Quantcast
Channel: SANS Internet Storm Center, InfoCON: green
Viewing all articles
Browse latest Browse all 8250

Searching for malspam, (Thu, Jun 9th)

$
0
0

Introduction

About a week ago, I stopped seeing the daily deluge of malicious spam (malspam) distributing Dridex banking trojans or Locky ransomware. Before this month, I generally noticed multiple waves of Dridex/Locky malspam almost every day. This malspam contains attachments with zipped .js files or Microsoft Office documents designed to download and install the malware.

I havent found much discussion about the current absence of Dridex/Locky malspam. Since the actor(s) behind Dridex started distributing Locky in back in February 2016 [1], I can" />
Shown above: Have others noticed a lull in Dridex/Locky? [2]

Of course, other campaigns are ongoing, so I figure its time to review other examples of malspam. These campaigns are somewhat harder to find than Dridex/Locky malspam, but theyre certainly out there.

However, my field of view is limited, and I can only report on what Im seeing. With that in mind, this diary reviews two examples of malspam I found on Wednesday 2016-06-08.

First example

Our first example was sent to one of the ISC handlers email aliases." />
Shown above:" />
Shown above:" />
Shown above:" />
Shown above:" />
Shown above:" />
Some of the alerts after reading the pcap in Snort using the Talos Snort subscriber ruleset.

Second example

Our second example is Brazilian malspam in Portuguese sent to a different email address." />
Shown above:" />
Shown above:" />
Shown above:" />
Shown above: Malware downloaded from the malspam link.

Here" />
Shown above: HTTP traffic from the second infection filtered in Wireshark.

In addition to the HTTP traffic, I saw IRC activity on TCP port 443 from the infected host to a server on ssl.houselannister.top at 95.215.46.153." />
Shown above:" />
Shown above: More IRC activity from my infected Windows host.

Of note, the hostname/username for my infected Windows host in this pcap is a throwaway." />
Shown above: Alerts generated on the second infection from Sguil in Security Onion.

Indicators of compromise (IOC) - first example

Domain used for the initial malware download by the .js file:

  • 198.105.244.228 port 80 - www.owifdsferger.net
  • 198.105.244.228 port 80 - www.dorimelds.at
  • 198.105.244.228 port 80 - www.opaosdfdksdfd.ro
  • 31.11.33.35 port 80 - www.brusasport.com

Post infection traffic that triggered alerts for Andromeda malware:

  • 188.165.157.176 port 80 - secure.adnxs.metalsystems.it - POST /new_and/state.php

Other HTTP traffic during this infection:

  • 62.149.128.72 port 80 - antoniocaroli.it - GET /prova/sd/Lnoort.exe
  • 62.149.132.43 port 80 - www.antoniocaroli.it - GET /prova/sd/Lnoort.exe
  • 62.149.128.154 port 80 -antoniocaroli.it- GET /prova/sd/romeo.exe
  • 62.149.132.43 port 80 -www.antoniocaroli.it- GET /prova/sd/romeo.exe
  • 62.149.140.183 port 80 -www.amicimusica.ud.it">/pz/ft.so
  • 217.160.6.96 port 2352 - Attempted TCP connection to dop.premiocastelloacaja.com
  • 188.190.33.93 port 80 - goyanok.at - HTTP POST triggered alert for Ursnif variant

Indicators of compromise (IOC) - second example

Traffic to retrieve the initial malware:

  • 65.181.113.254 port 80 - www.grupoc4.top - GET /m.php?id=[name]
  • NOTE: See the pcap for the URL from 4shared.com hosting the initial malware

Post-infection traffic:

  • 185.61.149.93 port 80 - www.ruthless.sexy - Callback from the infected host
  • 65.181.113.187 port 80 - lol.devyatinskiy.ru - Callback from the infected host">Final words

    Malspam is a pretty low-level threat, in my opinion. Most people recognize the malspam and will never click on the attachments or links. For those more likely to click, software restriction policies can play a role in preventing infections. And finally, people should be using properly administered Windows hosts and follow best security practices (up-to-date applications, latest OS patches, etc).

    The same thing goes for Dridex/Locky malspam, which I expect will return soon enough.

    But many vulnerable hosts are still out there, and enough people using those hosts are still tricked by this malspam. Thats probably why malspam remains a profitable method to distribute malware.

    Pcaps and malware for this ISC diary can be found here.

    ---
    Brad Duncan
    brad [at] malware-traffic-analysis.net

    References:

    [1] https://www.proofpoint.com/us/threat-insight/post/Dridex-Actors-Get-In-the-Ransomware-Game-With-Locky
    [2] https://twitter.com/MalwareTechBlog/status/738530089600733184

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Viewing all articles
Browse latest Browse all 8250

Trending Articles