2018-05-25 - NECURS BOTNET MALSPAM PUSHES FLAWED AMMYY RAT
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-05-25-Necurs-Botnet-malspam-tracker.csv.zip 0.7 kB (729 bytes)
- 2018-05-25-Necurs-Botnet-malspam-tracker.csv 1,104 bytes
- 2018-05-25-Necurs-Botnet-malspam-7-email-examples.txt.zip 1.9 kB (1,854 bytes)
- 2018-05-25-Necurs-Botnet-malspam-7-email-examples.txt 8,802 bytes
- 2018-05-25-Necurs-Botnet-malspam-sends-Flawwed-Ammyy.pcap.zip 940 kB (940,496 bytes)
- 2018-05-25-Necurs-Botnet-malspam-sends-Flawwed-Ammyy.pcap 1,056,042 bytes
- 2018-05-25-malware-and-artifacts-from-infection-due-to-Necurs-Botnet-malspam.zip 554 kB (554,446 bytes)
- 2018-05-25-Downloader-for-Flawed-Ammyy-from-Necurs-Botnet-malspam.exe 126,464 bytes
- 2018-05-25-Flawed-Ammyy-from-Necurs-Botnet-malspam.exe 856,064 bytes
- 2018-05-25-Necurs-Botnet-malspam-attachment-example.iqy.txt 49 bytes
- 2018-05-25-scheduled-task-to-keep-Flawed-Ammyy-persistent-Microsoft_Window_Center.xml.txt 3,212 bytes
NOTES:
- This is the first time I've posted anything about Necurs Botnet malspam since the data dumps I did last month on 2018-04-24, 2018-04-26, and 2018-04-27.
- The malspam was ultimately pushing Flawed Ammyy (also spelled as FlawedAmmyy) last month as well.
- Today, the attachments are IQY files.
- IQY is a file extension for an "internet query" used by Microsoft Excel. You have to click through some warnings to infect a vulnerable Windows host.
- See more information about today's malspam from MyOnlineSecurity in this blog post.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domain:
- clodflarechk[.]com
Shown above: Screenshot of the spreadsheet tracker.
Shown above: Screenshot from one of the emails.
EMAILS COLLECTED:
(READ: Date/Time -- Received: from -- Sender (spoofed) -- Subject line -- Attachment name)
- 2018-05-25 14:23 UTC -- static.vnpt[.]vn ([14.172.32[.]129]) -- Evangelina.Peacock@[recipient's email domain] -- Unpaid invoice [ID:6785584265] -- 6785584265.iqy
- 2018-05-25 14:27 UTC -- [154.234.223[.]7] ([154.234.223[.]7]) -- Francisca.Ambler@[recipient's email domain] -- Unpaid invoice [ID:7941581] -- 7941581.iqy
- 2018-05-25 14:30 UTC -- fm-dyn-111-94-33-14.fast[.]net[.]id ([111.94.33[.]14]) -- Bernie.Paffett@[recipient's email domain] -- Unpaid invoice [ID:458382955] -- 458382955.iqy
- 2018-05-25 14:30 UTC -- [183.81.187[.]115] ([183.81.187[.]115]) -- Terrell.Cory@[recipient's email domain] -- Unpaid invoice [ID:215319] -- 215319.iqy
- 2018-05-25 14:30 UTC -- [192.168.96[.]25] ([114.124.193[.]12]) -- Michele.Greenbank@[recipient's email domain] -- Unpaid invoice [ID:4142164753] -- 4142164753.iqy
- 2018-05-25 14:33 UTC -- [197.97.116[.]209] ([197.97.116[.]209]) -- Melba.Tunney@[recipient's email domain] -- Unpaid invoice [ID:2135542157] -- 2135542157.iqy
- 2018-05-25 14:42 UTC -- static.vnpt[.]vn ([14.239.97[.]129]) -- ugenio.Sheild@[recipient's email domain] -- Unpaid invoice [ID:002786] -- 002786.iqy
Shown above: The attached IQY file when double-clicked.
Shown above: Actual contents of the attached IQY file shown in a text editor.
TRAFFIC
Shown above: Traffic from an infection filtered in Wireshark.
NETWORK TRAFFIC FROM AN INFECTED LAB HOST:
- 85.119.150[.]29 port 80 - clodflarechk[.]com - POST /2.dat
- 85.119.150[.]29 port 80 - clodflarechk[.]com - GET /1.dat
- 85.119.150[.]29 port 80 - clodflarechk[.]com - GET /data.xls
- 85.119.150[.]29 port 80 - clodflarechk[.]com - GET /cloud.png
- 103.208.86[.]69 port 443 - Flawed Ammyy callback traffic
Shown above: TCP stream for the first HTTP request caused by opening the IQY file in Microsoft Excel.
Shown above: The second HTTP request returned script for Powershell.
Shown above: The third HTTP request returned the initial Windows executable.
Shown above: The fourth HTTP request returned a Flawed Ammyy executable, but it was encrypted as it came over the network.
Shown above: Callback traffic caused by the Flawed Ammyy executable.
FILE HASHES
MALSPAM ATTACHMENTS:
- SHA256 hash: ed9ada4fa0f323fde07ee3e9afacf9f8bd8b9b07771fe8f328ad96c33c0381a1
File size: 49 bytes
File name: [various digits].iqy
File description: Malspam attachments (all I saw had the same hash), Excel-based Internet Query (.iqy) file
INITIAL EXECUTABLE:
- SHA256 hash: f4b6b0c8787ea344ce9f68f5d506a5d6cc7447114b3dcdbb6d0207372054dfe2
File size: 167,936 bytes
File location: C:\Users\[username]\AppData\Local\temp\cmd_.exe
File description: File downloader that grabbed Flawed Ammyy binary
FOLLOW-UP EXECUTABLE:
- SHA256 hash: 82ef9b142e67bf5ecc6f4db77b68ebc0e52276c05ae768dced6c429ba921ff92
File size: 167,936 bytes
File location: C:\ProgramData\Settings\wsus.exe
File description: Flawed Ammyy binary
ADDITIONAL IMAGES
Shown above: Scheduled task to keep the Flawed Ammyy infection persistent.
Shown above: Alerts from Sguil in Security Onion using Suricata and the EmergingThreats Pro (ETPRO) ruleset.
Click here to return to the main page.