2015-02-16 - CHANITOR/VAWTRAK MALSPAM - SUBJECT: E-TICKET FROM AMERICAN AIRLINES
ASSOCIATED FILES:
- ZIP of the pcap: 2015-02-16-chanitor-vawtrak-traffic.pcap.zip
- ZIP of the malware: 2015-02-16-chanitor-vawtrak-malware.zip
NOTES:
- When I'm looking for a fake e-ticket, I don't expect to see a fake tax return... These guys are sloppy.
EXAMPLE OF THE EMAILS
SCREENSHOT:
MESSAGE TEXT:
From: American Airlines <e-ticket@aa.com>
Date: Monday, February 16, 2015 at 10:14 AM CST
To:
Subject: E-ticket from American Airlines
Loyalty has never been so rewarding
Reservations Redeem Miles My Account Deals oneworld
Dear [recipient's name]
Your order has been processed.
E-TICKET - 87584111
FLIGHT - NA685956626AA
DATE / TIME - FEB 18th 2015, 16:10
ARRIVING - New Orleans
TOTAL PRICE / 321.00 USD
Please download and print your e-ticket from attachment
We look forward to welcoming you on board soon.
Sincerely,
Suzanne L. Rubin
President
AAdvantage Loyalty Program
Attachment: e-ticket_256959547.doc (90.6 KB)
TRAFFIC FROM INFECTED VM
ASSOCIATED DOMAINS:
- 66.33.209.254 - gmedsport.com - Malicious word document calls to this domain hosting Chanitor malware
- 192.251.226.206 - ukzo73z4inzpenmq.tor2web.blutmagie.de - Chanitor-related traffic for tor2web domain
- 82.130.26.27 - ukzo73z4inzpenmq.tor2web.fi - Chanitor-related traffic for tor2web domain
- 194.150.168.70 - ukzo73z4inzpenmq.tor2web.org - Chanitor-related traffic for tor2web domain
TRAFFIC FROM INFECTED VM:
- 2015-02-16 15:44:54 UTC - gmedsport.com - GET /plugins/xmlrpc/file.exe
- 2015-02-16 15:45:40 UTC - HTTPS traffic to api.ipify.org
- 2015-02-16 15:45:41 UTC - www.download.windowsupdate.com - GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab
- 2015-02-16 15:45:41 UTC - HTTPS traffic to: ukzo73z4inzpenmq.tor2web.blutmagie.de
- 2015-02-16 15:45:51 UTC - HTTPS traffic to: ukzo73z4inzpenmq.tor2web.fi
- 2015-02-16 15:45:52 UTC - aia.startssl.com - GET /certs/sub.class2.server.ca.crt
- 2015-02-16 15:45:52 UTC - aia.startssl.com - GET /certs/ca.crt
- 2015-02-16 15:45:53 UTC - HTTPS traffic to: ukzo73z4inzpenmq.tor2web.org
SNORT EVENTS FROM INFECTED VM
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- Various IP addresses - ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (1) (sid:2016806)
Sourcefire VRT ruleset from Snort 2.9.7.0 on Debian 7:
- 1.1.2.2 - [1:29456:2] PROTOCOL-ICMP Unusual PING detected
- 66.33.209.254 port 80 - [1:15306:18] FILE-EXECUTABLE Portable Executable binary file magic detected
- DNS request for: ukzo73z4inzpenmq.tor2web.org - [1:33216:1] INDICATOR-COMPROMISE DNS request for known malware domain tor2web.org
PRELIMINARY MALWARE ANALYSIS
EMAIL ATTACHMENT:
File name: e-ticket_256959547.doc
File size: 67.0 KB ( 68608 bytes )
MD5 hash: c075bcd452d7ff56968ed7a213459bdc
Detection ratio: 1 / 57
First submission: 2015-02-16 15:36:58 UTC
VirusTotal link: https://www.virustotal.com/en/file/78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2/analysis/
Malwr link: https://malwr.com/analysis/OGZiN2Q1NjQ2YzcxNGM2OWI2Zjc5MjE1NDBiYzU3ZmI/
CHANITOR DOWNLOADED BY THE MALICIOUS WORD DOCUMENT:
File name: C:Users\username\AppData\Local\Temp\444.exe
File size: 139.5 KB ( 142848 bytes )
MD5 hash: 53752a41ed21172343f678423d6c9a44
Detection ratio: 1 / 57
First submission: 2015-02-16 15:27:08 UTC
VirusTotal link: https://www.virustotal.com/en/file/f5b1deee9f83f8567e02e1f303a35606e2cd60f01136f8b5eea264239538e60a/analysis/
Malwr link: https://malwr.com/analysis/MDliM2U2MTM0YTVhNGVkZmJkZWYyOGZmZDI1YzRiZWU/
VAWTRAK DOWNLOADED BY CHANITOR:
File name: C:\ProgramData\ZedfOzbeb\TugeBucb.fec
File size: 272.0 KB ( 278528 bytes )
MD5 hash: 1d154d14527fef4e3ae0f9da997ca7e2
Detection ratio: 39 / 57
First submission: 2015-02-16 16:14:55 UTC
VirusTotal link: https://www.virustotal.com/en/file/a6a203be00ae8155e495e0f47931d76b730fa11707e449bb7e04f0f2df6499ec/analysis/
Malwr link: https://malwr.com/analysis/YmJlZDlhYjRiM2I3NGZlZGI0YjM5MzEwMGNiOWMzOGQ/
FINAL NOTES
Once again, here are the associated files:
- ZIP of the pcap: 2015-02-16-chanitor-vawtrak-traffic.pcap.zip
- ZIP of the malware: 2015-02-16-chanitor-vawtrak-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.