2015-01-27 - UPATRE/DYRE MALSPAM WAVE - SUBJECT: VOICE MESSAGE
ASSOCIATED FILES:
- ZIP of pcap from sandbox analysis: 2015-01-27-Upatre-Dyre-malspam-infecting-a-VM.pcap.zip
- ZIP of the malware: 2015-01-27-Upatre-Dyre-malspam-related-malware.zip
EXAMPLE OF THE EMAILS
SCREENSHOT:
MESSAGE CHARACTERISTICS:
Sender (spoofed): "Admin" <no-replay@voice_global.co.uk>
Subject: Voice Message
Attachment name: voice#[7 random digits].zip
INFECTION TRAFFIC
EXTRACTING THE MALWARE FROM THE ZIP AND INFECTING A VM:
- 2015-01-27 18:21:25 UTC - 202.153.35.133 port 15175 - 202.153.35.133:15175 - GET /2701uk12/WIN-BS4EUJ1KO34/0/61-SP1/0/
- 2015-01-27 18:21:26 UTC - 202.153.35.133 port 15175 - 202.153.35.133:15175 - GET /2701uk12/WIN-BS4EUJ1KO34/1/0/0/
- 2015-01-27 18:21:28 UTC - 192.163.217.66 port 80 - best-synthetic-motor-oil.com - GET /file_k12.pdf
- 2015-01-27 18:21:42 UTC - 202.153.35.133 port 15128 - 202.153.35.133:15128 - GET /2701uk12/WIN-BS4EUJ1KO34/41/7/4/
- 2015-01-27 18:21:48 UTC - 208.91.197.54 port 3478 - UDP STUN traffic to: s2.taraba.net
- 2015-01-27 18:22:05 UTC - 173.194.67.127 port 19302 - UDP STUN traffic to: stun2.l.google.com
- 2015-01-27 18:22:12 UTC - 91.222.152.182 port 443 - Encrypted TCP traffic
- 2015-01-27 18:22:27 UTC - 78.143.39.41 port 80 - zac-buero.de - GET /mandoc/ml1from1.tar
- 2015-01-27 18:22:29 UTC - 37.59.30.125 port 443 - Encrypted TCP traffic
- 2015-01-27 18:22:29 UTC - 109.236.84.101 port 1025 - Encrypted TCP traffic
- 2015-01-27 18:22:34 UTC - 72.167.2.191 port 80 - shopmeyermusic.com - GET /boa/pony1.tar
- 2015-01-27 18:22:34 UTC - 83.219.133.225 port 81 - 83.219.133.225 - POST /dffgbDFGvf465/gate.php
- 2015-01-27 18:22:39 UTC - 95.25.71.144 port 443 - i2p.mooo.com - repeated attempts for TCP connections RST by the server
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 202.153.35.133 port 15175 - ET TROJAN Upatre Common URI Struct Dec 01 2014 (sid:2019847)
- 202.153.35.133 port 15175 - ET TROJAN Mazilla Suspicious User-Agent Jan 15 2015 (sid:2020235)
- 192.163.217.66 port 80 - ET TROJAN Common Upatre Header Structure (sid:2018394)
- 192.163.217.66 port 80 - ET TROJAN Common Upatre Header Structure 2 (sid:2018635)
- 91.222.152.182 port 443 - ET CURRENT_EVENTS Possible Dyre SSL Cert Jan 22 2015 (sid:2020290)
- 78.143.39.41 port 80 - ET TROJAN Dyre Downloading Mailer (sid:2020308)
- 37.59.30.125 port 443 - ET CURRENT_EVENTS Possible Dyre SSL Cert Jan 22 2015 (sid:2020290)
- 83.219.133.225 port 81 - ET TROJAN Trojan Generic - POST To gate.php with no referer (sid:2017930)
- 83.219.133.225 port 81 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
- 83.219.133.225 port 81 - ETPRO TROJAN Fareit/Pony Downloader CnC response (sid:2805976)
Talos (Sourcefire VRT) ruleset from Snort 2.9.7.0 on Debian 7:
