2014-07-11 - FAKE PURCHASE INVOICE PHISHING EMAILS
ASSOCIATED FILES:
- ZIP of PCAP(s): 2014-07-11-phishing-malware-sandbox-analysis.pcap.zip
- ZIP of the malware: 2014-07-11-phishing-malware.zip
TODAY'S EMAILS
SCREENSHOTS:
SUBJECT LINE:
Payment for [recipient's email address]
EXAMPLE OF THE MESSAGE TEXT:
Thanks for shopping with our company today! Your order is currently processing.
BILLING DETAILS
Purchase Number: Q135946436
Order Date: 7.31 AM Wed, Jul 11, 2014
Customer Email: [redacted]
Outright Purchase: 6752 USD
Download your invoice
Please click the link given above to get more details about your order.
LINKS FROM THE EMAILS TO THE MALWARE:
- www.dropbox.com/s/pvxzp00izy0pk2r/Invoice_389.PDF.scr?dl=1
- www.dropbox.com/s/3yi8rk449xa4gup/Invoice_349.PDF.scr?dl=1
- www.dropbox.com/s/u7mn5cc16pbgl6m/Invoice_159.PDF.scr?dl=1
NOTE: I aquired a copy of the malware from the first link. By the time I checked the other links, Dropbox had removed the malware.
TRAFFIC FROM SANDBOX ANALYSIS
IP ADDRESSES AND DOMAINS CALLED BY THE MALWARE:
- 49.50.8.51 - tikalikainterior.com
- 60.191.21.141 - tour-cn.com
- 78.129.153.11 - no domain, used port 8080
- 82.194.88.23 - manuelhuertasabogados.com
- 88.198.99.60 - hondazoomer.com
- 109.228.1.86 - www.energizerecruitment.co.uk
- 149.3.144.37 - zadropress.it
- 149.62.168.234 - piscinasalhaurin.es
- 173.201.216.13 - peterreh.com
- 193.227.16.94 - www.ies.alexu.edu.eg
- 199.204.44.252 - messina-and-messina.com
HTTP TRAFFIC FROM THE PCAP:
NOTE: [!] shows where more malware was returned.
- 21:54:16 UTC - 172.16.165.133:1031 - 78.129.153.11:8080 - 78.129.153.11:8080 - POST /warez/cloacla.php
- 21:54:20 UTC - 172.16.165.133:1033 - 149.62.168.234:80 - piscinasalhaurin.es - GET /modules/mod_modules/res.exe [!]
- 21:54:24 UTC - 172.16.165.133:1035 - 78.129.153.11:8080 - 78.129.153.11:8080 - POST /warez/cloacla.php
- 21:54:25 UTC - 172.16.165.133:1037 - 199.204.44.252:80 - messina-and-messina.com - GET /modules/mod_modules/p.exe [!]
- 21:54:29 UTC - 172.16.165.133:1039 - 78.129.153.11:8080 - 78.129.153.11:8080 - POST /warez/cloacla.php
- 21:55:06 UTC - 172.16.165.133:1043 - 88.198.99.60:80 - hondazoomer.com - POST /testosteron/gate.php
- 21:55:08 UTC - 172.16.165.133:1044 - 82.194.88.23:80 - manuelhuertasabogados.com - GET /administrator/svp.exe
- 21:55:09 UTC - 172.16.165.133:1045 - 199.204.44.252:80 - messina-and-messina.com - GET /administrator/svp.exe
- 21:55:10 UTC - 172.16.165.133:1046 - 149.62.168.234:80 - piscinasalhaurin.es - GET /_virus2/svp.exe
- 21:55:10 UTC - 172.16.165.133:1047 - 109.228.1.86:80 - www.energizerecruitment.co.uk - GET /cv/svp.exe
- 21:55:11 UTC - 172.16.165.133:1048 - 173.201.216.13:80 - peterreh.com - GET /wp-admin/svp.exe
- 21:55:13 UTC - 172.16.165.133:1049 - 193.227.16.94:80 - www.ies.alexu.edu.eg - GET /administrator/svp.exe
- 21:55:14 UTC - 172.16.165.133:1050 - 60.191.21.141:80 - tour-cn.com - GET /bbs/uc_server/svp.exe
- 21:55:15 UTC - 172.16.165.133:1052 - 149.3.144.37:80 - zadropress.it - GET /administrator/svp.exe
- 21:55:16 UTC - 172.16.165.133:1053 - 49.50.8.51:80 - tikalikainterior.com - GET /about/svp.exe
- 21:55:17 UTC - 172.16.165.133:1054 - 49.50.8.51:80 - tikalikainterior.com - GET /about/svp.exe/
- 21:55:34 UTC - 172.16.165.133:1055 - 88.198.99.60:80 - hondazoomer.com - POST /testosteron/gate.php
PRELIMINARY MALWARE ANALYSIS
MALWARE FROM PHISHING EMAIL LINK:
File name: Invoice_349.PDF.scr
File size: 133.8 KB ( 137042 bytes )
MD5 hash: a2929c03164efd23e7007b05a3de8da4
Detection ratio: 1 / 54
First submission: 2014-07-11 21:46:43 UTC
