2015-05-11 - MALSPAM CAMPAIGN - FAKE AMERICAN AIRLINES MESSAGES
PCAP AND MALWARE:
- PCAP from an infected host: 2015-05-11-malspam-campaign-traffic.pcap.zip
- ZIP file of the associated malware: 2015-05-11-malspam-associated-malware.zip
NOTES:
- Seems to be another botnet-based malicious spam (malspam) campaign
- These messages have links to a zip file with Fariet/Pony disguised as a .pif file inside.
- This malware downloads (and infects a host with) Rovnix.
EXAMPLE OF THE EMAILS
SENDERS:
- Sender (spoofed): orders@aa.com
SCREENSHOT:
- Subject: E-Ticket ready for Order # 997880727
- Subject: Order # 9017937910 - Credit Card Approved
- Subject: E-Ticket ready for Order # 9017937910
- Subject: Ticket information regarding your order # 9017937910
SCREENSHOT:
EXAMPLE OF THE MESSAGE TEXT:
Your payment has been processed and your credit card has been charged.
Please download and print your ticket from our website :
https://www.aa.com/flightInformation/viewOrder.do?order_id=9017937910&flight=WA794019
Below, you can find the order details and e-ticket information.
FLIGHT NUMBER / WA794019
DATE & TIME / May 11 2015, 13:30 CDT
DEPARTING / Washington, DC
TOTAL PRICE / $ 740.00
For more information regarding your order, contact our technical support by visiting :
http://www.aa.com/i18n/contactAA/contact-technical-support.jsp?
Thank you for flying with America Airlines.
EXAMPLES OF THE EMAIL HEADERS:
PRELIMINARY MALWARE ANALYSIS
FIRST SAMPLE:
Link to malware from the malspam:
- dugunorganizasyonu.co - GET /wp-content/plugins/cached_data/aa_ticket_9017937910.zip
Extracted File: aa_ticket_9017937910.pif (Fareit/Pony) - MD5 hash: f21072077e88c74b9b6d67f81ae63d84
Second-stage download: w1.exe (Rovnix) - MD5 hash: 3f11c42687d09d4a56c715f671143a58
Traffic from malware analysis tools:
- 198.57.196.20 - dev.mariocorp.com - GET /wp-content/plugins/cached_data/w1.exe HTTP/1.0
- 46.249.205.12 - dev.wbiz.it - GET /wp-content/plugins/cached_data/w1.exe HTTP/1.0
- 192.185.73.98 - diamondnailsvalpo.com - GET /wp-content/plugins/cached_data/w1.exe HTTP/1.0
- 62.76.179.132 - docscountry.com - POST /gate.php HTTP/1.0
- 91.217.90.137 - manterinvoice.com - POST /gate.php HTTP/1.0
- 46.4.145.94 - sampledocstrash.com - POST /gate.php HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /host.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/hosts.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/list32.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/3257F7F8 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/EB4E2654 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/B06139B1 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/1880376902_32.dat HTTP/1.0
SECOND SAMPLE
Link to malware from the malspam:
- djasad.co.uk - GET /wp-content/plugins/cached_data/aa_ticket_8392051302.zip/li>
- dj-collision.com - GET /wp-content/plugins/cached_data/aa_ticket_8392051302.zip/li>
- docitachocolates.com.br - GET /wp-content/plugins/cached_data/aa_ticket_8392051302.zip/li>
- joetradeco.com - GET /images/poultry/large/aa_ticket_8392051302.zip
Another link to malware from malspam:
- Link from email: www.danielbellini.it - GET /zvfjtrkw.php
- Goes to: bit.ly - GET /1F90aL5
- Goes to: (https) updateserver3.azurewebsites.net - GET /lander.php?id=10475
Extracted file: aa_ticket_8392051302.pif or aa_ticket_489965107764.pif (Fareit/Pony) - MD5 hash: 379c67ae879872d3fa0b601892c59605
Second-stage download: w2.exe (Rovnix) - MD5 hash: 6eb761ea46a40ad72018d3cee915c4cd
Traffic from malware analysis tools:
- 62.76.179.132 - docscountry.com - POST /gate.php HTTP/1.0
- 91.217.90.137 - manterinvoice.com - POST /gate.php HTTP/1.0
- 46.4.145.94 - sampledocstrash.com - POST /gate.php HTTP/1.0
- 50.62.52.1 - diamondlogosacademy.org - GET /wp-content/plugins/cached_data/w2.exe HTTP/1.0
- 185.36.134.3 - dierenkliniekpendrecht.nl - GET /wp-content/plugins/cached_data/w2.exe HTTP/1.0
- 81.0.104.144 - discoverbalaton.com - GET /wp-content/plugins/cached_data/w2.exe HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /host.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/hosts.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/list32.dat HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/3257F7F8 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/EB4E2654 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/B06139B1 HTTP/1.0
