FYI...
Fake 'pdf attachment' SPAM - delivers Locky/Dridex
- https://myonlinesecu...df-attachments/
11 May 2017 - "... well used email template with subjects varying from with literally hundreds if not thousands of subjects. These generally deliver either Locky ransomware or Dridex banking Trojan.
File_69348406
PDF_9859
Scan_2441975
Document_11048
Copy_9762
They -all- have a pdf attachment that drops a word doc with macros... all downloads from these locations which delivers an encrypted txt file that should be converted by the macro to a working.exe file but Payload security.... doesn’t seem able to convert it...
wipersdirect .com/f87346b
tending .info/f87346b
julian-g .ro/f87346b
I am being told this is a -new- ransomware called jaff ransomware*...
* https://twitter.com/...586080507424769
... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
wipersdirect .com: 108.165.22.125: https://www.virustot...25/information/
> https://www.virustot...49ec3/analysis/
tending .info: 80.75.98.151: https://www.virustot...51/information/
> https://www.virustot...35742/analysis/
julian-g .ro: 86.35.15.215: https://www.virustot...15/information/
> https://www.virustot...82654/analysis/
___
Fake 'DHL Statements' SPAM - delivers js malware
- https://myonlinesecu...livers-malware/
11 May 2017 - "... an email with the subject of '6109175302 Statements x Requests Required' (random numbers) pretending to come frombgyhub@ dhl .com with a zip attachment containing -2- differently named .js files which delivers some sort of malware...
Screenshot: https://myonlinesecu...ts-Required.png
TYPE OF GOODS_DECLARATION.zip: Extracts to: DECLARATION (FORM).PDF.js -and- TYPE OF GOODS DOC.pdf.js
Current Virus total detections [1] [2]: Payload Security [3] [4] shows a download from one or both of these locations:
http ://schuetzen-neusalz .de/images/banners/gbfont.se -or- http ://wersy .net/cuts.vs which is renamed and autorun by the script (VirusTotal [5]) (Payload Security[6])... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
1] https://www.virustot...sis/1494487534/
2] https://www.virustot...sis/1494487531/
3] https://www.hybrid-a...vironmentId=100
4] https://www.hybrid-a...vironmentId=100
5] https://www.virustot...sis/1494488118/
6] https://www.hybrid-a...vironmentId=100
schuetzen-neusalz .de: 85.13.146.159: https://www.virustot...59/information/
> https://www.virustot...cc5ce/analysis/
wersy .net: 217.29.53.99: https://www.virustot...99/information/
> https://www.virustot...0680e/analysis/
___
Malware spam with 'nm.pdf' attachment
- http://blog.dynamoo....attachment.html
11 May 2017 - "Currently underway is a malicious spam run with various subjects, for example:
Scan_5902
Document_10354
File_43359
Senders are random, and there is -no- body text. In -all- cases there is a PDF attached named nm.pdf with an MD5 of D4690177C76B5E86FBD9D6B8E8EE23ED -or- 6B305C5B59C235122FD8049B1C4C794D (and possibly more). Detection rates at VirusTotal are moderate [1] [2].
The PDF file contains an embedded Word .docm macro document. Hybrid Analysis [3] [4] is partly successful, but it shows a run-time error for the malicious code, but it does demonstrate that malicious .docm file is dropped with a detection rate of 15/58[5].
Putting the .docm file back into Hybrid Analysis and Malwr [6] [7] shows the same sort of results, namely a download from:
easysupport .us/f87346b ...
UPDATE: A contact pointed out this Hybrid Analysis[X] which looks like basically the same thing, only in this sample the download seems to work. Note the references to "jaff" in the report, which -matches- this Tweet[8] about something called "Jaff ransomware".
