FYI...
Ransomware decrypter released
- https://www.helpnets...r-apocalypsevm/
June 22, 2016 - "... Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM*. The tool works on the latest versions of the ransomware in question:
> https://www.helpnets...pocalypseVM.jpg
... The victim can then decide to use it on one, some, or all encrypted files. The tool selects the C: partition of the disk by default, but victims can choose other partitions or files to be decrypted. Emsisoft recommends testing the key first on a few files, then to proceed decrypting the rest if everything goes well with the test..."
* https://decrypter.emsisoft.com
Jun, 18, 2016 - Version: 1.0.0.23
___
Fake 'Corresponding Invoice' SPAM - leads to Locky
- http://blog.dynamoo....ng-invoice.html
22 June 2016 - "This spam has a malicious attachment... leading to Locky ransomware:
From: Althea Duke
Date: 22 June 2016 at 16:00
Subject: Corresponding Invoice
Dear lisa:
Thank you for your email regarding your order of 21 June, and sorry for the delay in replying. I am
writing to confirm receipt of your order, and to inform you that the item you requested will be delivered
by 25 June at the latest. If you require more information regarding this order, please do not hesitate to
contact me.
Also, our records show that we have not yet received payment for the previous order of 11 June,
so I would be grateful if you could send payment as soon as possible. Please find attached the
corresponding invoice.
If there is anything else you require, our company would be pleased to help. Looking forward to
hearing from you soon.
Yours sincerely
Althea Duke
Managing Director
UPDATE: A little bit of analysis, via these automated reports [1] [2].. show some download locations as:
personal-architecture .nl/6gcpaey
ding-a-ling-tel .com/b289dg
plasticsmachine .com/d43ndxna
hyip-all .com/9qwmc65
Various files are dropped, including these samples [6] [7] the latter of which is a three week old version of Locky. Go figure. The comments in this report show C2 servers at:
51.254.240.48 (Andrey Orlov aka Relink LLC, Russia / OVH, France)
91.219.29.41 (FLP Kochenov Aleksej Vladislavovich aka uadomen.com, Ukraine)
185.82.216.55 (ITL, Bulgaria)
93.170.169.188 (PE Dunaeivskyi Denys Leonidovich, Ukraine)
Three out of those four servers are the -same- as yesterday*.
Recommended blocklist:
51.254.240.48
91.219.29.41
185.82.216.55
93.170.169.188."
* http://blog.dynamoo....tached-our.html
1] https://malwr.com/an...DE1ZmIyMTI5ZTE/
2] https://malwr.com/an...WUyZGE1MjhjMGI/
6] https://virustotal.c...14b76/analysis/
7] https://virustotal.c...9b731/analysis/
- https://myonlinesecu...cky-ransomware/
22 June 2016 - "An email with the subject of 'Corresponding Invoice' pretending to come from random senders with a zip attachment which downloads Locky ransomware... These contain a heavily obfuscated JavaScript inside the zip. It has several layers of obfuscation. The alleged senders name matches the name in the body of the email. The job title is also random and can be anything from Sales Director, Account Director or any other position that any company might think of... This Blog post* describes how to manually deobfuscate these horridly difficult & tricky JavaScript files.
* https://malcat.moe/?p=53
One of the emails looks like:
From: Mariano Hoover <Hoover.20718@215-132 .thezone .bg>
Date: Wed 22/06/2016 15:10
Subject: Corresponding Invoice
Attachment: rob_unpaid_673442.zip
Dear rob:
Thank you for your email regarding your order of 21 June, and sorry for the delay in replying. I am
writing to confirm receipt of your order, and to inform you that the item you requested will be delivered
by 25 June at the latest. If you require more information regarding this order, please do not hesitate to
contact me.
Also, our records show that we have not yet received payment for the previous order of 11 June,
so I would be grateful if you could send payment as soon as possible. Please find attached the
corresponding invoice.
If there is anything else you require, our company would be pleased to help. Looking forward to
hearing from you soon.
Yours sincerely
Mariano Hoover
Regional Sales Director
22 June 2016: rob_unpaid_673442.zip: Extracts to: unpaid-5967.js - Current Virus total detections 2/56**
.. Payload Security*** shows us downloads from totalsportnetwork .com/kpbrp2mq or modelestrazackie .za.pl/zfww8nx which are encrypted files that get decrypted by the original JavaScript files to give
%TEMP%\OVAkXuGy.exe (VirusTotal 12/55[4]). These encrypted files make it very difficult for an antivirus to prevent download because they are are plain text, albeit in total gibberish to a human reader... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
** https://www.virustot...sis/1466604801/
*** https://www.hybrid-a...vironmentId=100
Contacted Hosts
192.186.209.5
193.203.99.113
4] https://www.virustot...bbb7f/analysis/
___
Fake 'On Hold Transactions' SPAM - malicious attachment
- https://myonlinesecu...money-services/
22 June 2016 - "An email with the subject of 'On Hold Transactions From 21.06.2016' pretending to come from Saeed Abugharbieh <saeed.abugharbieh@ xpressmoney .com> with a zip attachment that contains a Barys Trojan and a copy of the image in the email. The .exe file drops a JAVA jar file that is most likely Java Jacksbot Trojan...
