FYI...
Fake 'invoices' SPAM - malicious attachment
- http://blog.dynamoo....wing-phone.html
25 May 2016 - "These -fake- financial spams come from different companies, all with a malicious attachment.
From: Frank.ClaraZO@ pr-real .com
Date: 25 May 2016 at 11:34
Subject: The invoices from INCHCAPE PLC
Hello,
Following the phone conversation with the accounting department represantatives I'm sending you the invoices.
Thank you for attention,
Kind regards
Clara Frank
INCHCAPE PLC ...
> Sent from Iphone
Attached is a ZIP file with a name similar to Invoice 5044-032841.zip which in turn contains a malicious script named in a similar manner to invoice(677454).js which typically has a detection rate of 3/56*. Hybrid Analysis** of that sample shows the script creating a PFX (personal certificate) file which is then transformed into a PIF (executable) file using the certutil.exe application. This PIF file itself has a detection rate of 6/56*** but automated analysis [1] [2].. is inconclusive. The behaviour is somewhat consistent with the Dridex banking trojan but may possibly be Locky ransomware."
* https://virustotal.c...sis/1464173596/
** https://www.hybrid-a...vironmentId=100
*** https://virustotal.c...sis/1464174246/
1] https://malwr.com/an...2I4YTNkNTIwZTY/
2] https://www.hybrid-a...vironmentId=100
___
Fake 'Operational Expense' SPAM - leads to Locky
- http://blog.dynamoo....ense-leads.html
25 May 2016 - "This -fake- financial spam leads to malware:
From: Theodora Hamer
Date: 25 May 2016 at 12:17
Subject: Operational Expense
Operational Expense of 7,350,80 USD has been credited from your account. For more details please refer to the report that can be found down below
This analysis is based on a trusted source (thank you!). Attached is a ZIP file containing a malicious script, downloading from:
alborzcrane .com/g1slEn.exe
alborzcrane .com/Z94n5r.exe
alintagranito .com/fOA8Bl.exe
alintagranito .com/xB7nku.exe
amazoo.com .br/R0koId.exe
avayeparseh .com/s0faxS.exe
buzzimports .com.au/cRQVC4.exe
buzzimports .com.au/ECScwi.exe
galabel .com/lRkuJX.exe
galabel .com/oQz26K.exe
jett .com/6APaSk.exe
kitchen38 .com/HYPETS.exe
kitchen38 .com/V1ygc2.exe
onestopcableshop .com/J7t6au.exe
osdc .eu/gct5TH.exe
osdc .eu/n2UuEj.exe
purfectcar .com/9OaoqM.exe
purfectcar .com/sHXqZT.exe
wisebuy .com/WiOqzB.exe
yearnjewelry .com/OnvBrc.exe
yearnjewelry .com/t8HnK3.exe
zhaoyk .com/Dmv3As.exe
zhaoyk .com/JbO9uX.exe
This drops what is apparently Locky ransomware, with a detection rate of 3/56*. This phones home to:
164.132.40.47 (OVH, France)
104.131.182.103 (Digital Ocean, US)
This Hybrid Analysis** shows the Locky ransomware in action.
Recommended blocklist:
164.132.40.47
104.131.182.103 "
* https://virustotal.c...5cf88/analysis/
** https://www.hybrid-a...vironmentId=100
___
Fake 'URGENT - DELIVERY' SPAM - leads to malware
- http://blog.dynamoo....very-jobin.html
25 May 2016 - "This -fake- delivery spam leads to malware:
From: Justin harmon
Date: 25 May 2016 at 12:30
Subject: URGENT - DELIVERY
Dear customer.
Please find the attachment.
Thanks & Best Regards
Jobin Jacob
HYTEX ...
Attached is a ZIP file that contains one of many scripts that downloads a binary from one of the following locations (according to a trusted third party, thank you!):
avi-vest .ro/3g34t3t4tggrt?[random-string]=[random-string]
bankruptcymag .com/3g34t3t4tggrt?[random-string]=[random-string]
bizconsulting .ro/3g34t3t4tggrt?[random-string]=[random-string]
brunohenrique .net/3g34t3t4tggrt?[random-string]=[random-string]
cjglobal .co/3g34t3t4tggrt?[random-string]=[random-string]
comecomunicare .eu/3g34t3t4tggrt?[random-string]=[random-string]
crimeshurt .com/3g34t3t4tggrt?[random-string]=[random-string]
digitacaoveloz .com.br/3g34t3t4tggrt?[random-string]=[random-string]
globalcredithub .com/3g34t3t4tggrt?[random-string]=[random-string]
lifeclinics .net/3g34t3t4tggrt?[random-string]=[random-string]
orobos .nyc/3g34t3t4tggrt?[random-string]=[random-string]
selonija .lv/3g34t3t4tggrt?[random-string]=[random-string]
smp.com .mx/3g34t3t4tggrt?[random-string]=[random-string]
sweethomesgroup .com/3g34t3t4tggrt?[random-string]=[random-string]
tspipp .tsu.tula .ru/3g34t3t4tggrt?[random-string]=[random-string]
unijovem .com.br/3g34t3t4tggrt?[random-string]=[random-string]
www .appoutpost .com/3g34t3t4tggrt?[random-string]=[random-string]
Where [random-string] seems to be a random alphanumeric string. The dropped binary is Locky ransomware (as seen in this Malwr report*) which phones home to:
164.132.40.47 (OVH, France)
104.131.182.103 (Digital Ocean, US)
These are the same C2 servers as found here**."
