Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

SPAM frauds, fakes, and other MALWARE deliveries...


  • Please log in to reply
2072 replies to this topic

#1861 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 09 December 2016 - 03:59 AM

FYI...

Fake 'Firewall Software' SPAM - leads to Locky
- http://blog.dynamoo....e-leads-to.html
9 Dec 2016 - "This spam appears to come from multiple senders and leads to Locky ransomware:
    From:    Herman Middleton
    Date:    9 December 2016 at 07:40
    Subject:    Firewall Software
    Hey [redacted], it is Herman. You've asked me to order new firewall software for our office computers.
    Done and ready. Here, in the attachment, is the full invoice of the software counteragent.
    Please check it out.
    King Regards,
    Herman Middleton
    IT Support Manager


Attached is a ZIP file with a name like f_license_5330349.zip which contains a randomly named .js script which is very highly obfuscated. The Hybrid Analysis* and Malwr report** show that the script analysed downloads a component from welte .pl/mupze (there will probably be dozens of other locations) and appears to drop a DLL with a detection rate of 4/56***. That Hybrid Analysis also detections C2 traffic to:
107.181.187.97 /checkupdate [hostname: saluk1.example .com] (Total Server Solutions, US)
51.254.141.213 /checkupdate (OVH, France)
It's worth mentioning perhaps that other Locky C2 servers seen in the past 12 hours are as follows:
91.142.90.46 /checkupdate [hostname: mrn46.powerfulsecurities .com] (Miran, Russia)
195.123.209.23 /checkupdate [hostame: prujio .com] (Layer6, Latvia)
185.127.24.247 /checkupdate [hostname: free.example .com] (Informtehtrans, Russia)
176.121.14.95 /checkupdate (Rinet LLC, Ukraine)
185.46.11.236 /checkupdate (Agava, Russia)
178.159.42.248 /checkupdate (Dunaevskiy Denis Leonidovich / Zomro, Ukraine)
Although some of these are from different sub-groups of Locky pushers, let's stick them all together for the sake of convenience. Note that there are at least a couple of bad /24 blocks in there.
Recommended blocklist:
51.254.141.213
91.142.90.46
107.181.187.97
176.121.14.95
178.159.42.248
185.46.11.0/24
185.127.24.247
195.123.209.0/24
"
* https://www.hybrid-a...vironmentId=100
Contacted Hosts
79.96.68.245
107.181.187.97
178.159.42.248
51.254.141.213
54.239.168.239
91.198.174.192
91.198.174.208


** https://malwr.com/an...jQ1MmM2ODI0MTQ/
Hosts
79.96.68.245

*** https://virustotal.c...sis/1481273887/

- https://myonlinesecu...delivers-locky/
9 Dec 2016 - "... an email with the subject of 'Firewall Software' coming or pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of f_license_numbers.zip which delivers Locky ransomware... One of the emails looks like:
From: Curtis Jarvis <Jarvis.Curtis@ irishcitytours .com>
Date: Fri 09/12/2016 07:22
Subject: Firewall Software
Attachment: f_license_5875331.zip
    Hey emis2000, it is Curtis. You’ve asked me to order new firewall software for our office computers.
    Done and ready. Here, in the attachment, is the full invoice of the software counteragent.
    Please check it out.
    King Regards,
    Curtis Jarvis
    IT Support Manager


9 December 2016: f_license_5875331.zip: Extracts to: ~S911UGV716O1J3CSTB471C.js
Current Virus total detections 16/55*. MALWR** shows a download of an encrypted file from
 http ://www .pgringette .ca/a8crrwrc2t which is converted by the script to z7dWO4eQFUHRtg.zk (VirusTotal 4/57***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes tdb or .zk. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1480616575/

** https://malwr.com/an...jEwMDhkMTFmYmM/
Hosts
69.28.199.160

*** https://www.virustot...sis/1481268678/
___

Fake 'See attached' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
9 Dec 2016 - "An email spoofing the Business Advisory Service Ltd with the subject of 'See attached – I will call you in 10 mins' (random times) with a malicious Excel XLS spreadsheet attachment delivers Locky Osiris ransomware...

Screenshot: https://i1.wp.com/my...=1024,547&ssl=1

9 December 2016: Invoice_392618_final.xlsm - Current Virus total detections *
MALWR** shows a download of an encrypted file from http ://djelixir .com/34f43 which is converted by the script to XtPmJmcsvIP1.dll (VirusTotal 10/56***). Payload Security [4]... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
*

** https://malwr.com/an...TU2NDA1NmNmYjk/
Hosts
108.174.153.189
185.102.136.67


*** https://www.virustot...sis/1481278691/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
108.174.153.189
185.102.136.67
176.121.14.95
31.202.128.199
52.34.245.108
54.239.168.194

___

Another 'Apple phish' ...
- https://myonlinesecu...apple-phishing/
9 Dec 2016 - "...  mass Apple phish today, telling you that you have added ghost00@ hotmail .com as a new rescue email address for your Apple ID and you need to verify it... received about 200 so far this morning, some of which are getting past spam filters...

Screenshot: https://i0.wp.com/my...=1024,588&ssl=1

The links in the body go to:
 http ://opelpart .hu/media/system/swf/o.html
which -redirects- to numerous sites including:
 http ://ushindicounselling .ca/winter/Itunes/apple/
 http ://volleyballsaskatoon .ca/winter/Itunes/apple/
... There will no doubt be lots of other sites active in this phishing campaign... follow-the-link [DON'T] you see a webpage looking like this screenshot (taken form a previous example):
> https://i1.wp.com/my...=1024,565&ssl=1 "

opelpart .hu: 87.229.45.133: https://www.virustot...33/information/
ushindicounselling .ca: 67.212.91.221
volleyballsaskatoon .ca: 67.212.91.221: https://www.virustot...21/information/
___

Phish in-the-cloud ...
- http://www.darkreadi.../d/d-id/1327673
Dec 8, 2016 - "Everything else has gone to the cloud, so why not faux emails* and their malicious payloads?... phishing emails have become a way to infect desktops and servers with ransomware, which infosec professionals continually cite as their biggest ongoing concern and defense priority..."
* http://blog.imperva....-reined-in.html
Dec 6, 2016 - "Phishing is the starting point for most data breaches... cybercriminals are lowering the cost of phishing by enabling Phishing as-a-Service (PhaaS) using compromised web servers..."
> http://imperva.typep...32c51970c-800wi
___

400,000 phishing sites - every month in 2016
- https://www.helpnets...-observed-2016/
Dec 7, 2016 - "84 percent of phishing sites observed in 2016 existed for less than 24 hours, with an average life cycle of under 15 hours... data collected by Webroot*:
> https://www.helpnets...ng-122016-1.jpg "

* https://www.webroot....-for-christmas/
Dec 7, 2016 - "... Webroot has observed an average of over 400,000 phishing sites each month... Google, PayPal, Yahoo, and Apple are heavily targeted for attacks. Cybercriminals know to impersonate sites that people trust and use regularly... Google was impersonated in 21 percent of -all- phishing sites between January and September 2016, making it the most heavily targeted. Emails to avoid:
With the holiday season in full swing and the New Year fast approaching, hackers are up to their old tricks... we should all be wary of emails containing UPS, USPS, and FedEx shipping alerts; 401k/benefit enrollment notices; and miscellaneous tax documents from now through the end of January..."
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 09 December 2016 - 09:10 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#1862 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 December 2016 - 07:19 AM

FYI...

Fake 'Invoice' SPAM - leads to Locky
- http://blog.dynamoo....ber-947781.html
12 Dec 2016 - "This fake financial spam comes from -multiple- senders and leads to Locky ransomware:
    From:    AUTUMN RHINES
    Date:    12 December 2016 at 10:40
    Subject:    Invoice number: 947781
    Please find attached a copy of your invoice...


