Its tax season and cybercriminals are mass mailing tens of thousands of IRS (Internal Revenue Service) themed emails in an attempt to trick users into thinking that their income tax refund has been “turned down”. Once users click on any of the links found in the malicious emails, they’re automatically exposed to the client-side exploits served by the Black Hole Exploit Kit.
Sample screenshot of the spamvertised email:
Sample compromised URLs participating in the campaign:
Sample client-side exploits serving URL:
Sample malicious payload dropping URL:
Malicious domain name reconnaissance:
micropowerboating.net – 188.8.131.52; 184.108.40.206 – Email: email@example.com
Name Server: NS1.POOPHANAM.NET – 220.127.116.11
Name Server: NS2.POOPHANAM.NET – 18.104.22.168
The following malicious domains also respond to the same IPs (22.214.171.124; 126.96.36.199) and are part of the campaign’s infrastructure:
madcambodia.net – 188.8.131.52
micropowerboating.net – 184.108.40.206
dressaytam.net – 220.127.116.11
acctnmrxm.net – 18.104.22.168
capeinn.net – 22.214.171.124
albaperu.net – 126.96.36.199
live-satellite-view.net – 188.8.131.52
morepowetradersta.com – 184.108.40.206
asistyapipressta.com – 220.127.116.11
uminteraktifcozumler.com – 18.104.22.168
rebelldagsanet.com – 22.214.171.124
madcambodia.net – 126.96.36.199
micropowerboating.net – 188.8.131.52
capeinn.net – 184.108.40.206
albaperu.net – 220.127.116.11
live-satellite-view.net – 18.104.22.168
Although the initial client-side exploits serving domain used in the campaign (micropowerboating.net) was down when we attempted to reproduce its malicious payload, we managed to reproduce the malicious payload for a different domain parked at the same IP (22.214.171.124), namely, madcambodia.net.
Detection rate for the dropped malware:
madcambodia.net – 126.96.36.199 – MD5: 2da28ae0df7a90ce89c7c43878927a9f – detected by 23 out of 45 antivirus scanners as Trojan-Spy.Win32.Zbot.ivkf.
Upon execution, the sample created the following files on the affected hosts:
C:Documents and Settings<USER>Application DataYdukcfuonar.exe
Set the following Registry Keys:
As well as the following Mutexes:
Once executed, the sample also phones back to the following C&C (command and control) servers:
We also got another MD5 phoning back to the same IP, MD5: c308f5c888fd97ae20eee1344f890bdb – detected by 14 out of 45 antivirus scanners as PWS:Win32/Zbot.gen!AL.
What’s also worth noting is the fact that we’ve already seen one of the domains parked at the same IPs (morepowetradersta.com) as the original client-side exploits serving domain used in the campaign in the following analyses:
- Fake ‘FedEx Online Billing – Invoice Prepared to be Paid’ themed emails lead to Black Hole Exploit Kit
- Fake LinkedIn ‘Invitation Notifications’ themed emails lead to client-side exploits and malware
Webroot SecureAnywhere users are proactively protected from these threats.