{"id":8820,"date":"2012-11-26T12:00:36","date_gmt":"2012-11-26T19:00:36","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=8820"},"modified":"2018-10-05T11:51:39","modified_gmt":"2018-10-05T17:51:39","slug":"multiple-inter-company-invoice-themed-campaigns-serve-malware-and-client-side-exploits","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/11\/26\/multiple-inter-company-invoice-themed-campaigns-serve-malware-and-client-side-exploits\/","title":{"rendered":"Multiple &#8216;Inter-company&#8217; invoice themed campaigns serve malware and client-side exploits"},"content":{"rendered":"<p>Over the past few weeks, cybercriminals have been persistently spamvertising &#8216;Inter-company invoice&#8217; themed emails, in an attempt to trick users into viewing the malicious .html attachment, or unpack and execute the malicious binary found in the attached archives. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>More details: <!--more--><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/inter_company_invoice_email_spam_exploits_malware.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-8823\" title=\"Inter_Company_Invoice_Email_Spam_Exploits_Malware\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/11\/inter_company_invoice_email_spam_exploits_malware.png\" alt=\"\" width=\"241\" height=\"84\" \/><\/a><\/p>\n<p><strong>Client-side exploits serving URL:<\/strong> <em>hxxp:\/\/controlleramo.ru:8080\/forum\/links\/column.php<\/em><\/p>\n<p><strong>Malicious payload dropping URL<\/strong>: <em>hxxp:\/\/controlleramo.ru:8080\/forum\/links\/column.php?hljhtc=33:2v:1h:2w:1m&amp;uqsgtl=3h&amp;hzwtug=2v:1k:1m:32:33:1k:1k:31:1j:1o&amp;ttr=1n:1d:1g:1d:1h:1d:1f<\/em><\/p>\n<p><strong>Sample client-side exploits served:<\/strong> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-0188\"><em>CVE-2010-0188<\/em><\/a><\/p>\n<p><strong>Malicious domain name reconnaissance:<\/strong><br \/>\ncontrolleramo.ru<br \/>\nName server: <strong>ns1.controlleramo.ru<\/strong> &#8211; 62.76.186.190<br \/>\nName server: <strong>ns2.controlleramo.ru<\/strong> &#8211; 132.248.49.112<br \/>\nName server: <strong>ns3.controlleramo.ru<\/strong> &#8211; 84.22.100.108<br \/>\nName server: <strong>ns4.controlleramo.ru<\/strong> &#8211; 65.99.223.24<\/p>\n<p>We&#8217;ve already seen the same domain used in another malicious attack &#8211;\u00a0&#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/11\/20\/copies-of-missing-epli-policies-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Copies of Missing EPLI Policies\u2019 themed emails lead to Black Hole Exploit Kit<\/strong><\/a>&#8220;, indicating that they&#8217;ve been both launched by the same party.<\/p>\n<p>Upon successful client-side exploitation the campaign drops <a href=\"https:\/\/www.virustotal.com\/file\/cac2d05cab26c70c11ef6e2e37f6693b387fb9c86b10d58835d917375f6bbf6a\/analysis\/\"><strong>MD5: de48416449621ecd62b116cc41aa5bcc<\/strong><\/a> &#8211; detected by 30 out of 44 antivirus scanners as Worm:Win32\/Cridex.E.<\/p>\n<p>The first sample obtained from the attached archive, <a href=\"https:\/\/www.virustotal.com\/file\/d3457363507634d04c3ec16868fa1e9d0d23c1f7c89a8a9611bca5ca452911f5\/analysis\/1353768737\/\"><strong>MD5: 03f5311ef1b9f7f09f6e13ff9599f367<\/strong><\/a>&#8211; is detected by 40 out of 44 antivirus scanners as Worm:Win32\/Cridex.E.\u00a0Upon execution the sample phones back to <strong>95.142.167.193:8080\/mx\/5\/A\/in\/\u00a0<\/strong>(AS29169). We&#8217;ve seen another malware campaign also phoning back to the same IP &#8211; &#8220;\u2018<a href=\"http:\/\/blog.webroot.com\/2012\/10\/19\/regarding-your-friendster-password-themed-emails-lead-to-black-hole-exploit-kit\/\"><strong>Regarding your\u00a0Friendster password\u2019 themed emails lead to Black Hole exploit kit<\/strong><\/a>&#8220;.