The name of the sender varies, as does the fake invoice number. Attached is a .DOCM file with a filename matching that invoice number. Typical detection rates for the DOCM file are 13/56*. Automated analysis of a couple of these files [1] [2]... show the macro downloading a component from miel-maroc.com/874ghv3  (there are probably many more locations). A DLL is dropped with a current detection rate of 11/57**. All those analyses indicate that this is Locky ransomware (Osiris variant), phoning home to:
176.121.14.95 /checkupdate (Rinet LLC, Ukraine)
88.214.236.218 /checkupdate (Overoptic Systems, UK / Russia)
91.219.31.14 /checkupdate (FLP Kochenov Aleksej Vladislavovich aka uadomen .com, Ukraine)
Recommended blocklist:
176.121.14.95
88.214.236.218
91.219.31.14
"
* https://virustotal.c...77759/analysis/

1] https://malwr.com/an...mUwMTkwNDM5Y2U/
Hosts
5.153.23.8
176.121.14.95
88.214.236.218
91.219.31.14


2] https://malwr.com/an...TE4MWU3NzMxMjA/
Hosts
5.153.23.8
176.121.14.95
91.219.31.14


** https://virustotal.c...643df/analysis/
___

Fake 'New(910)' SPAM - leads to Locky
- http://blog.dynamoo....s-to-locky.html
12 Dec 2016 - "This spam leads to Locky ransomware:
    From:    Savannah [Savannah807@ victimdomain .tld]
    Reply-To:    Savannah [Savannah807@ victimdomain .tld]
    Date:    12 December 2016 at 09:50
    Subject:    New(910)
    Scanned by CamScanner
    Sent from Yahoo Mail on Android


The spam appears to come from a sender within the victim's-own-domain, but this is just a simple forgery. The attachment name is a .DOCM file matching the name in the subject. Automated analysis [1] [2] indicates that it works in a similar way to this other Locky ransomware run today*."
1] https://malwr.com/an...zQ5YjQwMDJhMGU/
Hosts
208.113.172.228
176.121.14.95


2] https://www.hybrid-a...vironmentId=100
Contacted Hosts
208.113.172.228
91.219.31.14
35.163.57.6
52.222.171.57
35.160.111.237


* http://blog.dynamoo....ber-947781.html
___

Fake 'Software License' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
12 Dec 2016 - "... an email with the subject of 'Software License' coming or pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of softlic_0600353.zip  which delivers Locky ransomware... One of the emails looks like:
From:  Deloris Santos <Santos.Deloris@ terebinthtreeportraits .com>
Date: Mon 12/12/2016 09:59
Subject: Software License
Attachment: softlic_0600353.zip
    Hello scans, it is Deloris.
    Sending you the scan of the software license agreement (Order #0600353).
    It is in the attachment. Please look into it ASAP.
    Best Regards,
    Deloris Santos


12 December 2016: softlic_0600353.zip: ~50Y70PZ821IW1H6QS6R5K4P.wsf - Current Virus total detections 5/55*
Racco42** has posted a list of found download sites on pastebin***... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481540340/

** https://twitter.com/...280355895529473

*** http://pastebin.com/cCeYpZsd
... C2:
POST http ://185.46.11.236/ checkupdate
POST http ://91.200.14.109/ checkupdate
POST http ://93.170.104.23 /checkupdate
POST http ://95.213.224.117 /checkupdate

185.46.11.236: https://www.virustot...36/information/- RU
91.200.14.109: https://www.virustot...09/information/- UA
93.170.104.23: https://www.virustot...23/information/- NL
95.213.224.117: https://www.virustot...17/information/- RU
___

Fake 'Amazon Transactions' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
12 Dec 2016 - "Following on from the continual series of spoofed FedEx Locky downloaders detailed in this POST[1]... using the same method have changed to a very bad imitation of Amazon .co.uk with an email with the subject of 'Transactions_Report__by_users_from_2016-11-18_to_2016-11-20' pretending to come from EGCTechServer  <nf@ ammaazon .co.uk> with a malicious word doc attachment continues to deliver Locky ransomware...
1] https://myonlinesecu...cky-ransomware/
9 Nov 2016

Screenhot: https://i2.wp.com/my...ng?w=1254&ssl=1

12 December 2016: Your_requested_Report_is_attached_Here.doc - Current Virus total detections 20/56*
Payload Security** contacts http ://triumphantul .top/2/ldd.php (185.101.218.162)... which actually downloads
 http ://triumphantul .top/2/565.exe (VirusTotal 4/57***) which is the same Locky version that they malspammed out on Sunday 11 Dec 2016... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481530568/

** https://www.hybrid-a...vironmentId=100

*** https://www.virustot...sis/1481450464/

185.101.218.162: https://www.virustot...62/information/
> https://www.virustot...f9478/analysis/
> https://www.virustot...d496f/analysis/
___

Fake 'Order' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
12 Dec 2016 - "... an email -spoofing- Hexstone Ltd with the subject of 'Order Confirmation 81110319 Hexstone Ltd' (random numbers)... pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of Ord81110319.dzip which delivers Locky ransomware... One of the emails looks like:
From: Leonor rede <Leonor6@ fiveoaks .com>
Date: Mon 12/12/2016 16:23
Subject: Order Confirmation 81110319 Hexstone Ltd
Attachment: Ord81110319.dzip
    This message is intended only for the individual or entity to which it is
    addressed and may contain information that is private and confidential. If
    you are not the intended recipient, you are hereby notified that any
    dissemination, distribution or copying of this communication and its
    attachments is strictly prohibited.


12 December 2016: Ord81110319.dzip: Extracts to: Receipt(546).jse - Current Virus total detections 12/54*
Payload Security** shows a download of an encrypted file from
 http ://indigenouspromotions .com.au /874ghv3?qSzzdCEa=EIWRey which is converted by the script to fQuANqFwqs1.dll
(VirusTotal 16/56***)... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481560496/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
111.67.22.192
176.121.14.95
52.32.150.180
54.239.168.239
52.35.54.251


*** https://www.virustot...0b265/analysis/
...adaa.exe
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 12 December 2016 - 11:34 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1863 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 December 2016 - 05:15 AM

FYI...

Fake 'documents' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
13 Dec 2016 - "... an email with the subject of 'Total Gas & Power documents 0/5' (random numbers) pretending to come from totadonotreply@ netsend .biz with a semi-random named zip attachment in the format of 3000566547_invoice_139920043-09.zip which delivers Locky ransomware. The dates on the emails are 12 days old...

Screenshot: https://i0.wp.com/my...ng?w=1258&ssl=1

13 December 2016: 3000566547_invoice_139920043-09.zip: Extracts to: 3000566547_invoice_139920047-55.jse
Current Virus total detections 9/55*. MALWR** shows a download of an encrypted file from
  http ://94.127.33.126 /knby545?bVoaEKQ=DtsfPK which is converted by the script to JWvpjx1.dll (VirusTotal 10/57***). Payload Security[4]... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481622006/

** https://malwr.com/an...2M0NWQ4NDE5M2Y/
Hosts
94.127.33.126
176.121.14.95


*** https://www.virustot...sis/1481622948/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
94.127.33.126
109.234.34.212
52.39.24.163
35.160.111.237

___

Fake 'Intuit invoice' SPAM - delivers Dridex
- https://myonlinesecu...banking-trojan/
13 Dec 2016 - "... an email -spoofing- Intuit/QuickBooks with the subject of 'Invoice 00341 from Gas Safety Plus' (random numbers and random companies) pretending to come from the random company in subject line <notification@ global-intuit .com> with zip attachment which delivers Dridex banking Trojan... All the ones I have seen seem to be actually coming from various IP numbers on the OVH SAS network using fake, spoofed or newly registered domain identifications:
    193.70.50.59
    193.70.117.190
    176.31.130.77
    176.31.130.74
    51.254.63.185
    91.121.114.211
    92.222.182.70
    94.23.58.107
...
Some of the subject lines & companies include:
    Invoice 00476 from Gaswise (Lincoln) Ltd
    Invoice 00845 from Moss Florist
    Invoice 00668 from Linda Leary Estate Agents
    Invoice 00475 from Urban Merchants, Your Fine Food Supplier
    Invoice 00969 from Ballon Wise ...
One of the emails looks like:
From: Gas Safety Plus <notification@ global-intuit .com>
Date: Thu 01/09/2016 19:22
Subject: Invoice 00341 from Gas Safety Plus
Attachment: link-in-email body
    Gas Safety Plus
    Invoice 00341
    Due date 14/12/2016
    Balance due 335.00
    View invoice
    Dear Customer, Here’s your invoice. We appereciate your prompt payment. Thank’s for your business! Gas Safety Plus
    Intuit. Inc. All right reserved...



