{"id":4094,"date":"2011-03-21T02:11:31","date_gmt":"2011-03-21T09:11:31","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4094"},"modified":"2018-01-30T12:38:51","modified_gmt":"2018-01-30T19:38:51","slug":"shipping-confirmations-back-on-the-radar","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/03\/21\/shipping-confirmations-back-on-the-radar\/","title":{"rendered":"Shipping Confirmations Back on the Radar"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2004.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/03\/21\/shipping-confirmations-back-on-the-radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2014.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;title=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2024.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;title=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2034.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;title=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2044.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;title=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2054.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;Title=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2064.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Shipping%20Confirmations%20Back%20on%20the%20Radar+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2074.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/03\/21\/shipping-confirmations-back-on-the-radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2084.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;headline=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2094.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F03%2F21%2Fshipping-confirmations-back-on-the-radar&amp;h=Shipping%20Confirmations%20Back%20on%20the%20Radar\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2104.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2114.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_opener_icons.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4098\" title=\"20110319_shipconf_opener_icons\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_opener_icons.png\" width=\"224\" height=\"144\" \/><\/a>After a prolonged absence, waves of Trojans distributed as Zipped email attachments have been showing up in our spam traps for a few weeks. The spam messages employ the same hackneyed shipping confirmation pretext as many previous iterations of this scam. This technique&#8217;s emergence as a common malware distribution method correlates with the emergence of <strong><a href=\"http:\/\/en.wordpress.com\/tag\/trojan-downloader-tacticlol\/\" target=\"_blank\">Trojan-Downloader-Tacticlol<\/a>.<\/strong><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_email.png\" target=\"_blank\">The messages<\/a> claim to come from various express shippers, including DHL, UPS, and FedEx, as well as one that may have originated in a malware guy&#8217;s imagination: Post Express. And even though the distribution method mimics those used by Tacticlol, the payloads haven&#8217;t been limited to that Trojan. This time around, the files belong to a wider variety of malware, including not only several new variants of Tacticlol but also <strong><a href=\"http:\/\/en.wordpress.com\/tag\/trojan-downloader-Karagany\/\" target=\"_blank\">Trojan-Downloader-Karagany<\/a>, Trojan-Relayer-Highport,<\/strong> and <a href=\"http:\/\/en.wordpress.com\/tag\/trojan-backdoor-zbot\/\" target=\"_blank\"><strong>SpyEye<\/strong><\/a>.<\/p>\n<p>The Trojans&#8217; icons look like Office documents or Acrobat PDFs, which serve to further convince victims that the file isn&#8217;t dangerous. The email attachments &#8212; Zip files with names such as <strong>tracking.zip, Post_Express_Label.zip <\/strong>or<strong> DHL_tracking.zip<\/strong> &#8212; aren&#8217;t dangerous unless you open the attachment, extract the Trojan, and execute it. But once you do, you&#8217;re in for a world of trouble.<\/p>\n<p><!--more--><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_useragentstrings.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4099\" title=\"20110319_shipconf_useragentstrings\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_useragentstrings.png\" width=\"429\" height=\"250\" \/><\/a><\/p>\n<p>For example, the <strong>Post Express<\/strong> <em>Tacticlol <\/em>sample immediately attempts to retrieve additional malware, including rogue antivirus installers, from the domain <strong>mialepromo.ru<\/strong>, using a totally-not-obvious-so-sneaky User-Agent string: <strong>Our_Agent<\/strong>.<\/p>\n<p>The Trojan also downloads a Microsoft Word .doc file &#8211; a laughable &#8220;shipping invoice&#8221; that reads as if it had been designed by someone with a tenuous grip on reality. Signed &#8220;Director of the Department to send a parcel,&#8221; this so-called invoice supposedly provides details about the alleged shipment. Data, allegedly about each item in the shipment, includes the item&#8217;s weight, the &#8220;total weight&#8221; (of what, is not said), the &#8220;total weight&#8221; again (with a different number than the first total weight), the length (but not width or depth) of the package, and a number value for &#8220;quality&#8221; (which appears to be on a scale of from 6 to 463).<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_shipconf.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-4101 alignnone\" title=\"20110319_shipconf_shipconf_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_shipconf_crop.png?w=300\" width=\"300\" height=\"113\" \/><\/a><\/p>\n<p>The graphic designer to the criminals should try a little harder next time. Everyone knows weight times length, minus details, divided by quality equals <em>total <\/em>total weight. Clearly, quality is job 464 for these guys.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_props.