2016-07-12 - LOCKY MALSPAM - SUBJECT: FW:
NOTES:
- These are just 4 examples from hundreds of emails in this wave of Locky malspam.
ASSOCIATED FILES:
- ZIP archive of today's data: 2016-07-12-locky-malspam-data.zip 1.2 MB (1,150,282 bytes)
- 2016-07-12-malspam-data.csv (1,104 bytes)
- Traffic-from-malspam-2016-07-12-1355-UTC.pcap (174,188 bytes)
- Traffic-from-malspam-2016-07-12-1356-UTC.pcap (171,189 bytes)
- Traffic-from-malspam-2016-07-12-1402-UTC.pcap (162,357 bytes)
- Traffic-from-malspam-2016-07-12-1408-UTC.pcap (160,405 bytes)
- emails/2016-07-12-1355-UTC.eml (12,895 bytes)
- emails/2016-07-12-1356-UTC.eml (12,714 bytes)
- emails/2016-07-12-1402-UTC.eml (12,808 bytes)
- emails/2016-07-12-1408-UTC.eml (12,903 bytes)
- attachments/alan_copies_315759.zip (8,825 bytes)
- attachments/gregory_forward_937188.zip (8,850 bytes)
- attachments/robert_copies_560364.zip (8,708 bytes)
- attachments/susan_copies_104906.zip (8,782 bytes)
- extracted-files/-SWIFT-1ec2-.js (81,589 bytes)
- extracted-files/-SWIFT-43f-.js (80,760 bytes)
- extracted-files/-SWIFT-883f-.js (80,807 bytes)
- extracted-files/-SWIFT-f48e-.js (81,616 bytes)
- artifacts-from-infected-hosts/3VkFo0ErNhs9.exe (139,776 bytes)
- artifacts-from-infected-hosts/OWVQ1Igf.exe (139,776 bytes)
- artifacts-from-infected-hosts/_HELP_instructions.bmp (3,864,030 bytes)
- artifacts-from-infected-hosts/_HELP_instructions.html (9,345 bytes)
- artifacts-from-infected-hosts/j4NxFPY45Bz3Q.exe (139,776 bytes)
- artifacts-from-infected-hosts/xmLXfRH8gYbB7.exe (139,776 bytes)
EMAILS
Shown above: Email data from the spreadsheet (part 1 of 2).
Shown above: Email data from the spreadsheet (part 2 of 2).
Shown above: Text of the emails.
TRAFFIC
Shown above: Traffic generated from the first email.
Shown above: Traffic generated from the second email.
Shown above: Traffic generated from the third email.
Shown above: Traffic generated from the 4th email.
ASSOCIATED DOMAINS:
- 198.27.74.207 port 80 - nicesound.biz - GET /42did
- 192.71.249.220 port 80 - 192.71.249.220 - POST /upload/_dispatch.php
- 5.196.189.37 port 80 - 5.196.189.37 - POST /upload/_dispatch.php
- 203.183.200.158 port 80 - eusekkei.co.jp - GET /tdts0
- 77.222.54.202 port 80 - 77.222.54.202 - POST /upload/_dispatch.php
- 192.145.239.20 port 80 - ferozsons-labs.com - GET /52sf0l
- 109.234.34.146 port 80 - 109.234.34.146 - POST /upload/_dispatch.php
- 88.198.13.104 port 80 - omnitask.ba - GET /ac5f6
- 192.71.249.220 port 80 - 192.71.249.220 - POST /upload/_dispatch.php
DOMAINS FROM THE DECRYPT INSTRUCTIONS:
- mphtadhci5mrdlju.tor2web.org
- mphtadhci5mrdlju.onion.to
FILE HASHES
LOCKY SAMPLES FROM THE INFECTED HOSTS:
- SHA256 hash: 3f4314d12ae46f2369854fb3ac25ea40043778106362c5f1d370c14694cc777b
File name: 3VkFo0ErNhs9.exe
- SHA256 hash: 311a8c3f3a2e4f56a7e6e76a69b21f622d922f716dced83fc43d4c35aa692454
File name: OWVQ1Igf.exe
- SHA256 hash: bcc417d66308f680f163613d0debbb302e2637f6723f263babb87295b63a7fbf
File name: j4NxFPY45Bz3Q.exe
- SHA256 hash: 394dbe2e35487ba27d292a6bcc4ec5c5aa19eab88fa90c4511cfb5adea7db670
File name: xmLXfRH8gYbB7.exe
IMAGES
Shown above: Infected Windows desktop from one of the emails.
FINAL NOTES
Once again, here is the archive with all the data:
- ZIP archive of today's data: 2016-07-12-locky-malspam-data.zip 1.2 MB (1,150,282 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.