- 107.181.174.129 - heckwassleftran.ru - GET /101/1880376902_32.dat HTTP/1.0
INFECTION TRAFFIC
ASSOCIATED DOMAINS:
- 62.76.179.132 - docscountry.com - Pony/Fareit checkin
- 50.62.52.1 port 80 - diamondlogosacademy.org - request to download follow-up malware (Rovnix)
- 81.177.22.189 port 80 - ip.xss.ru - post-infection traffic (Rovnix)
- 107.181.174.129 port 80 - heckwassleftran.ru - post-infection traffic (Rovnix)
TRAFFIC FROM AN INFECTED HOST THAT WAS LEFT ALONE FOR A WHILE:
- 2015-05-11 16:45:06 UTC - docscountry.com - POST /gate.php HTTP/1.0
- 2015-05-11 16:45:09 UTC - diamondlogosacademy.org - GET /wp-content/plugins/cached_data/w2.exe HTTP/1.0
- 2015-05-11 16:45:25 UTC - heckwassleftran.ru - GET /host.dat HTTP/1.0
- 2015-05-11 16:45:31 UTC - heckwassleftran.ru - GET /101/hosts.dat HTTP/1.0
- 2015-05-11 16:45:41 UTC - heckwassleftran.ru - GET /101/list64.dat HTTP/1.0
- 2015-05-11 16:45:55 UTC - heckwassleftran.ru - GET /101/7B28207A HTTP/1.0
- 2015-05-11 16:46:02 UTC - heckwassleftran.ru - GET /101/0A14CF25 HTTP/1.0
- 2015-05-11 16:46:46 UTC - heckwassleftran.ru - GET /101/2325E690 HTTP/1.0
- 2015-05-11 16:46:52 UTC - heckwassleftran.ru - GET /101/1086666136_64.dat HTTP/1.0
- 2015-05-11 16:48:01 UTC - ip.xss.ru - GET / HTTP/1.0
- 2015-05-11 16:48:04 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=log HTTP/1.0
- 2015-05-11 16:48:07 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cfg&crc32=0 HTTP/1.0
- 2015-05-11 16:48:10 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:49:13 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:50:16 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:51:19 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:52:21 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:53:24 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:54:27 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:55:30 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:56:32 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:57:35 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:58:38 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 16:59:41 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:00:46 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:01:49 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:02:52 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:03:54 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:04:57 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:06:00 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:07:03 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:08:06 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:09:09 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:10:11 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
- 2015-05-11 17:11:14 UTC - heckwassleftran.ru POST /vbulletin/post.php?qu=cmd HTTP/1.0
SNORT EVENTS
Emerging Threats and ETPRO rulesets from Sguil on Security Onion (without ET POLICY or ET INFO events):
- 62.76.179.132 port 80 - ET TROJAN Trojan Generic - POST To gate.php with no referer (sid:2017930)
- 62.76.179.132 port 80 - ET TROJAN Fareit/Pony Downloader Checkin 2 (sid:2014411)
- 50.62.52.1 port 80 - ET TROJAN Possible Graftor EXE Download Common Header Order (sid:2018254)
- 50.62.52.1 port 80 - ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile (sid:2019714)
- 107.181.174.129 port 80 - ETPRO TROJAN Win32/Rovnix.P Retrieving .dat (sid:2810756)
- 107.181.174.129 port 80 - ETPRO TROJAN Win32/Rovnix.P HTTP POST CnC Beacon 1 (sid:2810758)
- 107.181.174.129 port 80 - ETPRO TROJAN Win32/Rovnix.P HTTP POST CnC Beacon 2 (sid:2810759)
Talos (Snort subrscriber) ruleset from Snort 2.9.6.2 on Debian 7:
- 62.76.179.132 port 80 - [1:27919:3] MALWARE-CNC Win.Trojan.Zeus encrypted POST Data exfiltration
- 50.62.52.1 port 80 - [1:27918:2] MALWARE-CNC Win.Trojan.Zeus variant outbound connection
- 50.62.52.1 port 80 - [1:15306:22] FILE-EXECUTABLE Portable Executable binary file magic detected
FINAL NOTES
Once again, here are the associated files:
- PCAP from an infected host: 2015-05-11-malspam-campaign-traffic.pcap.zip
- ZIP file of the associated malware: 2015-05-11-malspam-associated-malware.zip
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.