{"id":7225,"date":"2012-06-25T07:48:52","date_gmt":"2012-06-25T14:48:52","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=7225"},"modified":"2018-10-05T11:08:00","modified_gmt":"2018-10-05T17:08:00","slug":"spamvertised-your-ups-delivery-tracking-emails-serving-client-side-exploits-and-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/06\/25\/spamvertised-your-ups-delivery-tracking-emails-serving-client-side-exploits-and-malware\/","title":{"rendered":"Spamvertised &#8216;Your UPS delivery tracking&#8217; emails serving client-side exploits and malware"},"content":{"rendered":"<p>Cybercriminals are currently spamvertising millions of emails impersonating United Parcel Service (UPS) in an attempt to trick end and corporate users into clicking on exploits and malware serving links found in the malicious emails. What exploits are they using? How widespread is the campaign? Is it an isolated incident, or is the campaign linked to more malicious activity?<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Screenshots of the spamvertised campaign:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7232\" title=\"UPS_email_spam_exploits_malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware.png\" alt=\"\" width=\"367\" height=\"283\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7233\" title=\"UPS_email_spam_exploits_malware_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_01.png\" alt=\"\" width=\"373\" height=\"283\" \/><\/a><\/p>\n<p><strong>Upon clicking on the link, users are exposed to the following bogus page displaying additional information about the package:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7234\" title=\"UPS_email_spam_exploits_malware_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_02.png\" alt=\"\" width=\"204\" height=\"221\" \/><\/a><\/p>\n<p><strong>Sample spamvertised malicious URLs:<\/strong>\u00a0<em>hxxp:\/\/andreascookies.com\/deliv.html<\/em>;\u00a0<em>hxxp:\/\/selcoelectrical.co.uk\/deliv.html<\/em>;\u00a0<em>hxxp:\/\/nepa.com.np\/deliv.html<\/em>;\u00a0<em>hxxp:\/\/it-agency-job-opportunities.com\/\/track.html<\/em>;\u00a0<em>hxxp:\/\/agarcia.tv\/wp-content\/uploads\/fgallery\/track.html<\/em>;\u00a0<em>hxxp:\/\/samsung40lcdtvlnt4061f.uwcblog.com\/spss.html<\/em><\/p>\n<p><strong>Detection rate for the client-side exploit serving page:\u00a0<\/strong>devil.html &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/267a95ad845dfddcea93bc915a8569ef5f9085d7a93d47a3896b29aa636d726e\/analysis\/1339706944\/\"><strong>MD5: f9a47465f88bb76d1987fba6ffc72db7<\/strong><\/a> &#8211; detected by 2 out of 42 antivirus scanners as JS\/Obfuscus.AACB!tr; HEUR:Trojan.Script.Generic<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7236\" title=\"UPS_email_spam_exploits_malware_03\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/06\/ups_email_spam_exploits_malware_03.png\" alt=\"\" width=\"614\" height=\"141\" \/><\/a><\/p>\n<p><strong>Client-side exploitation chain:<\/strong> <em>hxxp:\/\/savecoralz.net\/main.php?page=2a709dab1e660eaf<\/em> -&gt; <em>hxxp:\/\/savecoralz.net\/Set.jar<\/em><\/p>\n<p><strong>Second client-side exploitation chain seen in the same campaign:<\/strong> <em>hxxp:\/\/abilenepaint.net\/main.php?page=c3c45bf60719e629<\/em> -&gt; <em>hxxp:\/\/abilenepaint.net\/Half.jar<\/em><\/p>\n<p>Upon clicking on the link, the campaign is serving client-side exploits using the Black Hole web malware exploitation kit, and in this particular campaign it&#8217;s attempting to exploit <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-1885\"><strong>CVE-2010-1885<\/strong><\/a> and <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0507\"><strong>CVE-2012-0507<\/strong><\/a>.