13 December 2016: Invoice.zip: Extracts to: Invoice.js - Current Virus total detections 16/55*.
MALWR** shows a download from http ://195.238.172.213 /~iceskate/images/manual.pdf which is -not- a pdf but a renamed .exe file It gets renamed by the script to PPqFp2Bl32.exe and autorun (VirusTotal 9/57***). Payload Security[4]...
The -links- in the email body goes to a hacked/compromised fraudulently set up sharepoint address:
 “https ://telstrastorecorio-my.sharepoint .com/personal/rebecca_telstrashopcorio_com_au/_layouts/15/guestaccess.aspx?guestaccesstoken=nlZdrO0WUpP2BvOovx5%2bkQFaMQk87jAFOPGDI79ApoA%3d&docid=0508e7d01f6e144528e3b4e23521272d1&rev=1”
... Never just blindly click on the link/file in your email..."
* https://www.virustot...sis/1480616575/

** https://malwr.com/an...GNiYTZkZTlhMjM/
Hosts
188.165.230.126
195.238.172.213


*** https://www.virustot...sis/1481626327/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
82.196.5.27
109.74.9.119
192.188.58.163


telstrastorecorio-my.sharepoint .com: 104.146.164.28: https://www.virustot...28/information/
___

Fake 'fax' SPAM - leads to malware
- https://myonlinesecu...nknown-malware/
13 Dec 2016 - "... a -blank- email with the subject of 'fax copia' coming or pretending to come from 910663334@ fax.vodafone .es with a semi-random named zip attachment in the format of 201612130917585473299351.zip
(which is date_randomnumbers.zip) which delivers... Sharik Trojan... Other subjects include:
    Confirmacion
    datos ...
One of the emails looks like:
From: from910663334@ fax.vodafone .es
Date: Tue 13/12/2016 08:47shows
Subject: fax copia
Attachment: 201612130917585473299351.zip


Body content: totally empty/blank

13 December 2016: 201612130917585473299351.zip: Extracts to: 201612130913339837772661.pdf.exe
Current Virus total detections 6/56*. Payload Security** shows several connections which confirms Sharik...
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481619230/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
146.0.72.73
172.227.109.213

___

Fake 'picture' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
13 Dec 2016 - "... an email with the subject of 'a picture for you'  coming or pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of 2016-12-1640.zip which delivers Locky ransomware. other subjects in this malspam run include:
    a image for you
    a photos for you ...
One of the emails looks like:
From: Delia <Delia.6@ mountainbikecup .dk>
Date: Tue 13/12/2016 15:22
Subject: a picture for you
Attachment: 2016-12-1640.zip
    resized


13 December 2016:2016-12-1640.zip: Extracts to: 2016-12-14473.jse - Current Virus total detections 11/50*
MALWR** shows a download of an encrypted file from  http ://jrgolfbuddy .com/knby545?MoxfoYUn=neDsPVdRB which is converted by the script to GDJpPJ1.dll (VirusTotal 9/56***). Payload Security[4]. C2 http ://176.121.14.95 /checkupdate
The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481643767/

** https://malwr.com/an...zQyMWYwYmQ4ZWQ/
Hosts
192.185.225.117
176.121.14.95


*** https://www.virustot...sis/1481643297/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
192.185.225.117
176.121.14.95
35.163.57.6
52.85.184.150
35.160.111.237

___

Fake 'Fixed invoices' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
13 Dec 2016 - "... an email with the subject of 'Fixed invoices'... pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of inv4665150.zip which delivers Locky ransomware... One of the emails looks like:
From: Julia Weiss <Weiss.Julia@ interfacialsolutions .com>
Date: Tue 13/12/2016 20:28
Subject: Fixed invoices
Attachment: inv4665150.zip
    Dear [redacted],
    Sorry for mistakes in the invoice. The number is 362, the amount came to $289.26.
    Please check out the details in the attachment.
    Best Regards,
    Julia Weiss


13 December 2016: inv4665150.zip: Extracts to: ~_C4RM8B_~.wsf - Current Virus total detections 2/54*
... Payload Security**... does show locky ransomware and C2 sites... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481661940/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
104.168.87.215
54.187.5.20
213.32.113.203
52.34.245.108
52.35.54.251
91.198.174.192
91.198.174.208

 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 13 December 2016 - 03:46 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1864 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 December 2016 - 07:42 AM

FYI...

Fake 'Confirmation' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
14 Dec 2016 - "An email -spoofing- Kirklees Council with the subject of 'Booking Confirmation' pretending to come from random senders with a malicious word doc attachment delivers Locky ransomware... The email looks like:
From: jewell nethercote <jewell.nethercote@ luciafranca .com>
Date: Wed 14/12/2016 08:06
Subject: Booking Confirmation
Attachment: BookingConfirmation_331225_aberkinnuji@ thespykiller .co.uk.docm
    Booking Confirmation
     This email and any attachments are confidential. If you have received it in error – notify the sender immediately, delete it from your system, and do not use, copy or disclose the information in any way. Kirklees Council monitors all emails sent or received.


14 December 2016: BookingConfirmation_331225_aberkinnuji@thespykiller.co.uk.docm
Current Virus total detections 13/56*. MALWR** shows a download of an encrypted file from
  http ://eastoncorporatefinance .com/nbv364 which is converted by the script to sonmoga2.rudf (VirusTotal 7/57***). Payload Security[4]. Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes  tdb or .zk. or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481706521/

** https://malwr.com/an...GJlNTBjYTEzYjY/
Hosts
217.160.231.206
176.121.14.95


*** https://www.virustot...sis/1481706902/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
217.160.231.206
176.121.14.95
185.117.72.105
52.34.245.108
52.85.184.150
35.160.111.237

___

Fake 'Certificate' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
14 Dec 2016 - "... an email with the subject of 'Parcel Certificate' pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of par_cert_5444211.zip which delivers Locky ransomware... One of the emails looks like:
From: Effie Bush <Bush.Effie@ adkime .com>
Date: Wed 14/12/2016 09:41
Subject: Parcel Certificate
Attachment: par_cert_5444211.zip
    Dear hyperbolasmappera,
    Please check the parcel certificate I am sending you in the attachment.
    Order number is 477-F. Quite urgent, so please review it.
    Best Regards,
    Effie Bush


14 December 2016: par_cert_5444211.zip: Extracts to: ~_9UZONB_~.wsf - Current Virus total detections 3/54*
Payload Security** shows a download of an encrypted file from http ://ziskant .com/kqnioulnfj which is converted by the script to hIzFvc4Ek.zk (VirusTotal 4/56***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481708404/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
62.210.89.38
185.129.148.56
86.110.117.155
213.32.113.203
35.160.111.237


*** https://www.virustot...sis/1481709795/
___

Fake 'e-fax' SPAM - delivers Trickbot
- https://myonlinesecu...banking-trojan/
14 Dec 2016 - "An email with the subject of 'eFax message from +611300786102 – 4 page(s), Caller-ID: +611300786102' (random numbers) pretending to come from eFax <inbound@ efax .delivery> with a malicious word doc attachment delivers Trickbot banking Trojan...

