{"id":8521,"date":"2012-11-06T00:00:36","date_gmt":"2012-11-06T07:00:36","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8521"},"modified":"2018-10-05T11:42:42","modified_gmt":"2018-10-05T17:42:42","slug":"usps-postal-notification-themed-emails-lead-to-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/11\/06\/usps-postal-notification-themed-emails-lead-to-malware\/","title":{"rendered":"USPS &#8216;Postal Notification&#8217; themed emails lead to malware"},"content":{"rendered":"<p>Cybercriminals are currently mass mailing millions of emails impersonating The United States Postal Service (USPS), in an attempt to trick its customers into downloading and executing the malicious .zip archive linked in the bogus emails.<\/p>\n<p>Upon execution, the malware opens a backdoor on the affected host, allowing the cybercriminals behind the campaign to gain complete control over the host.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/usps_email_spam_malware.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8569\" title=\"USPS_Email_Spam_Malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/usps_email_spam_malware.jpg\" alt=\"\" width=\"280\" height=\"388\" \/><\/a><\/p>\n<p><strong>Spamvertised compromised URL:<\/strong>\u00a0<em>hxxp:\/\/www.unser-revier-bruchtorf-ost.de\/FWUJKKOGMP.html<\/em><\/p>\n<p><strong>Actual malicious archive URL:<\/strong>\u00a0<em>hxxp:\/\/www.unser-revier-bruchtorf-ost.de\/Shipping_Label_USPS.zip<\/em><\/p>\n<p><strong>Detection rate:<\/strong>\u00a0<a href=\"https:\/\/www.virustotal.com\/file\/372b436a2ffb66b9f7a45d172320e0c1298d24a877d17877118647a04af6814e\/analysis\/1351876562\/\"><strong>MD5: 089605f20e02fe86b6719e0949c8f363<\/strong><\/a> &#8211; detected by 5 out of 44 antivirus scanners as UDS:DangerousObject.Multi.Generic<\/p>\n<p><strong>Upon execution, the sample phones back to the following URLs:<\/strong><br \/>\n<em>hxxp:\/\/<strong>64.151.87.152<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>66.7.209.185<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>173.224.211.194<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>46.105.121.86:43456<\/strong>\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>222.255.237.132<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>64.151.87.152<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>79.170.89.209<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>79.170.89.209<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>217.160.236.108<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>217.160.236.108<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>88.84.137.174<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>46.105.112.99<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>50.22.136.150<\/strong>:8080\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>130.88.105.45<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>91.205.63.194<\/strong>:41765\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>95.173.180.42<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>95.173.180.42<\/strong>:43456\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><br \/>\n<em>hxxp:\/\/<strong>217.160.236.108<\/strong>:84\/00cd1a40FA511365883ACEB58B055EA44882D5E2D24B9BB24D7949BCECDEA40E850DB1FCC7397577B70452EC74D82B225022BB99287FFFA45E0F98E18AA3A71007E1FDA570<\/em><\/p>\n<p><strong>More malware variants are also known to have phoned back to the same IPs:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/595063ff4a535bfc61769843cb8ac8b7cf473305d218730e1a85a5ba756cee2e\/analysis\/\"><strong>MD5: 54b574029cef8da99737fe8705597ac6<\/strong><\/a> &#8211; detected by 23 out of 44 antivirus scanners as TrojanDownloader:Win32\/Kuluoz.B<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/f4403ed6571101f6a593f4a1b2726440a39b38e97edc3db14f02865b6df46d07\/analysis\/\"><strong>MD5: 4f0bf97d890967d44ca6aec07f6bc752<\/strong><\/a>\u00a0&#8211; detected