{"id":9017,"date":"2012-12-12T00:00:40","date_gmt":"2012-12-12T07:00:40","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=9017"},"modified":"2018-10-05T11:59:58","modified_gmt":"2018-10-05T17:59:58","slug":"malicious-sendspace-file-delivery-notifications-lead-to-black-hole-exploit-kit","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/12\/12\/malicious-sendspace-file-delivery-notifications-lead-to-black-hole-exploit-kit\/","title":{"rendered":"Malicious &#8216;Sendspace File Delivery Notifications&#8217; lead to Black Hole Exploit Kit"},"content":{"rendered":"<p>Cybercriminals are currently attempting to trick hundreds of thousands of users into clicking on the malicious links found in the currently spamvertised bogus &#8216;<em>Sendspace File Delivery Notifications<\/em>&#8216;.<\/p>\n<p>Upon clicking on any of the links found in the email, users are exposed to the client-side exploits served by the latest version of the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/blog.webroot.com\/?attachment_id=9033\" rel=\"attachment wp-att-9033\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-9033\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/12\/email_spam_exploits_malware_social_engineering_black_hole_exploit_kit.png\" alt=\"Email_Spam_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_Kit\" width=\"485\" height=\"170\" \/><\/a><\/p>\n<p><strong>Sample spamvertised malicious URls:<\/strong> <em>hxxp:\/\/mininet.nl\/forwarding.htm<\/em>; <em>hxxp:\/\/hd-group.cn\/redirect.htm<\/em>; <em>hxxp:\/\/cztiyu.com\/upload.htm<\/em><\/p>\n<p><strong>Sample client-side exploits serving URL:<\/strong> <em>hxxp:\/\/canadianpanakota.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/anifkailood.ru:8080\/forum\/links\/column.php<\/em>; <em>hxxp:\/\/pelamutrika.ru:8080\/forum\/links\/public_version.php<\/em><\/p>\n<p><strong>Sample malicious payloa dropping URL:<\/strong> <em>hxxp:\/\/canadianpanakota.ru:8080\/forum\/links\/column.php? <\/em><br \/>\n<em>bwi=1i:2w:1h:1n:1l&amp;oaera=3l&amp;zmbxivwt=2v:1k:1m:32:33:1k:1k:31:1j:1o&amp;evgiw=1n:1d:1g:1d:1h:1d:1f<\/em><\/p>\n<p><strong>Sample client-side exploits served:<\/strong> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-0188\"><strong>CVE-2010-0188<\/strong><\/a><\/p>\n<p>Upon successful client-side exploitation, the campaign drops <a href=\"https:\/\/www.virustotal.com\/file\/a0703de85f59b501935eff571a6c6b6f9e30c03c703a678abe699019e2c1eb2b\/analysis\/\"><strong>MD5: 532bdd2565cae7b84cb26e4cf02f42a0<\/strong><\/a> &#8211; detected by 33 out of 44 antivirus scanners as Worm:Win32\/Cridex.E<\/p>\n<p>Once executed it creates <em>%AppData%kb00121600.exe<\/em> on the affected system.<\/p>\n<p><strong>The sample also creates the following registry entries:<\/strong><br \/>\n<em>HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCFBDC89D4<\/em><br \/>\n<em>HKEY_CURRENT_USERSoftwareMicrosoftWindows NTS25BC2D7B<\/em><\/p>\n<p><strong>As well as the following Mutexes:<\/strong><br \/>\n<em>LocalXMM00000418<\/em><br \/>\n<em>LocalXMI00000418<\/em><br \/>\n<em>LocalXMRFB119394<\/em><br \/>\n<em>LocalXMM000005E4<\/em><br \/>\n<em>LocalXMI000005E4<\/em><br \/>\n<em>LocalXMM0000009C<\/em><br \/>\n<em>LocalXMI0000009C<\/em><br \/>\n<em>LocalXMM000000C8<\/em><br \/>\n<em>LocalXMI000000C8<\/em><\/p>\n<p>It then phones back to <strong>hxxp:\/\/210.253.102.95:8080\/DPNilBA\/ue1elBAAAA\/tlSHAAAAA\/<\/strong> and to <strong>hxxp:\/\/123.49.61.59:8080\/AJtw\/UCyqrDAA\/Ud+asDAA\/<\/strong><\/p>\n<p>We&#8217;ve already seen the same pseudo-randomly generated C&amp;C characters used in the first &#8216;phone back request&#8217; (<strong>DPNilBA\/ue1elBAAAA\/tlSHAAAAA\/<\/strong>) used in the following\u00a0previously profiled malicious campaigns:<\/p>\n<ul>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/11\/22\/cybercriminals-resume-spamvertising-payroll-account-cancelled-by-intuit-themed-emails-serve-client-side-exploits-and-malware\/\"><strong>Cybercriminals resume spamvertising \u2018Payroll Account Cancelled by Intuit\u2019 themed emails, serve client-side exploits and malware<\/strong><\/a><\/li>\n<li><strong><a href=\"http:\/\/blog.webroot.com\/2012\/11\/23\/cybercriminals-spamvertise-millions-of-fdic-your-activity-is-discontinued-themed-emails-serve-client-side-exploits-and-malware\/\">Cybercriminals spamvertise millions of FDIC \u2018Your activity is discontinued\u2019 themed emails, serve client-side exploits and malware<\/a><\/strong><\/li>\n<\/ul>\n<p>Not surprisingly, we&#8217;ve also seen the second &#8216;phone back&#8217; IP (<strong>123.49.61.59<\/strong>) used in the following campaigns:<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/blog.webroot.com\/2012\/06\/25\/spamvertised-your-ups-delivery-tracking-emails-serving-client-side-exploits-and-malware\/\">Spamvertised \u2018Your UPS delivery tracking\u2019 emails serving client-side exploits and malware<\/a><\/strong><\/li>\n<\/ul>\n<p>As well as the actual pseudo-randomly generated characters used in the second C&amp;C (<strong>AJtw\/UCyqrDAA\/Ud+asDAA\/<\/strong>) in the following analyses:<\/p>\n<ul>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/11\/26\/multiple-inter-company-invoice-themed-campaigns-serve-malware-and-client-side-exploits\/\"><strong>Multiple \u2018Inter-company\u2019 invoice themed campaigns serve malware and client-side exploits<\/strong><\/a><\/li>\n<li><a