wait. If the machine is connected – it runs silently until it finish encrypting the files. This time DMA Locker comes with a deception layer added – packed sample have an icon pretending a PDF document:
> https://blog.malware...016/05/icon.png
... After it finishes the encryption process, a red window, similar to the one known form the previous editions pops up:
> https://blog.malware...05/dma_gui4.png
... The recently observed changes suggest that the product is preparing to be distributed on a massive scale. Few important things got automated. Distribution is now exploit kit based – that makes it reach much more targets..."
(More detail at the malwarebytes URL above.)
___

Tech Support Scammers using Winlogon
- https://blog.malware...using-winlogon/
May 23, 2016 - "... Tech Support Scammers are using every trick in the malware-authors-book to get new 'customers'. Here is one that takes over the victims’ Windows system after a reboot by using the Winlogon-Shell registry value... This makes sure that the user gets access to his Taskbar and Desktop (among other things). It can be changed by so-called skins or replacement shells with the users’ consent, but in this case it was done -without- consent... This resulted in this screen after the user logged on:
> https://blog.malware...5/TSSscreen.png
... The installer is a file called 'Hotstar.exe' and was submitted to us by a fellow researcher. We suspect the file was hosted on the site amiga[dot]tech, because of two reasons. The installer opens two browser windows and one of those -queries- that site. The other one opens up exetracking.weebly .com, a site that can be used to keep track of the number of installs, but the account of this author was -suspended- a few weeks ago. The other reason is that amiga[dot]tech still hosts a file called Hotstar.exe, but this one installs a -fake- registry cleaner (The type that finds -896- infections in 0.2 seconds on a -clean- Virtual Machine):
> https://blog.malware.../infections.png
... We looked at another Tech Support Scam using scare-tactics to lure victims into calling their phone number. The method is a bit different, but the end-goal is the same. Take the money and run. So save yourself the hassle and get protected..."

amiga[dot]tech: 107.180.51.27: https://www.virustot...27/information/
>> https://www.virustot...708d6/analysis/
Malware site ...

exetracking.weebly .com: 199.34.228.53: https://www.virustot...53/information/
>> https://www.virustot...ba807/analysis/
Malware site ...

199.34.228.54: https://www.virustot...54/information/

weebly .com: 74.115.50.109: https://www.virustot...09/information/
>> https://www.virustot...1648a/analysis/
74.115.50.110: https://www.virustot...10/information/
>> https://www.virustot...336b0/analysis/
___

Hacks probe defenses of Middle East banks
Targeted Attacks...
- https://www.fireeye....attacksaga.html
May 22, 2016 - "In the first week of May 2016... a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actors appear to be performing initial reconnaissance against would-be targets, and the attacks caught our attention since they were using unique -scripts- not commonly seen in crimeware campaigns... The attackers sent multiple emails containing macro-enabled-XLS-files to employees working in the banking sector in the Middle East. The themes of the messages used in the attacks are related to IT Infrastructure such as a log of Server Status Report or a list of Cisco Iron Port Appliance details. In one case, the content of the email appeared to be a legitimate email conversation between several employees, even containing contact details of employees from several banks. This email was then forwarded to several people, with the malicious Excel file attached... This was done for the purpose of social engineering – specifically, to convince the victim that enabling-the-macro did in fact result in the 'unhiding' of additional spreadsheet data... This attack also demonstrates that macro malware is effective even today. Users can protect themselves from such attacks by -disabling- Office macros in their settings and also by being more vigilant when enabling macros (especially when prompted) in documents, even if such documents are from seemingly 'trusted' sources..."
(More detail at the fireeye URL above.)

Disable -macros- in Office
> https://support.offi...efe4f860b12#bm2
"... Macro security settings are located in the Trust Center. However, if you work in an organization, your system administrator might have changed the default settings to prevent anyone from changing any settings.
Note: When you change your macro settings in the Trust Center, they are changed only for the Office program that you are currently using. The macro settings are -not- changed for all your Office programs..."
YMMV.

