Made in Russia |
From: Tamika Cortez
Date: 22 April 2015 at 14:33
Subject: New document with ID:G27427P from RESTAURANT GROUP PLC was generated
New report with ID:G27427P was generated by our system. Please follow the link below to get your report.
Download report ID:G27427P
Best regards ,Tamika Cortez
RESTAURANT GROUP PLC
In this case, the link in the email goes to:
http://igruv.tourstogo.us/oalroshimt/fokreeshoo/thovoaksij?arg1=victim@victimdomain.com&arg2=G27427P.vbs&arg3=RESTAURANT%20GROUP%20PLC
..which includes the victim's email address in the URL. In turn, this redirects to:
http://igruv.tourstogo.us/oalroshimt/fokreeshoo/thovoaksij/files/G27427P.vbs
As the name suggests, this is a VBScript (VT 1/56), in this case it is lightly obfuscated [pastebin] and it initiates a download from:
http://185.91.175.183/sas/evzxce.exe
..which is saved as %TEMP%\jhvwrvcf.exe. The download location is 176.31.28.226 (OVH, France). This file has a VirusTotal detection rate of 6/57. Automated analysis tools [1] [2] [3] show network connections to the following IPs:
144.76.73.3 (Hetzner, Germany)
5.44.216.44 (Camelhost SIA, Latvia)
62.210.214.249 (Iliad Entreprises / Poney Telecom, France)
89.184.66.18 (Invest Ltd, Ukraine)
According to this Malwr report, it drops a Dridex DLL with a detection rate of 3/57.
Recommended blocklist:
176.31.28.226
144.76.73.3
5.44.216.44
62.210.214.249
89.184.66.18
MD5s:
1fc2abec9c754e8cc1726bf40e0b3533
af8ff1ea180d5c45b4bb8c8f17c6cddc
57b54e248588af284871c2076f05651c
No comments:
Post a Comment