2018-05-29 - DHL-THEMED MALSPAM WITH LINKS TO .JS FILE DOWNLOADER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- Zip archive of the spreadsheet tracker: 2018-05-29-DHL-themed-malspam-spreadsheet-tracker.csv.zip 1.2 kB (1,161 bytes)
- 2018-05-29-DHL-themed-malspam-spreadsheet-tracker.csv (2,186 bytes)
- Zip archive of 10 email examples: 2018-05-29-DHL-themed-malspam-10-email-examples.zip 248 kB (248,447 bytes)
- 2018-05-28-DHL-themed-malspam-0508-UTC.eml (190,207 bytes)
- 2018-05-28-DHL-themed-malspam-1739-UTC.eml (189,925 bytes)
- 2018-05-28-DHL-themed-malspam-2038-UTC.eml (190,060 bytes)
- 2018-05-28-DHL-themed-malspam-2109-UTC.eml (68,446 bytes)
- 2018-05-28-DHL-themed-malspam-2208-UTC.eml (189,957 bytes)
- 2018-05-28-DHL-themed-malspam-2211-UTC.eml (190,113 bytes)
- 2018-05-28-DHL-themed-malspam-2216-UTC.eml (190,137 bytes)
- 2018-05-28-DHL-themed-malspam-2251-UTC.eml (190,321 bytes)
- 2018-05-28-DHL-themed-malspam-2336-UTC.eml (190,365 bytes)
- 2018-05-29-DHL-themed-malspam-0146-UTC.eml (190,225 bytes)
- Zip archive of the infection traffic: 2018-05-29-DHL-themed-malspam-infection-traffic.pcap.zip 3.5 MB (3,521,632 bytes)
- 2018-05-29-DHL-themed-malspam-infection-traffic.pcap (5,847,764 bytes)
- Zip archive of the malware: 2018-05-29-malware-from-DHL-themed-malspam-infection.zip 554 kB (554,413 bytes)
- DHL-Express-Customer-Invoice.js (17,004 bytes)
- TempRNi25.eXe (228,352 bytes)
- hero.exe (598,016 bytes)
NOTES:
- I left the recipents in the To: line in the sanitized email examples, because every recipient I saw this malspam from was BCC-ed.
Shown above: My attempt at a flowchart for today's infection traffic.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- cityofdifferentips[.]gq
- winterforcing[.]info
- wolahedbune[.]com
- hxxp[:]//37.48.125[.]107/hero.exe
- hxxp[:]//www.abhinish[.]com/wp-content/plugins/js_composer/assets/lib/prettyphoto/images/g_frugality_patholytic.html
- hxxp[:]//www.applauce[.]no/modules/mod_ariimageslidersa/w_aureous_vertically.html
- hxxp[:]//www.bizplace[.]co[.]uk/ghhgtr65d/f_balaenoid_Jordanian.html
- hxxp[:]//www.brigittenyc[.]com/P_neurocardiac_crippledom.html
- hxxp[:]//www.dannemking[.]com.au/loggers/F_strong_corollated.html
- hxxp[:]//www.dilsedilli[.]com/wp-content/plugins/unyson/framework/includes/container-types/box/Q_disprepare_rime.html
- hxxp[:]//www.maratonianos[.]es/d_urushi_naphthalenoid.html
- hxxp[:]//www.rentcar[.]pl//blog/wp-content/uploads/2018/05/p_Petrinist_vacuefy.html
- hxxp[:]//www.rgriggsphoto[.]com/i_unpitying_skibby.html
- hxxp[:]//www.tinkhuyenmai99[.]com/wp-content/uploads/p_overstately_monodromic.html
EMAILS
10 EMAIL EXAMPLES:
(Read: date/time - received from -- sending address -- subject)
- 2018-05-28 05:08 UTC -- nh502-vm11.bullet.mail.kks.yahoo[.]co[.]jp ([183.79.56[.]156]) -- DHL <godricgryffindor0731@yahoo[.]co[.]jp> -- Your Invoice Number #113634
- 2018-05-28 17:39 UTC -- nh605-vm3.bullet.mail.ssk.yahoo[.]co[.]jp ([182.22.90[.]76]) -- DHL Post <okatsu12000@yahoo[.]co[.]jp> -- Your Invoice Number #75935
- 2018-05-28 20:38 UTC -- nh602-vm14.bullet.mail.ssk.yahoo[.]co[.]jp ([182.22.90[.]39]) -- DHL Post <hamanakahideo@yahoo[.]co[.]jp> -- Invoice Number #90617
- 2018-05-28 21:09 UTC -- nh504-vm4.bullet.mail.kks.yahoo[.]co[.]jp ([183.79.57[.]90]) -- DHL <kakasipower@yahoo[.]co[.]jp> -- Invoice Number #187256
- 2018-05-28 22:08 UTC -- nh602-vm6.bullet.mail.ssk.yahoo[.]co[.]jp ([182.22.90[.]31]) -- DHL Post <kouji06302000@yahoo[.]co[.]jp> -- Your Invoice Number #193333
- 2018-05-28 22:11 UTC -- nh501.bullet.mail.kks.yahoo[.]co[.]jp ([183.79.56[.]130]) -- DHL Express <kapel0505@yahoo[.]co[.]jp> -- Your Invoice Number #223306
- 2018-05-28 22:16 UTC -- nh504-vm7.bullet.mail.kks.yahoo[.]co[.]jp ([183.79.57[.]93]) -- DHL <srbwg315@yahoo[.]co[.]jp> -- Invoice Number #54281
- 2018-05-28 22:51 UTC -- nh602-vm12.bullet.mail.ssk.yahoo[.]co[.]jp ([182.22.90[.]37]) -- DHL <hirobottle@yahoo[.]co[.]jp> -- Invoice Number #110779
- 2018-05-28 23:36 UTC -- nh604-vm12.bullet.mail.ssk.yahoo[.]co[.]jp ([182.22.90[.]69]) -- DHL <mikixshiki@yahoo[.]co[.]jp> -- Invoice Number #120405
- 2018-05-29 01:46 UTC -- nh505-vm12.bullet.mail.kks.yahoo[.]co[.]jp ([183.79.57[.]114]) -- DHL <kekosugi00@yahoo[.]co[.]jp> -- Your Invoice Number #95575
Shown above: Screen shot from one of the emails.
