{"id":8675,"date":"2012-11-21T00:00:49","date_gmt":"2012-11-21T07:00:49","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8675"},"modified":"2018-10-05T11:49:19","modified_gmt":"2018-10-05T17:49:19","slug":"cybercriminals-spamvertise-bogus-microsoft-license-orders-serve-client-side-exploits-and-malware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/11\/21\/cybercriminals-spamvertise-bogus-microsoft-license-orders-serve-client-side-exploits-and-malware\/","title":{"rendered":"Cybercriminals spamvertise bogus &#8216;Microsoft License Orders&#8217; serve client-side exploits and malware"},"content":{"rendered":"<p>Cybercriminals are currently mass mailing millions of emails impersonating Microsoft Corporation in an attempt to trick users into clicking on a link in a bogus &#8216;License Order&#8221; confirmation email. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/microsoft_windows_email_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8692\" title=\"Microsoft_Windows_Email_Spam_Exploits_Malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/microsoft_windows_email_spam_exploits_malware.png\" alt=\"\" width=\"227\" height=\"96\" \/><\/a><\/p>\n<p><strong>Sample compromised URL used in the campaign:<\/strong> <em>hxxp:\/\/kalender.mn-welt.de\/page2.htm<\/em><\/p>\n<p><strong>Sample client-side exploits serving URL:<\/strong> <em>hxxp:\/\/fidelocastroo.ru:8080\/forum\/links\/column.php<\/em><\/p>\n<p><strong>Sample payload serving URL:<\/strong> <em>hxxp:\/\/fidelocastroo.ru:8080\/forum\/links\/column.php?sojhnkxv=030a380233&amp;vjmm=3307093738070736060b&amp;qkzwsj=03&amp;jqgvx=hszplzo&amp;maxtgox=obazeot<\/em><\/p>\n<p><strong>Sample client-side exploit served:<\/strong> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-0188\"><em>CVE-2010-0188<\/em><\/a><\/p>\n<p><strong>Malicious domain name reconnaissance:<\/strong><br \/>\n<strong>fidelocastroo.ru<\/strong> &#8211; 209.51.221.247; 203.80.16.81<br \/>\nName server: <strong>ns1.fidelocastroo.ru<\/strong> &#8211; 85.143.166.170<br \/>\nName server: <strong>ns2.fidelocastroo.ru<\/strong> &#8211; 132.248.49.112<br \/>\nName server: <strong>ns3.fidelocastroo.ru<\/strong> &#8211; 84.22.100.108<br \/>\nName server: <strong>ns4.fidelocastroo.ru<\/strong> &#8211; 213.251.171.30<\/p>\n<p>The following domains also respond to <strong>209.51.221.247<\/strong>:<br \/>\n<strong>kennedyana.ru<\/strong><br \/>\n<strong>leprasmotra.ru<\/strong><br \/>\n<strong>windowonu.ru<\/strong><br \/>\n<strong>bakface.ru<\/strong><br \/>\n<strong>wikipediastore.ru<\/strong><br \/>\n<strong>linkrdin.ru<\/strong><br \/>\n<strong>secondhand4u.ru<\/strong><\/p>\n<p>We&#8217;ve already seen <strong>secondhand4u.ru<\/strong> and <strong>linkrdin.ru<\/strong> used in the previously profiled &#8220;&#8216;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/07\/fwd-scan-from-a-xerox-w-pro-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Fwd: Scan from a Xerox W. Pro&#8217; themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8221; malicious campaign, indicating that both campaigns have been launched by the same party.<\/p>\n<p>Upon successful client-side exploitation, the Microsoft Windows License themed campaign drops <a href=\"https:\/\/www.virustotal.com\/file\/be91d7ae09f0f823e22d47d08a2da545c96f160b54c39deb5dc8e3020e15e4c6\/analysis\/\"><strong>MD5: d5211a7882c3c3e66f4a7db04c2a0280<\/strong><\/a> &#8211; detected by 37 out of 44 antivirus scanners as Trojan.Win32.Bublik.obv<\/p>\n<p>Once executed, the sample creates the following file on the affected host:\u00a0%AppData%KB00121600.exe &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/be91d7ae09f0f823e22d47d08a2da545c96f160b54c39deb5dc8e3020e15e4c6\/analysis\/\"><strong>MD5: D5211A7882C3C3E66F4A7DB04C2A0280<\/strong><\/a> &#8211; detected by 37 out of 44 antivirus scanners as Trojan.Win32.Bublik.obv<\/p>\n<p>It then phones back to <strong>188.40.0.138:8080\/AJtw\/UCygrDAA\/Ud+asDAA<\/strong> (AS24940). We&#8217;ve already seen the same pseudo-random characters used in the &#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/11\/12\/american-express-alert-your-transaction-is-aborted-themed-emails-serve-client-side-exploits-and-malware\/\"><strong>American Express Alert: Your Transaction is Aborted\u2019 themed emails serve client-side exploits and malware<\/strong><\/a>&#8221; campaign.<\/p>\n<p><strong>More MD5s are known to have phoned back to the same IP in the past. For instance:<\/strong><br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e480f6bed12e39ada2b93c15f93325522c0067af2b9a7ce17e018f7442e5a3d7\/analysis\/\"><strong>MD5: 850c3b497224cee9086ad9ad6a2f71e6<\/strong><\/a> &#8211; detected by 4 out of 44 antivirus scanners as UDS:DangerousObject.Multi.Generic<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/1cc433d22333332f9c7d5f9ce8c1cea25f23c2a05d6d891b68b592b1ae540608\/analysis\/\"><strong>MD5: 2c20575eb1c1ac2da222d0b47639434e<\/strong><\/a> &#8211; detected by 34 out of 44 antivirus scanners as Trojan-Ransom.Win32.PornoAsset.ascm<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/29c44e11d1f822abb97423880b1b4a52d5db1985ba4a967e464a5ab2b02acfba\/analysis\/\"><strong>MD5: d9eaad9b06e500f7a0cd90a02f537364<\/strong><\/a> &#8211; detected by 29 out of 44 antivirus scanners as PWS:Win32\/Zbot<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/6f2ea71dfd12734c2fd0956078a1c205fe0d4ffea62808e6bfe13fdfc820d22e\/analysis\/\"><strong>MD5: 92978246ab42f68c323c36e62593d4ee<\/strong><\/a> &#8211; detected by 31 out of 43 antivirus scanners as HEUR:Trojan.Win32.Invader<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d3457363507634d04c3ec16868fa1e9d0d23c1f7c89a8a9611bca5ca452911f5\/analysis\/\"><strong>MD5: 03f5311ef1b9f7f09f6e13ff9599f367<\/strong><\/a> &#8211; detected by 35 out of 44 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/0904f0f25e7a0c568c1dd78ff8d8438033aec5c70f9730a3d771812fbc2a89b2\/analysis\/\"><strong>MD5: d343eb0ab2703ae3623eb1504f321018<\/strong><\/a> &#8211; detected by 37 out of 44 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e9fa6e0dceabf2c2434e803b44e1d68d403470ebe80eb44e8fccbac6653a8ef6\/analysis\/\"><strong>MD5: 7b9f0a74820a00b34cc57e7c02d1492c<\/strong><\/a> &#8211; detected by 39 out of 44 antivirus scanners as W32.Cridex<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/2caa711d18f477abb32078bfe839ba6b9f871d874ccc92e035248ca653742ee0\/analysis\/\"><strong>MD5: cdbc0ba05ce8214d8877c658b648bc7e<\/strong><\/a> &#8211; detected by 36 out of 44 antivirus scanners as W32.Cridex<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/1e579da66b2512d05ecd6b81ae50bc929bf2a928791a42af86eae85e2ee9dc50\/analysis\/\"><strong>MD5: 7515448fa3aa1ee585311b80dab7ca87<\/strong><\/a> &#8211; detected by 38 out of 44 antivirus scanners as Trojan-Ransom.Win32.PornoAsset.aaql<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/cbe15fca9cb086a3e8491497e8523ffe95cf6009326fb03b78c7cf0abfd6618f\/analysis\/\"><strong>MD5: 19f481447e1adf70245582d4f4f5719c<\/strong><\/a> &#8211; detected by 40 out of 43 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/dd4af6f8e58b6985611f99660f214ddd5f896985228386cc73149f1d325e5eaf\/analysis\/\"><strong>MD5: ABD0A8FCF1B728B14A9412F6ECF32586<\/strong><\/a> &#8211; detected by 27 out of 44 antivirus scanners as Heuristic.BehavesLike.Win32.Suspicious-BAY.K<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e0c294d51596599405c9bfd5510e0a34acc3619fddb79b6d8dc4b56458295c3e\/analysis\/\"><strong>MD5: 