From: Brenda Howcroft [accounts@swaledalefoods.co.uk]
Date: 21 December 2015 at 10:46
Subject: INVOICE
Invoice 14702.doc
83K
Attached is a file Invoice 14702.doc which comes in at least 9 different versions (VirusTotal results [1] [2] [3] [4] [5] [6] [7] [8] [9]). I haven't had the chance to analyse them, but my sources say that at least some versions download from the following locations:
110.164.184.28/jh45wf/98i76u6h.exe
getmooresuccess.com/jh45wf/98i76u6h.exe
rahayu-homespa.com/jh45wf/98i76u6h.exe
This dropped file has a detection rate of 6/54. The Hybrid Analysis report plus some other sources indicate network traffic to:
199.7.136.88 (Megawire, Canada)
151.80.142.33 (OVH, France)
202.69.40.173 (Gerrys Information Technology (pvt) Ltd, Pakistan)
78.47.66.169 (Hetzner, Germany)
The payload is the Dridex banking trojan.
MD5s:
6932A004CE3AD1AD5EA30F43A31B0285
49CF8C70BC4E94F6887ED0CBC426F08C
92B1F1B4BBD864411FA75C951D28EC5D
E4CB705754C93645D3F86F8AF9307769
D409889F92DA9B8D855C0037894A46CC
87CA159B9AEB127F698D2AA28A5BAAC5
C770760C66298301D1BE29E85ECBE971
F2FF5FCE2836025E97691937D6DF579E
6617EAB5B4DD17247DFF1819CA444674
EE57F929672651C1AE238EB7C7A0D734
Recommended blocklist:
199.7.136.88
151.80.142.33
202.69.40.173
78.47.66.169
2 comments:
Thanks for this I received one yesterday and had tried to contact the company to no avail - problem solved!
This is a good article. Thanks for sharing
http://paketraftingmalangpaketrafting.blogspot.co.id
https://www.youtube.com/watch?v=HXyjTVNNt5c
Post a Comment