href=\"http:\/\/blog.webroot.com\/2012\/11\/08\/your-discover-card-services-blockaded-themed-emails-serve-client-side-exploits-and-malware\/\"><strong>\u2018Your Discover Card Services Blockaded\u2019 themed emails serve client-side exploits and malware<\/strong><\/a><\/li>\n<\/ul>\n<p><strong>Malicious domain names reconnaissance:<\/strong><br \/>\n<strong>canadianpanakota.ru<\/strong> &#8211; 120.138.20.54; 203.80.16.81; 202.180.221.186<br \/>\nName server: <strong>ns1.canadianpanakota.ru<\/strong> &#8211; 62.76.178.233<br \/>\nName server: <strong>ns2.canadianpanakota.ru<\/strong> &#8211; 132.248.49.112<br \/>\nName server: <strong>ns3.canadianpanakota.ru<\/strong> &#8211; 84.22.100.108<br \/>\nName server: <strong>ns4.canadianpanakota.ru<\/strong> &#8211; 65.99.223.24<\/p>\n<p>The following malicious domains also respond to the same IP:<br \/>\n<strong>forumibiza.ru<\/strong><br \/>\n<strong> donkihotik.ru<\/strong><br \/>\n<strong> lemonadiom.ru<\/strong><br \/>\n<strong> peneloipin.ru<\/strong><br \/>\n<strong> finitolaco.ru<\/strong><br \/>\n<strong> moneymakergrow.ru<\/strong><br \/>\n<strong> fionadix.ru<\/strong><\/p>\n<p><strong>pelamutrika.ru<\/strong> &#8211; 202.180.221.186<br \/>\nName server: <strong>ns1.pelamutrika.ru<\/strong> &#8211; 62.76.189.72<br \/>\nName server: <strong>ns2.pelamutrika.ru<\/strong> &#8211; 41.168.5.140<br \/>\nName server: <strong>ns3.pelamutrika.ru<\/strong> &#8211; 132.248.49.112<br \/>\nName server: <strong>ns4.pelamutrika.ru<\/strong> &#8211; 209.51.221.247<br \/>\nName server: <strong>ns5.pelamutrika.ru<\/strong> &#8211; 208.87.243.196<br \/>\nName server: <strong>ns6.pelamutrika.ru<\/strong> &#8211; 216.99.149.226<\/p>\n<p>The following malicious domains also respond to the same IP:<br \/>\n<strong>ganiopatia.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>pelamutrika.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>ganalionomka.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>genevaonline.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>francese.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>podarunoki.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>publicatorian.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>cinemaallon.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>pitoniamason.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>leberiasun.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>dimarikanko.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>somaliaonfloor.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>panamechkis.ru<\/strong> &#8211; 202.180.221.186<\/p>\n<p><strong>anifkailood.ru<\/strong> &#8211; 202.180.221.186; 212.162.52.180; 212.162.56.210<br \/>\nName server: <strong>ns1.anifkailood.ru<\/strong> &#8211; 62.76.189.72<br \/>\nName server: <strong>ns2.anifkailood.ru<\/strong> &#8211; 62.76.177.104<br \/>\nName server: <strong>ns3.anifkailood.ru<\/strong> &#8211; 41.168.5.140<br \/>\nName server: <strong>ns4.anifkailood.ru<\/strong> &#8211; 209.51.221.247<br \/>\nName server: <strong>ns5.anifkailood.ru<\/strong> &#8211; 42.121.116.38<br \/>\nName server: <strong>ns6.anifkailood.ru<\/strong> &#8211; 110.164.58.250<\/p>\n<p>The following malicious domains also respond to the same IP:<br \/>\n<strong>ganiopatia.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>pelamutrika.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>ganalionomka.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>anifkailood.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>genevaonline.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>francese.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>podarunoki.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>publicatorian.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>cinemaallon.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>pitoniamason.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>leberiasun.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>dimarikanko.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>somaliaonfloor.ru<\/strong> &#8211; 202.180.221.186<br \/>\n<strong>panamechkis.ru<\/strong> &#8211; 202.180.221.186<\/p>\n<p>We&#8217;ve also seen some of these malicious domains used in previously profiled campaigns, indicating that the cybercriminal\/gang of cybercriminals behind these attacks are continuing to rotate the impersonated brands and launch new social engineering driven campaigns in the wild.<\/p>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are currently attempting to trick hundreds of thousands of users into clicking on the malicious links found in the currently spamvertised bogus &#8216;Sendspace File Delivery Notifications&#8216;. Upon clicking on any of the links found in the email, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[6187,6177,9563,10103,6185,12405,12377,10109,6189,5727,5247,12443,12881,6191,12883,12391,12373,12403,12375,12369],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9017"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=9017"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9017\/revisions"}],"predecessor-version":[{"id":25563,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9017\/revisions\/25563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=9017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=9017"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=9017"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=9017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}