Screenshot: https://i2.wp.com/my...ng?w=1308&ssl=1

14 December 2016: InboundMessage.doc - Current Virus total detections 10/53*
Payload Security** shows a download from ‘http ://cendereci .com/dasphdasodasopjdaspjdasdasa.png’ which is -not- a png (image file) but -renamed- .exe (VirusTotal 41/57***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481698402/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
85.159.66.172
23.21.228.240
36.37.176.6
202.5.50.55


*** https://www.virustot...f78f8/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 14 December 2016 - 08:24 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1865 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 15 December 2016 - 04:48 AM

FYI...

Fake 'Amount Payable' SPAM - leads to Locky
- http://blog.dynamoo....e-leads-to.html
15 Dec 2016 - "This -fake- financial spam leads to Locky ransomware:
    From:    Lynn Drake
    Date:    15 December 2016 at 09:55
    Subject:    Amount Payable
    Dear [redacted],
    The amount payable has come to $38.29. All details are in the attachment.
    Please open the file when possible.
    Best Regards,
    Lynn Drake


The name of the sender will vary, although the dollar amount seems consistent in all the samples I have seen. Attached is a file with a name similar to doc_6937209.zip which contains an apparently randomly-named script in a format similar to ~_ZJR8WZ_~.js... highly obfuscated script... Typical detection rates for the script are around 16/54*. There are many different scripts, downloading a component...
(Long list of domain-names at the dynamoo URL above.)
According to this Malwr analysis**, a DLL is dropped with a detection rate of 18/55***. This Hybrid Analysis[4] shows the Locky infection clearly and identifies some C2s, combining this with another source gives the following list of C2 servers:
86.110.117.155 /checkupdate (Rustelekom, Russia)
185.129.148.56 /checkupdate (MWTV, Latvia)
185.17.120.166 /checkupdate (Rustelekom, Russia)
MWTV is a known-bad-host, so I recommend blocking the entire /24.
Recommended blocklist:
86.110.117.155
185.129.148.0/24
185.17.120.166
"
* https://virustotal.c...sis/1481796164/

** https://malwr.com/an...jgxNzFiYTMxYjk/
Hosts
92.48.111.60

*** https://virustotal.c...sis/1481796614/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
92.48.111.60
185.129.148.56
86.110.117.155
52.42.26.69
52.85.184.67
52.35.54.251

___

Fake 'Order Receipt' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
15 Dec 2016 - "... an email with the subject of 'Order Receipt' pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format which delivers Locky ransomware... One of the emails looks like:
From: Joshua Mooney <Mooney.Joshua@ ricket .net>
Date: Thu 15/12/2016 10:54
Subject: Order Receipt
Attachment: scan9022222.zip
    Dear enrico,
    Thank you for making your order in our store!
    The payment receipt and crucial payment information are in the attached document.
    King Regards,
    Joshua Mooney
    Sales Manager


15 December 2016: scan9022222.zip: Extracts to: ~_4RYT3KP_~.js - Current Virus total detections 6/54*
MALWR** shows a download of an encrypted file from  http ://www.bds-1 .com/gfftte3uv which is converted by the script to RJJvCX8vggvNw4PW.zk (VirusTotal 4/56***). Payload Security[4]. Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481799202/

** https://malwr.com/an...mY1YTYwZWZlNTA/
Hosts
64.71.33.107

*** https://www.virustot...sis/1481804458/

4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
64.71.33.107
185.17.120.166
185.129.148.56
178.209.51.223
52.42.26.69
52.85.184.195
35.160.111.237
91.198.174.192
91.198.174.208

___

One -billion- users affected - Yahoo hack
- https://www.helpnets...ion-yahoo-hack/
Dec 15, 2016 - "Yahoo has revealed that it’s been the victim of -another- hack and massive data breach that resulted in the compromise of information of a -billion- users... Outside forensic experts that have been called in to help with the investigation believe that this breach happened in August 2013, and that it’s likely -not- been performed by the same attackers as the 2014 breach disclosed this September. In addition to this, the company says that attackers have accessed the company’s proprietary code, which allowed them to learn how to -forge-cookies- and to, therefore, be able to access user accounts -without- a password... Yahoo says that they were unable to identify the intrusion associated with this latest data theft, but that it seems that data associated with more than one-billion- user accounts has been stolen..."
* https://help.yahoo.c...mpressions=true
Dec 14, 2016
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 15 December 2016 - 08:17 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1866 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 December 2016 - 05:12 AM

FYI...

Fake 'document' SPAM - delivers Locky
- https://myonlinesecu...re-again-today/
16 Dec 2016 - "Another -blank/empty- email with the subject of 'Attached document' pretending to come from copier@ your-own-email-address with a malicious word doc attachment delivers Locky ransomware... The email looks like:
From: copier@ your-own-email-address
Date: Fri 16/12/2016 09:57
Subject: Attached document
Attachment: 3867_002.docm


Body content: Completely empty/Blank

16 December 2016: 3867_002.docm - Current Virus total detections 12/56*
Payload Security** shows a download of an encrypted file from http ://fiddlefire .net/hjg766′ which is converted by the script to loppsa2.aww ... Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481882199/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
69.161.143.24
37.235.50.29
176.121.14.95
86.110.117.155
83.220.172.182
52.88.7.60
91.198.174.192
91.198.174.208

___

Fake 'Subscription' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
16 Dec 2016 - "... an email with the subject of 'Subscription Details' pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of user0989063.zip which delivers Locky ransomware... One of the emails looks like:
From: Cyril Levy <Levy.Cyril@ dragonflystudiosalon .com>
Date: Fri 16/12/2016 10:49
Subject: Subscription Details
Attachment: user0989063.zip
    Dear mammoth, thank for you for subscribing to our service!
    All payment and ID details are in the attachment.


16 December 2016: user0989063.zip: Extracts to: ~_P1EJYA_~.js - Current Virus total detections 4/55*
Payload Security** shows a download of an encrypted file from http ://rondurkin .com/c6w5pscmc which is converted by the script to jex1N6oXpYUpIQ.zk (VirusTotal 5/56***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481885511/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
82.211.96.24
91.201.41.145
31.41.47.50
46.8.29.155
52.34.245.108
54.240.162.137


*** https://www.virustot...sis/1481886225/
___

Fake 'Processing Problem' SPAM - leads to Locky
- http://blog.dynamoo....ng-problem.html
15 Dec 2016 - "This -fake- financial spam leads to Locky ransomware:
    From:    Juliet Langley
    Date:    15 December 2016 at 23:17
    Subject:    Payment Processing Problem
    Dear [redacted],
    We have to inform you that a problem occured when processing your last payment (code: 3132224-M, $789.$63).
    The receipt is in the attachment. Please study it and contact us.
    King Regards,
    Juliet Langley


The name of the sender will vary as will the reference number and dollar amounts. Attached is a ZIP file with a name somewhat matching the reference (e.g. MPay3132224.zip) containing in turn a malicious Javascript with a name similar to ~_AB1C2D_~.js... the scripts download a component...
(Long list of domain-names at the dynamoo URL above.)
The malware then phones home to the following locations:
185.129.148.56 /checkupdate (MWTV, Latvia)
178.209.51.223 /checkupdate [hostname: 454.SW.multiservers.xyz] (EDIS, Switzerland)
37.235.50.119 /checkupdate [hostname: 454.2.SW.multiservers.xyz] (EDIS, Switzerland)
Recommended blocklist:
185.129.148.0/24
178.209.51.223
37.235.50.119
"

- https://myonlinesecu...delivers-locky/
15 Dec 2016 - "... an email with the subject of 'Payment Processing Problem' coming or pretending to come from random companies, names and email addresses with a semi-random named zip attachment in the format of  MPay7197337.zip which delivers Locky ransomware... One of the emails looks like:
From: Kristie Soto <Soto.Kristie@ kadgraphics .com>
Date: Thu 15/12/2016 22:33
Subject: Payment Processing Problem
Attachment: MPay7197337.zip
    Dear adkins,
    We have to inform you that a problem occured when processing your last payment (code: 7197337-M, $454.$86).
    The receipt is in the attachment. Please study it and contact us.
    King Regards,
    Kristie Soto


