2018-07-02 - EMOTET INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-07-02-Emotet-malspam-16-examples.txt.zip 4.8 kB (4,755 bytes)
- 2018-07-02-Emotet-malspam-16-examples.txt (15,796 bytes)
- 2018-07-02-Emotet-infection-with-Zeus-Panda-Banker.pcap.zip 4.6 MB (4,620,324 bytes)
- 2018-07-02-Emotet-infection-with-Zeus-Panda-Banker.pcap (5,303,730 bytes)/li>
- 2018-07-02-malware-associated-with-Emotet-infection.zip 542 kB (542,110 bytes)
- 2018-07-02-downloaded-Word-doc-with-macro-for-Emotet.doc (232,192 bytes)
- 2018-07-02-Emotet-malware-binary-1-of-2.exe (208,896 bytes)
- 2018-07-02-Emotet-malware-binary-2-of-2.exe (203,776 bytes)
- 2018-07-02-Zeus-Panda-Banker-caused-by-Emotet.exe (223,744 bytes)
NOTES:
- Generated this infection in an Active Directory (AD) environment, just to see if anything unusual happened.
- So the traffic in today's pcap is a little messier than in my normal blog posts.
- From what I can tell, nothing unusual happened, other than the expected infection traffic.
Shown above: Chain of events for today's infection.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following URLs and domain:
- hxxp[:]//all4mums[.]ru/Client/Past-Due-invoice/
- hxxp[:]//chinaspycam[.]com/includes/languages/english/html_includes/En/DOC/Account-20064/
- hxxp[:]//chouett-vacances[.]com/Payment-and-address/Invoice-70195027-070118/
- hxxp[:]//cqfsbj[.]cn/DOC/Auditor-of-State-Notification-of-EFT-Deposit/
- hxxp[:]//minami[.]com[.]tw/DOC/Account-55907/
- hxxp[:]//nagoyamicky[.]com/cacheqblog/Payment-and-address/Invoice-3838804/
- hxxp[:]//own-transport[.]com/pub/OVERDUE-ACCOUNT/tracking-number-and-invoice-of-your-order/
- hxxp[:]//www.caglarturizm[.]com[.]tr/INVOICE-STATUS/Please-pull-invoice-47924/
- hxxp[:]//www.customaccessdatabase[.]com/En/Purchase/HRI-Monthly-Invoice/
- hxxp[:]//www.gracetexpro[.]com/Greeting-eCard/
- hxxp[:]//www.jxprint[.]ru/Order/Payment/
- hxxp[:]//www.legionofboomfireworks[.]com/Statement/Direct-Deposit-Notice/
- hxxp[:]//www.marcoantoniocasares[.]com/Purchase/Pay-Invoice/
- hxxp[:]//www.perezdearceycia.cl/wp-content/FILE/Invoice-23382229-070218/
- hxxp[:]//www.sewamobilbengkulu.web[.]id/4th-July-2018/
- hxxp[:]//zlc-aa[.]org/New-Order-Upcoming/588052/
- hxxp[:]//clubvolvoitalia[.]it/r3z6/
- hxxp[:]//ericconsulting[.]com/7I3eUNF/
- hxxp[:]//www.goldenfell[.]ru/media/5DzF30jL/
- hxxp[:]//jmamusical[.]jp/wordpress/wp-content/L8J0igh/
- hxxp[:]//www.mobsterljud[.]se/VJkuLg/
- hxxp[:]//74.79.26[.]193:990/whoami.php
- canariasmotor[.]top
EMAILS
Shown above: Example of the malspam (raw text with headers and formatting).
DATA FROM 16 EMAIL EXAMPLES OF THE MALSPAM:
- Received: from ([80.14.105[.]108])
- Received: from ([103.55.69[.]138])
- Received: from ([137.59.225[.]35])
- Received: from ([196.250.41[.]105])
- Received: from ([221.163.32[.]101])
- Received: from 10.0.0[.]0 ([119.148.37[.]228])
- Received: from 10.0.0[.]16 ([211.221.155[.]202])
- Received: from 10.0.0[.]20 ([117.240.219[.]106])
- Received: from 10.0.0[.]28 ([189.194.248[.]28])
- Received: from 10.0.0[.]28 ([220.249.72[.]99])
- Received: from 10.0.0[.]30 ([221.163.32[.]101])
- Received: from 10.0.0[.]36 ([14.51.231[.]1])
- Received: from 10.0.0[.]40 ([187.144.210[.]26])
- Received: from 10.0.0[.]49 ([122.160.85[.]51])
- Received: from 10.0.0[.]59 ([90.86.57[.]136])
- Received: from 10.0.0[.]63 ([221.163.32[.]101])
SPOOFED SENDERS:
- From: alexa.ballantine@gmail[.]com <[spoofed sending email address]>
- From: Jamacapq@sbcglobal[.]net <[spoofed sending email address]>
- From: ramakrishna3sbc32@gmail[.]com <[spoofed sending email address]>
- From: Amanda Fisher <[spoofed sending email address]>
- From: Andrew Clough <[spoofed sending email address]>
- From: andy <[spoofed sending email address]>
- From: Beacon Systems <[spoofed sending email address]>
- From: CYNTHIA HARRY <[spoofed sending email address]>
- From: Darren Hamm <[spoofed sending email address]>
- From: Kira Holden <[spoofed sending email address]>
- From: Marina Eckert <[spoofed sending email address]>
- From: Mike Andrews <[spoofed sending email address]>
- From: Phil Gibson <[spoofed sending email address]>
- From: Priyanka Kapadia <[spoofed sending email address]>
- From: robert biggs <[spoofed sending email address]>
- From: Terry Nelson <[spoofed sending email address]>
SUBJECT LINES:
- Subject: The Fourth of July wishes
- Subject: =?UTF-8?B?Vm9zIGZhY3R1cmVzIGltcGF5w6llcyBkdSAwMi8wNy8yMDE4ICMwMTUtNTgyMQ==?=
- Subject: Darren Hamm 4th of July Greeting Card
- Subject: Final Account
- Subject: INCORRECT INVOICE
- Subject: Invoice Number 13915
- Subject: Invoice Number 55057
- Subject: Invoice# 3988726
- Subject: Outstanding INVOICE FQOVN/2773110/730
- Subject: Outstanding INVOICE XOJR/7763411/6403
- Subject: Please send copy invoice
- Subject: RE: Outstanding INVOICE BIA/066250/5423
- Subject: RTZM3-9044531941
- Subject: Sales Invoice
- Subject: Seperate Remittance Advice Layout - paper document A4
- Subject: Votre facture du 02 juillet Nr. 08296866
Shown above: Word doc generated from link in the malspam.
