{"id":16562,"date":"2014-05-13T13:53:31","date_gmt":"2014-05-13T19:53:31","guid":{"rendered":"https://www.webroot.com/blog/?p=16562"},"modified":"2023-11-02T12:12:46","modified_gmt":"2023-11-02T18:12:46","slug":"spamvertised-notification-payment-received-themed-emails-lead-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/05\/13\/spamvertised-notification-payment-received-themed-emails-lead-malware\/","title":{"rendered":"Spamvertised &#8216;Notification of payment received&#8217; themed emails lead to malware"},"content":{"rendered":"<p>PayPal users, watch what you click on!<\/p>\n<p>We&#8217;ve recently intercepted a currently circulating malicious spamvertised campaign which is impersonating PayPal\u00a0in an attempt to trick socially engineered end users into clicking on the malware-serving links found in the emails.<\/p>\n<p>More details:<\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p><!--more--><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/Spamvertised_PayPal_Malware_Malicious_Software_Social_Engineering.png\"><img decoding=\"async\" loading=\"lazy\" width=\"619\" height=\"937\" class=\"size-full wp-image-16566 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/Spamvertised_PayPal_Malware_Malicious_Software_Social_Engineering.png\" alt=\"Spamvertised_PayPal_Malware_Malicious_Software_Social_Engineering\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/Spamvertised_PayPal_Malware_Malicious_Software_Social_Engineering.png 619w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/05\/Spamvertised_PayPal_Malware_Malicious_Software_Social_Engineering-198x300.png 198w\" sizes=\"(max-width: 619px) 100vw, 619px\" \/><\/a><\/p>\n<p><strong>Malicious URL redirection chain:<\/strong> <em>hxxp:\/\/hoodflixxx.com\/PP_det.html<\/em> -&gt; <em>hxxp:\/\/62.76.43.78\/p2p\/PP_detalis_726716942049.pdf.exe<\/em><\/p>\n<p>Detection rate for a sample malware <a href=\"https:\/\/www.virustotal.com\/en\/file\/fef606db754a8397d52fcb830934caace186e09a3dd80f865389d867c31e265f\/analysis\/1399906387\/\"><strong>MD5: aa1762e9ba4b552421971ef2e4de9208<\/strong><\/a> &#8211; detected by 2 out of 51 antivirus scanners as Spyware.Zbot.ED.<\/p>\n<p>Once executed, the sample starts listening on ports 9296, and 3198. It also\u00a0drops the following malicious MD5: e8007be046dcc5b6f8e29d4d8233fd78 on the affected hosts.<\/p>\n<p><strong>It then phones back to the following C&amp;C servers:<\/strong><br \/>\n81.157.189.166<br \/>\n81.149.93.141<br \/>\n81.130.195.125<br \/>\n143.225.154.3<br \/>\n76.22.162.44<br \/>\n99.73.173.219<br \/>\n174.89.110.91<br \/>\n23.97.72.192<br \/>\n168.63.211.182<br \/>\n75.1.220.146<br \/>\n77.239.59.243<br \/>\n94.88.99.85<br \/>\n37.57.41.161<br \/>\n46.171.141.202<br \/>\n23.98.64.182<br \/>\n221.193.254.122<br \/>\n191.234.52.206<br \/>\n138.91.18.14<br \/>\n23.98.42.224<br \/>\n168.61.87.1<br \/>\n137.117.69.203<br \/>\n72.190.57.143<br \/>\n109.158.32.240<br \/>\n88.61.116.225<br \/>\n94.98.191.169<br \/>\n105.236.47.68<br \/>\n173.200.116.226<br \/>\n137.117.196.168<br \/>\n221.214.141.155<br \/>\n83.110.198.24<br \/>\n222.14.178.194<\/p>\n<p><strong>Related malicious MD5s known to have phoned back to the following C&amp;C (81.149.93.141) server:<\/strong><br \/>\nMD5: 108a74d39c3bce71ba5686b55658358e<br \/>\nMD5: a2bde0d1389b3bdbcd9f612ae683edd8<br \/>\nMD5: c9ec831991c4962ba5c984f78e13bef5<br \/>\nMD5: 4ee923a7769430785dd1f309aad0a12b<\/p>\n<p><strong>Once executed MD5: 108a74d39c3bce71ba5686b55658358e phones back to the following C&amp;C servers:<\/strong><br \/>\n81.149.93.141:7325<br \/>\n81.130.195.125:2607<br \/>\n130.37.198.100:2430<br \/>\n213.120.146.245:6585<br \/>\n143.225.154.3:7621<\/p>\n<p><strong>Once executed MD5: a2bde0d1389b3bdbcd9f612ae683edd8 phones back to the following C&amp;C servers:<\/strong><br \/>\nhxxp:\/\/81.149.93.141:7325<br \/>\nhxxp:\/\/81.130.195.125:2607<br \/>\nhxxp:\/\/130.37.198.100:2430<br \/>\nhxxp:\/\/13.120.146.245:6585<br \/>\nhxxp:\/\/143.225.154.3:7621<\/p>\n<p><strong>Known to have phoned back to the following C&amp;C server (81.130.195.125) are also the following malicious MD5s:<\/strong><br \/>\nMD5: ffb9cad511d90734a0d6151086994fb6<br \/>\nMD5: 108a74d39c3bce71ba5686b55658358e<br \/>\nMD5: a2bde0d1389b3bdbcd9f612ae683edd8<br \/>\nMD5: 4ee923a7769430785dd1f309aad0a12b<br \/>\nMD5: 188df9486ab259d5a1340f842c4f3e78<br \/>\nMD5: e49e7b907499c8b4e31447eaffd112b1<\/p>\n<p><strong>Once executed, MD5: e49e7b907499c8b4e31447eaffd112b1 phones back to the following C&amp;C servers:<\/strong><br \/>\nhxxp:\/\/94.88.99.85:8596<br \/>\nhxxp:\/\/81.130.195.125:2607<br \/>\nhxxp:\/\/130.37.198.100:2430<br \/>\nhxxp:\/\/109.153.212.95:4808<\/p>\n<p><strong><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot\u00a0SecureAnywhere<\/a><\/strong>\u00a0users are proactively protected from these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PayPal users, watch what you click on! We&#8217;ve recently intercepted a currently circulating malicious spamvertised campaign which is impersonating PayPal\u00a0in an attempt to trick socially engineered end users into clicking on the malware-serving links found in the emails. More details: Sample screenshot of the spamvertised email:<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[17727,17729,22369,22367,13139,14055,4065,15475,17719,17723,17721,17725,11489,8933,3875,4417,5883,3529],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16562"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=16562"}],"version-history":[{"count":15,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16562\/revisions"}],"predecessor-version":[{"id":32291,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/16562\/revisions\/32291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=16562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=16562"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=16562"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=16562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}