2018-09-28 - MORE MALSPAM WITH PASSWORD-PROTECTED WORD DOCS PUSHING NYMAIM
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2018-09-28-example-of-Nymaim-malspam.eml.zip 32 kB (32,241 bytes)
 - 2018-09-28-Nymaim-infection-traffic.pcap.zip 6.2 MB (6,236,663 bytes)
 - 2018-09-28-malware-associated-with-Nymaim-infection.zip 3.2 MB (3,223,671 bytes)
 
NOTES:
- Still seeing this since the last time I posted about it on 2018-09-21. See that post for more details and a bit more history on this campaign.
 - @HerbieZimmerman also tweeted an example earlier. (link to tweet)
 - Password for these Word docs is still 1234
 
EMAILS
SENDING MAIL SERVER INFO FROM THIS MALSPAM:
- Sending mail servers: 46.161.42[.]2 through 46.161.42[.]32
 
- Received from: simplexhealthcare[.]info ([46.161.42[.]2])
 - Received from: 0937[.]org ([46.161.42[.]3])
 - Received from: forbetteramerica[.]com ([46.161.42[.]4])
 - Received from: managedprintservices-online[.]com ([46.161.42[.]5])
 - Received from: 0downdeals[.]com ([46.161.42[.]6])
 - Received from: 0human[.]org ([46.161.42[.]7])
 - Received from: 0mgmix[.]co[.]uk ([46.161.42[.]8])
 - Received from: 10000tables[.]org ([46.161.42[.]9])
 - Received from: bulgariantravel[.]org ([46.161.42[.]10])
 - Received from: successprogramsunlimited[.]net ([46.161.42[.]11])
 - Received from: 121finance[.]in ([46.161.42[.]12])
 - Received from: 123dep[.]com ([46.161.42[.]13])
 - Received from: 123muaban[.]net ([46.161.42[.]14])
 - Received from: thebodycontouringspecialist[.]com ([46.161.42[.]15])
 - Received from: gotlube[.]net ([46.161.42[.]16])
 - Received from: 1323[.]com ([46.161.42[.]17])
 - Received from: 135798[.]com ([46.161.42[.]18])
 - Received from: 138365[.]com ([46.161.42[.]19])
 - Received from: whygavs[.]net ([46.161.42[.]20])
 - Received from: 160h[.]com ([46.161.42[.]21])
 - Received from: 16thbit[.]com ([46.161.42[.]22])
 - Received from: 18005379327[.]com ([46.161.42[.]23])
 - Received from: 180connection[.]org ([46.161.42[.]24])
 - Received from: 180therapies[.]info ([46.161.42[.]25])
 - Received from: optypo[.]com ([46.161.42[.]26])
 - Received from: 1brx[.]com ([46.161.42[.]27])
 - Received from: 1buscame[.]com ([46.161.42[.]28])
 - Received from: 1jk[.]org ([46.161.42[.]29])
 - Received from: 1roll[.]net ([46.161.42[.]30])
 - Received from: 1roll[.]org ([46.161.42[.]31])
 - Received from: 1tuangou[.]com ([46.161.42[.]32])
 
VARIOUS SENDERS FROM EACH OF THE ABOVE DOMAINS START WITH:
- From: admin@
 - From: billing@
 - From: help@
 - From: info@
 - From: mail@
 - From: no-reply@
 - From: noreply@
 - From: sale@
 - From: support@
 - From: ticket@
 
EMAIL HEADERS
EMAIL HEADERS IN TODAY'S EXAMPLE:

Shown above:  Screenshot from today's example.
Received: from [46.161.42[.]31] ([46.161.42[.]31:51291] helo=1roll[.]org)
        by [removed] (envelope-from <support@1roll[.]org>) [removed];
        Thu, 27 Sep 2018 16:14:04 -0400
From: =?utf-8?B?TWlrZSBCcm9tYW4gwqA=?= <support@1roll[.]org>
To: [removed]
Subject: Application
Thread-Topic: Application
Date: Thu, 27 Sep 2018 19:42:18 +0000
Message-ID: <2gew194jz9seuvipzp6ajpvm.1962140182032@1roll[.]org>
Content-Language: en-US
Content-Type: multipart/mixed;
        boundary="------------703162491244836653324287"
MIME-Version: 1.0
Errors-To: >bouncechecker@yahoo[.]com>

Shown above:  To get infected, I had to enable macros after unlocking the Word document.
TRAFFIC
TRAFFIC FROM AN INFECTED WINDOWS HOST:

Shown above:  Infection traffic filtered in Wireshark.
- 209.141.60[.]230 port 80 - 209.141.60[.]230 - GET /521.exe
 - 37.152.176[.]90 port 80 - zepter[.]com - POST /buslurgw/index.php
 - 185.94.4[.]228 port 80 - zepter[.]com - POST /buslurgw/index.php
 - 84.2.61[.]102 port 80 - carfax[.]com - POST /buslurgw/index.php
 - 188.237.190[.]24 port 80 - zepter[.]com - POST /
 - 188.237.190[.]24 port 80 - carfax[.]com - POST /
 - DNS queries for geisbfreco[.]com to Google DNS (8.8.4[.]4 and 8.8.8[.]8)
 - DNS queries for microsoft[.]com to Google DNS (8.8.4[.]4 and 8.8.8[.]8)
 - DNS queries for google[.]com to Google DNS (8.8.4[.]4 and 8.8.8[.]8)
 
- NOTE: carfax[.]com and zepter[.]com are legitimate domains that are being spoofed.
 
FILE HASHES
ATTACHED WORD DOCUMENT:
- SHA256 hash:  a38a15cb84d110b1628626eb2267698f5d23307a59fcc66b49fbe94f04bb053e
File size: 39,424 bytes
File name: Mike Resume.doc 
INITIAL NYMAIN BINARY:
- SHA256 hash:  6895cd54fe75529b2f510d8a9a0eb1bbda34e6d8ad29462529edbe977bffb926
File size: 1,327,104 bytes
File location: C:\Users\[username]\AppData\Local\qwerty2.exe 
FOLLOW-UP NYMAIM MALWARE:
- SHA256 hash:  8b45578a90cc9ef139e66e2d77dbabc83694d1e89ffed928c65baafa0d4b99f0
File size: 887,808 bytes
Associated shortcut location: C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Associated shortcut name: gamma-1.lnk
Shortcut target: C:\Users\[username]\AppData\Roaming\gamma-25\gamma-2.exe -5d 
- SHA256 hash:  11eb17a580da49282f7d41f7cebebe5c60c46df6aaefd2283a2741c7afe2dfc5
File size: 887,808 bytes
Associated registry key: HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Value name: shell
Value type: REG_SZ
Value data: C:\ProgramData\kanal-2\kanal-4.exe -1,explorer.exe 
- SHA256 hash:  78fabf339b726203334bb592812ab42c8652ab37535eeccf2e457df257d7a881
File size: 862,720 bytes
Associated registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Value name: machine-36
Value type: REG_SZ
Value data: C:\Users\[username]\AppData\Local\machine-27\machine-88.exe -x 
Click here to return to the main page.