INFECTION TRAFFIC
Shown above: Traffic from an infection filtered in Wireshark.
URLS FROM THE MALSPAM TO DOWNLOAD THE INITIAL WORD DOCUMENT:
- hxxp[:]//all4mums[.]ru/Client/Past-Due-invoice/
- hxxp[:]//chinaspycam[.]com/includes/languages/english/html_includes/En/DOC/Account-20064/
- hxxp[:]//chouett-vacances[.]com/Payment-and-address/Invoice-70195027-070118/
- hxxp[:]//cqfsbj[.]cn/DOC/Auditor-of-State-Notification-of-EFT-Deposit/
- hxxp[:]//minami[.]com[.]tw/DOC/Account-55907/
- hxxp[:]//nagoyamicky[.]com/cacheqblog/Payment-and-address/Invoice-3838804/
- hxxp[:]//own-transport[.]com/pub/OVERDUE-ACCOUNT/tracking-number-and-invoice-of-your-order/
- hxxp[:]//www.caglarturizm[.]com[.]tr/INVOICE-STATUS/Please-pull-invoice-47924/
- hxxp[:]//www.customaccessdatabase[.]com/En/Purchase/HRI-Monthly-Invoice/
- hxxp[:]//www.gracetexpro[.]com/Greeting-eCard/
- hxxp[:]//www.jxprint[.]ru/Order/Payment/
- hxxp[:]//www.legionofboomfireworks[.]com/Statement/Direct-Deposit-Notice/
- hxxp[:]//www.marcoantoniocasares[.]com/Purchase/Pay-Invoice/
- hxxp[:]//www.perezdearceycia[.]cl/wp-content/FILE/Invoice-23382229-070218/
- hxxp[:]//www[.]sewamobilbengkulu.web[.]id/4th-July-2018/
- hxxp[:]//zlc-aa[.]org/New-Order-Upcoming/588052/
URLS FROM MACRO IN THE DOWNLOADED WORD DOC TO GRAB AN EMOTET BINARY:
- hxxp[:]//clubvolvoitalia[.]it/r3z6/
- hxxp[:]//ericconsulting[.]com/7I3eUNF/
- hxxp[:]//www.goldenfell[.]ru/media/5DzF30jL/
- hxxp[:]//jmamusical[.]jp/wordpress/wp-content/L8J0igh/
- hxxp[:]//www.mobsterljud[.]se/VJkuLg/
EMOTET INFECTION TRAFFIC:
- 156.67.209[.]70 port 80 - www.sewamobilbengkulu.web[.]id - GET /4th-July-2018/ - returned Word doc
- 94.141.21[.]54 port 80 - clubvolvoitalia[.]it - GET /r3z6/ - returned Emotet binary
- 92.27.116[.]104 port 80 - attempted TCP connections, but no response from the server (caused by Emotet)
- 24.173.127[.]246 port 443 - 24.173.127[.]246:443 - POST / - caused by Emotet
- 185.45.193[.]240 port 443 - canariasmotor[.]top - HTTPS/SSL/TLS traffic caused by Zeus Panda Banker
- 74.79.26[.]193 port 990 - 74.79.26[.]193:990 - GET /whoami.php - caused by Emotet
- 74.79.26[.]193 port 990 - 74.79.26[.]193:990 - POST / - caused by Emotet
MALWARE
MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:
- SHA256 hash: 4b3159ce83df623e093304b48ebf600a4932a2dc8067792b5dec5248d29c4ccf
File size: 232,192 bytes
File name: wishes-July-4th.doc (random name invloving 4th of July or Independence Day)
File description: Word doc downloaded from link in one of the emails. Has macro to retreive Emotet.
- SHA256 hash: da4e4afbc50adfaa1b0e3d9288ec77346d9b4ebc6bc8538c7801ef4412b19b71
File size: 208,896 bytes
File location: C:\Users\[username]\AppData\Local\Microsoft\Windows\[random file name].exe
File description: Emotet malware binary downloaded by macro in downloaded Word doc
- SHA256 hash: 47280253fad49f9f5ebacb420b30985fc68f22fd3a6e51f41571648ce77a8edd
File size: 203,776 bytes
File location: C:\Users\[username]\AppData\Local\Microsoft\Windows\[random file name].exe
File description: Updated Emotet malware binary after the host was infected for a while
- SHA256 hash: 2527c9eb597bd85c4ca2e7a6550cc7480dbb3129dd3d6033e66e82b0988ee061
File size: 223,744 bytes
File location: C:\Users\[username]\AppData\Roaming\[existing directory path]\[random file name].exe
File description: Zeus Panda Banker downloaded by my Emotet-infected host
Click here to return to the main page.