2017-10-31 - NECURS BOTNET MALSPAM STOPS USING DDE, STILL USES WORD DOCS TO PUSH LOCKY RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 

SOME PRIOR DOCUMENTATION:

 

NOTES:


Shown above:  New chain of events (no DDE, but embedded objects).

 

EMAILS


Shown above:  Example of an email from this wave of malspam.

 

DATE/TIME:

 

EXAMPLES OF SUBJECT LINES:

 

EXAMPLES OF SENDING ADDRESSES (ALL SPOOFED):

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

TRAFFIC FROM AN INFECTED WINDOWS HOST:

 

OTHER HTTP REQUESTS GENERATED BY THE WORD DOCUMENTS:

 

OTHER HTTP REQUESTS FOR THE 1ST-STAGE MALWARE:

 

TOR DOMAIN FOR LOCKY RANSOMWARE DECRYPTION INSTRUCTIONS:

 

FILE HASHES

WORD DOCUMENTS WITH EMBEDDED OBJECT:

 

MALWARE RETRIEVED FROM THE INFECTED HOST:

 

IMAGES


Shown above:  PowerShell shortcuts seen in the user's AppData\Local\Temp directory.

 


Shown above:  Windows registry update making the 1st-stage malware persistent after a reboot.

 


Shown above:  Desktop from an infected Windows host.

 


Shown above:  Ransom payment was .25 bitcoin.

 

Click here to return to the main page.