2018-05-29 - DHL-THEMED MALSPAM WITH LINKS TO .JS FILE DOWNLOADER

NOTICE:

ASSOCIATED FILES:

  • 2018-05-29-DHL-themed-malspam-spreadsheet-tracker.csv   (2,186 bytes)
  • 2018-05-28-DHL-themed-malspam-0508-UTC.eml   (190,207 bytes)
  • 2018-05-28-DHL-themed-malspam-1739-UTC.eml   (189,925 bytes)
  • 2018-05-28-DHL-themed-malspam-2038-UTC.eml   (190,060 bytes)
  • 2018-05-28-DHL-themed-malspam-2109-UTC.eml   (68,446 bytes)
  • 2018-05-28-DHL-themed-malspam-2208-UTC.eml   (189,957 bytes)
  • 2018-05-28-DHL-themed-malspam-2211-UTC.eml   (190,113 bytes)
  • 2018-05-28-DHL-themed-malspam-2216-UTC.eml   (190,137 bytes)
  • 2018-05-28-DHL-themed-malspam-2251-UTC.eml   (190,321 bytes)
  • 2018-05-28-DHL-themed-malspam-2336-UTC.eml   (190,365 bytes)
  • 2018-05-29-DHL-themed-malspam-0146-UTC.eml   (190,225 bytes)
  • 2018-05-29-DHL-themed-malspam-infection-traffic.pcap   (5,847,764 bytes)
  • DHL-Express-Customer-Invoice.js   (17,004 bytes)
  • TempRNi25.eXe   (228,352 bytes)
  • hero.exe   (598,016 bytes)

 

NOTES:


Shown above:  My attempt at a flowchart for today's infection traffic.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS

10 EMAIL EXAMPLES:

(Read: date/time - received from -- sending address -- subject)

 


Shown above:  Screen shot from one of the emails.

 


Shown above:  Following a link from one of the emails resulted in some redirects and a downloaded .js file.

 


Shown above:  The downloaded .js file.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

 

URLS FROM THE EMAILS:

 

TRAFFIC FROM AN INFECTED WINDOWS HOST:

 

FILE HASHES

DOWNLOADED .JS FILE:

1ST MALWARE EXECUTABLE:

2ND MALWARE EXECUTABLE PERSISTENT ON THE INFECTED WINDOWS HOST:

 

Click here to return to the main page.