Subject: Emailing: Scan0963Attached is a .7z file with a name matching the "Scan" part in the header and body text. MD5s of those seen so far (there may be more):
From: "Sales" [sales@victimdomain.tld]
Date: Thu, September 28, 2017 10:31 am
Your message is ready to be sent with the following file or link
attachments:
Scan0963
Note: To protect against computer viruses, e-mail programs may prevent
sending or receiving certain types of file attachments. Check your e-mail
security settings to determine how attachments are handled.
58B76A9DC942AF73CFADFAF764637A48
627A8A6C3F73365161B94ABF5472E5C0
8927AE38D6F84DF1940D0E13491015F9
1CD93386F4FD7D5771A8119C5E9E6C98
A406E870D20A5913B17C4F9D6D52CDCD
EB087BB59BEED8039FC7B7E48F099E79
1D94DC6ECAED3D33D840E61DDAD7AC07
FDB76F480AF0A8D01DA2E4A3098A549F
320401A216CC7A3BA6B9C12163B3EB60
1AC6D2DA56FAA27C60A22CFD2099435F
1BD79C90F2CC8390170A4D6231282328
Inside is a malicious VBS script (example) which exhibits a curious feature:
If you are in the UK, Australia, Ireland, Belgium or Luxembourg you get one binary [VT 12/64], everyone else gets another [VT 20/64]. My Online Security describes this in more detail - the first group get the Trickbot banking trojan and everyone gets Locky ransomware.
In the samples I saw, the Trickbot download locations were:
autoecole-jeanpierre.com/9hciunery8g?
autoecoleathena.com/9hciunery8g?
conlin-boats.com/9hciunery8g?
flooringforyou.co.uk/9hciunery8g?
fls-portal.co.uk/9hciunery8g?
fmarson.com/9hciunery8g?
freevillemusic.com/9hciunery8g?
geeks-online.de/9hciunery8g?
jakuboweb.com/9hciunery8g?
jaysonmorrison.com/9hciunery8g?
melting-potes.com/9hciunery8g?
sherylbro.net/p66/LUYTbjnrf
camerawind.com/9hciunery8g?
The Locky download locations:
americanbulldogradio.com/LUYTbjnrf?
anarakdesert.com/LUYTbjnrf?
atlantarecyclingcenters.com/LUYTbjnrf?
augustinechua.com/LUYTbjnrf?
classactionlawsuitnewscenter.com/LUYTbjnrf?
davidstephensbanjo.com/LUYTbjnrf?
e-westchesterpropertytax.com/LUYTbjnrf?
felicesfiestas.com.mx/LUYTbjnrf?
financeforautos.com/LUYTbjnrf?
mtblanc-let.co.uk/LUYTbjnrf?
plumanns.com/LUYTbjnrf?
poemsan.info/p66/d8743fgh
asnsport-bg.com/LUYTbjnrf?
There may be other locations too.
The following legitimate services are used for geolocation. They might be worth monitoring:
https://ipinfo.io/json
http://www.geoplugin.net/json.gp
http://freegeoip.net/json/
All these recent attacks have used .7z archive files which would require 7zip or a compatible program to unarchive. Most decent mail filtering tools should be able to block or strip this extension, more clever ones would be able to determine that there is a .vbs script in there and block on that too.
UPDATE
A more complete list of download locations from a trusted source (thank you!)
ambrogiauto.com/9hciunery8g
autoecoleathena.com/9hciunery8g
autoecoleboisdesroches.com/9hciunery8g
autoecole-jeanpierre.com/9hciunery8g
camerawind.com/9hciunery8g
conlin-boats.com/9hciunery8g
feng-lian.com.tw/9hciunery8g
flooringforyou.co.uk/9hciunery8g
fls-portal.co.uk/9hciunery8g
fmarson.com/9hciunery8g
freevillemusic.com/9hciunery8g
geeks-online.de/9hciunery8g
givensplace.com/9hciunery8g
jakuboweb.com/9hciunery8g
jaysonmorrison.com/9hciunery8g
melting-potes.com/9hciunery8g
patrickreeves.com/9hciunery8g
sherylbro.net/p66/LUYTbjnrf
americanbulldogradio.com/LUYTbjnrf
anarakdesert.com/LUYTbjnrf
asnsport-bg.com/LUYTbjnrf
astilleroscotnsa.com/LUYTbjnrf
atlantarecyclingcenters.com/LUYTbjnrf
augustinechua.com/LUYTbjnrf
classactionlawsuitnewscenter.com/LUYTbjnrf
davidstephensbanjo.com/LUYTbjnrf
essenza.co.id/LUYTbjnrf
evlilikpsikolojisi.com/LUYTbjnrf
e-westchesterpropertytax.com/LUYTbjnrf
felicesfiestas.com.mx/LUYTbjnrf
financeforautos.com/LUYTbjnrf
fincasoroel.es/LUYTbjnrf
kailanisilks.com/LUYTbjnrf
mediatrendsistem.com/LUYTbjnrf
modaintensa.com/LUYTbjnrf
mtblanc-let.co.uk/LUYTbjnrf
plumanns.com/LUYTbjnrf
poemsan.info/p66/d8743fgh
2 comments:
I found a couple of samples this morning also, with the following domains:
bredabeckerle.com/dg6rerg?
playbrief.info/p66/dg6rerg
brendo.biz/dg6rerg?
brascopperchile.cl/dg6rerg?
MD5 payload (VBS) hashes:
1EE5965705AC00300AA544B35FAF1C2A
7DC54ADB2161C59900829947C05C3FF5
SHA256 payload (VBS) hashes:
99136D278E66EEBC7D666BF949B855F5BA7243FCFD30278548B55190BED0C007
33D9264ECDBBF361FC86CC54CBC686AC05531FEC8C94ADB64E3724208AC6B5B4
MD5 7z hashes:
09E2BE31E5CB9B860F70E7B1C2EBA955
16D73F1876903E7E427346BE5F039B30
SHA256 7z hashes:
1D161CF202E6DD1C9147D12D209D1925F65AB6F3F46C8A9ABCD3971EC1B8FA38
9ECAB956FB9126CE90BBB2FCE86F31264B347767D038CAF84F42BE6652079E7B
Just a followup, running these samples in a sandbox, the servers hosting whatever malware it's trying to grab are returning status 503.
Post a Comment