{"id":10294,"date":"2013-04-02T00:00:19","date_gmt":"2013-04-02T07:00:19","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=10294"},"modified":"2018-10-05T12:26:14","modified_gmt":"2018-10-05T18:26:14","slug":"spamvertised-re-changelog-as-promised-themed-emails-lead-to-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/04\/02\/spamvertised-re-changelog-as-promised-themed-emails-lead-to-malware\/","title":{"rendered":"Spamvertised &#8216;Re: Changelog as promised&#8217; themed emails lead to malware"},"content":{"rendered":"<p>We have recently intercepted a malicious spam campaign, that&#8217;s attempting to trick users into thinking that they&#8217;ve received a non-existent &#8220;changelog.&#8221; Once gullible and socially engineered users execute the malicious attachment, their PCs automatically become part of the botnet operated by the cybercriminal\/gang of cybercriminals.<\/p>\n<p>More details:<!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/email_spam_malware_malicious_software_social_engineering_changelog.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-10296\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/03\/email_spam_malware_malicious_software_social_engineering_changelog.png\" alt=\"Email_Spam_Malware_Malicious_Software_Social_Engineering_Changelog\" width=\"149\" height=\"112\" \/><\/a><\/p>\n<p><strong>Detection rate for the malicious attachment:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/f18154fdb0d0620f40c392e595daf6023b6799768b50a91059e26149e977eee6\/analysis\/1364475932\/\"><strong>MD5: e01ea945b8d055c5c115ab58749ac502<\/strong><\/a> &#8211; detected by 23 out of 46 antivirus scanners as Worm:Win32\/Cridex.E.<\/p>\n<p><strong>Upon execution, the sample creates the following processess on the affected hosts:<\/strong><br \/>\n<em>C:WINDOWSsystem32cmd.exe&#8221; \/c &#8220;C:DOCUME~1&lt;USER&gt;~1LOCALS~1Tempexp1.tmp.bat<\/em><br \/>\n<em>C:Documents and Settings&lt;USER&gt;Application DataKB00927107.exe<\/em><\/p>\n<p><strong>The following Registry Keys:<\/strong><br \/>\n<em>HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCFBDC89D4<\/em><br \/>\n<em>HKEY_CURRENT_USERSoftwareMicrosoftWindows NTS25BC2D7B<\/em><\/p>\n<p><strong>The following Registry Values:<\/strong><br \/>\n<em>[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun] -&gt; KB00121600.exe = &#8220;&#8221;%AppData%KB00121600.exe&#8221;&#8221;<\/em><\/p>\n<p><strong>As well as the following Mutexes:<\/strong><br \/>\n<em>LocalXMM000003F0<\/em><br \/>\n<em>LocalXMM00000200<\/em><br \/>\n<em>LocalXMM000003F8<\/em><br \/>\n<em>LocalXMI000003F8<\/em><br \/>\n<em>LocalXMRFB119394<\/em><br \/>\n<em>LocalXMM000005E4<\/em><br \/>\n<em>LocalXMI000005E4<\/em><br \/>\n<em>LocalXMM0000009C<\/em><br \/>\n<em>LocalXMI0000009C<\/em><br \/>\n<em>LocalXMM000000C8<\/em><br \/>\n<em>LocalXMI000000C8<\/em><\/p>\n<p>It then phones back to <strong>hxxp:\/\/85.214.143.90:8080\/DPNilBA\/ue1elBAAAA\/tlSHAAAAA\/<\/strong> and to <strong>hxxp:\/\/91.121.90.92:8080\/AJtw\/UCyqrDAA\/Ud+asDAA\/<\/strong><\/p>\n<p>We&#8217;ve already seen the same C&amp;C (<strong>85.214.143.90<\/strong>) used in a previously profiled malicious campaign:<\/p>\n<ul>\n<li><span style=\"line-height: 16px;\"><a href=\"http:\/\/blog.webroot.com\/2013\/03\/27\/terminated-wire-transfer-notificationach-file-id-themed-malicious-campaigns-lead-to-black-hole-exploit-kit\/\"><strong>\u2018Terminated Wire Transfer Notification\/ACH File ID\u201d themed malicious campaigns lead to Black Hole Exploit Kit<\/strong><\/a><br \/>\n<\/span><\/li>\n<\/ul>\n<p>Users are advised to avoid interacting with these emails, and to be extra vigilant for similar social engineering driven malicious campaigns.<\/p>\n<p><strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot\u00a0SecureAnywhere<\/a><\/strong>\u00a0users are proactively protected from this threat.<\/p>\n<p><em>You can find more about Dancho\u00a0Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have recently intercepted a malicious spam campaign, that&#8217;s attempting to trick users into thinking that they&#8217;ve received a non-existent &#8220;changelog.&#8221; Once gullible and socially engineered users execute the malicious attachment, their PCs automatically become part of the botnet operated by the cybercriminal\/gang of cybercriminals. More details:<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5593,3881,11559,13961,4065,5723,12733,4501,3875,3529],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10294"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=10294"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10294\/revisions"}],"predecessor-version":[{"id":25643,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/10294\/revisions\/25643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=10294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=10294"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=10294"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=10294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}