{"id":8577,"date":"2012-11-07T00:00:58","date_gmt":"2012-11-07T07:00:58","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8577"},"modified":"2018-10-05T11:43:25","modified_gmt":"2018-10-05T17:43:25","slug":"fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/","title":{"rendered":"&#8216;Fwd: Scan from a Xerox W. Pro&#8217; themed emails lead to Black Hole Exploit Kit"},"content":{"rendered":"<p>On a periodic basis, malicious cybercriminals spamvertise <a href=\"http:\/\/blog.webroot.com\/2012\/08\/27\/spamvertised-fwd-scan-from-a-hewlett-packard-scanjet-emails-lead-to-black-hole-exploit-kit\/\"><strong>millions of emails<\/strong><\/a> attempting to trick end users into thinking that they&#8217;ve received <a href=\"http:\/\/blog.webroot.com\/2012\/03\/31\/spamvertised-scan-from-a-hewlett-packard-scanjet-emails-lead-to-client-side-exploits-and-malware\/\"><strong>a scanned document<\/strong><\/a>. Upon clicking on the links found in these emails, or viewing the malicious .html attachment, users are automatically exposed to the client-side exploits served by the latest version of the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>In this post, I will profile two currently circulating malicious campaigns. The first is mimicking a Xerox Pro printer, and the second is claiming to be a legitimate Wire Transfer. Both of these campaigns point to the same client-side exploits serving URL, indicating that they&#8217;ve been launched by the same cybercriminal\/gang of cybercriminals.<\/p>\n<p>More details: <!--more--><strong>Sample screenshots of the spamvertised emails:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/xerox_email_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8579\" title=\"Xerox_Email_Spam_Exploits_Malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/xerox_email_spam_exploits_malware.png\" alt=\"\" width=\"227\" height=\"87\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/xerox_email_spam_exploits_malware_01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8581\" title=\"Xerox_Email_Spam_Exploits_Malware_01\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/xerox_email_spam_exploits_malware_01.png\" alt=\"\" width=\"172\" height=\"88\" \/><\/a><\/p>\n<p><strong>Client-side exploits serving URLs:<\/strong> <em>hxxp:\/\/panalkinew.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/panalkinew.ru:8080\/forum\/links\/column.php?rcgeyqil=0406080806&amp;qkped=36&amp;kwtgtko=3307093738070736060b&amp;ucu=02000200020002<\/em><\/p>\n<p><strong>Spamvertised compromised URL used in the Wire Transfer themed campaign:<\/strong> <em>hxxp:\/\/www.mm4management.com\/indeaxo.htm<\/em><\/p>\n<p>Upon loading, the URLs exploit\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-0188\"><strong>CVE-2010-0188<\/strong><\/a> in an attempt to drop a malicious PDF file on the affected host. The sample then drops additional malware.<\/p>\n<p><strong>Detection rate for a sample javascript obfuscation:<\/strong> <a href=\"https:\/\/www.virustotal.com\/file\/c65505c7d00e01f0afed0e35949af275c0ed50208640000a2c612be19471ea40\/analysis\/1351525757\/\"><strong>MD5: 0a8a06770836493a67ea2e9a1af844bf<\/strong><\/a> &#8211; detected by 15 out of 43 antivirus scanners as Mal\/JSRedir-M<\/p>\n<p><strong>Detection rate for the dropped malware:<\/strong> <a href=\"https:\/\/www.virustotal.com\/file\/f8aa0ca5b78e08bec43cf32cfdebd205c984089aea6a8eae992ebaccc5275ed8\/analysis\/\"><strong>MD5: 194655f7368438ab01e80b35a5293875<\/strong><\/a> &#8211; detected by 25 out of 43 antivirus scanners as Trojan-Ransom.Win32.PornoAsset.avzz<\/p>\n<p><strong>panalkinew.ru<\/strong> responds to the following IPs &#8211; 203.80.16.81, AS24514; 209.51.221.247, AS10297; 213.251.171.30, AS16276<\/p>\n<p><strong>Responding to the same IPs are also the following malicious domains part of the campaign&#8217;s infrastructure:<\/strong><br \/>\n<strong>manekenppa.ru<\/strong><br \/>\n<strong>kiladopje.ru<\/strong><br \/>\n<strong>lemonadiom.ru<\/strong><br \/>\n<strong>finitolaco.ru<\/strong><br \/>\n<strong>fidelocastroo.ru<\/strong><br \/>\n<strong>ponowseniks.ru<\/strong><br \/>\n<strong>panasonicviva.ru<\/strong><br \/>\n<strong>geforceexlusive.ru<\/strong><br \/>\n<strong>limonadiksec.ru<\/strong><br \/>\n<strong>linkrdin.ru<\/strong><br \/>\n<strong>sonatanamore.ru<\/strong><br \/>\n<strong>secondhand4u.ru<\/strong><br \/>\n<strong>windowonu.ru<\/strong><\/p>\n<p>Deja vu! We&#8217;ve already seen one of these domains (<strong>sonatanamore.ru<\/strong>) used in the recently profiled &#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/10\/19\/regarding-your-friendster-password-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Regarding your Friendster password\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a>&#8221; campaign, indicating that these campaigns have been launched by the same malicious party.