2016-10-24 - ".SHIT" VARIANT LOCKY MALSPAM
ASSOCIATED FILES:
- ZIP archive of all the information: 2016-10-24-Locky-malspam-all-info.zip 2.09 MB (2,092,600 bytes)
- 2016-10-24-Locky-malspam-info.csv (1,965 bytes)
- artifacts-from-infected-hosts / KiOBUGxRvH1.dll (274,432 bytes)
- artifacts-from-infected-hosts / LjXiDmd1.dll (274,432 bytes)
- artifacts-from-infected-hosts / UrhgVhR1.dll (274,432 bytes)
- artifacts-from-infected-hosts / XebQkujR1.dll (274,432 bytes)
- artifacts-from-infected-hosts / YnDGHb1.dll (274,432 bytes)
- artifacts-from-infected-hosts / _WHAT_is.bmp (3,578,902 bytes)
- artifacts-from-infected-hosts / _WHAT_is.html (9,976 bytes)
- artifacts-from-infected-hosts / mIbqzP1.dll (274,432 bytes)
- attachments / Receipt 017-13644.zip (8,018 bytes)
- attachments / Receipt 15075-053619.zip (7,400 bytes)
- attachments / Receipt 46-2734.zip (7,438 bytes)
- attachments / Receipt 4845-83761.zip (7,977 bytes)
- attachments / Receipt 63-81684.zip (7,378 bytes)
- attachments / Receipt 77077-14409.zip (7,979 bytes)
- emails / 2016-10-24-malspam-1314-UTC.eml (10,899 bytes)
- emails / 2016-10-24-malspam-1322-UTC.eml (10,841 bytes)
- emails / 2016-10-24-malspam-1335-UTC.eml (10,862 bytes)
- emails / 2016-10-24-malspam-1356-UTC.eml (11,669 bytes)
- emails / 2016-10-24-malspam-1421-UTC.eml (11,686 bytes)
- emails / 2016-10-24-malspam-1434-UTC.eml (11,631 bytes)
- extracted-files / Receipt 15110-632446.wsf (29,186 bytes)
- extracted-files / Receipt 34469-690103.wsf (29,447 bytes)
- extracted-files / Receipt 43284-144137.hta (26,180 bytes)
- extracted-files / Receipt 53744-762732.wsf (31,424 bytes)
- extracted-files / Receipt 72645-990319.hta (27,938 bytes)
- extracted-files / Receipt 84603-492538.hta (25,635 bytes)
- pcaps / 2016-10-24-traffic-from-1314-UTC-malspam.pcap (120,026 bytes)
- pcaps / 2016-10-24-traffic-from-1322-UTC-malspam.pcap (184,925 bytes)
- pcaps / 2016-10-24-traffic-from-1325-UTC-malspam.pcap (209,376 bytes)
- pcaps / 2016-10-24-traffic-from-1358-UTC-malspam.pcap (177,510 bytes)
- pcaps / 2016-10-24-traffic-from-1421-UTC-malspam.pcap (262,724 bytes)
- pcaps / 2016-10-24-traffic-from-1434-UTC-malspam.pcap (160,647 bytes)
NOTES:
- This variant of Locky uses the file extension .shit for the encrypted files.
- That makes it suitable for all sorts of puns or jokes when reporting about it.
- My favorite so far is a BleepingComputer post titled: Locky ransomware's new .SHIT Extension shows that you can't polish a turd
EMAILS
Shown above: Data from six Locky malspam examples (part 1 of 2).
Shown above: Data from six Locky malspam examples (part 2 of 2).
TRAFFIC
TRAFFIC FROM THE .HTA AND .WSF FILES (TO RETRIEVE THE LOCKY):
- 192.186.209.132 port 80 - absxpintranet.in - GET /076wc?YEWarQuo=TzMlteDhX
- 119.59.104.32 port 80 - belovephoto.com - GET /076wc?IozECqu=scTHum
- 46.30.213.77 port 80 - dolphinom.com - GET /076wc?rqgHORHqCI=QTOFKDHc
- 184.171.250.90 port 80 - acanac.wysework.com - GET /076wc?snNEdvXtIR=TLfxhJC
- 192.185.173.26 port 80 - castoncorporateadvisory.in - GET /076wc?finKElSJhh=YytsQvBmKBs
- 107.180.23.49 port 80 - icclicks.com - GET /076wc?rDAVIOTKMa=uteGSLdpc
POST-INFECTION LOCKY CALLBACK:
- 91.200.14.124 port 80 - 91.200.14.124 - POST /linuxsucks.php
- 185.102.136.77 port 80 - 185.102.136.77 - POST /linuxsucks.php
DOMAINS FROM THE DECRYPTION INSTRUCTIONS:
- jhomitevd2abj3fk.tor2web.org
- jhomitevd2abj3fk.onion.to
FILE HASHES
LOCKY SAMPLE:
- SHA256 hash: b54802e6f6430c75d0683140ef0529c6603418b4ef602d80e85aaa88fe730c79
File name: C:\Users\[username\AppData\Local\Temp\KiOBUGxRvH1.dll (and various other names for the DLL)
IMAGES
Shown above: Screen shot from an infected Windows desktop. Note the .shit file extension.
Shown above: Ransom payment is 1.5 bitcoin, just like most samples of the previous variant I've seen.
FINAL NOTES
Once again, here is the associated archive:
- ZIP archive of all the information: 2016-10-24-Locky-malspam-all-info.zip 2.09 MB (2,092,600 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.