VirusTotal link: https://www.virustotal.com/en/file/28e8e70a068e49062b7eb028cf97b18eece72573ca7ae644995f3f692cfa7cc5/analysis/
Malwr link: https://malwr.com/analysis/MjQ0MzBhMGI2MzhhNDgzYjlmYmM5NTE4ZmQ5ZWJhZDQ/
FOLLOW-UP MALWARE 1 OF 2:
File name: res.exe
File size: 220.5 KB ( 225792 bytes )
MD5 hash: 0c55c1a7e7c14c239b7535039a922150
Detection ratio: 2 / 54
First submission: 2014-07-11 23:41:52 UTC
VirusTotal link: https://www.virustotal.com/en/file/a1e9af4632ff0eb5b3eb21285f5909ad8e28c326d71489707e7ea2f76e28e34b/analysis/
Malwr link: https://malwr.com/analysis/ZmYxYTJkMDI5MGFlNDI3ZDhhY2NmNzQwNTIyZGYyMWU/
FOLLOW-UP MALWARE 2 OF 2:
File name: p.exe
File size: 180.0 KB ( 184320 bytes )
MD5 hash: c24ead56a5532bfc8840d9b602aebbe2
Detection ratio: 2 / 54
First submission: 2014-07-11 21:23:12 UTC
VirusTotal link: https://www.virustotal.com/en/file/e7e70c62c8741f9394edf394554d46a2fc41ca8fb51a6a5141f042eaf50cb956/analysis/
Malwr link: https://malwr.com/analysis/OTRkY2QxZDAyMDMzNGZjOWFlMzU2ZDU4MjlmYzY1OGQ/
SNORT EVENTS
Sourcefire VRT ruleset from Snort 2.9.6.0 running on Ubuntu 14.04 LTS:
- 2014-07-11 21:54:20 UTC - 8.8.4.4:53 - 172.16.165.133:1032 - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
- 2014-07-11 21:54:20 UTC - 149.62.168.234:80 - 172.16.165.133:1033 - [1:11192:16] FILE-EXECUTABLE download of executable content
- 2014-07-11 21:54:20 UTC - 149.62.168.234:80 - 172.16.165.133:1033 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- 2014-07-11 21:54:26 UTC - 199.204.44.252:80 - 172.16.165.133:1037 - [1:648:14] INDICATOR-SHELLCODE x86 NOOP
- 2014-07-11 21:54:25 UTC - 199.204.44.252:80 - 172.16.165.133:1037 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- 2014-07-11 21:54:26 UTC - 199.204.44.252:80 - 172.16.165.133:1037 - [1:648:14] INDICATOR-SHELLCODE x86 NOOP
- 2014-07-11 21:54:26 UTC - 199.204.44.252:80 - 172.16.165.133:1037 - [1:648:14] INDICATOR-SHELLCODE x86 NOOP
- 2014-07-11 21:54:26 UTC - 199.204.44.252:80 - 172.16.165.133:1037 - [1:23256:5] FILE-EXECUTABLE Armadillo v1.71 packer file magic detected
- 2014-07-11 21:55:06 UTC - 172.16.165.133:1043 - 88.198.99.60:80 - [1:27919:3] MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration
- 2014-07-11 21:55:08 UTC - 172.16.165.133:1044 - 82.194.88.23:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:09 UTC - 172.16.165.133:1045 - 199.204.44.252:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:10 UTC - 172.16.165.2:53 - 172.16.165.133:1026 - [1:254:15] PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
- 2014-07-11 21:55:10 UTC - 172.16.165.133:1046 - 149.62.168.234:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:10 UTC - 172.16.165.133:1047 - 109.228.1.86:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:11 UTC - 172.16.165.133:1048 - 173.201.216.13:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:13 UTC - 172.16.165.133:1049 - 193.227.16.94:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:14 UTC - 172.16.165.133:1050 - 60.191.21.141:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:15 UTC - 172.16.165.133:1052 - 149.3.144.37:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:16 UTC - 172.16.165.133:1053 - 49.50.8.51:80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 2014-07-11 21:55:34 UTC - 172.16.165.133:1055 - 88.198.99.60:80 - [1:27919:3] MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration
FINAL NOTES
Once again, here are the associated files:
- ZIP of PCAP(s): 2014-07-11-phishing-malware-sandbox-analysis.pcap.zip
- ZIP of the malware: 2014-07-11-phishing-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.