FYI...
Fake 'Sage Invoice' SPAM - delivers Trickbot
- https://myonlinesecu...tdated-invoice/
17 Nov 2016 - "An email with the subject of ' pretending to come from 'Sage Invoice' with a malicious word doc delivers Trickbot banking Trojan... sageinvoices .com / sage-invoice .com /sage-invoices .com are all newly created -yesterday- ... domains sending these emails include:
Sage Invoice <service@ sage-invoices .com>
Sage Invoice <service@ sage-invoice .com>
Sage Invoice <service@ sageinvoice .com> ...
Screenshot: https://i0.wp.com/my...=1024,689&ssl=1
17 November 2016: SageInvoice.doc - Current Virus total detections 3/54*
Payload Security** shows a download from http ://delexdart .com/images/gfjfgklmslifdsfnln.png which is not a png file but a renamed .exe file which is renamed by the macro to scsadmin.exe and auto run using PowerShell (VirusTotal ***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1479380615/
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
182.50.132.43
78.47.139.102
193.107.111.164
81.177.13.236
185.86.77.224
*** https://www.virustot...sis/1479381072/
sage-invoices .com: 50.63.202.56: https://www.virustot...56/information/
sage-invoice .com: 184.168.221.34: https://www.virustot...34/information/
sageinvoice .com: 50.63.202.34: https://www.virustot...34/information/
//
- http://blog.dynamoo....ervicesage.html
17 Nov 2016 - "This -fake- financial spam leads to Trickbot banking trojan...
Screenshot: https://3.bp.blogspo...ge-trickbot.png
Attached is a malicious Word document named SageInvoice.doc with a detection rate of 3/54*. Hybrid Analysis** shows malicious network traffic to:
substan.merahost .ru/petrov.bin [185.86.77.224] (Mulgin Alexander Sergeevich aka gmhost .com.ua, Ukraine)
A malicious file scsnsys.exe is dropped with a detection rate of 8/53***.
The domain sage-invoices .com has been registered by criminals for this action, presumably to allow encrypted end-to-end communication... I recommend that you -block- traffic from that domain or check your filters to see who may have it.
Recommended blocklist:
sage-invoices .com
185.86.77.0/24 "
* https://virustotal.c...a0369/analysis/
** https://www.hybrid-a...vironmentId=100
Contacted Hosts
61.19.247.54
78.47.139.102
193.107.111.164
81.177.13.236
185.86.77.224
*** https://virustotal.c...b4f91/analysis/
___
Fake 'Please check' SPAM - delivers Trickbot
- https://myonlinesecu...banking-trojan/
17 Nov 2016 - "... an email with the subject of 'Please check the information-3878358' (random numbers) pretending to come from random names at your-own-email-domain that tries to deliver Trickbot banking Trojan... tessaban .com 61.19.247.54 has been used for malware spreading for some time now and really needs blocking [1]...
1] https://virustotal.c...sis/1479194525/
One of the emails looks like:
From: Brigitte Guidry <Brigitte.Guidry@ victim domain .tld >
Date: Thu 17/11/2016 02:48
Subject: Please check the information-3878358
Attachment: invoice_2222.zip
Hi,
I have attached an invoice-4654 for you.
Regards,
Brigitte Guidry
17 November 2016: invoice_2222.zip: Extracts to: invoice_1711.js - Current Virus total detections 2/54*
MALWR** shows an attempted download of a file from http ://www .tessaban .com/admin/images/ospspps.png currently giving a 404 not found which should be renamed by the script to an .exe file... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1479370770/
** https://malwr.com/an...jk0ZmZiNWQxYzI/
Hosts
61.19.247.54: https://www.virustot...54/information/
> https://virustotal.c...4077a/analysis/
___
Fake AMEX Phish
- https://myonlinesecu...press-phishing/
17 Nov 2016 - "... The subject is 'Please activate your Personal Security Key' coming from American Express
<welcome@ amex-mails .com>. Additional sending addresses so far found include:
Amex-mails .com | amexmails .com | amex-emails .com | amexmails .com
were -all- registered -today- by surprise, surprise: Godaddy .com. They currently do not have an IP number associated with them. When they were received, the emails came from:
172.99.87.130 - San Antonio Texas US AS27357 Rackspace Hosting ...
The weird thing is the emails appear -blank- when opened in Outlook, but using view source I can see the email in its full glory, including the links-to-click to get to the-phishing-site... A screenshot of the html is:
> https://i1.wp.com/my...t=678,913&ssl=1
Alternative links in emails go to:
http :// amexsafekeys .com | http ://americanexpressafekey .com | http ://amex-mails .com
| http:// amexmails .com
aexpsafekeys .com was registered -yesterday- 16 November 2016 and hosted on these IP addresses:
95.163.127.249 | 188.227.18.142 which look like they belong to a -Russian- network.
http ://amexsafekeys .com was also registered -yesterday- by the same Russian name and hosted on same IP addresses: 188.227.18.142 | 95.163.127.249
http ://americanexpressafekey .com also registered -yesterday- same IP addresses. Following the link to aexpsafekeys .com, you get a typical phishing page like this, where they want all the usual information about you, your family and bank/credit cards etc.:
> https://i2.wp.com/my...=1024,603&ssl=1 "
95.163.127.249: https://www.virustot...49/information/
> https://www.virustot...c2a5d/analysis/
188.227.18.142: https://www.virustot...42/information/
> https://www.virustot...c2a5d/analysis/
104.168.87.178: https://www.virustot...78/information/
> https://www.virustot...c2a5d/analysis/
Edited by AplusWebMaster, 17 November 2016 - 04:27 PM.