15 December 2016: MPay7197337.zip: Extracts to: ~_7XXTOQ_~.js - Current Virus total detections 3/55*
Payload Security** shows a download of an encrypted file from http ://ustadhanif .com/q0w93lkrvp  
which is converted by the script to HNUsEBnh.zk (VirusTotal 6/57***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1481842328/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
208.75.151.108
37.235.50.119
52.85.184.150


*** https://www.virustot...sis/1481843139/
___

Malvertising compromises routers instead of computers
- https://www.helpnets...omises-routers/
Dec 16, 2016 - "The DNSChanger exploit kit is back and more effective than ever, and is being used in a widespread malvertising attack whose goal is to compromise small/home office routers. According to Proofpoint* researchers, the attacker’s current main goal is to change DNS records on the target router, so that it queries the attacker’s rogue DNS servers, and the users are served with ads that will earn the attackers money:
> https://www.helpnets...nger-attack.jpg
... Using ad-blocking software should also minimize the risk of getting hit through this and other malvertising campaigns. According to Kafeine**, the current one is successfully targeting Chrome browser users on Windows desktops and Android devices. Also, this is not the first time that attackers are successfully using steganography to deliver and run malicious code. Earlier this month, ESET researchers flagged a malvertising campaign that redirected users to the Stegano exploit kit through malicious code hidden in the pixels of the bad ads/banners."
* https://www.proofpoi...android-devices
"... Since the end of October, we have seen an improved version of the “DNSChanger EK” ** used in ongoing malvertising campaigns. DNSChanger attacks internet routers via potential victims’ web browsers; the EK does not rely on browser or device vulnerabilities but rather vulnerabilities in the victims' home or small office (SOHO) routers. Most often, DNSChanger works through the Chrome browser on Windows desktops and Android devices. However, once routers are compromised, all users connecting to the router, regardless of their operating system or browser, are vulnerable to attack and further malvertising..."
** http://malware.dontn...ed-to-csrf.html
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 16 December 2016 - 09:17 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1867 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 19 December 2016 - 05:55 AM

FYI...

Fake 'Payslip' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
19 Dec 2016 - "An email with the subject of 'Payslip for the month Dec 2016' pretending to come from random senders with a malicious word doc attachment delivers Locky ransomware... The email looks like:
From: JASMINE DICKEY <jasmine.dickey@ ejmbcommercial .com>
Date: Mon 19/12/2016 09:50
Subject: Payslip for the month Dec 2016.
Attachment: Payslip_Dec_2016_5490254.doc
    Dear customer,
    We are sending your payslip for the month Dec 2016 as an attachment with this mail.
    Note: This is an auto-generated mail. Please do not reply.


19 December 2016: Payslip_Dec_2016_5490254.doc - Current Virus total detections 11/53*
Payload Security** shows a download of an encrypted file from http ://routerpanyoso.50webs .com/8hrnv3 which is converted by the script to shtrina2.ero (VirusTotal 12/55***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482144602/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
162.210.101.94
193.201.225.124
46.148.26.82
188.127.237.76
176.121.14.95
52.39.24.163
52.85.184.92
91.198.174.192
13.82.139.29
91.198.174.192
91.198.174.208


*** https://www.virustot...sis/1482144877/

- http://blog.dynamoo....h-dec-2016.html
19 Dec 2016 - "This -fake- financial spam leads to Locky ransomware:
    From:    PATRICA GROVES
    Date:    19 December 2016 at 10:12
    Subject:    Payslip for the month Dec 2016.
    Dear customer,
    We are sending your payslip for the month Dec 2016 as an attachment with this mail.
    Note: This is an auto-generated mail. Please do not reply.


The name of the sender will vary. Attached is a malicious Word document with a name like Payslip_Dec_2016_6946345.doc which has a VirusTotal detection rate of 12/55*. This Hybrid Analysis** clearly shows Locky ransomware in action when the document is opened. According to my usual reliable source, the various versions of this download a component...
(Long list of domain-names shown at the dynamoo URL above.)
... The malware then phones home to one of the following locations:
176.121.14.95 /checkupdate (Rinet LLC, Ukraine)
193.201.225.124 /checkupdate (PE Tetyana Mysyk, Ukraine)
188.127.237.76 /checkupdate (SmartApe, Russia)
46.148.26.82 /checkupdate (Infium, Latvia / Ukraine)
A DLL is dropped with a detection rate of 12/52*.
Recommended blocklist:
176.121.14.95
193.201.225.124
188.127.237.76
46.148.26.82
"
* https://virustotal.c...sis/1482147232/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
193.201.225.124
188.127.237.76
46.148.26.82
176.121.14.95
52.85.184.12


*** https://virustotal.c...a16d3/analysis/
___

Fake 'LogMeIn' SPAM - delivers malware
- https://myonlinesecu...livers-malware/
19 Dec 2016 - "The email looks like:
From: LogMeIn.com Auto-Mailer <noreply@ ssl-logmein .com>
Date: Mon 19/12/2016 17:10
Subject: LogMeIn Account Notification  – Ip blocked
Attachment: -Link-in-email-body- downloads notification_recipients_name.doc
    Your IP has been blocked from using the LogMeIn website after too many failed log-in attempts.
    Account holder: keith@[redacted]
    Event: IP blocked
    At: Mon, 19 Dec 2016 19:09:37 +0200
    To clear the IP address lockout, please follow the instructions...


Screenshot: https://i0.wp.com/my...ble-editing.png

19 December 2016: notification_keith.doc - Current Virus total detections 3/54*
Payload Security **. The link-in-the-email is to  http ://www .celf .jp/wp-content/themes/i-max/api/get.php?id=recipients email address encoded in base 64... The domain ssl-logmein .com was registered -today- 19 December 2016 via a Chinese registrar to a Bulgarian entity (IP address listed as 1.1.1.1). The emails are actually coming via a botnet of infected/compromised computers and servers... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482167739/
Trojan:W97...

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
23.21.228.240
80.78.251.134
212.24.98.247


ssl-logmein .com: 1.1.1.1: https://www.virustot....1/information/
> https://www.virustot...7a4a5/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 19 December 2016 - 04:29 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1868 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 December 2016 - 05:24 AM

FYI...

Fake 'printing' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
20 Dec 2016 - "An email spoofing Moonbake Inc with the subject of 'for printing' coming from random sender with a malicious Excel XLS spreadsheet attachment delivers Locky... One of the email looks like:
From: HILLARY TATEHAM <hillary.tateham@ stonelawassociates .Com>
Date: Tue 20/12/2016 09:47
Subject: for printing
Attachment: Certificate_2373.xls
    Hi,
    For printing.
    Thank you so much.
    HILLARY TATEHAM Cristobal HRD/Admin Officer
    Moonbake Inc. 14 Langka St., Golden Acres Talon 1
    Las Piñas City, Philippines ...


20 December 2016: Certificate_2373.xls - Current Virus total detections 5/56*
Payload Security** shows a download of an encrypted file from http ://yorkshire-pm .com/hjv56 which is converted by the script to momerk2.vip (VirusTotal 9/55***). Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do. Manual analysis shows these download locations:
yorkshire-pm .com/hjv56
isriir .com/hjv56
noosnegah .com/hjv56 ...
DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482227222/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
103.11.101.46
91.223.180.3
188.127.239.48
193.201.225.124
54.239.168.79


*** https://www.virustot...sis/1482228007/
___

Fake 'Scan' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
20 Dec 2016 - "... an email spoofing Lumax Industries Ltd. with the subject of 'Scan' pretending to come from random companies, names and email addresses with a random named zip attachment which delivers Locky ransomware...