Screenshot: https://myonlinesecu...ns-1024x552.png
22 June 2016: On Hold Transactions From 21.06.2016.zip: Extracts to: On Hold Transactions From 21.06.2016.exe
Current Virus total detections 15/56*.. MALWR** shows this drops a JAVA.jar file 812594500.jar which appears to be Java Jacksbot Trojan (VirusTotal 29/56***). MALWR[4]... This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
* https://www.virustot...sis/1466613297/
** https://malwr.com/an...mY1MjY3YmFiMzY/
*** https://www.virustot...sis/1466613895/
4] https://malwr.com/an...2M0MTdhZDJhZjI/
___
Fake 'Payment' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
22 June 2016 - "An email with the subject of 'Payment' pretending to come from random senders with a zip attachment which downloads Locky ransomware... These contain a heavily obfuscated JavaScript inside the zip. It has several layers of obfuscation. The alleged senders name matches the name in the body of the email. The job title is also random and can be anything from Sales Director, Account Director or any other position that any company might think of... This Blog post* describes how to manually deobfuscate... JavaScript files. The JavaScript in this one is the -same- as THIS earlier run of Locky downloaders**...
* https://malcat.moe/?p=53
** >> https://myonlinesecu...cky-ransomware/
One of the emails looks like:
From: Luz Odonnell <Odonnell.198@ frionline .com.br>
Date: Wed 22/06/2016 20:36
Subject: Payment
Attachment: details_rob_440235.zip
Dear rob,
Our records show that we have not yet received payment for the previous order #A-440235
Could you please send payment as soon as possible?
Please find attached file for details.
Yours sincerely
Luz Odonnell
Head of Maintenance
This is another one of the files that unless you have “show known file extensions enabled“, can easily be mistaken for a genuine DOC/PDF/JPG or other common file instead of the .EXE/.JS file it really is, so making it much more likely for you to accidentally open it and be infected..."
___
Fake 'documents for your reference' PHISH
- https://myonlinesecu...n-owa-phishing/
22 June 2016 - "An email saying 'Please find below documents for your reference kindly sign' pretending to come from gccremittance@ emirates .net.ae is one of the latest -phish- attempts to steal your Outlook Web App log on details which is generally your Microsoft account details...
Screenshot: https://myonlinesecu...ce-1024x471.png
-If- you follow the link http ://intimeshop .com/reviews/cgi-bin/login sure owa/index.html which goes to you get a pop up message:
> https://myonlinesecu...p1-1024x193.png
.. press OK & you go to:
> https://myonlinesecu...p2-1024x536.png
After giving an email address & password you are sent to:
http ://integrare .inf.br/images/Servicos/process/process.php which is currently giving a 404 error... these emails use Social engineering tricks to persuade you to open the attachments that come with the email..."
intimeshop .com: 195.154.232.157: https://www.virustot...57/information/
>> https://www.virustot...14981/analysis/
integrare .inf.br: 177.12.163.97: https://www.virustot...97/information/
___
Fake 'invoice' SPAM - leads to Locky
- http://blog.dynamoo....tached-our.html
21 June 2016 - "This malicious spam leads to Locky ransomware, something that we haven't seen for several weeks:
From: Lilian Fletcher
Date: 21 June 2016 at 20:01
Subject: Re:
Dear lisa:
Please find attached our invoice for services rendered and additional disbursements in the above-
mentioned matter.
Hoping the above to your satisfaction, we remain.
Sincerely,
Lilian Fletcher
Head of Maintenance
These are being sent out in huge numbers at the moment. Details vary from message to message, but the body text is essentially the same. Attached is a ZIP file containing the words 'addition', 'invoice' or 'services' plus the recipients email address and a number (e.g. lisa_addition_278292.zip) containing a malicious script beginning with the word "addition"... Analysis.. shows that it phones home to:
51.254.240.48 (Andrey Orlov aka Relink LLC, Russia / OVH, France)
91.219.29.41 (FLP Kochenov Aleksej Vladislavovich aka uadomen.com, Ukraine)
185.82.216.55 (ITL, Bulgaria)
217.12.223.83 (ITL, Ukraine)
As I mentioned before, this is Locky ransomware which has not been circulating at all since about 31st May.
Recommended blocklist:
51.254.240.48
91.219.29.41
185.82.216.55
217.12.223.83 "
51.254.240.48: https://www.virustot...48/information/
>> https://www.virustot...4e1d3/analysis/
91.219.29.41: https://www.virustot...41/information/
>> https://www.virustot...22a51/analysis/
185.82.216.55: https://www.virustot...55/information/
>> https://www.virustot...c2f8b/analysis/
217.12.223.83: https://www.virustot...83/information/
>> https://www.virustot...1fd5e/analysis/
Edited by AplusWebMaster, 22 June 2016 - 03:46 PM.