Shown above: Following a link from one of the emails resulted in some redirects and a downloaded .js file.
Shown above: The downloaded .js file.
TRAFFIC
Shown above: Traffic from an infection filtered in Wireshark.
URLS FROM THE EMAILS:
- hxxp[:]//www.abhinish[.]com/wp-content/plugins/js_composer/assets/lib/prettyphoto/images/g_frugality_patholytic.html
- hxxp[:]//www.applauce[.]no/modules/mod_ariimageslidersa/w_aureous_vertically.html
- hxxp[:]//www.bizplace[.]co[.]uk/ghhgtr65d/f_balaenoid_Jordanian.html
- hxxp[:]//www.brigittenyc[.]com/P_neurocardiac_crippledom.html
- hxxp[:]//www.dannemking[.]com[.]au/loggers/F_strong_corollated.html
- hxxp[:]//www.dilsedilli[.]com/wp-content/plugins/unyson/framework/includes/container-types/box/Q_disprepare_rime.html
- hxxp[:]//www.maratonianos[.]es/d_urushi_naphthalenoid.html
- hxxp[:]//www.rentcar[.]pl//blog/wp-content/uploads/2018/05/p_Petrinist_vacuefy.html
- hxxp[:]//www.rgriggsphoto[.]com/i_unpitying_skibby.html
- hxxp[:]//www.tinkhuyenmai99[.]com/wp-content/uploads/p_overstately_monodromic.html
TRAFFIC FROM AN INFECTED WINDOWS HOST:
- 185.18.199[.]251 port 80 - maratonianos[.]es - GET /d_urushi_naphthalenoid.html
- 111.118.215[.]40 port 80 - winterforcing[.]info - GET /klein/index.html
- 46.30.42[.]66 port 443 - cityofdifferentips[.]gq - GET /XUUXbQkOx.js (HTTPS)
- 46.30.42[.]66 port 443 - cityofdifferentips[.]gq - GET /js.php (HTTPS)
- 111.118.215[.]40 port 80 - winterforcing[.]info - GET /get/new/get.php (returned .js file)
- 111.118.215[.]40 port 80 - winterforcing[.]info - GET /get/get.php?yDokni (returned 1st executable)
- 185.224.249[.]152 port 80 - wolahedbune[.]com - POST /kryaka/index.php
- 37.48.125[.]107 port 80 - 37.48.125[.]107 - GET /hero.exe (returned 2nd executable)
- 37.48.125[.]114 port 98 - Encrypted or encoded traffic, possibly caused by 2nd executable
FILE HASHES
DOWNLOADED .JS FILE:
- SHA256 hash: 7521284ee6f9b45f5efe44cf7c449a3ed6fc86d71018fc071cd5c93f98bbafb8
File size: 17,004 bytes
File name: DHL-Express-Customer-Invoice.js
1ST MALWARE EXECUTABLE:
- SHA256 hash: cca8206696979428e9f4fec0153e2623a95a7ff206f6c68ce262a1dc59d0579c
File size: 228,352 bytes
File location: C:\Users\[username]\AppData\Local\TempRNi25.eXe
2ND MALWARE EXECUTABLE PERSISTENT ON THE INFECTED WINDOWS HOST:
- SHA256 hash: a8d9739b395df4ceaf14bb51c962368008bd24d00cf98456fdbcd7f58e959a5e
File size: 598,016 bytes
File location: C:\Users\[username]\AppData\Local\Temp\hero.exe
File location: C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeServices.exe
Click here to return to the main page.