Screenshot: https://i0.wp.com/my...png?w=896&ssl=1

20 December 2016: 07cff4edf9a.zip: Extracts to: r9a2aa5cdfcbabe8bbbfc598cd334abb.wsf
Current Virus total detections 9/55*. Payload Security** shows a download of an encrypted file from
 http ://www.judo-hattingen .de /hjv56?lktttKC=koHaQOx which is converted by the script to pYmpJfsNiM1.dll which unfortunately the free web version of Payload security does not make available for download... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482248792/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
91.250.102.57
176.121.14.95
193.201.225.124
52.32.150.180
52.85.184.12

 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 20 December 2016 - 11:47 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1869 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 December 2016 - 05:41 AM

FYI...

Fake 'Secure Comm' SPAM - delivers Trickbot
- https://myonlinesecu...livers-malware/
21 Dec 2016 - "An email spoofing CommBank with the subject of 'Secure Communication' coming from < secure.message@ commbanksecureemail .com > with a malicious word doc attachment delivers Trickbot banking Trojan...

Screenshot: https://i1.wp.com/my...=1024,805&ssl=1

21 December 2016: Message.doc - Current Virus total detections 14/54*
Payload Security** shows a downloadfrom http ://onsitepcinc .com/images/344bzhmyVYyWz7NqRpfuunqXxjkseLhdmy.png  which is -not- a png (image file) but a renamed .exe that is renamed by the script to wynrajo.exe (VirusTotal 22/56***)... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482306465/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
65.108.116.221
78.47.139.102
36.37.176.6
201.236.219.180
144.76.249.26


*** https://www.virustot...sis/1482314962/
___

Fake 'Photo' SPAM - delivers Locky
- https://myonlinesecu...delivers-locky/
21 Dec 2016 - "... another -blank- empty email with the subject of 'Photo' from {random Girl’s name} pretending to come from  names and email addresses with a semi-random named zip attachment in the format of IMG-date-WA1234.zip which delivers Locky ransomware... One of the emails looks like:
From: Glenna <Glennaherron3424@ syprotek .com>
Date: Wed 21/12/2016 09:32
Subject: Photo from Glenna
Attachment: IMG-20161221-WA4646.zip


Body content: totally blank/Empty

21 December 2016: IMG-20161221-WA4646.zip: Extracts to: A87D1FCF.wsf - Current Virus total detections 8/55*
Payload Security**... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482312946/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
103.232.120.79
176.121.14.95
52.42.26.69
54.240.162.130
52.35.54.251

 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 21 December 2016 - 07:27 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1870 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 22 December 2016 - 04:04 AM

FYI...

Fake 'scanned copy' SPAM - delivers Locky
- https://myonlinesecu...cky-ransomware/
22 Dec 2016 - "... another -blank/empty- email with the subject of 'scanned copy' pretending to come from random names and email addresses with a semi-random named zip attachment in the format of HP0000000937.zip delivers Locky ransomware... One of the emails looks like:
From: jeanne whitehorne <jeanne.whitehorne@ owdv .net>
Date: Thu 22/12/2016 03:55
Subject: scanned copy
Attachment: HP0000000937.zip


Body content: totally blank/empty

22 December 2016: HP0000000937.zip: Extracts to: JFF38A.vbs - Current Virus total detections 8/55*
Payload Security** shows a download of an encrypted file from http ://www .dvdpostal .net/result ... Locky has recently started to use non standard file extensions on the binaries. Sometimes they are numbers like 342, 343, 552 or sometimes .tdb or .zk  or any other 2, 3 or 4 character or number extension. All of these are actually DLL files that rundll32.exe will run via the macro or VBS/JS/WSF scripting file telling it what to do... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482379501/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
213.0.77.6
176.121.14.95
52.88.7.60
54.240.162.173
35.160.111.237

___

Fake 'Bestbuy' SPAM - delivers malware
- https://myonlinesecu...eliver-malware/
22 Dec 2016 - "... an email with the subject of 'Your Bestbuy item is due for delivery on 22th December' pretending to come from random names at yahoo .com with a random named zip attachment which tries to deliver some sort of malware. This zip file extracts to another zip file before it extracts to the .js file... One of the emails looks like:
From: josecastillo2344@ yahoo .com
Date: Thu 22/12/2016 08:56
Subject: Your Bestbuy item is due for delivery on 22th December
Attachment: ECIOPZiodlxc.zip
    On the morning 22th of December you’ll be delivered a window and you’ll have the possibility to track your request on its way to your address.
    Please make sure someone is available to sign for your delivery.
    Pack delivery info and your contact data is in the file attached to this letter.
    If you will be out, it’s not a problem: you have a range of ‘in-flight’ options like changing your delivery time collecting from the nearest DPD Pickup Shop, asking us to deliver to one of your frients or arranging to have your item delivered to a safe place at your work address.


22 December 2016: ECIOPZiodlxc.zip: Extracts to: ECIOPZiodlxc.js - Current Virus total detections 3/54*
Payload Security** shows a download of an encrypted file from  http ://optimastop .eu/castle/map which is currently giving me a 403 forbidden. It does show it wants to use BITS transfer and it is possible that a standard http get is blocked... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482399844/
Troj.Downloader.Js...

** https://www.hybrid-a...vironmentId=100
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 22 December 2016 - 04:24 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#1871 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 December 2016 - 05:48 AM

FYI...

Tech support phone SCAM
- http://blog.dynamoo....scam-using.html
23 Dec 2016 - "If these people ring you DO -NOT- GIVE THEM ACCESS TO YOUR PC and either hang up - or waste their time like I do. It seems there are some prolific technical support scammers ringing from 02085258899 pretending to be from BT. They had a very heavy Indian accent, and they have made many silent calls to my telephone number before today. They -claim- that hackers are accessing my router. I wasted 37 minutes of their time, these are some of the steps to watch out for..
1. They get you to open a command prompt and type ASSOC which brings up a big long list of file associations, in particular they seem interested in one that says .ZFSendToTarget=CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}
2. Then they get you to bring up the Event Viewer by typing EVENTVWR and then clicking "Custom Views" and "Administrative Events". This is a log file that will always show a whole bunch of meaningless errors (such as network faults). It's quite normal for this to look quite bad to the untrained eye.
3. Then in order they try to get you to connect to the following services to take remote control of your PC: www .anydesk .com, www .teamviewer .com and www .supremofree .com. All of these are legitimate services, but I have to confess I'd never heard of the last one.. so I will add it to my corporate blacklist.
4. When those didn't work they tried directing me to a proxy at hide .me/proxy and www .hide .me/proxy (the same thing I know) which is probably another candidate for blocking.
Of course, once they have access to your PC they will try to convince you that you need to -pay- them some money for technical support. Be warned, that they can render-your-PC-unusable if you don't pay, and they can also steal confidential data. Despite how many times they may tell you they are from BT, they are not.. they are simply fraudsters."
___

Fake 'eFax' SPAM - delivers malware
- https://myonlinesecu...nknown-malware/
22 Dec 2016 - "... another email spoofing eFax with the subject of 'You have recevied a message' pretending to come from faxscanner scanner@ your-own-email-address with a semi-random named zip attachment in the format of Message efax system-1701.zip which delivers an unknown malware. Indications are that this could be Trickbot or could be Dridex banking Trojan... One of the emails looks like:
From: Fax Scanner <scanner @ your-email-address>
Date: Thu 22/12/2016 20:51
Subject: You have recevied a message
Attachment: Message efax system-1701.zip
    You have received a message on efax.
    Please download and open document attached.
    Scanner eFax system.


22 December 2016: Message efax system-1701.zip: Extracts to: Message efax system-2817.js
Current Virus total detections 4/53*. Payload Security** shows a download of ntntoto1].png (but doesn’t give the download url) which is renamed by the script to QE7JlpDt.exe (VirusTotal 29/56***). The js file is heavily obfuscated and almost impossible to human read and decrypt. Update: MALWR[4] gave me ‘http ://glendaleoffice .com/js/ntntoto.png’ as the download location... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482441908/

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
78.47.139.102
36.37.176.6
201.236.219.180


*** https://www.virustot...d9c29/analysis/

4] https://malwr.com/an...DgwMDIxODEwMmU/
Hosts
69.67.54.86
78.47.139.102
54.243.154.49
45.76.25.15
167.114.174.158
188.40.53.51
36.37.176.6
192.189.25.143


glendaleoffice .com: 69.67.54.86: https://www.virustot...86/information/
> https://www.virustot...5d12e/analysis/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 23 December 2016 - 07:24 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1872 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 27 December 2016 - 06:53 AM

FYI...

