Over the last couple of hours, cybercriminals have started spamvertising millions of emails pretending to be coming from HP ScanJet scanner, in an attempt to trick end and and corporate users into downloading and viewing the malicious .html attachment.

Upon viewing, the document loads the invisible iFrame script, ultimately redirecting the user to a landing URL courtesy of the Black Hole web malware exploitation kit.

More details:

The ongoing spam campaign is using both, zip attachments containing a malicious executable, and a malicious iFrame loading .html file. Let’s take a closer look at the dynamics behind the campaigns.

Spamvertised subject: Scan from a Hewlett-Packard ScanJet #[random number]

Client-side exploits serving URls: hxxp://mirdymas.ru:8080/forum/showthread.php?page=5fa58bce769e5c2chxxp://anapoli.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c

Client-side exploits served: CVE-2010-0188CVE-2010-1885

Detection rate for a sample malicious .html attachment: MD5: 2e12ae0e2472bcd43e4f08e82faaf561 – detected by 16 out of 42 antivirus scanners as Trojan-Clicker.JS.Iframe.gr; Trojan:JS/BlacoleRef.W

Detection rate for a sample spamvertised malicious .zip archive: MD5: 41f6cd9df05fa7d880061651235d50e0 – detected by 30 out of 41 antivirus scanners as Trojan-Ransom.Win32.PornoAsset!IK; TrojanDownloader.Win32.Deliver.st.

Upon successful client-side exploitation, the campaign drops MD5: 4e0053fe00b65627c07dc8c85c85a351 – detected by 31 out of 42 antivirus scanners as Trojan.Generic.KDV.696365; Trojan.Win32.Yakes.antc; and MD5: 7fe4d2e52b6f3f22b2f168e8384a757e – detected by 28 out of 42 antivirus scanners as Trojan.Win32.Buzus.lxwt; Worm:Win32/Cridex.E.

Once executed, the samples phones back to In fact, we already seen another campaign using the same command and control server, namely, the malicious spam campaign impersonating 123greetings.com. Clearly, both of these campaigns are launched by the same cybercriminal/gang of cybercriminals.

Now let’s take a deeper look into the malicious Black Hole exploit kit landing URLs.

anapoli.ru –;;

Name servers part of the campaign’s infrastructure:
ns1.anapoli.ru –
ns2.anapoli.ru –
ns3.anapoli.ru –
ns4.anapoli.ru –
ns5.anapoli.ru –

Responding to the same IPs are the following malicious domains and command and control servers:

mirdymas.ru –;;

Name servers part of the campaign’s infrastructure:
ns1.mirdymas.ru –
ns2.mirdymas.ru –
ns3.mirdymas.ru –
ns4.mirdymas.ru –
ns5.mirdymas.ru –

Responding to are also the following malicious domains and command and control servers:

We’ve already seen some of these domains in the recently profiled spam campaign that was impersonating 123greetings.com in an attempt to trick end and corporate users into clicking on exploits and malware serving links.

Related name servers used in the campaign’s infrastructure:

ns1.gorysevera.ru –
ns2.gorysevera.ru –
ns3.gorysevera.ru –
ns4.gorysevera.ru –
ns5.gorysevera.ru –

ns1.pussyriotss.ru –
ns2.pussyriotss.ru –
ns3.pussyriotss.ru –
ns4.pussyriotss.ru –
ns5.pussyriotss.ru –

ns1.spb-koalitia.ru –
ns2.spb-koalitia.ru –
ns3.spb-koalitia.ru –
ns4.spb-koalitia.ru –
ns5.spb-koalitia.ru –

ns1.ashanrestaurant.ru –
ns2.ashanrestaurant.ru –
ns3.ashanrestaurant.ru –
ns4.ashanrestaurant.ru –
ns5.ashanrestaurant.ru –

ns1.panamamoskow.ru –
ns2.panamamoskow.ru –
ns3.panamamoskow.ru –
ns4.panamamoskow.ru –
ns5.panamamoskow.ru –

ns1.onerussiaboard.ru –
ns2.onerussiaboard.ru –
ns3.onerussiaboard.ru –
ns4.onerussiaboard.ru –
ns5.onerussiaboard.ru –

The last time we intercepted and profiled a similar campaign, was in March 2012. Back then, the malicious domains were fast-fluxed.

We’ll continue monitoring the development of the campaign, and update this post as soon as new developments emerge.

Webroot SecureAnywhere users are proactively protected from these threats.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on  Twitter.

Blog Staff

About the Author

Blog Staff

The Webroot blog offers expert insights and analysis into the latest cybersecurity trends. Whether you’re a home or business user, we’re dedicated to giving you the awareness and knowledge needed to stay ahead of today’s cyber threats.

Share This