{"id":9703,"date":"2013-02-15T00:00:06","date_gmt":"2013-02-15T07:00:06","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=9703"},"modified":"2018-10-05T12:16:59","modified_gmt":"2018-10-05T18:16:59","slug":"spamvertised-irs-income-tax-refund-turned-down-themed-emails-lead-to-black-hole-exploit-kit","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/02\/15\/spamvertised-irs-income-tax-refund-turned-down-themed-emails-lead-to-black-hole-exploit-kit\/","title":{"rendered":"Spamvertised IRS &#8216;Income Tax Refund Turned Down&#8217; themed emails lead to Black Hole Exploit Kit"},"content":{"rendered":"<p>Its tax season and cybercriminals are mass mailing tens of thousands of <a href=\"http:\/\/blog.webroot.com\/tag\/irs\/\"><strong>IRS (Internal Revenue Service)<\/strong><\/a> themed emails in an attempt \u00a0to trick users into thinking that their income tax refund has been &#8220;turned down&#8221;. Once users click on any of the links found in the malicious emails, they&#8217;re automatically exposed to the client-side exploits served by the <a href=\"http:\/\/blog.webroot.com\/tag\/black-hole-exploit-kit\/\"><strong>Black Hole Exploit Kit<\/strong><\/a>.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the spamvertised email:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/02\/irs_income_tax_appeal_spam_email_malware_black_hole_exploit_kit.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-9706\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/02\/irs_income_tax_appeal_spam_email_malware_black_hole_exploit_kit.png\" alt=\"IRS_Income_Tax_Appeal_Spam_Email_Malware_Black_Hole_Exploit_Kit\" width=\"614\" height=\"131\" \/><\/a><\/p>\n<p><strong>Sample compromised URLs participating in the campaign:<\/strong><br \/>\n<em>hxxp:\/\/www.ordinarycoder.com\/\/wp-content\/themes\/trulyminimal\/includes\/framework\/plugins\/rjtra_irs.html<\/em><br \/>\n<em>hxxp:\/\/troutkinglures.com\/store-front\/wp-content\/themes\/mantra\/uploads\/rjtra_irs.html<\/em><br \/>\n<em>hxxp:\/\/www.romanfirnkranz.com\/\/wp-content\/themes\/trulyminimal\/includes\/framework\/plugins\/rjtra_irs.html<\/em><br \/>\n<em>hxxp:\/\/ichetblog.net\/wp-content\/themes\/mantra\/uploads\/rjtra_irs.html<\/em><\/p>\n<p><strong>Sample client-side exploits serving URL:<\/strong><br \/>\n<em>hxxp:\/\/micropowerboating.net\/detects\/pending_details.php<\/em><\/p>\n<p><strong>Sample malicious payload dropping URL:<\/strong><br \/>\n<em>hxxp:\/\/micropowerboating.net\/detects\/pending_details.php?nf=1f:32:31:1l:2w&amp;ee=2v:1j:1m:2v:1g:1m:1l:33:1g:2v&amp;l=1f&amp;zf=e&amp;xx=w<\/em><\/p>\n<p><strong>Malicious domain name reconnaissance:<\/strong><br \/>\n<strong>micropowerboating.net<\/strong> &#8211; 175.121.229.209; 198.144.191.50 &#8211; Email: dooronemars@aol.com<br \/>\nName Server: <strong>NS1.POOPHANAM.NET<\/strong> &#8211; 31.170.106.17<br \/>\nName Server: <strong>NS2.POOPHANAM.NET<\/strong> &#8211; 65.135.199.21<\/p>\n<p><strong>The following malicious domains also respond to the same IPs <\/strong><strong>(175.121.229.209; 198.144.191.50) and are part of the campaign&#8217;s infrastructure:\u00a0<\/strong><br \/>\n<strong>madcambodia.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>micropowerboating.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>dressaytam.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>acctnmrxm.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>capeinn.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>albaperu.net<\/strong> &#8211; 175.121.229.209<br \/>\n<strong>live-satellite-view.net<\/strong> &#8211; 175.121.229.209<\/p>\n<p><strong>morepowetradersta.com<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>asistyapipressta.com<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>uminteraktifcozumler.com<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>rebelldagsanet.com<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>madcambodia.net<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>micropowerboating.net<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>acctnmrxm.net<\/strong>&#8211; 198.144.191.50<br \/>\n<strong>capeinn.net<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>albaperu.net<\/strong> &#8211; 198.144.191.50<br \/>\n<strong>live-satellite-view.net<\/strong> &#8211; 198.144.191.50<\/p>\n<p>Although the initial client-side exploits serving domain used in the campaign (<strong>micropowerboating.net<\/strong>) was down when we attempted to reproduce its malicious payload, we managed to reproduce the malicious payload for a different domain parked at the same IP (<strong>175.121.229.209<\/strong>), namely,\u00a0<strong>madcambodia.net<\/strong>.<\/p>\n<p>Detection rate for the dropped malware:<br \/>\n<strong>madcambodia.net<\/strong> &#8211; 175.121.229.209 &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/d83dad0125948b0c20016f98dae6248dd2d96d03be83b3bbcb0627715ea19a70\/analysis\/\"><strong>MD5: 2da28ae0df7a90ce89c7c43878927a9f<\/strong><\/a> &#8211; detected by 23 out of 45 antivirus scanners as Trojan-Spy.Win32.Zbot.ivkf.