Fake 'USPS' SPAM - delivers Locky, Kovter, other malware
- https://myonlinesecu...-other-malware/
27 Dec 2016 - "... malware gang spoofing FedEx, USPS and every other courier, delivery or postal service, sending thousands of 'Courier was not able to deliver your parcel' and hundreds of variants or similar subjects like 'USPS issue #06914074: unable to delivery parcel'... Some subjects seen, all have random numbers, include:
    USPS issue #06914074: unable to delivery parcel
    Parcel #006514814 shipment problem, please review
    USPS parcel #3150281 delivery problem
    Courier was not able to deliver your parcel (ID006976677, USPS)
    Parcel 05836911 delivery notification, USPS

... malware downloaders spoofing USPS pretending to be a message saying cannot deliver the parcel. These deliver Locky ransomware and Kovter Trojans amongst others...

27 December 2016: Delivery-Details-06914074.zip: Extracts to: Delivery-Details-06914074.doc.wsf
Current Virus total detections 7/55*. Payload Security** shows a download from
  http ://boardedhallgreen .com/counter/?a=1HHDb3PbzDuGitWA7eW5oQFLzRjd1VzqhJ&m=3254807&i=Y5rzyqa6RhRlpx-dpPoqiXX2fW4GipPhNOTHtfBNJDBj6eEd6iZ3Yj9wAD7akn77R5LBqqvQvXIlyx_kYmBdyl0Bi12Qqds7
  which gives counter.js (VirusTotal 1/55***) that in turn downloads from
 http ://baltasmenulis .lt/counter/?i=Y5rzyqa6RhRlpx-dpPoqiXX2fW4GipPhNOTHtfBNJDBj6eEd6iZ3Yj9wAD7akn77R5LBqqvQvXIlyx_kYmBdyl0Bi12Qqds7&a=1HHDb3PbzDuGitWA7eW5oQFLzRjd1VzqhJ&r=01 (and 02 – 05).
The script tries the first in the list & then moves down until it gets a reply from the server. You never see the first downloaded file ( counter.js on your computer, that is run directly from temp internet files ). It downloads 01 first, then 02, then 03 until you get to 05. If any site doesn’t have the file, then it moves to the next site in the list for that particular file. Each site on the list has a full set of the files. but it is rare for the site giving counter.js to actually download from itself, normally that downloads from a different site on the list. All the files (apart from the original counter.js) pretend to be png (image files). They are actually all renamed .exe files or in the case of number 3, a -renamed- php script. Both of the innocent files are misused to run the malware. This is a very noisy malware set that contacts 4 domains and -179- hosts. View the network section on the Payload Security report[4] for more details... One of the emails looks like:
From: USPS Priority Delivery <steven.kent@ confedampa .org>
Date: Tue 27/12/2016 06:57
Subject: USPS issue #06914074: unable to delivery parcel
Attachment: Delivery-Details-06914074.zip
    Dear Customer,
    Your item has arrived at December 25, but our courier was not able to deliver the parcel.
    You can download the shipment label attached!
    Thank you for your assistance in this matter,
    Steven Kent,
    USPS Chief Delivery Manager.


The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1482822876/

** https://www.hybrid-a...vironmentId=100

*** https://www.virustot...sis/1482824922/

4] https://www.hybrid-a...network-traffic
Contacted Hosts (179)
___

Fake 'FedEx' SPAM - delivers Locky and other malware
- https://myonlinesecu...other-malwares/
25 Dec 2016

> https://www.hybrid-a...network-traffic
Contacted Hosts (170)
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 27 December 2016 - 08:54 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1873 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 December 2016 - 06:45 AM

FYI...

Fake 'FedEx/USPS' SPAM - Kovter/Locky sites
- https://myonlinesecu...nd-locky-sites/
28 Dec 2016 - "Following on from these [FEDEX(1)] [USPS(2)] posts describing the Spoofed FedEx and USPS (and other delivery services from time to time). I will endeavour to keep up to date with a list of current sites involved in the spreading of this malware. I will also show the command used that day to obtain the malware. I will add each days new sites to the lists, but please remember that old sites are -reused-daily- until taken down by their hosts. -All- the sites used in this malware spreading campaign are -hacked/compromised- sites.
1] https://myonlinesecu...other-malwares/

2] https://myonlinesecu...-other-malware/

The script tries the first in the list & then moves down until it gets a reply from the server. You never see the first downloaded file (counter.js by searching on your computer, that is run directly from temp internet files). Counter.js then downloads a different -variant- of counter.js which in turn downloads 01 first, then 02, then 03 until you get to 05. If any site doesn’t have the file, then it moves to the next site in the list for that particular file. Each site on the list has a full set of the files. but it is rare for the site delivering counter.js to actually download from itself, normally that downloads from a different site on the list. All the files (apart from the -original- counter.js) pretend to be png (image files). They are actually all renamed .exe files or a renamed php script listing the files to be encrypted. Counter.js contains the list of sites to download from, which includes many of the sites listed in the original WSF, JS, VBS or other scripting file and normally one or 2 extra ones. to get the -second- counter.js you need to change the &r=01 at the end of the url to &m=01 (or 02-05). This -second- counter.js contains -additional- sites to download from which frequently includes sites from the previous days lists that are not already included in the WSF or first counter.js.
I only accidentally found out about the second /3rd /4th /5th counter.js when I made a mistake in manually decoding the original wsf file (and the original counter.js) and mistyped/miscopied the &r= and used &m= instead. Obviously it is a belt and braces approach to making sure the actual malware gets downloaded to a victim’s computer when urls or sites are known about and -blocked- by an antivirus or web filter service.

25 December 2016: (Payload Security report [3]) Contacted Hosts (170)
3spension .com: 116.127.123.32: https://www.virustot...32/information/
minebleue .com: 213.186.33.87: https://www.virustot...87/information/
chaitanyaimpex .org: 43.255.154.44: https://www.virustot...44/information/
grancaffe .net: 94.23.64.40: https://www.virustot...40/information/
break-first .com: 87.98.144.123: https://www.virustot...23/information/
www .meizumalaysia .com: 103.51.41.205: https://www.virustot...05/information/
dreamoutloudcenter .org: 184.168.234.1: https://www.virustot....1/information/
megrelis-avocat .com: 213.186.33.82: https://www.virustot...82/information/

/counter/?a=1DtntZgmur6occ1CY29PJzvAzLsjCXMuyD&m=9488599&i=e5J5zaa6WhR1MYhBZ8L8Rmw2RWRVmbtna9Y_vLRIrGW2mVxU7SBYLhBH9Gj5Mr942yUp7kFWRWAOGtmJ5aqexWRDrTq_rGixe_a-gmVCMQ
/counter/?i=e5J5zaa6WhR1MYhBZ8L8Rmw2RWRVmbtna9Y_vLRIrGW2mVxU7SBYLhBH9Gj5Mr942yUp7kFWRWAOGtmJ5aqexWRDrTq_rGixe_a-gmVCMQ&a=1DtntZgmur6occ1CY29PJzvAzLsjCXMuyD&r=01

27 December 2016: (Payload Security report[4]) Contacted Hosts (179)
lacasadeicuochi .it: 185.2.4.12: https://www.virustot...12/information/
boardedhallgreen .com: 184.168.230.1: https://www.virustot....1/information/
www .memoodgetactive.det.nsw .edu.au: 153.107.134.124: https://www.virustot...24/information/
rebecook .fr: 213.186.33.104: https://www.virustot...04/information/
peachaid .com: 107.180.26.91: https://www.virustot...91/information/
kidsgalaxy .fr: 213.186.33.18: https://www.virustot...18/information/
baltasmenulis .lt: 185.5.53.28: https://www.virustot...28/information/
artss .org: 166.62.27.56: https://www.virustot...56/information/

