2017-10-03 - URSNIF INFECTION FROM JAPANESE MALSPAM

NOTICE:

ASSOCIATED FILES:

  • 2017-10-03-Ursnif-infection-traffic.pcap   (550,394 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0813-UTC.eml   (63,890 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0815-UTC.eml   (63,980 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0818-UTC.eml   (64,049 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0923-UTC.eml   (1,748 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0926-UTC.eml   (1,693 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0930-UTC.eml   (98,935 bytes)
  • 2017-10-03-Japanese-malspam-for-Ursnif-0939-UTC.eml   (98,822 bytes)
  • 2017-10-03-Excel-file-pushing-Ursnif-example-1-of-2.xls   (45,568 bytes)
  • 2017-10-03-Excel-file-pushing-Ursnif-example-1-of-2.xls   (71,680 bytes)
  • 2017-10-03-Ursnif-binary-from-nonudoka_top.exe   (483,328 bytes)

 

NOTES:

 

EMAILS


Shown above:  Screenshot from an email (1 of 2).

 


Shown above:  Screenshot from an email (2 of 2).

 

INFORMATION FROM THE EMAILS:

 


Shown above:  Example of an Excel spreadsheet (1 of 2).

 


Shown above:  Example of an Excel spreadsheet (2 of 2).

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark (only DNS queries and TCP SYN segments for post-infection activity).

 


Shown above:  Screenshot of Fiddler capture when @tmmalanalyst checked it out earlier (link to tweet).

 

TRAFFIC FROM AN INFECTION:

POST-INFECTION TRAFFIC:

 

FILE HASHES

EMAIL ATTACHMENT 1 OF 2:

EMAIL ATTACHMENT 2 OF 2:

FOLLOW-UP MALWARE - URSNIF:


Shown above:  Malware persistent on the infected Windows host.

 

Click here to return to the main page.