<\/p>\n<p><strong>Upon execution, the sample created the following files on the affected hosts:<\/strong><br \/>\n<em>C:Documents and Settings&lt;USER&gt;Application DataYdukcfuonar.exe<\/em><br \/>\n<em>C:DOCUME~1&lt;USER&gt;~1LOCALS~1Temptmp53f9eac3.bat<\/em><\/p>\n<p><strong>Set the following Registry Keys:<\/strong><br \/>\n<em>HKEY_CURRENT_USERSoftwareMicrosoftEqini289bbd03<\/em><\/p>\n<p><strong>As well as the following Mutexes:<\/strong><br \/>\n<em>Global{CB561546-E774-D5EA-8F92-61FCBA8C42EE}<\/em><br \/>\n<em>Local{744F300D-C23F-6AF3-8F92-61FCBA8C42EE}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-0508-B06D3016937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-7109-B06D4417937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-490A-B06D7C14937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-610A-B06D5414937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-8D0A-B06DB814937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-990A-B06DAC14937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-350B-B06D0015937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-610B-B06D5415937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-B90B-B06D8C15937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-150C-B06D2012937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-4D0C-B06D7812937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-710C-B06D4412937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-B50D-B06D8013937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-2D0E-B06D1810937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-650E-B06D5010937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-7D08-B06D4816937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-050C-B06D3012937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-150D-B06D2013937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-DD0E-B06DE810937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-750F-B06D4011937F}<\/em><br \/>\n<em>Global{2E56E149-137B-30EA-A10B-B06D9415937F}<\/em><\/p>\n<p><strong>Once executed, the sample also phones back to the following C&amp;C (command and control) servers:<\/strong><br \/>\n<em>94.68.61.135:14511<\/em><br \/>\n<em>99.76.3.38:11350<\/em><\/p>\n<p>We also got another MD5 phoning back to the same IP, <a href=\"https:\/\/www.virustotal.com\/file\/fb773d92a4a964cd0498d3579ed7b9a0f71fcaf3b7cc1d45d508c41599f328f7\/analysis\/\"><strong>MD5: c308f5c888fd97ae20eee1344f890bdb<\/strong><\/a> &#8211; detected by 14 out of 45 antivirus scanners as PWS:Win32\/Zbot.gen!AL.<\/p>\n<p>What&#8217;s also worth noting is the fact that we&#8217;ve already seen one of the domains parked at the same IPs (<strong>morepowetradersta.com<\/strong>)\u00a0as the original client-side exploits serving domain used in the campaign in the following analyses:<\/p>\n<ul>\n<li><span style=\"line-height: 13px;\"><strong><a href=\"http:\/\/blog.webroot.com\/2013\/01\/29\/fake-fedex-online-billing-invoice-prepared-to-be-paid-themed-emails-lead-to-black-hole-exploit-kit\/\">Fake \u2018FedEx Online Billing \u2013 Invoice Prepared to be Paid\u2019 themed emails lead to Black Hole Exploit Kit<\/a><\/strong><br \/>\n<\/span><\/li>\n<li><strong><a href=\"http:\/\/blog.webroot.com\/2013\/01\/24\/fake-linkedin-invitation-notifications-themed-emails-lead-to-client-side-exploits-and-malware\/\">Fake LinkedIn \u2018Invitation Notifications\u2019 themed emails lead to client-side exploits and malware<\/a><\/strong><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\"><strong>Webroot SecureAnywhere<\/strong><\/a>\u00a0users are proactively protected from these threats.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Its tax season and cybercriminals are mass mailing tens of thousands of IRS (Internal Revenue Service) themed emails in an attempt \u00a0to trick users into thinking that their income tax refund has been &#8220;turned down&#8221;. Once users click on any of the links found in the malicious emails, they&#8217;re automatically exposed to the client-side exploits [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[23031,23029,23035,13431,3871,11341,6187,6177,9563,6193,13425,11739,10283,13429,6189,23033,12957,12443,3869,11747],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9703"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=9703"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9703\/revisions"}],"predecessor-version":[{"id":25611,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9703\/revisions\/25611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=9703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=9703"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=9703"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=9703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}