/counter/?a=1HHDb3PbzDuGitWA7eW5oQFLzRjd1VzqhJ&m=3254807&i=Y5rzyqa6RhRlpx-dpPoqiXX2fW4GipPhNOTHtfBNJDBj6eEd6iZ3Yj9wAD7akn77R5LBqqvQvXIlyx_kYmBdyl0Bi12Qqds7  
/counter/?i=Y5rzyqa6RhRlpx-dpPoqiXX2fW4GipPhNOTHtfBNJDBj6eEd6iZ3Yj9wAD7akn77R5LBqqvQvXIlyx_kYmBdyl0Bi12Qqds7&a=1HHDb3PbzDuGitWA7eW5oQFLzRjd1VzqhJ&r=01

28 December 2016: (Payload Security report[5])  Contacted Hosts (174)
thanepoliceschool .com: 166.62.27.146: https://www.virustot...46/information/
chimie.iset-liege .be: 213.186.33.17: https://www.virustot...17/information/
partnersforcleanstreams .org: 192.186.205.128: https://www.virustot...28/information/

/counter/?a=1N1rEZQQ9Z3Ju6jggwn7hFU1jXytBTcK7r&m=8429816&i=LXEfbBQo_qDv_k77jrIae7y_BHSSQ_IZeneRTOoRmdDa4RlnJqaUKIl03HhN683DsUx-hkDi_OiCy0bOPjhZTiYm8RSQDBkfCerE
/counter/?i=LXEfbBQo_qDv_k77jrIae7y_BHSSQ_IZeneRTOoRmdDa4RlnJqaUKIl03HhN683DsUx-hkDi_OiCy0bOPjhZTiYm8RSQDBkfCerE&a=1N1rEZQQ9Z3Ju6jggwn7hFU1jXytBTcK7r&r=01 "

3] https://www.hybrid-a...vironmentId=100

4] https://www.hybrid-a...vironmentId=100

5] https://www.hybrid-a...vironmentId=100
___

29 December 2016: (Payload Security report[6]) Contacted Hosts (169)
cobycaresfoundation .org: 72.47.244.92: https://www.virustot...92/information/
dev.zodia-q .com: 153.121.37.174: https://www.virustot...74/information/
shark1.idhost .kz: 82.200.247.240: https://www.virustot...40/information/
italysfinestdesign .it: 217.72.102.152: https://www.virustot...52/information/
salutgaudi .com: 185.2.4.20: https://www.virustot...20/information/
zodia-q .com: 153.121.37.174: https://www.virustot...74/information/

/counter/?a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&m=2365622&i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA

/counter/?i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA&a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&r=01

> 2nd version today (Payload Security Report[7]) Contacted Hosts (7)

/counter/?=&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo&a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&r=01

/counter/?a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&m=4831333&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo

6] https://www.hybrid-a...vironmentId=100

7] https://www.hybrid-a...vironmentId=100
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 29 December 2016 - 05:06 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1874 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 29 December 2016 - 06:24 AM

FYI...

Fake 'FedEx/USPS' SPAM - updates
- https://myonlinesecu...nd-locky-sites/
28 Dec 2016

29 December 2016: (Payload Security report[6]) Contacted Hosts (169)
cobycaresfoundation .org: 72.47.244.92: https://www.virustot...92/information/
dev.zodia-q .com: 153.121.37.174: https://www.virustot...74/information/
shark1.idhost .kz: 82.200.247.240: https://www.virustot...40/information/
italysfinestdesign .it: 217.72.102.152: https://www.virustot...52/information/
salutgaudi .com: 185.2.4.20: https://www.virustot...20/information/
zodia-q .com: 153.121.37.174: https://www.virustot...74/information/

/counter/?a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&m=2365622&i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA

/counter/?i=a5P5yqa6RhR1p80JYSnJbDP0I9KOXtIPtIhrFT4SHyIIqBAg-BghzAkZFkHS2tXw5C3mJYnrwuc1MpOfvGWZGd_STcfaml86P_kj5gA&a=13h8Y8z3WfiDFYG7jEWgsqZmPL94z22ca1&r=01

> 2nd version today (Payload Security Report[7]) Contacted Hosts (7)

/counter/?=&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo&a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&r=01

/counter/?a=16TqYh72RpopqiWR97WGMNtTGTazWFYBg1&m=4831333&i=a5P71qa6RhRlpLdtPLsJBpD0aKRuq7EtvIQrHyyE-zmVoG37HDoS-OmdfAXYY-Y0RtEcCwavHQyucNU4JL_PpGxvv0l-mxt00fo

6] https://www.hybrid-a...vironmentId=100

7] https://www.hybrid-a...vironmentId=100
___

Updated Sundown EK ...
- http://blog.trendmic...-steganography/
Dec 29, 2016 - "... On December 27, 2016, we noticed that Sundown was updated... The PNG files weren’t just used to store harvested information; the malware designers now used -steganography- to hide their exploit code. The newly updated exploit kit was used by multiple-malvertising-campaigns to distribute malware. The most affected countries were Japan, Canada, and France, though Japanese users accounted for more than 30% of the total targets:
> https://blog.trendmi...anography-1.jpg
...  previous Sundown versions directly connected victims to the Flash-exploit-file on their landing page. In this updated version, the exploit kit’s malvertisement creates a hidden iframe that automatically connects to the Sundown landing page. The page will retrieve and download a white PNG image. It then decodes the data in this PNG file to obtain additional malicious code... we found that it included the exploit code targeting CVE-2015-2419, a vulnerability in the JScript handling of Internet Explorer. A Flash exploit for CVE-2016-4117 is also retrieved by the exploit code. The landing page itself includes an exploit targeting another Internet Explorer (IE) vulnerability, CVE-2016-0189... The Sundown exploit kit exploits vulnerabilities in Adobe Flash and JavaScript, among others... Indicators of Compromise: The following domains were used by the Sundown Exploit kit with the matching IP addresses:
    xbs.q30 .biz (188.165.163.228)
    cjf.0340 .mobi (93.190.143.211)
The Chthonic sample has the following SHA1 hash:
    c2cd9ea5ad1061fc33adf9df68eeed6a1883c5f9
The sample also used the following C&C server:
    pationare .bit"

pationare .bit: 'Could not find an IP address for this domain name.'

188.165.163.228: https://www.virustot...28/information/

93.190.143.211: https://www.virustot...11/information/
 

:ph34r: :ph34r:   <_<


Edited by AplusWebMaster, 29 December 2016 - 06:25 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#1875 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 03 January 2017 - 11:36 AM

FYI...

Fake 'FTC' SPAM - ransomware
- https://myonlinesecu...t-notification/
3 Jan 2017 - "... an email with the subject of 'Consumer complaint notification' pretending to come from Federal Trade Commission <ftc.mvUJw@ ftc .gov.uk>... this is a ransomware version. Techhelplist* has kindly helped out and run the sample on a test system and got this very seasonal screenshot:
* https://twitter.com/...316984371646469
... The domain “ftc .gov.uk” does -not- exist... The link-in-the-email goes to:
 http ://govapego .com//COMPLAINT42084270.zip

Screenshot: https://i2.wp.com/my...=1024,574&ssl=1

3 January 2017: COMPLAINT42084270.zip: Extracts to: COMPLAINT.pdf.exe - Current Virus total detections 21/57*
Payload Security**..."
* https://www.virustot...sis/1483458092/
COMPLAINT.pdf.exe

** https://www.hybrid-a...vironmentId=100
Contacted Hosts
81.4.123.67: https://www.virustot...67/information/

govapego .com: 92.51.134.34: https://www.virustot...34/information/
 

:ph34r: :ph34r:   <_<


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users