2018-01-02 - INFECTION FROM WHATSAPP-THEMED MALSPAM TAGETING BRAZIL
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-01-02-infection-traffic.pcap.zip 14.4 MB (14,366,849 bytes)
- 2018-01-02-infection-traffic.pcap (15,560,361 bytes)
- Zip archive of the email: 2018-01-02-WhatsApp-themed-malspam-1443-UTC.eml.zip 1.5 kB (1,516 bytes)
- 2018-01-02-WhatsApp-themed-malspam-1443-UTC.eml (3,581 bytes)
- 2018-01-02-malware-and-artifacts.zip 24.7 MB (24,741,226 bytes)
- 124412.dat (6,499,839 bytes)
- 125412.dat (5,440,967 bytes)
- DISNEY0201.exe (201,679,672 bytes)
- DISNEY020118.exe (202,065,232 bytes)
- usernameHOSTNAME-PC0.txt (3,364 bytes)
- usernameHOSTNAME-PC1.txt (3,360 bytes)
- vIDEO.Nat.25.12.2017.exe (3,490,816 bytes)
NOTES:
- I documented similar malspam last year on 2017-10-03 and 2017-10-11.
- The end results appears to be the same type of Banload-style information stealer/banking malware we've seen before from this type of malspam.
- The only alerts of note on the network traffic were alerts for a Lets Encrypt SSL certificate used by whatsapp.visualizar[.]cf, a server established to help distribute the malware.
Shown above: Flowchart for today's infection.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- hxxps[:]//storage.googleapis[.]com/webmessenger/Visualizar.html
- whatsapp.visualizar[.]cf
- hxxps[:]//storage.googleapis[.]com/videoswhatsap/vIDEO.Nat.25.12.2017.exe
- hxxp[:]//177.11.55[.]92/upload.php?id=PRO
- hxxp[:]//177.11.55[.]92/upload.php?id=LXO
- hxxp[:]//177.11.55[.]92/index1.php
Shown above: Screenshot of the email.
HEADER INFORMATION:
- Date: Tuesday, 2018-01-01 at 14:44 UTC
- Received: from fh5 ([89.40.119[.]45])
- Message-ID: <20180102144358.30DB91F88F@fh5>
- From: [spoofed as recipient's email address]
- Subject: FWD: - Video (WhatsApp) 02/01/2018 03:43:58
- Link in the email: hxxps[:]//storage.googleapis[.]com/webmessenger/Visualizar.html
MESSAGE TEXT:
Número do Controle: 950637668 Prezado Usuário: [recipient's email address]
WhatsApp com você. Para visualizá-lo, clique no link abaixo.
Video.Wav.25.12.2017.AM:03.30
***** Enviado via IPhone X *****
Shown above: Downloading malware from link in the email.
Shown above: Saw this pop-up message, but the malware still infected my lab host..
TRAFFIC
Shown above: HTTP traffic from the infection filtered in Wireshark.
Shown above: HTTPS URLs noted in Fiddler web debugger.
ASSOCIATED DOMAINS:
- port 443 (HTTPS) - storage.googleapis[.]com - GET /webmessenger/Visualizar.html
- 185.189.56[.]84 port 443 (HTTPS) - whatsapp.visualizar[.]cf - GET /Abrir/
- port 443 (HTTPS) - storage.googleapis[.]com - GET /videoswhatsap/vIDEO.Nat.25.12.2017.exe&[string of characters]
- 177.11.55[.]92 port 80 - 177.11.55[.]92 - GET /upload.php?id=PRO
- 177.11.55[.]92 port 80 - 177.11.55[.]92 - GET /upload.php?id=LXO
- 177.11.55[.]92 port 80 - 177.11.55[.]92 - POST /index1.php
- DNS queries for globo[.]com (a legitimate site), cxaffdxxxeo.gotdns[.]ch, and twocxaffdxxxeo.gotdns[.]ch - but no associated TCP traffic.
MALWARE
MALWARE DOWNLOADED FROM LINK IN EMAIL:
- SHA256 hash: 3e7fe55b467948c0e4f788581e2bd2008619f53cf1cb2a3c6dcd156042d553ec
File size: 3,490,816 bytes
File name: vIDEO.Nat.25.12.2017.exe
FOLLOW-UP ZIP ARCHIVE (1 OF 2):
- SHA256 hash: 116872ae52c6f59aee0d5114445c3c3db2153db0ccb3c6869d8983ecc766a4cd
File size: 6,499,839 bytes
File name: 124412.dat
File location: hxxp[:]//177.11.55[.]92/upload.php?id=PRO
EXTRACTED EXECUTABLE (1 OF 2):
- SHA256 hash: a44c6a4233201818c8b86303e06d70141e526dfa47ef5cb0dcb42c98d7078948
File size: 201,679,672 bytes
File name: kqabnrgr.dat
File location: C:\Users\[username]\AppData\Local\A9313E2A1BB5D422EA99\DISNEY0201.exe
FOLLOW-UP ZIP ARCHIVE (2 OF 2):
- SHA256 hash: b69421193dc529eb50a76549c81ab34ecc12cbbdb0aa2376681cdd8cbc95bc4b
File size: 5,440,967 bytes
File name: 125412.dat
File location: hxxp[:]//177.11.55[.]92/upload.php?id=LXO
EXTRACTED EXECUTABLE (2 OF 2):
- SHA256 hash: 7c7d58eb470fa4a6dd697bfeb802b0a48c0e0f670ea2c015e589263af3f52353
File size: 202,065,232 bytes
File name: ptdwplcp.dat
File location: C:\Users\[username]\AppData\Local\B9313E2A1BB5D422EA98\DISNEY020118.exe
IMAGES
Shown above: Follow-up download for a zip archive with malware for the infection.
Shown above: Contents of the zip archive and where it was dropped for persistence.
Shown above: Two zip archives were retrieved by the initial installer, and the extracted EXE files were made persistent through scheduled tasks.
Shown above: Alerts from Sguil in Security Onion using Suricata and the EmergingThreats Pro (ETPRO) ruleset.
Shown above: Some alerts on the infection traffic from the Snort subscriber ruleset when reading the pcap with Snort 2.9.11.
Shown above: Post-infection callback from the infected Windows host.
Click here to return to the main page.