by 31 out of 43 antivirus scanners as Trojan.Win32.Agent.uloi<br \/>\n<strong><a href=\"https:\/\/www.virustotal.com\/file\/5341660122b2beffc6aa0a9d0897ea76b22c65cf5b04780126a450b1934f2397\/analysis\/\">MD5: 96255178f15033362c81fb6d9b9c3ce4<\/a>\u00a0<\/strong>&#8211; detected by 9 out of 44 antivirus scanners as Trojan-Dropper.Win32.Dapato.bupr<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/595063ff4a535bfc61769843cb8ac8b7cf473305d218730e1a85a5ba756cee2e\/analysis\/\"><strong>MD5: 54b574029cef8da99737fe8705597ac6<\/strong><\/a> &#8211; detected by 23 out of 44 antivirus scanners as UDS:DangerousObject.Multi.Generic<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/77ac3f2fa169a3b070feada92c6670531eb251cda117bed2131e87ffcbd06f3d\/analysis\/\"><strong>MD5: 0282bc929bae27ef95733cfa390b10e0<\/strong><\/a>\u00a0&#8211; detected by 7 out of 44 antivirus scanners as TrojanDownloader:Win32\/Kuluoz.B<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/7d0154da86c885e4aec46434552e4ef75fdca08351801492c735983cd37bd641\/analysis\/\"><strong>MD5: ea8adf1d9c6a76b39c9a3e1a5e8826f0<\/strong><\/a>\u00a0&#8211; detected by 27 out of 42 antivirus scanners as Trojan.Win32.Yakes.bhhg<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/2a6656ad2df3fab17dfa97c1ffb2d8d073aefeacc77c0a753be5fc346b0f3d98\/analysis\/\"><strong>MD5: b4cd6c46d789c322876b6bb74ec62357<\/strong><\/a>\u00a0&#8211; detected by 32 out of 40 antivirus scanners as Trojan-Downloader.Win32.Kuluoz.aad<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/0ae0dae36605e4dd0f0c841436f9517706b5b95c850e0cf2b0af6eaf05f311eb\/analysis\/\"><strong>MD5: 57d9b0652f253933df251624b3965c52<\/strong><\/a>\u00a0&#8211; detected by 33 out of 44 antivirus scanners as Trojan.Generic.KDV.762605<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/84e4d8bbe3250384159d5cdb3b1982bad782ad2059660a8b5e0bd7d408479a65\/analysis\/\"><strong>MD5: b99d77ea6c96f27da3d84e65149c3e28<\/strong><\/a> &#8211; detected by 26 out of 41 antivirus scanners as Trojan.Win32.Yakes.bise<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d42d6902878dcad80740d2f97d66783403368bc123a0553c0ad0c04f76cf132e\/analysis\/\"><strong>MD5: e40342f10b6aff36002996f3a3e88add<\/strong><\/a>\u00a0&#8211; detected by 30 out of 44 antivirus scanners as TrojanDownloader:Win32\/Kuluoz.B<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e5c0f28c379e2e3a314c7382b1e37f4ead6b898dfd0cb556e8b902e6ee39e37e\/analysis\/\"><strong>MD5: 36d30a8eea96881057ae795467fe561a<\/strong><\/a>\u00a0&#8211; detected by 34 out of 44 antivirus scanners as Trojan.Win32.Yakes.bigs<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/84e4d8bbe3250384159d5cdb3b1982bad782ad2059660a8b5e0bd7d408479a65\/analysis\/\"><strong>MD5: b99d77ea6c96f27da3d84e65149c3e28<\/strong><\/a>\u00a0&#8211; detected by 26 out of 41 antivirus scanners as Trojan.Win32.Yakes.bise<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/c9e798690bfcbe08386ba240d3bb4b941594624d09274ad133a7436471e30968\/analysis\/\"><strong>MD5: 7e5a4754b1b7c285e812e37be1765c35<\/strong><\/a>\u00a0&#8211; detected by 29 out of 42 antivirus scanners as Trojan-Downloader.Win32.Kuluoz.aal<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/975201e489c8f0cb579bb7daba0adca54e6d1c4ee27baa13bc7e14b6696042ce\/analysis\/\"><strong>MD5: 7cec1a12f0f3d6e6b41976cb955c209e<\/strong><\/a>\u00a0&#8211; detected by 34 out of 44 antivirus scanners as Trojan.Win32.Yakes.bhjy<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/df16f5c3c4e9577e48e40d492437f83a826bc12faf58b9886223133c3a856ebb\/analysis\/\"><strong>MD5: 7afc73de809387bc6d66434cbbb6bed3<\/strong><\/a>\u00a0&#8211; detected by 24 out of 35 antivirus scanners as TrojanDownloader:Win32\/Kuluoz.B<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/7d0154da86c885e4aec46434552e4ef75fdca08351801492c735983cd37bd641\/analysis\/\"><strong>MD5: