2019-04-24 - BRAZIL MALSPAM PUSHING BANLOAD

NOTICE:

ASSOCIATED FILES:

  • 2019-04-23-Brasil-malspam-0959-UTC.eml   (5,576 bytes)
  • 2019-04-24-Banload-infection-traffic-from-Brazil-malspam.pcap   (9,767,131 bytes)
  • docx-master.zip   (857,356 bytes)
  • TextInputDocsx.exe   (2,184,192 bytes)
  • 2019-04-24-Windows-registry-update-from-Banload-malware.txt   (688 bytes)
  • 1839BB57A6334E8BAC7A0D45930D3104/Ped   (0 bytes)
  • 1839BB57A6334E8BAC7A0D45930D3104/e2J3c6H1R4.cmd   (16,760 bytes)
  • 1839BB57A6334E8BAC7A0D45930D3104/jli.dll   (617,149,334 bytes)
  • 1839BB57A6334E8BAC7A0D45930D3104/msvcr100.dll   (773,968 bytes)

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domain and URLs:

 

EMAIL HEADERS


Shown above:  Screenshot from today's example of Banload malspam.

 

EMAIL HEADERS FROM TODAY'S BANLOAD MALSPAM EXAMPLE:

Received: from [139.99.75[.]19] ([139.99.75[.]19:40118] helo=z17.autocontabil[.]com) by [removed]
        (envelope-from <ubuntu@z17.autocontabil[.]com>) [removed];
        Tue, 23 Apr 2019 06:00:38 -0400
Received: by z17.autocontabil.com (Postfix, from userid 1000)
        id 2F743346B9; Tue, 23 Apr 2019 06:59:08 -0300 (-03)
Subject: Segue o codigo de rastreio (BG83446844BR) №   (926390)
X-PHP-Originating-Script: 1000:javali.php
X-Mailer: Microsoft Office Outlook, Build 17.551210
To: [removed]
From: Sedex Brasil <rastreamento.web@correios[.]com[.]br>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="923ccb3261e6bd916018c459b0b3e350"
Message-Id: <20190423095908.2F743346B9@z17.autocontabil[.]com>
Date: Tue, 23 Apr 2019 06:59:08 -0300 (-03)

 


Shown above:  Malicious file downloaded from link in the malspam.

 

TRAFFIC

 


Shown above:  Traffic from today's infection filtered in Wireshark.

 

TRAFFIC FROM AN INFECTED WINDOWS HOST:

 


Shown above:  Traffic over TCP port 26457 caused by the malware.

 


Shown above:  Alerts from Security Onion using Suricata and the EmergingThreats Pro (ETPRO) ruleset.

 


Shown above:  Some alerts noted from the Any.Run analysis of this malware.

 

FILE HASHES

MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:

 

Click here to return to the main page.