{"id":7799,"date":"2012-08-21T14:14:37","date_gmt":"2012-08-21T21:14:37","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=7799"},"modified":"2018-10-05T11:17:55","modified_gmt":"2018-10-05T17:17:55","slug":"cybercriminals-spamvertise-bogus-greeting-cards-serve-exploits-and-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/08\/21\/cybercriminals-spamvertise-bogus-greeting-cards-serve-exploits-and-malware\/","title":{"rendered":"Cybercriminals spamvertise bogus greeting cards, serve exploits and malware"},"content":{"rendered":"<p>Think you&#8217;ve received an online greeting card from <strong>123greetings.com<\/strong>? Think twice!<\/p>\n<p>Over the past couple of days, cybercriminals have spamvertised millions of emails impersonating the popular e-card service <strong>123greetings.com<\/strong> in an attempt to trick end and corporate users into clicking on client-side exploits and malware serving links, courtesy of the Black Hole web malware exploitation kit.<\/p>\n<p>What&#8217;s so special about this campaign? Can we connect it to previously spamvertised campaigns profiled at Webroot&#8217;s Threat Blog? Let&#8217;s find out.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7805\" title=\"Spam_123greetings_exploits_malware_BlackHole_exploit_kit\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit.png\" alt=\"\" width=\"614\" height=\"250\" \/><\/a><\/p>\n<p><strong>Upon clicking on any of the links found in the malicious emails, users are exposed to the following bogus &#8220;Page loading&#8230;&#8221; page:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7806\" title=\"Spam_123greetings_exploits_malware_BlackHole_exploit_kit_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit_01.png\" alt=\"\" width=\"614\" height=\"101\" \/><\/a><\/p>\n<p><strong>Obfuscated java script redirection:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-7807\" title=\"Spam_123greetings_exploits_malware_BlackHole_exploit_kit_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/08\/spam_123greetings_exploits_malware_blackhole_exploit_kit_02.png\" alt=\"\" width=\"614\" height=\"197\" \/><\/a><\/p>\n<p><strong>Spamvertised malicious URLs:<\/strong>\u00a0<em>hxxp:\/\/bjflm.cn\/postc.html<\/em>; <em>hxxp:\/\/minihotel74.com\/pcard.html<\/em>; <em>hxxp:\/\/wowgame.net.cn\/pcard.html<\/em>; <em>hxxp:\/\/phototula.ru\/postc.html<\/em>; <em>hxxp:\/\/joanjoy.com\/postc.html<\/em>;\u00a0<em>hxxp:\/\/akrepilaclama.org\/wp-content\/plugins\/akismet\/greet.html<\/em>; <em>hxxp:\/\/vinointhevalley.com\/wp-content\/plugins\/akismet\/greet.html<\/em><\/p>\n<p><strong>Client-side exploits serving URLs:<\/strong>\u00a0<em>hxxp:\/\/remindingwands.org\/main.php?page=861097b084221fd8<\/em> &#8211; 78.87.123.114; <em>hxxp:\/\/voicecontroldevotes.info\/main.php?page=6df8994172330e77; hxxp:\/\/immigrationunix.pro\/main.php?page=28677a727aff0456<\/em><\/p>\n<p><strong>Client-side exploits served:<\/strong>\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-1885\"><em>CVE-2010-1885<\/em><\/a><\/p>\n<p>Upon sucessful exploitation, the campaign drops <a href=\"https:\/\/www.virustotal.com\/file\/52961e6c88e0b98637ad56bb56743750f55be6e962da4caa6123eefbca10365f\/analysis\/\"><strong>MD5: 42307705ad637c615a6ed5fbf1e755d1<\/strong><\/a> &#8211; detected by 25 out of 42 antivirus scanners as Trojan.Win32.Yakes.ansm; Mal\/Katusha-I.