* https://malwr.com/an...DVkY2VlZjkwYmM/
Hosts
2.49.203.206
164.132.40.47
** http://blog.dynamoo....ense-leads.html
___
Fake 'Weekly report' SPAM - malicious attachment
- http://blog.dynamoo....lease-find.html
25 May 2016 - "This -fake- financial spam comes from random senders and companies and has a malicious attachment:
From: Alicia Ramirez
Date: 25 May 2016 at 14:22
Subject: Weekly report
Hi [redacted],
Please find attached the Weekly report.
King regards,
Alicia Ramirez
Castle (A.M.) & Co.
There are a -large- number of these, with a ZIP file -attached- containing malicious scripts with a typical detection rate of 3/56*. In this sample Malwr** analysis, it downloads a file from:
test.glafuri .net/yxk6s
There will certainly be a LOT of other download locations. The dropped file GSKQtcnNu8MS.exe has a detection rate of 4/55*** and that same VirusTotal report indicates C2 traffic to:
138.201.93.46 (Hetzner, Germany)
91.200.14.139 (PP SKS-LUGAN, Ukraine)
104.131.182.103 (Digital Ocean, US)
164.132.40.47 (OVH, France)
Even though other automated analysis -failed- [1] [2] this time we have previously identified -two- of those IPs[3] as being Locky ransomware, so there is little doubt that this will be more of the same.
Recommended blocklist:
138.201.93.46
91.200.14.139
104.131.182.103
164.132.40.47 "
* https://virustotal.c...5b177/analysis/
** https://malwr.com/an...DQzN2IzM2JmMWY/
Hosts
176.223.121.193
*** https://virustotal.c...b5f47/analysis/
TCP connections
138.201.93.46
91.200.14.139
104.131.182.103
164.132.40.47
69.195.129.70
1] https://www.hybrid-a...vironmentId=100
2] https://malwr.com/an...mFiYjM2NTg0Mzc/
3] http://blog.dynamoo....ense-leads.html
___
Fake 'Pan Card' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
25 May 2016 - "An email with the subject of 'Pan Card' pretending to come from email2jbala . <email2jbala@ gmail .com> with a malicious word doc attachment downloads Locky ransomware... 'never heard of a 'PAN card' and had to do a Google search to find out what it is. 'Turns out to be an Indian Identity card for income tax payments... The email looks like:
From: email2jbala . <email2jbala@igmail .com>
Date: Wed 25/05/2016 15:37
Subject: Pan Card
Attachment: 2015-25-05_333317.docm
Attached is the PAN card as requested.
You can mail me form 16.
25 May 2016: 2015-25-05_333317.docm - Current Virus total detections 7/55*
.. MALWR** shows a download from
http ://www.asysa .cl/k7jhrt4hertg which gave the hendibe.exe which doesn’t look like an .exe file but is an HTML file (VirusTotal 0/57***) (Currently giving me a 404 'not found'). An alternative version gave me
http ://majaz .co.uk/k7jhrt4hertg (VirusTotal 6/56[4]) which is the same Locky ransomware version from earlier today[5]... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1464187080/
** https://malwr.com/an...WI5YTFjY2M5YzU/
Hosts
186.67.227.204
*** https://www.virustot...sis/1464191429/
4] https://www.virustot...sis/1464189317/
TCP connections
164.132.40.47
5] https://myonlinesecu...delivers-locky/
asysa .cl: 186.67.227.204: https://www.virustot...04/information/
>> https://www.virustot...fd834/analysis/
majaz .co.uk: 81.27.85.11: https://www.virustot...11/information/
>> https://www.virustot...2173a/analysis/
___
'WhatsApp Gold' SCAM - spreads malware
- http://www.actionfra...s-malware-may16
24 May 2016 - "WhatsApp users are being tricked by fraudsters into downloading a -fake- version of WhatsApp which infects Android devices with malware. The "secret" messages sent to peoples inboxes claim you have an exclusive chance to download “WhatsApp Gold”. The scam messages claim to offer enhanced features used by celebrities. Victims are urged to sign up via-a-link-provided... After clicking-on-the-link you will be -redirected- to a -fake- page and your Android device will become infected with malware. If you have already followed the link to download the software, install some -antivirus- software onto your device to remove the malware..."
> https://www.helpnets...p-gold-malware/
May 25, 2016 - "... messages that offer 'WhatsApp Gold'..." [which does NOT exist.]
Edited by AplusWebMaster, 25 May 2016 - 11:09 AM.