<\/p>\n<p>More MD5s are known to have phoned back to it as well:<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/88b4e1d0b3fdcb234653a8e6d0f2149257e6228b913a0de29536dd93da168781\/analysis\/\"><strong>MD5: cf6f40f1ce37fd8edefc447f68a88e1f<\/strong><\/a> &#8211; detected by 34 out of 41 antivirus scanners as VirTool:Win32\/CeeInject<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/ad3303066031c90bee64d9256648859681b9497630c984fbbda4199f2cad3668\/analysis\/\"><strong>MD5: 2d2358dc42cd1abe0beda21b6db3a61c<\/strong><\/a> &#8211; detected by 27 out of 42 antivirus scanners as HEUR:Trojan.Win32.Generic<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/7613de4ebf8ea6ab4d7c945430746a7e06541a5a1d939a993519ccb601a31844\/analysis\/\"><strong>MD5: d4153d2c325d729c82fd8a96a94435f2<\/strong><\/a> &#8211; detected by 39 out of 44 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/9ed45cdc2a79a858429a98119afb02531889ab5fa6f5051a0bec6e600af70c84\/analysis\/\"><strong>MD5: e6f66ce084b9cc2f3f2f8c35b1636ab8<\/strong><\/a> &#8211; detected by 21 out of 42 antivirus scanners as VirTool:Win32\/Obfuscator.ZA<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/f6589d593001ca8b2b53b0380b247efff965a0c2ec5868ab664b2a721b0caaf1\/analysis\/\"><strong>MD5: 45992c5b7fb455a0e15466a1e8a8c0f0<\/strong><\/a> &#8211; detected by 38 out of 44 antivirus scanners as Worm:Win32\/Cridex.G<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/d2261091905b832aff805fbf4afc421632ca7177a998b6cb7b8d67057f021cce\/analysis\/\"><strong>MD5: d5de95df9a69bef997c21f9be9b0fc88<\/strong><\/a> &#8211; detected by 37 out of 42 antivirus scanners as Trojan-Ransom.Win32.Birele.uhu<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/baa73a4cf4f79422b210659767fc660c26018bcc2af7671e1a95fa581035d18b\/analysis\/\"><strong>MD5: 56a35fa27f04131f86f0cd44bd8480c3<\/strong><\/a> &#8211; detected by 32 out of 40 antivirus scanners as Worm:Win32\/Cridex.E<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/77d1d5c1a9f15c30f7e8adef2ce1c9f4321a04eb227b2a25f81c98d7efc961e0\/analysis\/\"><strong>MD5: de05549b469984316e0ec99a1bfe843a<\/strong><\/a> &#8211; detected by 39 out of 44 antivirus scanners as Trojan-Ransom.Win32.PornoAsset.akna<br \/>\n<a href=\"https:\/\/www.virustotal.com\/file\/e9fa6e0dceabf2c2434e803b44e1d68d403470ebe80eb44e8fccbac6653a8ef6\/analysis\/\"><strong>MD5: 7b9f0a74820a00b34cc57e7c02d1492c<\/strong><\/a> &#8211; detected by 39 out of 44 antivirus scanners as Worm:Win32\/Cridex.E<\/p>\n<p>The second sample obtained from yet another spamvertised archive with\u00a0<a href=\"https:\/\/www.virustotal.com\/file\/245db8d2f65c7bb476be3d8d3c6c9edc6af9b4827b54ec988157a8ead358074d\/analysis\/1353769289\/\"><strong>MD5: 3a8ce3d72b60b105783d74dbc65c37a6<\/strong><\/a> &#8211; is detected by 37 out of 44 antivirus scanners as Worm:Win32\/Cridex.E.\u00a0Upon execution it phones back to the following URL: <strong>188.40.0.138:8080\/AJtw\/UCyqrDAA\/Ud+asDAA<\/strong> (AS24940, HETZNER-AS).<\/p>\n<p>We&#8217;ve already seen malware analyzed in previous campaigns phoning back to the same URL, indicating that these campaigns have been launched by the same party &#8211; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/11\/21\/cybercriminals-spamvertise-bogus-microsoft-license-orders-serve-client-side-exploits-and-malware\/\"><strong>Cybercriminals spamvertise bogus \u2018Microsoft License Orders\u2019 serve client-side exploits and malware<\/strong><\/a>&#8220;; &#8220;<a href=\"http:\/\/blog.webroot.com\/2012\/09\/18\/spamvertised-us-airways-reservation-confirmation-themed-emails-serve-exploits-and-malware\/\"><strong>Spamvertised \u2018US Airways reservation confirmation\u2019 themed emails serve exploits and malware<\/strong><\/a>&#8220;.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few weeks, cybercriminals have been persistently spamvertising &#8216;Inter-company invoice&#8217; themed emails, in an attempt to trick users into viewing the malicious .html attachment, or unpack and execute the malicious binary found in the attached archives. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[12559,12557,10897,6183,5811,5801,3871,5803,6187,6177,12407,11733,11729,12389,6189,12437,11735,11731,5813,11745],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8820"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=8820"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8820\/revisions"}],"predecessor-version":[{"id":25533,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/8820\/revisions\/25533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=8820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=8820"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=8820"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=8820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}