 

1. DO NOT follow the advice they give to enable macros or enable editing to see the content.
2. The basic rule is NEVER open any attachment to an email, unless you are expecting it - and refer to Rule #1.
___

Ransomware prevalence
- https://atlas.arbor....ndex#-610101497
May 19, 2016 - "Analysis: Analysts at Microsoft took a three-month snapshot of ransomware incidents ending in mid-May highlighting the overall breadth of compromises they observed. The table provided a list of the top 20 countries where Microsoft discovered ransomware victims... The top ten listed accounted for 651,801 known compromises..."
> https://blogs.techne...-of-ransomware/
"... The following table* shows the top 20 countries where ransomware is most prevalent..."
* https://msdnshared.b...R_consumer2.png
Ransomware timeline:
- https://msdnshared.b...R_consumer6.png
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 23 May 2016 - 03:40 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1725 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 24 May 2016 - 05:20 AM

FYI...

Fake 'Exchange Rates' SPAM - Java malware
- https://myonlinesecu...s-java-malware/
24 May 2016 - "An email with the subject of 'Updated Exchange Rates For All Agents' pretending to come from Western Union Business Solution <Gerard.Evans@ westernunion .com> with a zip attachment is another one from the current bot runs which delivers a java jacksbot. If you do not have Java installed, then you are safe from this malware...

Screenshot: https://myonlinesecu...ts-1024x750.png

24 May 2016: New Rates 23_may_2016.rar: Extracts to: Updated rates and adjusted commission fees..jar and
 wu fx updated rates.jpg (which is same image as in email). Current Virus total detections 23/57*. MALWR** which doesn't show much, because Java isn’t enabled on the sandbox... Payload Security*** finally gave a report but all it shows is a connection to a dynamic DNS service zingaremit2016.duckdns .org but I still don’t know what for except to divert silently to the actual malware sites and prevent antivirus companies & researchers finding and closing the site... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for  a genuine  DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1464063358/

** https://malwr.com/an...GI5NDIzZGUzNjc/

*** https://www.hybrid-a...vironmentId=100
Contacted Hosts
89.163.154.146
___

Fake 'New Message' SPAM - js malware attachment
- https://myonlinesecu...-administrator/
24 May 2016 - "An email with the subject of 'New Message from Administrator' pretending to come from random senders and email addresses  with a zip attachment is another one from the current bot runs which downloads some malware probably Locky ransomware with anti-debugging, anti-analysis protection... One of the  emails looks like:
From: Filide Macpherson <MacphersonFilide57@ wateen .net>
Date: Tue 24/05/2016 11:05
Subject: New Message from Administrator
Attachment: copy_577640.zip
    You have 1 new message from Administrator. To read it, please open the attachment down below.


24 May 2016: copy_577640.zip: Extracts to: post_scan_7QeOo.js - Current Virus total detections 4/57*
.. MALWR** shows a download from http ://shop2gather .com/0WEGev.exe (VirusTotal 2/56***). MALWR[4] crashed on running this download. Payload security[5] doesn’t give any real useful info, except to suggest anti-debugging and analysis protection... Other sites found in this malware campaign include:
http ://shop2gather .com/0WEGev.exe - 191.234.21.43
http ://davidjubermann .com/kgRATz.exe - 103.16.128.166
http ://americanaintl .com/lFsXD3.exe - 175.45.50.235  giving me a 404
http ://puntacanaprivateoutlet .com/ogZ4Le.exe - 185.42.104.144
http ://piyopiyo .co.uk/XGh7zQ.exe - 23.229.156.163
... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1464085967/