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4111\" title=\"20110319_shipconf_dhl_props_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_props_crop.png\" width=\"337\" height=\"91\" \/><\/a> <a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_document-exe_icon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4113\" title=\"20110319_shipconf_dhl_document.exe_icon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_document-exe_icon.png\" width=\"78\" height=\"68\" \/><\/a><\/p>\n<p>A different sample delivered by this same spam mechanism, a file we classify to Karagany, also comes dressed in a PDF document icon slightly different from the Tacticlol sample.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_adobeutil_icon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4103\" title=\"20110319_shipconf_adobeutil_icon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_adobeutil_icon.png\" width=\"173\" height=\"63\" \/><\/a><\/p>\n<p>The installer<strong> <\/strong>drops a (legit) copy of the Microsoft HTML Application Host (or MSHTA) in\u00a0 &#8220;%appdata%Adobe<strong>AdobeUtil .exe<\/strong>&#8221; &#8212; with a space in the filename &#8212; and uses <em>that <\/em>tool to download its payload.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_err-log_icon.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4104\" title=\"20110319_shipconf_dhl_err.log_icon\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_dhl_err-log_icon.png\" width=\"81\" height=\"82\" \/><\/a><\/p>\n<p>It also plants a duplicate of itself in two locations: in the same location where the Trojan was first executed, named err.log###### (where # can be any number); and in %appdata%Adobe<strong>AdobeUtil.exe<\/strong>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_adubeutil-exe_strings_urls.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4105\" title=\"20110319_shipconf_adubeutil.exe_strings_urls\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_adubeutil-exe_strings_urls.png\" width=\"203\" height=\"280\" \/><\/a><\/p>\n<p>Note the names of those domains at the bottom of the screenshot above, and then take a look at this record of the infected system&#8217;s network traffic when it infected the box then communicated with <a href=\"http:\/\/amada.abuse.ch\/?search=kusika911.ru\" target=\"_blank\">kusika911.ru<\/a>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_kusika911_pcap.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4107\" title=\"20110319_shipconf_kusika911_pcap_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_kusika911_pcap_crop.png\" width=\"239\" height=\"104\" \/><\/a><\/p>\n<p>I see what you did there.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_tacticlol_regurl.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4110\" title=\"20110319_shipconf_tacticlol_regurl_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_tacticlol_regurl_crop.png\" width=\"346\" height=\"201\" \/><\/a><\/p>\n<p>The new Tacticlol samples share something else in common with previous generations, besides the distribution method: The Trojan always stores at least one command and control server address in the Windows registry. In this case, the key containing the data is <strong>HKCUSoftwareMSOLoad<\/strong> in the value labeled <strong>krnl_servers_list<\/strong>. <a href=\"http:\/\/blog.webroot.com\/2010\/06\/14\/spammed-trojan-wont-run-under-windows-xp\/\" target=\"_blank\">Earlier iterations<\/a> used to store this information in <strong>HKLMSoftwareClassesidid.<\/strong><\/p>\n<p><strong><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_fedex_tacticlol_payloads.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-4117\" title=\"20110319_shipconf_fedex_tacticlol_payloads\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/03\/20110319_shipconf_fedex_tacticlol_payloads.png\" width=\"374\" height=\"67\" \/><\/a><br \/>\n<\/strong><\/p>\n<p><a href=\"http:\/\/www.virustotal.com\/file-scan\/report.html?id=ad394c108e6859eb59bcd81e5663c772b51a50ff6c9281ed3c82117c0deee0fb-1300215974\" target=\"_blank\">This <strong>FedEx.exe<\/strong> Tacticlol sample<\/a> went straight to <a href=\"http:\/\/www.brightcloud.com\/support\/lookup.php?endpoint=62.122.73.203\" target=\"_blank\"><strong>62.122.73.203<\/strong><\/a>, from which it downloaded the <strong>549.exe<\/strong> payload, above. Digging around a bit, I found a few more files stored on the server, all malicious.<strong> <\/strong><\/p>\n<p>New samples have been showing up regularly since early February. It seems the campaign hasn&#8217;t lost all its steam yet, so we&#8217;ll keep an eye on this one. Meanwhile, don&#8217;t immediately open the contents of zipped email attachments you weren&#8217;t expecting to receive. Call or check with the sender first, to make sure it&#8217;s legit.<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After a prolonged absence, waves of Trojans distributed as Zipped email attachments have been showing up in our spam traps for a few weeks. The spam messages employ the same hackneyed shipping confirmation pretext as many previous iterations of this scam. This technique&#8217;s emergence as a common malware distribution method correlates with the emergence of [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,4263,8569,8549,8555,3477,8573,8561,3875,8563,8571,8557,8575,8567,8565,4143,3471,8577,8559,8553],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4094"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4094"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4094\/revisions"}],"predecessor-version":[{"id":23859,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4094\/revisions\/23859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4094"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4094"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}