ea8adf1d9c6a76b39c9a3e1a5e8826f0<\/strong><\/a>\u00a0&#8211; detected by 27 out of 42 antivirus scanners as Trojan.Win32.Yakes.bhhg<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/86f5114f09dad42a3d5be2490817a8a0509c9eecb9bf8162531700ed40ca7aa2\/analysis\/\"><strong>MD5: dbacc50ee3e42b24b45b9d8a7a7aaa4b<\/strong><\/a>\u00a0&#8211; detected by 34 out of 44 antivirus scanners as Trojan.Win32.Yakes.bhij<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/df964262b565824138f66448285b6b05c87082f68e1dedc2cfcac1aaadaa947c\/analysis\/\"><strong>MD5: 6d121b530bbf8ab026e7052a42ed644a<\/strong><\/a>\u00a0&#8211; detected by 30 out of 42 antivirus scanners as Trojan.Win32.Yakes.bgvk<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/595063ff4a535bfc61769843cb8ac8b7cf473305d218730e1a85a5ba756cee2e\/analysis\/\"><strong>MD5: 54b574029cef8da99737fe8705597ac6<\/strong><\/a>\u00a0&#8211; detected by 23 out of 44 antivirus scanners as TrojanDownloader:Win32\/Kuluoz.B<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e5c0f28c379e2e3a314c7382b1e37f4ead6b898dfd0cb556e8b902e6ee39e37e\/analysis\/\"><strong>MD5: 36d30a8eea96881057ae795467fe561a<\/strong><\/a>\u00a0&#8211; detected by 34 out of 44 antivirus scanners as PWS-Zbot.gen.aow<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d42d6902878dcad80740d2f97d66783403368bc123a0553c0ad0c04f76cf132e\/analysis\/\"><strong>MD5: e40342f10b6aff36002996f3a3e88add<\/strong><\/a>\u00a0&#8211; detected by 30 out of 44 antivirus scanners as Trojan-Downloader.Win32.Kuluoz.aao<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/61be5df41fc91598dbc0c7db9463162c0fe223553e5f19557e6512f18b6742d5\/analysis\/\"><strong>MD5: 2e9755cfce544627fbfd3be07af5d7d9<\/strong><\/a>\u00a0&#8211; detected by 33 out of 43 antivirus scanners as Trojan-Downloader.Win32.Kuluoz.aam<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d42d6902878dcad80740d2f97d66783403368bc123a0553c0ad0c04f76cf132e\/analysis\/\"><strong>MD5: e40342f10b6aff36002996f3a3e88add<\/strong><\/a>\u00a0&#8211; detected by 30 out of 44 antivirus scanners as Trojan.Generic.KDV.768818<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/64b53f58cfcb5b1759a2c208beab0da3ba577bfa69e70d1663ce8f27a78d37f6\/analysis\/\"><strong>MD5: cddd3267db116d9b8bb0954c40d45f2d<\/strong><\/a>\u00a0&#8211; detected by 27 out of 44 antivirus scanners as Trojan.Generic.KDV.770707<\/p>\n<p>Who&#8217;s behind this campaign? It&#8217;s the same cybercriminal\/group of cybercriminals that launched the &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/08\/31\/cybercriminals-impersonate-ups-serve-malware\/\"><strong>Cybercriminals impersonate UPS, serve malware<\/strong><\/a>&#8221; campaign in August, 2012. Both campaigns are launched using identical tactics, and some of the listed MD5s are identical to the MD5s found in related campaigns impersonating UPS.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are currently mass mailing millions of emails impersonating The United States Postal Service (USPS), in an attempt to trick its customers into downloading and executing the malicious .zip archive linked in the bogus emails. Upon execution, the malware opens a backdoor on the affected host, allowing the cybercriminals behind the campaign to gain complete [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12469,12489,12487,12471,12481,12465,12477,10897,12475,6183,5811,12467,12463,12473,12479,5705,12491,12483,12485,5709],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8521"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8521"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8521\/revisions"}],"predecessor-version":[{"id":25501,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8521\/revisions\/25501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8521"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8521"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}