** https://malwr.com/an...DAyYjFiMjliNDU/
Hosts
191.234.21.43

*** https://www.virustot...sis/1464086027/

4] https://malwr.com/an...jFkNjc1YzQ3MDI/

5] https://www.hybrid-a...vironmentId=100
___

Fake 'logon attempt' SPAM - doc malware
- https://myonlinesecu...eads-to-dridex/
24 May 2016 - "An email with the subject of 'Suspicious logon attempt' pretending to come from random senders, companies and email addresses with a malicious word doc inside a zip attachment is another one from the current bot runs... This looks like Dridex using an encrypted-base64-encoded-file inside the word doc that is converted and extracted using Microsoft certutil, using this new method described by MalwareTech Blog[1]...
1] http://www.malwarete...stribution.html
The email looks like:
From: Clay.Mortonp@raiosoldas .com.br
Date: Tue 24/05/2016 11:30
Subject: Suspicious logon attempt
Attachment: Security Report.zip
    Attention!
    Suspicious logon attempt to your account was detected (Firefox browser, IP-address: 199.30.218.0)
    Reason: unusual IP
    Please refer to the attached report to view further detailed information.
    OROGEN GOLD PLC ...


24 May 2016: Security Report.zip: extracts to Security Report ID(12093937).doc
Current Virus total detections 3/57*. MALWR** - Payload Security***. Neither online sandbox managed to extract a working malware, but all indications point to Dridex... Update: .. THIS is the Dridex payload (VirusTotal 10/56[4])

.. DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1464086262/

** https://malwr.com/an...jg0ZjZlOGVmYWI/

*** https://www.hybrid-a...vironmentId=100

4] https://virustotal.c...dd999/analysis/

- http://blog.dynamoo....ompromised.html
24 May 2016 - "These -fake- security warnings come with a malicious attachment:
    From:    Jennings.KarlaVk@ ttnet .com.tr
    Date:    24 May 2016 at 11:48
    Subject:    Account Compromised
    Attention!
    Suspicious logon attempt to your account was detected (Chrome browser, IP-address: 108.127.172.96)
    Reason: unusual IP
    Please refer to the attached report to view further detailed information.
    BMJ Group ...
    > Sent from iPad


In the two samples I have seen, there are attachments named Security Report.zip and Security Notification.zip which in turn contain a Word document with a name such as Security Report ID(11701573).doc . The two documents that I have seen have detection rates of about 3/56 [1] [2]...
UPDATE: According to a third party analysis, this apparently drops Dridex which phones home to:
210.245.92.63 (FPT Telecom Company, Vietnam)
162.251.84.219 (PDR Solutions, US)
80.88.89.222 (Aruba, Italy)
213.192.1.171 (EASY Net, Czech Republic)
Recommended blocklist:
210.245.92.63
162.251.84.219
80.88.89.222
213.192.1.171
"
1] https://virustotal.c...sis/1464089508/

2] https://virustotal.c...sis/1464089505/
___

Fake 'SAFARI LPO' SPAM - leads to Locky
- https://myonlinesecu...leads-to-locky/
24 May 2016 - "An email with the subject of 'SAFARI LPO [MAL] 337659' [random numbered] pretending to come from purchase@ safarigroup .net with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the  emails looks like:
From: purchase@ safarigroup .net
Date: Tue 24/05/2016 12:31
Subject: SAFARI LPO [MAL] 337659
Attachment: LPOMAL337659-6A9-5006.zip
    Please find the attachment


2
4 May 2016: LPOMAL337659-6A9-5006.zip: Extracts to: IGFH-3503688.js - Current Virus total detections 23/56*
.. MALWR** shows downloads from
 http ://alpadv .com/65g434f?YgXKzKkla=TeWMgeqci (VirusTotal 2/56***) or
 http ://angelocc.php5 .cz/43454yt32?NjprTmi=EqTcdjEWuM (currently giving me a 404 not found) or
 http ://panaceya.nichost .ru/sdfg4g3?gzVmzLqQLkU=oDlhsxWsTBF
Other download sites I have been informed about include :
 http ://agro-bum .eu/43454yt32
 http ://protei .me/43454yt32
 http ://keiciuosi .lt/43454yt32
 http ://BenavidezHoy .com/43454yt32
... This is another one of the  files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1441173827/

