{"id":10056,"date":"2013-03-12T00:00:47","date_gmt":"2013-03-12T07:00:47","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=10056"},"modified":"2018-05-29T10:25:18","modified_gmt":"2018-05-29T16:25:18","slug":"fake-bofa-cashpro-online-digital-certificate-themed-emails-lead-to-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/03\/12\/fake-bofa-cashpro-online-digital-certificate-themed-emails-lead-to-malware\/","title":{"rendered":"Fake BofA CashPro &#8216;Online Digital Certificate&#8221; themed emails lead to malware"},"content":{"rendered":"<p><strong>By Dancho\u00a0Danchev<\/strong><\/p>\n<p>Over the past 24 hours, we intercepted tens of thousands of malicious emails attempting to socially engineer <a href=\"https:\/\/cashproonline.bankofamerica.com\/\"><strong>BofA&#8217;s\u00a0CashPro<\/strong><\/a> users into downloading\u00a0and executing a bogus online digital certificate attached to the fake emails.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of \u00a0the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/email_spam_malware_cashpro_social_engineering.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-10058\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/email_spam_malware_cashpro_social_engineering.png\" alt=\"Email_Spam_Malware_CashPro_Social_Engineering\" width=\"298\" height=\"238\" \/><\/a><\/p>\n<p>Detection rate for the malicious executable:\u00a0<a href=\"https:\/\/www.virustotal.com\/en\/file\/4a6ab406f82e620a24e25d717ba04657d9b2ef254d7d852323ba2d077c0bcdf3\/analysis\/\"><strong>MD5: bfe7c4846823174cbcbb10de9daf426b<\/strong><\/a> &#8211; detected by 34 out of 46 antivirus scanners as Password-Stealer.<\/p>\n<p><strong>The attachment uses the following naming convention:<\/strong><br \/>\n<em>cashpro_cert_7585cc6726.zip<\/em><br \/>\n<em>cashpro_cert_cc1d4a119071.zip<\/em><\/p>\n<p><strong>Once extracted, the malicious executable masks its name with the following convention:<\/strong><br \/>\n<em>CASHPRO_CERT_ID_5764578926487346283945238645298374628937894273648528523905625-23652659235-235-235-235235237562372463478238452835482354823482346287548.CRT.EXE<\/em><\/p>\n<p><strong>Once executed, the sample creates the following Registry Key:<\/strong><br \/>\n<em>HKEY_CURRENT_USERSoftwareWinRAR<\/em><\/p>\n<p><strong>And sets the following Registry Value:<\/strong><br \/>\n<em>HWID\u00a0= 7B\u00a039 35 39 37 36 32 38 46 2D 37 38 37 38 2D 34 33 41 31 2D 38 43 45 41 2D 32 41 43 43 32 33 44 39 36 32 39 45 7D<\/em><\/p>\n<p>It then attempts to connect to <strong>74.207.227.67<\/strong>; <strong>17.optimaxmagnetics.us<\/strong>, and successfully establishes a connection with the C&amp;C server at\u00a0<strong>50.28.90.36:8080\/forum\/viewtopic.php<\/strong><\/p>\n<p>More MD5s are known to have phoned back to the same IP:<br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/e4b5008b966913341b7ee8a311be67463c449522a96842fac3a1958504abafab\/analysis\/\"><strong>MD5: 4C46DC410268C19DD561DB92BD52D02D<\/strong><\/a> &#8211; <em>50.28.90.36:8080\/ponyb\/gate.php<\/em><br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/a2fb6a8a699a326a272a828bb4f416d63f304a1193bb8408e911704c6ecf8679\/analysis\/\"><strong>MD5: 5F0084494777BC4F76F6919E284C6AA9<\/strong><\/a> &#8211; <em>50.28.90.36:8080\/forum\/viewtopic.php<\/em><br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/347a38e615e2431e19159cf947b4e21646e1c648ba47c7512bd3e7b0444bbde0\/analysis\/\"><strong>MD5: 6E360ACA1BE5569A681832DF8B16F320<\/strong><\/a> &#8211; <em>50.28.90.36:8080\/forum\/viewtopic.php<\/em><\/p>\n<p><strong>50.28.90.36<\/strong> responds to <strong>host.elenskids.com<\/strong>. What&#8217;s particularly interesting about this host is that it&#8217;s the official Web site of <a href=\"http:\/\/www.crimes-of-persuasion.com\/modeling\/kids\/ellenskids.html\"><strong>Elen&#8217;s Kids Modeling &amp; Talent Management<\/strong><\/a> (operated by <a href=\"http:\/\/www.ripoffreport.com\/modeling-agencies\/elens-kids\/elens-kids-elens-kids-modeli-94dfm.htm\"><strong>LANFusion LLC<\/strong><\/a>), who appear to be running an advance fee type of <a href=\"http:\/\/www.ripoffreport.com\/modeling-agencies\/kids-com-aka-justour\/kids-com-just-our-kids-elens-y9e45.htm\"><strong>fraudulent scheme<\/strong><\/a>, according to several complaints about their activities.<\/p>\n<p><em>You can find more about Dancho\u00a0Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Dancho\u00a0Danchev Over the past 24 hours, we intercepted tens of thousands of malicious emails attempting to socially engineer BofA&#8217;s\u00a0CashPro users into downloading\u00a0and executing a bogus online digital certificate attached to the fake emails. More details:<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[13469,13463,13481,13459,13471,13461,13465,13467,13473,13475,7607,13477,22375,6173,5735,3561,4065,5717,4501,3875],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10056"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=10056"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10056\/revisions"}],"predecessor-version":[{"id":24557,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10056\/revisions\/24557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=10056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=10056"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=10056"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=10056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}