<\/p>\n<p>Once the client-side exploitation takes place, the campaign drops\u00a0<a href=\"https:\/\/www.virustotal.com\/file\/61a9178d564129eafdc799db3870d5c4fba4d765e062d0ee4d952d9cd948ca36\/analysis\/\"><strong>MD5: 202d24597758dc5f190bf63527712af0<\/strong><\/a> &#8211; detected by 2 out of 42 antivirus scanners as Trojan\/Win32.Hrup; Suspicious.Cloud.5<\/p>\n<p><strong>Info on the client-side exploit serving domain: <\/strong>savecoralz.net &#8211; 109.164.221.176; 46.162.27.165; name servers: NS1.GRAPECOMPUTERS.NET; NS2.GRAPECOMPUTERS.NET &#8211; Email: clinicadelta@aol.com<\/p>\n<p><strong>The following malware-serving domains are also using the same name servers:<\/strong><br \/>\nsynergyledlighting.net<br \/>\nstafffire.net<br \/>\nthai4me.com<br \/>\nenergirans.net<br \/>\nhapturing.net<br \/>\nhousespect.net<br \/>\nsynetworks.net<br \/>\n110hobart.com<br \/>\nperikanzas.com<br \/>\nabc-spain.net<br \/>\nmigdaliasbistro.net<br \/>\nthemeparkoupons.net<br \/>\nicemed.net<br \/>\nsony-zeus.net<br \/>\nmynourigen.net<br \/>\ngeorgekinsman.net<br \/>\nekotastic.net<br \/>\ntorsax.net<br \/>\npopzulu.net<br \/>\narizonacentennialmens.com<\/p>\n<p><strong>Info on the second client-side exploits serving domain observed in the campaign:<\/strong>\u00a0abilenepaint.net &#8211; 79.142.67.135 (known to have also responding to 109.169.86.139 (stafffire.net) &#8211; Email: ezvalu@live.com Name servers: ns1.asiazmile.net, ns2.asiazmile.net<\/p>\n<p><strong>More domains known to be using the same name servers as abilenepaint.net<\/strong><br \/>\nstafffire.net<br \/>\nalamedapaint.net<br \/>\nasiazmile.net<\/p>\n<p><strong>Client-side exploitation chain:<\/strong>\u00a0<em>hxxp:\/\/abilenepaint.net\/main.php?page=c3c45bf60719e629<\/em> -&gt;\u00a0<em>hxxp:\/\/abilenepaint.net\/Half.jar<\/em><\/p>\n<p>Upon successful client-side exploitation the second malicious URL drops\u00a0<a href=\"https:\/\/www.virustotal.com\/file\/4749ae29e51c7d89a546ec8a4a0e881660206b81d0ad5047c60afc3c07fa6168\/analysis\/\"><strong>MD5: 5e187c293a563968dd026fae02194cfa<\/strong><\/a>, detected by 3 out of 42 antivirus scanners as PAK_Generic.001.\u00a0Upon execution it creates the following file:<\/p>\n<p>%AppData%KB00121600.exe &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/4749ae29e51c7d89a546ec8a4a0e881660206b81d0ad5047c60afc3c07fa6168\/analysis\/\"><strong>MD5: 5E187C293A563968DD026FAE02194CFA<\/strong><\/a> &#8211;\u00a0detected by 3 out of 42 antivirus scanners as PAK_Generic.001<\/p>\n<p>Upon execution, the sample phones back to\u00a0<strong>123.49.61.59\/zb\/v_01_b\/in<\/strong> on port 8080.\u00a0Another sample is known to have phoned back to the same URL, namely, <a href=\"https:\/\/www.virustotal.com\/file\/938ffbad24444c133d0d46592597faa7adf7eb3c6b5d5da4521c19d63721b3ae\/analysis\/\"><strong>MD5: 108F10F0921F2B4FCA87FE6E620D21EF<\/strong><\/a> which phones back to:<\/p>\n<p><em>hxxp:\/\/123.49.61.59:8080\/zb\/v_01_a\/in\/<\/em><br \/>\n<em>hxxp:\/\/91.121.103.143:8080\/zb\/v_01_a\/.upd\/u2006a.exe<\/em><\/p>\n<p><strong>u2006a.exe<\/strong> has a MD5 of\u00a0<strong><a href=\"https:\/\/www.virustotal.com\/file\/be3077959439e8dfcf3b22d792917dde578569133a3413cc9ee39dd223c1edbc\/analysis\/1340216586\/\">MD5: c5fcee018e9b80a2574d98189684ba2a<\/a>, <\/strong>and is detected by 4 out of 42 antivirus scanners as Worm.Win32.AutoRun.dtaf.<\/p>\n<p>This is <a href=\"http:\/\/blog.webroot.com\/2012\/06\/07\/spamvertised-ups-delivery-notification-emails-serving-client-side-exploits-and-malware\/\"><strong>the second UPS themed campaign<\/strong><\/a> that we&#8217;ve intercepted during June, 2012. In the first campaign, the cybercriminals used malicious .html attachments compared to directly linking to exploits and malware serving sites like we&#8217;ve seen in the latest campaign.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a> users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are currently spamvertising millions of emails impersonating United Parcel Service (UPS) in an attempt to trick end and corporate users into clicking on exploits and malware serving links found in the malicious emails. What exploits are they using? How widespread is the campaign? Is it an isolated incident, or is the campaign linked to [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[11087,11073,11089,11075,10907,10897,11069,3871,11079,10185,11085,11081,11071,11077,22935,4027,11083],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7225"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=7225"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7225\/revisions"}],"predecessor-version":[{"id":25361,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7225\/revisions\/25361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=7225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=7225"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=7225"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=7225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}