That report also gives two other locations to look out for:
trialinsider .com/f87346b
fkksjobnn43 .org/a5/
This currently gives a recommended blocklist of:
47.91.107.213
trialinsider .com
easysupport .us "
1] https://virustotal.c...sis/1494492097/
2] https://virustotal.c...sis/1494492251/
3] https://www.hybrid-a...vironmentId=100
Contacted Hosts
198.58.93.28 - easysupport .us
- https://www.virustot...28/information/
> https://www.virustot...de188/analysis/
4] https://www.hybrid-a...vironmentId=100
Contacted Hosts
198.58.93.28 - easysupport .us
5] https://virustotal.c...sis/1494492613/
6] https://www.hybrid-a...vironmentId=100
198.58.93.28 - easysupport .us
> https://www.virustot...de188/analysis/
7] https://malwr.com/an...WY1NjU5ZDViNzk/
8] https://twitter.com/...597006363152385
X] https://www.hybrid-a...vironmentId=100
Contacted Hosts
107.154.168.227 - trialinsider .com
47.91.107.213 - fkksjobnn43 .org
trialinsider .com: 107.154.161.227: https://www.virustot...27/information/
> https://www.virustot...4291a/analysis/
107.154.168.227: https://www.virustot...27/information/
> https://www.virustot...4291a/analysis/
fkksjobnn43 .org: 47.91.107.213: https://www.virustot...13/information/
> https://www.virustot...4e012/analysis/
___
Fake 'DHL' SPAM - delivers Trojan
- https://myonlinesecu...banking-trojan/
11 May 2017 - "... an email with the subject of 'Fwd: DHL Redelivery Confirmation #574068024996' (random numbers) pretending to come from random companies, names and email addresses with a semi-random named zip attachment which delivers Ursnif banking Trojan...
Screenshot: https://myonlinesecu...-redelivery.png
request-redelivery-2017053299810.pdf.js - Current Virus total detections 1/57*. Payload Security** shows a download from one of both or these locations
http ://schuetzen-neusalz .de/images/banners/gbfont.se -or- http ://wersy .net/cuts.vs
which is -renamed- and autorun by the script (VirusTotal 9/62***) (Payload Security[4])... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1494500118/
** https://www.hybrid-a...vironmentId=100
*** https://www.virustot...sis/1494488118/
4] https://www.hybrid-a...vironmentId=100
schuetzen-neusalz .de: 85.13.146.159: https://www.virustot...59/information/
> https://www.virustot...cc5ce/analysis/
wersy .net: 217.29.53.99: https://www.virustot...99/information/
> https://www.virustot...0680e/analysis/
___
Fake 'invoice' SPAM - using docs with embedded ole objects
- https://myonlinesecu...ed-ole-objects/
11 May 2017 - "... banking Trojans. This one is using a different delivery method to try to throw us off track... this has a word docx attachment that contains an embedded ole object that when you click on the blurry image in the word doc, thinking you are opening an invoice you actually open & run the embedded hidden .js file. This pretends to be an invoice coming from random senders:
> https://myonlinesecu...-ole-object.png
Screenshot: https://myonlinesecu...ozi-invoice.png
7398219046.docx - Current Virus total detections 2/58*. Payload Security** shows the dropped .js file but doesn’t make it available for download. I had to get that manually (VirusTotal 1/55***) (Payload Security[4]) which shows
the same connections and download from one or both of these locations
http ://schuetzen-neusalz .de/images/banners/gbfont.se -or- http ://wersy .net/cuts.vs
which is renamed and autorun by the script (VirusTotal 9/62[5]) (Payload Security[6])... This email attachment contains what appears to be a genuine word doc or Excel XLS spreadsheet with either a macro script or an embedded OLE object that when run will infect you... DO NOT follow the advice they give to enable macros or enable editing to see the content... The basic rule is NEVER open any attachment to an email, unless you are expecting it..."
* https://www.virustot...sis/1494509580/
** https://www.hybrid-a...vironmentId=100
** https://www.virustot...sis/1494508789/
4] https://www.hybrid-a...vironmentId=100
5] https://www.virustot...sis/1494488118/
6] https://www.hybrid-a...vironmentId=100
schuetzen-neusalz .de: 85.13.146.159: https://www.virustot...59/information/
> https://www.virustot...cc5ce/analysis/
wersy .net: 217.29.53.99: https://www.virustot...99/information/
> https://www.virustot...0680e/analysis/
___
New ‘Jaff’ ransomware via Necurs ...
- https://blog.malware...asks-for-2-btc/
May 11, 2017 - "... yet another ransomware on the block, but contrary to the many copycats out there this one appears to be more serious and widespread since it is part of the Necurs spam campaigns... Jaff ransomware looks very identical to Locky in many ways: same distribution via the Necurs botnet, same PDF that opens up a Word document with a macro, and also similar payment page:
> https://blog.malware...17/05/email.png
...
> https://blog.malware.../Jaff_decoy.png
... this is where the comparison ends, since the code base is different as well as the ransom itself. Jaff asks for an astounding 2 BTC, which is about $3,700 at the time of writing:
> https://blog.malware...5/encrypted.png
... the return of Locky after a short hiatus has not been as big as anticipated. The appearance of the Jaff ransomware may also take away some market shares from it."
Edited by AplusWebMaster, 11 May 2017 - 02:28 PM.