- 202.153.35.133 port 15175 - [1:33207:1] BLACKLIST User-Agent known malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre
- 202.153.35.133 port 15175 - [1:33146:2] MALWARE-CNC Win.Trojan.Upatre variant outbound connection (x2)
- 202.153.35.133 port 15128 - [1:33207:1] BLACKLIST User-Agent known malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre
- 192.163.217.66 port 80 - [1:33207:1] BLACKLIST User-Agent known malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre
- 83.219.133.225 port 81 - [1:27919:3] MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration
PRELIMINARY MALWARE ANALYSIS
EMAIL ATTACHMENT:
File name: voice#5734223.zip
File size: 10.9 KB ( 11149 bytes )
MD5 hash: ad6a9ccf06269f3fde4343694f020df9
Detection ratio: 13 / 57
First submission: 2015-01-27 12:15:07 UTC
VirusTotal link: https://www.virustotal.com/en/file/f90a0953931e9a1793e5cc597cd8dd0fc1689b7240169663b7ec9a5633076f58/analysis/
EXTRACTED MALWARE:
File name: voice.exe
File size: 26.5 KB ( 27136 bytes )
MD5 hash: 39941126cc7e3064c1d3546f6babed79
Detection ratio: 12 / 57
First submission: 2015-01-27 12:17:22 UTC
VirusTotal link: https://www.virustotal.com/en/file/858626c43c6ba34f59c0064168b734610b1dfead0107ba1d27f2049cdcc1386b/analysis/
Malwr link: https://malwr.com/analysis/ZjdiNWU1NzU5NjdhNDZjNDllMjJjNjdhNmQ5MjA4NzM/
DROPPED MALWARE (1 OF 3):
File name: C:\Windows\KHEjkGgXApfKThf.exe
File size: 410.0 KB ( 419840 bytes )
MD5 hash: 028ebc2c61156781868199de0b44caaf
Detection ratio: 9 / 56
First submission: 2015-01-27 15:20:51 UTC
VirusTotal link: https://www.virustotal.com/en/file/b7194a81a653880c9a084f8628bbfe165f9cb72f5ff2bb385636cfdc9076ce51/analysis/
Malwr link: https://malwr.com/analysis/NjUyMzM4ZTkwYWY0NGQwOTlkYzYxNGJhNGExZDFhMGM/
DROPPED MALWARE (2 OF 3):
File name: C:\Windows\Temp\FC8E.tmp
File size: 441.0 KB ( 451584 bytes )
MD5 hash: d9a3d5c3c06f3429b65db7b84b50bed4
Detection ratio: 35 / 57
First submission: 2015-01-26 15:30:03 UTC
VirusTotal link: https://www.virustotal.com/en/file/948f5dee6e752a593949c327781bae2d3e8994d4c00074228bed6e1156fe3402/analysis/
Malwr link: https://malwr.com/analysis/MGQxZThhMjBkYWQ3NDk5MDgxNjRhNTQxZjAwYzE5ZTU/
DROPPED MALWARE (3 OF 3):
File name: C:\Windows\Temp\DBE.tmp
File size: 112.0 KB ( 114688 bytes )
MD5 hash: 40a59f55199e4578267dfb883747be9f
Detection ratio: 0 / 57
First submission: 2015-01-27 17:42:17 UTC
VirusTotal link: https://www.virustotal.com/en/file/1fa614e5ae8e7b2307851227e5f7324ea38b57416e14518a730d3071dd0ba956/analysis/
Malwr link: https://malwr.com/analysis/M2NkZDJhODAxMmQ3NDUxM2FhMzRhZTMyZDczNTFkM2I/
FINAL NOTES
Once again, here are the associated files:
- ZIP of pcap from sandbox analysis: 2015-01-27-Upatre-Dyre-malspam-infecting-a-VM.pcap.zip
- ZIP of the malware: 2015-01-27-Upatre-Dyre-malspam-related-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.