63F0092762566A87BE777A008CE3C511<\/strong><\/a> &#8211; detected by 31 out of 44 antivirus scanners as Trojan.Reveton.AN<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/0d844db401cb3dce94a43c4b1a22cac778a5015cfe9fe90efcff8792df2c5f40\/analysis\/\"><strong>MD5: BFFC8545808E0F5E1148BDD2A0FBF79E<\/strong><\/a> &#8211; detected by 39 out of 43 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/b4828cbafb868a97386b0ed951b29ee708d27d9184bd9e16eea4e9ec0b2ca2ff\/analysis\/\"><strong>MD5: C83877421A4A88B38F155DF2BF786B6A<\/strong><\/a> &#8211; detected by 24 out of 44 antivirus scanners as Gen:Variant.Kazy.105014<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/a759606e27dc55636735e24eb91c874c92697b292f40efd433c789f33f4d7695\/analysis\/\"><strong>MD5: C379D30CCDC4A57088F8D137DF525CCD<\/strong><\/a> &#8211; detected by 29 out of 44 antivirus scanners as Trojan.Win32.Bublik.nrz<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/91ddb5f51b8cb2064b72e65f31114324a857359fa18adbce1d7468f8742a5382\/analysis\/\"><strong>MD5: 42F36DB25B25196B454771751F8C1B89<\/strong><\/a> &#8211; detected by 35 out of 44 antivirus scanners as Malware.Cridex<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/245db8d2f65c7bb476be3d8d3c6c9edc6af9b4827b54ec988157a8ead358074d\/analysis\/\"><strong>MD5: 3A8CE3D72B60B105783D74DBC65C37A6<\/strong><\/a> &#8211; detected by 33 out of 42 antivirus scanners as Trojan.Win32.Bublik.ols<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/c9603aa2fb24a3e781ca612bb9b7d2ad2a729b1e0f019d3abd93eaebbb049b9c\/analysis\/\"><strong>MD5: EB242D0BFCE8DAA6CC2B45CA339512A0<\/strong><\/a> &#8211; detected by 25 out of 43 antivirus scanners as Win32:LockScreen-LV [Trj]<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/2caa711d18f477abb32078bfe839ba6b9f871d874ccc92e035248ca653742ee0\/analysis\/\"><strong>MD5: CDBC0BA05CE8214D8877C658B648BC7E<\/strong><\/a> &#8211; detected by 36 out of 44 antivirus scanners as Win32:Kryptik-KGB [Trj]<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/4f26d6f1b2cc01111e98598affc06fa491e4726945b9407d5438e23fb6bd4aa7\/analysis\/\"><strong>MD5: 733D33FF69013658D50328221254E80C<\/strong><\/a> &#8211; detected by 25 out of 43 antivirus scanners as Win32.Citadel<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/2fdca49c12ecb7cc5b9b22b6a09681da40f5c8725a819bfbaae3d4dd8edc9656\/analysis\/\"><strong>MD5: 963FE8239C00318DFF5BF55B866252C3<\/strong><\/a> &#8211; detected by 39 out of 44 antivirus scanners as Trojan:W32\/Injector.AH<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/954efe06a73786058ffe7c8f5dea6a7c14cc0dce43a1091b7daea728205854f1\/analysis\/\"><strong>MD5: 0D4FE02D89102B67A722027759EB40D1<\/strong><\/a> &#8211; detected by 40 out of 44 antivirus scanners as Gen:Variant.Kazy.102147<br \/>\n<strong>MD5: F8254130C26B227616C0939FBE73B9C7<\/strong><\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are currently mass mailing millions of emails impersonating Microsoft Corporation in an attempt to trick users into clicking on a link in a bogus &#8216;License Order&#8221; confirmation email. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit. More details:<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12637,12631,12633,12635,12639,12623,12557,12263,12629,6183,5811,12625,12627,5801,12641,5803,6177,10103,5813,12373],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8675"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8675"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8675\/revisions"}],"predecessor-version":[{"id":25525,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8675\/revisions\/25525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8675"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8675"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}