2018-09-05 - EMOTET INFECTION WITH ICEDID BANKING TROJAN AND AZORULT
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2018-09-05-Emotet-malspam-with-PDF-attachments-3-examples.zip 7.9 kB (7,898 bytes)
 - 2018-09-05-Emotet-infection-with-IcedID-banking-Trojan-and-AZORult.pcap.zip 5.3 MB (5,328,331 bytes)
 - 2018-09-05-malware-and-artifacts-from-Emotet-infection-with-IcedID-and-AZORult.zip 960 kB (960,083 bytes)
 
NOTES:
- Traffic-wise, it looks like Emotet retrieved IcedID, then IcedID retrieved AZORult.
 - As noted yesterday, this week I've seen Emotet malspam with PDF attachments, where there is no link in the message text for an Emotet Word doc.
 - Instead, the PDF attachments have a link for the Emotet Word doc.
 - Of note, I'm also seeing Word docs directly attached to the emails from Emotet malspam.
 - And as usual I'm also finding URLs from the Emotet malspam message text with links to the Word document (these emails have no attachments).
 
- A final reminder that Emotet malspam currently uses at least 3 methods to infect a vulnerable Windows host:
 
- Malspam with no attachments and a link to the Word doc in the message text.
 - Malspam with no links in the message text, but a PDF attachment with a link to the Word doc in that PDF file.
 - Malspam with no links in the message text, but a Word doc attached directly to the email.
 
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- hxxp[:]//treesurveys.infrontdesigns[.]com/payment-09-18
 - hxxp[:]//treesurveys.infrontdesigns[.]com/payment-09-18/
 - hxxp[:]//aspettaprimavera[.]it/4LmlHpS
 - hxxp[:]//aspettaprimavera[.]it/4LmlHpS/
 - fillizee[.]com
 - aboupir[.]com
 - hxxp[:]//kanboard.globalsoftm[.]com/vendor/symfony/console/Tests/Formatter/crypt_AU3_EXE.exe
 - hxxp[:]//107.182.230[.]25/index.php
 - hxxp[:]//201.170.69[.]112/whoami.php
 
EMAILS

Shown above:  Screenshot from a malspam example on Wednesday 2018-09-05.
3 EXAMPLES OF EMOTET MALSPAM WITH PDF ATTACHMENTS:
- 2018-09-05 at 09:03 UTC -- From: admin.maraisdal@barvallei[.]co[.]za -- Subject: Payment Reminder
 - 2018-09-05 at 12:13 UTC -- From: info@funeralflowerslondon[.]org[.]uk -- Subject: TR: facture L1044 de
 - 2018-09-05 at 16:20 UTC -- From: hector@almadisa[.]com -- Subject: Paiements
 

Shown above:  Clicking on the link in the PDF document downloads the Word document used to infect a vulnerable Windows host.
TRAFFIC

Shown above:  Infection traffic filtered in Wireshark.
INITIAL INFECTION TRAFFIC (EMOTET WORD DOC AND EXECUTABLE):
- 185.20.50[.]222 port 80 - treesurveys.infrontdesigns[.]com - GET /payment-09-18
 - 185.20.50[.]222 port 80 - treesurveys.infrontdesigns[.]com - GET /payment-09-18/
 - 213.186.33[.]151 port 80 - aspettaprimavera[.]it - GET /4LmlHpS
 - 213.186.33[.]151 port 80 - aspettaprimavera[.]it - GET /4LmlHpS/
 
EMOTET POST-INFECTION TRAFFIC:
- 201.146.211[.]106 port 7080 - 201.146.211[.]106:7080 - GET /
 - 181.29.82[.]117 port 80 - 181.29.82[.]117 - GET /
 - 41.79.155[.]118 port 8080 - 41.79.155[.]118:8080 - GET /
 - 41.79.155[.]118 port 8080 - 41.79.155[.]118:8080 - GET /
 - 201.170.69[.]112 port 80 - 201.170.69[.]112 - GET /whoami.php
 
ICEDID BANKING TROJAN POST-INFECTION TRAFFIC:
- 5.135.252[.]103 port 443 - fillizee[.]com - SSL/TLS traffic caused by IcedID banking Trojan
 - 93.189.41[.]44 port 80 - aboupir[.]com - GET /data2.php?B41857922C8EBEE9
 - 93.189.41[.]44 port 443 - aboupir[.]com - SSL/TLS traffic caused by IcedID banking Trojan
 
POST-INFECTION TRAFFIC ASSOCIATED WITH AZORULT:
- 198.211.109[.]169 port 80 - kanboard.globalsoftm[.]com - GET /vendor/symfony/console/Tests/Formatter/crypt_AU3_EXE.exe
 - 107.182.230[.]25 port 80 - 107.182.230[.]25 - POST /index.php
 
FILE HASHES
PDF ATTACHMENTS FROM THOSE 3 EXAMPLES:
- 3a0f7fcf42df97c0dba446eade1ac1928d04c97ae97774779b46e87193741ca4 - 1,668 bytes - DOC-3746.pdf
 - 28c06c2911c41a1027def891ab5b60b6ee8db221bafb38cb7cf742ac6f1a2800 - 1,593 bytes - DOC1044.pdf
 - bda2d2488d1f2d611f9ec792ef7026a461bff753ff156f75da3b1fdf375097ef - 1,619 bytes - DOC154122.pdf
 
MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:
- SHA256 hash:  2106af69195037522d4458574a6734b6156e3d6a181c01d55e72051c22471258
File size: 78,720 bytes
File description: Downloaded Word doc with macro for Emotet 
- SHA256 hash:  6556cc4b93b46cc22a7bcdd07f5e0af6aa1b4bec96831232f118fb64158efc45
File size: 510,464 bytes
File location: C:\Users\[username]\AppData\Local\Microsoft\Windows\[random name].exe
File description: Emotet malware binary retreived from the infected Windows host 
- SHA256 hash:  24503419c21a345173822bd36297c8815e8f91c78c0d46211f33a1738479238a
File size: 475,648 bytes
File location: C:\ProgramData\QLUwn7PzPqFo72.exe
File location: C:\ProgramData\tx9r.exe
File description: IcedID malware retreived from the infected Windows host 
- SHA256 hash:  3c84bfb7377d0e47c1eaa12fdbee6f5fcd19d482cc9aa3790507f4445d719290
File size: 475,648 bytes
File location: C:\ProgramData\{5A0BA599-0B99-4344-A7E9-AEAFDACF4896}\ayxuiczipqtf
File description: IcedID malware persistent on the infected Windows host 
- SHA256 hash:  3a65b5735981f636fbaf9cff05e78f933d10b5191209eb077d4a29210c23e739
File size: 514,560 bytes
File location: hxxp[:]//kanboard.globalsoftm[.]com/vendor/symfony/console/Tests/Formatter/crypt_AU3_EXE.exe
File description: AZORult malware retreived from kanboard.globalsoftm.com 
MORE IMAGES

Shown above:  Websocket traffic caused by IcedID on the infected Windows host.

Shown above:  SSL/TLS certificate data consistent with previous samples of IcedID banking Trojan (1 of 2).

Shown above:  SSL/TLS certificate data consistent with previous samples of IcedID banking Trojan (2 of 2).

Shown above:  Scheduled task to keep IcedID persistent on the infected Windows host.

Shown above:  Locations of IcedID malware and artifacts on the infected Windows host.
Click here to return to the main page.
