2018-12-19 - MALSPAM PUSHING THE MYDOOM WORM IS STILL A THING
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Malspam examples: 2018-12-19-MyDoom-malspam-4-email-examples.zip 87.5 kB (87,475 bytes)
 
- 2018-12-17-malspam-0334-UTC.eml (32,517 bytes)
 - 2018-12-17-malspam-2019-UTC.eml (30,838 bytes)
 - 2018-12-18-malspam-1922-UTC.eml (31,456 bytes)
 - 2018-12-19-malspam-1454-UTC.eml (31,030 bytes)
 
- Pcap of the infection traffic: 2018-12-19-MyDoom-infection-traffic.pcap.zip 205 kB (204,725 bytes)
 
- 2018-12-19-MyDoom-infection-traffic.pcap (362,046 bytes)
 
- Associated malware: 2018-12-19-MyDoom-zip-attachments-and-extracted-EXE-files.zip 171.3 kB (171,343 bytes)
 
- 17c7b0ccdf73b05a070443659715c9ae136aeda89f931e05cc80a8a05fbfea85.exe (22,020 bytes)
 - 2ccf2b595b2c85fc17dafdf7ec3e0133b897ca2eb84da62189af023c2dc8a430.exe (22,020 bytes)
 - 3335c2a089421bd1c19cff225d04f0c3d1f9192a41cd257ad93e608199b4d849.zip (22,140 bytes)
 - 57b58feb49bd6de828371fc52c0e300a37cc7365720e1f961265f47fa5abeea8.zip (22,376 bytes)
 - 78acb6f8d713e20f17f4bf6ca20e919845dfa1d8252487aa37958062b4fd146e.zip (21,966 bytes)
 - 868289da1cf8aba7c2e9c38028accdfd989ef59cde9fc733543dff9fc4ce5826.exe (22,752 bytes)
 - ab870f7f11ab105d92f2a29e8581992ae506bbc9e19e9c71e873b0c54639d8ad.exe (22,020 bytes)
 - e3e809cd45c807ac832535a338003248739fa09ff9bcfa12a0acb7b1217e80f6.zip (22,140 bytes)
 
NOTES:
- MyDoom worm was big in 2004, and it's been propagating around ever since. Some details can be found here.
 - I still occasionally see these, and other people have also seen MyDoom activity over that past year or two.
 
EMAILS

Shown above:  Screenshot from one of the MyDoom emails.
EMAILS:
- Date range: 2018-12-17 03:34 UTC through 2018-12-20 04:05 UTC
 
- Received: from browsefox[.]com ([218.16.100[.]42])
 - Received: from yhglobal[.]com ([113.91.55[.]46])
 - Received: from adobee[.]com ([113.91.55[.]72])
 - Received: from mozilla[.]org ([95.56.208[.]123])
 
- Subject: Returned mail: Data format error
 - Subject: File Delivery failed
 - Subject: File Returned mail: see transcript for details
 
- From: File james@browsefox[.]com
 - From: File john@yhglobal[.]com
 - From: File flash@adobee[.]com
 - From: tochka@vyach-zaxaroff.narod[.]ru
 
- Attachment name: .zip
 - Attachment name: message.zip
 
TRAFFIC
TRAFFIC FROM AN INFECTED WINDOWS HOST:
- Various IP addresses over TCP port 1042 - attempted connections (SYN packets only)
 - Various mail servers over TCP port 25 - SMTP and attempted SMTP traffic
 
MALWARE
FROM 2017-12-17 03:34 EMAIL:
- SHA256 hash:  442c89956a623c10ea5e525dc85d8f8827c973569640ca266cab0a0f6aba0070
File size: 23,060 bytes
File name: .zip
File description: File attachment (zip archive) from malspam on 2018-12-17 03:34 UTC 
- SHA256 hash:  868289da1cf8aba7c2e9c38028accdfd989ef59cde9fc733543dff9fc4ce5826
File size: 22,752 bytes
File name: .txt [97 spaces in middle of file name] .pif
File description: Windows executable file - MyDoom worm (Modified date: Dec 2004) 
FROM 2017-12-17 20:19 EMAIL:
- SHA256 hash:  3335c2a089421bd1c19cff225d04f0c3d1f9192a41cd257ad93e608199b4d849
File size: 22,140 bytes
File name: message.zip
File description: File attachment (zip archive) from malspam on 2018-12-17 20:19 UTC 
- SHA256 hash:  ab870f7f11ab105d92f2a29e8581992ae506bbc9e19e9c71e873b0c54639d8ad
File size: 22,020 bytes
File name: message.bat
File description: Windows executable file - MyDoom worm (Modified date: Dec 2004) 
FROM 2017-12-18 19:22 EMAIL:
- SHA256 hash:  57b58feb49bd6de828371fc52c0e300a37cc7365720e1f961265f47fa5abeea8
File size: 22,376 bytes
File name: .zip
File description: File attachment (zip archive) from malspam on 2018-12-18 19:22 UTC 
- SHA256 hash:  2ccf2b595b2c85fc17dafdf7ec3e0133b897ca2eb84da62189af023c2dc8a430
File size: 22,020 bytes
File name: .htm [121 spaces in middle of file name] .scr
File description: Windows executable file - MyDoom worm (Modified date: Dec 2004) 
FROM 2017-12-19 14:54 EMAIL:
- SHA256 hash:  e3e809cd45c807ac832535a338003248739fa09ff9bcfa12a0acb7b1217e80f6
File size: 22140 bytes
File name: message.zip
File description: File attachment (zip archive) from malspam on 2018-12-19 14:54 UTC 
- SHA256 hash:  17c7b0ccdf73b05a070443659715c9ae136aeda89f931e05cc80a8a05fbfea85
File size: 22,020 bytes
File name: message.exe
File description: Windows executable file - MyDoom worm (Modified date: Dec 2004) 
IMAGES

Shown above:  Traffic from an infection filtered in Wireshark first show attempted TCP connections to various IP addresses over port 1042.

Shown above:  Filtering on smtp and ip contains "MAIL FROM:" shows some of the spoofed sending addresses sent from my
infected Windows host.

Shown above:  Filtering on smtp and ip contains "Subject:" will results that you can follow a TCP stream and
see a full malspam message sent from my infected Windows host.

Shown above:  Following one of the TCP streams to view malspam sent from the infected Windows host.
Click here to return to the main page.
