2020-03-19 - ENGLISH MALSPAM PUSHES URSNIF (GOZI/IFSB)
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2020-03-19-Ursnif-IOCs.txt.zip 1.2 kB (1,236 bytes)
 
- 2020-03-19-Ursnif-IOCs.txt (1,943 bytes)
 
- 2020-03-19-Ursnif-infection-traffic.pcap.zip 647 kB (646,922 bytes)
 
- 2020-03-19-Ursnif-infection-traffic.pcap (997,531 bytes)
 
- 2020-03-19-Ursnif-malware-and-artifacts.zip 2.5 MB (2,520,270 bytes)
 
- 2020-03-19-Word-doc-with-macro-for-Ursnif.bin (60,279 bytes)
 - 2020-03-19-initial-Ursnif-DLL-retreived-after-enabling-Word-macro.bin (347,136 bytes)
 - 2020-03-19-not-malicious-copy-of-MSHTA.EXE-dropped-after-enabling-Word-macro.bin (13,312 bytes)
 - 2020-03-19-password-protected-zip-archive-password-333.zip (54,224 bytes)
 - 2020-03-19-registry-update-caused-by-Ursnif.txt (10,799,368 bytes)
 - 2020-03-19-script-dropped-after-enabling-macros.txt (1,928 bytes)
 
NOTES:
- Chain of events: malspam --> password-protected zip attachment --> extracted Word doc --> enable macros --> Ursnif
 
IMAGES

Shown above:  Example of an attachment from this malspam.

Shown above:  Screenshot of the Word doc.

Shown above:  Traffic from an infection filtered in Wireshark.

Shown above:  Some items seen after enabling macros on the Word doc.
Click here to return to the main page.