<\/p>\n<p><strong>Name servers used in the campaign&#8217;s infrastructure:<\/strong><br \/>\n<strong>ns1.panalkinew.ru<\/strong> &#8211; 62.76.186.190<br \/>\n<strong>ns2.panalkinew.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns3.panalkinew.ru<\/strong> &#8211; 50.22.102.132<br \/>\n<strong>ns4.panalkinew.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.manekenppa.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.manekenppa.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.manekenppa.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.manekenppa.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.kiladopje.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.kiladopje.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.kiladopje.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.kiladopje.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.lemonadiom.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.lemonadiom.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.lemonadiom.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.lemonadiom.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.finitolaco.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.finitolaco.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.finitolaco.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.finitolaco.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.fidelocastroo.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.fidelocastroo.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.fidelocastroo.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.fidelocastroo.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.ponowseniks.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.ponowseniks.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.ponowseniks.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.ponowseniks.ru<\/strong> &#8211; 213.251.171.30<br \/>\n<strong>ns1.panasonicviva.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns2.panasonicviva.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns3.panasonicviva.ru<\/strong> &#8211; 62.76.47.51<br \/>\n<strong>ns1.geforceexlusive.ru<\/strong> &#8211; 62.76.47.51<br \/>\n<strong>ns2.geforceexlusive.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.geforceexlusive.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.geforceexlusive.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.limonadiksec.ru<\/strong> &#8211; 62.76.46.195<br \/>\n<strong>ns2.limonadiksec.ru<\/strong> &#8211; 87.120.41.155<br \/>\n<strong>ns3.limonadiksec.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns4.limonadiksec.ru<\/strong> &#8211; 91.194.122.8<br \/>\n<strong>ns5.limonadiksec.ru<\/strong> &#8211; 62.76.188.246<br \/>\n<strong>ns1.linkrdin.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.linkrdin.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.linkrdin.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.linkrdin.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.sonatanamore.ru<\/strong> &#8211; 62.76.47.51<br \/>\n<strong>ns2.sonatanamore.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.sonatanamore.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns1.secondhand4u.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.secondhand4u.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.secondhand4u.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.secondhand4u.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.windowonu.ru<\/strong> &#8211; 85.143.166.170<br \/>\n<strong>ns2.windowonu.ru<\/strong> &#8211; 132.248.49.112<br \/>\n<strong>ns3.windowonu.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns4.windowonu.ru<\/strong> &#8211; 79.98.27.9<br \/>\n<strong>ns1.panalkinew.ru<\/strong> &#8211; 62.76.186.190<br \/>\n<strong>ns2.panalkinew.ru<\/strong> &#8211; 84.22.100.108<br \/>\n<strong>ns3.panalkinew.ru<\/strong> &#8211; 50.22.102.132<br \/>\n<strong>ns4.panalkinew.ru<\/strong> &#8211; 213.251.171.30<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On a periodic basis, malicious cybercriminals spamvertise millions of emails attempting to trick end users into thinking that they&#8217;ve received a scanned document. Upon clicking on the links found in these emails, or viewing the malicious .html attachment, users are automatically exposed to the client-side exploits served by the latest version of the Black Hole [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12457,12459,12263,12303,12461,11341,6187,6177,9563,6193,11733,11729,4911,11343,6189,11737,11735,11731,11747,11745],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8577"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8577"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8577\/revisions"}],"predecessor-version":[{"id":25503,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8577\/revisions\/25503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8577"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8577"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}