<\/p>\n<p>Upon successful execution, the sample phones back to <strong>87.120.41.155:8080\/mx5\/B\/in<\/strong><\/p>\n<p>More MD5s are known to have phoned back to the same command and control server, such as for instance:<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/file\/1cba3515ffc6e0a4c7de018df9d7de48cf894f865d2900035207e3af598fcfea\/analysis\/\"><strong>MD5: b11421acddbfc94544482d1846ba6d97<\/strong><\/a><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/123e66b9a3729f2f129d3ab376c1509b75080d5eda5805938d0f276e80d4bba9\/analysis\/\"><strong>MD5: 4e0053fe00b65627c07dc8c85c85a351<\/strong><\/a><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/127e75d407fd25a516ab933c068ad19076de11f767e67b3114c927d88bbbdc96\/analysis\/\"><strong>MD5: 90d1b3367e97f384af029b0f1674f7ff<\/strong><\/a><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d2af3534d5a11395a81ed89ef5c6d903527818e34a0057899f08c3ff65f24bb2\/analysis\/\"><strong>MD5: d2be252de958b7435279c6e8f270de4e<\/strong><\/a><\/p>\n<p><strong>87.120.41.155<\/strong> is actually a name server offering DNS resolving services to related malicious and command and control servers part of the campaign such as:<br \/>\n<strong>spb-koalitia.ru<\/strong><br \/>\n<strong>onerussiaboard.ru<\/strong><br \/>\n<strong>mysqlfordummys.ru<\/strong><br \/>\n<strong>online-gaminatore.ru<\/strong><br \/>\n<strong>leprisoruim.ru<\/strong><br \/>\n<strong>switched-games.ru<\/strong><br \/>\n<strong>ipadvssonyx.ru<\/strong><br \/>\n<strong>online-cammunity.ru<\/strong><br \/>\n<strong>zenedin-zidane.ru<\/strong><br \/>\n<strong>porschedesignrussia.ru<\/strong><\/p>\n<p>Associated malicious name servers part of the campaign&#8217;s infrastructure:<br \/>\n<strong>ns1.spb-koalitia.ru<\/strong> &#8211; 62.76.190.208<br \/>\n<strong>ns2.spb-koalitia.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns3.spb-koalitia.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns4.spb-koalitia.ru<\/strong> &#8211; 173.224.208.60<br \/>\n<strong>ns5.spb-koalitia.ru<\/strong> &#8211; 62.76.188.138<\/p>\n<p><strong>ns1.onerussiaboard.ru<\/strong> &#8211; 62.76.190.208<br \/>\n<strong>ns2.onerussiaboard.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns3.onerussiaboard.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns4.onerussiaboard.ru<\/strong> &#8211; 173.224.208.60<br \/>\n<strong>ns5.onerussiaboard.ru<\/strong> &#8211; 62.76.188.138<\/p>\n<p><strong>ns1.mysqlfordummys.ru<\/strong> &#8211; 62.76.190.208<br \/>\n<strong>ns2.mysqlfordummys.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns3.mysqlfordummys.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns4.mysqlfordummys.ru<\/strong> &#8211; 173.224.208.60<br \/>\n<strong>ns5.mysqlfordummys.ru<\/strong> &#8211; 62.76.188.138<\/p>\n<p><strong>ns1.online-gaminatore.ru<\/strong> &#8211; 62.213.64.161<br \/>\n<strong>ns2.online-gaminatore.ru<\/strong> &#8211; 85.143.166.243<br \/>\n<strong>ns3.online-gaminatore.ru<\/strong> &#8211; 41.66.137.155<br \/>\n<strong>ns4.online-gaminatore.ru<\/strong> &#8211; 184.106.189.124<br \/>\n<strong>ns5.online-gaminatore.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns6.online-gaminatore.ru<\/strong> &#8211; 87.120.41.155<\/p>\n<p><strong>ns1.leprisoruim.ru<\/strong> &#8211; 62.76.190.208<br \/>\n<strong>ns2.leprisoruim.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns3.leprisoruim.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns4.leprisoruim.ru<\/strong> &#8211; 173.224.208.60<br \/>\n<strong>ns5.leprisoruim.ru<\/strong> &#8211; 62.76.188.138<\/p>\n<p><strong>ns1.switched-games.ru<\/strong> &#8211; 62.213.64.161<br \/>\n<strong>ns2.switched-games.ru<\/strong> &#8211; 85.143.166.243<br \/>\n<strong>ns3.switched-games.ru<\/strong> &#8211; 41.66.137.155<br \/>\n<strong>ns4.switched-games.ru<\/strong> &#8211; 184.106.189.124<br \/>\n<strong>ns5.switched-games.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns6.switched-games.ru<\/strong> &#8211; 87.120.41.155<\/p>\n<p><strong>ns1.ipadvssonyx.ru<\/strong> =&gt; 62.76.190.208<br \/>\n<strong>ns2.ipadvssonyx.ru<\/strong> =&gt; 203.172.140.202<br \/>\n<strong>ns3.ipadvssonyx.ru<\/strong> =&gt; 87.120.41.155<br \/>\n<strong>ns4.ipadvssonyx.ru<\/strong> =&gt; 173.224.208.60<br \/>\n<strong>ns5.ipadvssonyx.ru<\/strong> =&gt; 62.76.188.138<\/p>\n<p><strong>ns1.online-cammunity.ru<\/strong> &#8211; 62.76.190.208<br \/>\n<strong>ns2.online-cammunity.