2017-05-26 - COREBOT INFECTION

NOTICE:

ASSOCIATED FILES:

  • 2017-05-26-Corebot-infection-from-fake-DHL-site.pcap   (1,495,969 bytes)
  • 2017-05-25-DHL-themed-Corebot-malspam-024959-UTC.eml   (1,255 bytes)
  • 2017-05-25-DHL-themed-Corebot-malspam-225407-UTC.eml   (1,237 bytes)
  • 34cf4593-e97c-459b-b49d-bf21da142526.exe   (284,514 bytes)
  • invoice-0063827410370260857-000001870346531780753154078347.pdf.js   (21,338 bytes)
  • invoice-0063827410370260857-000001870346531780753154078347.zip   (5985 bytes)
  • jebfc.exe   (272,226 bytes)

NOTES:

 

EMAIL


Shown above:  Screenshot of one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Link from the email goes to a fake DHL page that sends a zip archive.

 


Shown above:  Zip archive from the fake DHL page contains a .js downloader.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

TRAFFIC FROM AN INFECTION:

 


Shown above:  TCP stream of fake DHL site sending the malicious zip archive.

 


Shown above:  TCP stream of HTTP request of the Windows executable for Corebot.

 


Shown above:  Certificate data from the Corebot C2 traffic shown in Wireshark.

 


Shown above:  TCP stream of an IP address check by the infected host.

 

FILE HASHES

ZIP ARCHIVE SENT BY FAKE DHL SITE:

COREBOT MALWARE FROM THE INFECTED WINDOWS HOST:

WINDOWS REGISTRY UPDATE:

 

IMAGES


Shown above:  Corebot malware persistent on the infected Windows host through a registry update.

 

Click here to return to the main page.