** https://malwr.com/an...GU5MGI5Y2U0Y2Y/
Hosts
195.208.1.161
185.82.216.45
173.236.147.27
104.18.36.113
217.198.115.56


*** https://www.virustot...sis/1464089771/
TCP connections
185.82.216.45

alpadv .com: 173.236.147.27: https://www.virustot...27/information/
>> https://www.virustot...80dcc/analysis/
angelocc.php5 .cz: 217.198.115.56: https://www.virustot...56/information/
>> https://www.virustot...55b47/analysis/
panaceya.nichost .ru: 195.208.1.161: https://www.virustot...61/information/

agro-bum .eu: 188.116.19.62: https://www.virustot...62/information/
>> https://www.virustot...599ad/analysis/
protei .me: 198.46.81.204: https://www.virustot...04/information/
>> https://www.virustot...2f2b5/analysis/
keiciuosi .lt: 194.135.87.62: https://www.virustot...62/information/
>> https://www.virustot...08411/analysis/
benavidezhoy .com: 69.16.243.28: https://www.virustot...28/information/
>> https://www.virustot...3129d/analysis/
___

Fake 'Your Payment' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
24 May 2016 - "An email with the subject of 'We Have Received Your Payment – Thank You (#49407B2)' [random numbered] pretending to come from random senders and email addresses with a zip attachment is another one from the current bot runs which downloads Locky ransomware... One of the emails looks like:
From: Chung House <HouseChung30291@ privateclientlegal .com>
Date: Tue 24/05/2016 14:40
Subject: We Have Received Your Payment – Thank You (#49407B2)
Attachment: details_074728.zip
    Your payment has been successfully received. Please, notice that in order to ship your order, we need you to fill out the additional form enclosed down below.


24 May 2016: details_074728.zip: Extracts to: letter_kWRDn1.js - Current Virus total detections 3/57*
.. MALWR** shows a download of Locky from
 http ://shop.deliciescatalanes .com/SMjheb.exe (VirusTotal 2/56***). MALWR[4]. Manual analysis shows an alternative download from http ://shop.vixtro .com/z2qLMy.exe ... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1464099776/

** https://malwr.com/an...9bcbb031824f131
Hosts
212.92.57.70
31.41.44.45


*** https://www.virustot...sis/1464091820/

4] https://malwr.com/an...GY1NGU5NTJlYjQ/
Hosts
185.82.216.45

shop.vixtro .com: 202.126.109.134: https://www.virustot...34/information/
>> https://www.virustot...2c01d/analysis/
___

Evil network: OVH - Angler EK cluster
- http://blog.dynamoo....ologistnet.html
24 May 2016 - "Here's an Angler EK cluster, hosted on multiple ranges rented from OVH France.. working first from this list of Angler IPs in OVH address space we can see a common factor.
5.135.249.214
5.135.249.215
51.255.59.119
51.255.59.120
51.255.59.121
51.255.59.123
91.134.206.128
91.134.206.129
91.134.206.130
91.134.206.131
91.134.204.217
91.134.204.218
91.134.204.219
91.134.204.243
91.134.204.245
91.134.204.247

One handy thing that OVH does with suballocated ranges is give clear details about the customer. This certainly helps track down abusers. In this case, the ranges these IPs are in are allocated to:
ORG-KM91-RIPE reference can be looked up on the RIPE database[1]: giving more of these little /30 blocks:
1] https://apps.db.ripe.../full-text.html
5.135.249.212/30
51.255.59.116/30
51.255.59.120/30
51.255.59.124/30
91.134.206.128/30
91.134.204.212/30
91.134.204.216/30
91.134.204.220/30
91.134.204.240/30
91.134.204.244/30
91.134.204.248/30
91.134.204.252/30
164.132.223.192/30

OVH have been pretty good at cleaning up this sort of thing lately (unlike PlusServer*) so hopefully they will get this under control. If you want to find other Angler EK ranges then I have a bunch of 'em in my Pastebin**."
* http://blog.dynamoo....oblem-with.html

** http://pastebin.com/u/dynamoo
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 24 May 2016 - 11:37 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



3 user(s) are reading this topic

0 members, 3 guests, 0 anonymous users