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns3.online-cammunity.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns4.online-cammunity.ru<\/strong> &#8211; 173.224.208.60<br \/>\n<strong>ns5.online-cammunity.ru<\/strong> &#8211; 62.76.188.138<\/p>\n<p><strong>ns1.zenedin-zidane.ru<\/strong> &#8211; 62.213.64.161<br \/>\n<strong>ns2.zenedin-zidane.ru<\/strong> &#8211; 85.143.166.243<br \/>\n<strong>ns3.zenedin-zidane.ru<\/strong> &#8211; 41.66.137.155<br \/>\n<strong>ns4.zenedin-zidane.ru<\/strong> &#8211; 184.106.189.124<br \/>\n<strong>ns5.zenedin-zidane.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns6.zenedin-zidane.ru<\/strong> &#8211; 87.120.41.155<\/p>\n<p><strong>ns1.porschedesignrussia.ru<\/strong> &#8211; 62.213.64.161<br \/>\n<strong>ns2.porschedesignrussia.ru<\/strong> &#8211; 85.143.166.243<br \/>\n<strong>ns3.porschedesignrussia.ru<\/strong> &#8211; 41.66.137.155<br \/>\n<strong>ns4.porschedesignrussia.ru<\/strong> &#8211; 184.106.189.124<br \/>\n<strong>ns5.porschedesignrussia.ru<\/strong> &#8211; 203.172.140.202<br \/>\n<strong>ns6.porschedesignrussia.ru<\/strong> &#8211; 87.120.41.155<\/p>\n<p>Related client-side exploits and malware serving URLs spamvertised in the same campaign, also drop <a href=\"https:\/\/www.virustotal.com\/file\/287c63f12a41a466e243771ec6d546c4275a39396f3773437e90b080d959b259\/analysis\/\"><strong>MD5: cd0aac6df71fa28d4564406a24f7e1a2<\/strong><\/a> &#8211; detected by 28 out of 42 antivirus scanners as Gen:Variant.Zusy.15382; P2P-Worm.Win32.Palevo.fbvx<\/p>\n<p>The second sample phones back to <strong>87.204.199.100:8080\/mx5\/B\/in\/<\/strong> not surprisingly, we&#8217;ve already seen this command and control server used in numerous profiled campaigns, such as, for instance, the <a href=\"http:\/\/blog.webroot.com\/2012\/08\/10\/cybercriminals-impersonate-atts-billing-service-serve-exploits-and-malware\/\"><strong>AT&amp;T Billing Center impersonation<\/strong><\/a> one, the <a href=\"http:\/\/blog.webroot.com\/2012\/07\/24\/spamvertised-craigslist-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Craigslist spam campaign<\/strong><\/a>, the <a href=\"http:\/\/blog.webroot.com\/2012\/08\/02\/spamvertised-paypal-has-sent-you-a-bank-transfer-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>PayPal spam campaign<\/strong><\/a>, the <a href=\"http:\/\/blog.webroot.com\/2012\/07\/31\/spamvertised-your-ebay-funds-are-cleared-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>eBay spam campaign<\/strong><\/a>, and the <a href=\"http:\/\/blog.webroot.com\/2012\/07\/13\/spamvertised-american-airlines-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>American Airlines themed spam campaign<\/strong><\/a>.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Think you&#8217;ve received an online greeting card from 123greetings.com? Think twice! Over the past couple of days, cybercriminals have spamvertised millions of emails impersonating the popular e-card service 123greetings.com in an attempt to trick end and corporate users into clicking on client-side exploits and malware serving links, courtesy of the Black Hole web malware exploitation [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[11803,10907,10897,11801,3871,3881,9563,10103,11129,4863,8965,11809,10109,11077,11153,5717,11807,11805,7077,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7799"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=7799"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7799\/revisions"}],"predecessor-version":[{"id":25407,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/7799\/revisions\/25407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=7799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=7799"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=7799"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=7799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}