MalwareCleaning

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, February 26, 2013

FedEx spam loads malware

Posted on 7:43 AM by Unknown

Received an email from (supposedly) FedEx today, seems my parcel was unable to be delivered:

Print your receipt!

















    Mail details:
Subject: Shipping Information‏


Sender: stoiciu_ro01@uhost.ro


X-Originating-IP: 195.78.124.42
Content: 
FedEx
Tracking ID: 1795-21492944
Date: Monday, 18 February 2013, 10:22 AM
Dear Client,
Your parcel has arrived at February 20.Courier was unable to deliver the parcel to you at 20 February 06:33 PM.
To receive your parcel, please, print this receipt and go to the nearest office.
Print Receipt  
Best Regards, The FedEx Team.
FedEx 1995-2013


The 'Print Receipt' button points to a filesharing website, where a ZIP file gets downloaded. Inside the ZIP is an EXE file with a neat little Word icon. When running the file:


Postal Receipt  information













You get a Notepad file with some information. Is your name Mark Smith? No? Then you're infected. Is your name Mark Smith? Then you're infected anyway. 

Does this behaviour look familiar? Well noticed, we've seen this in a post from some months ago:
UPS spam downloads malware



Gathered files. Contact me for a copy.









Some more details about the downloaded file:
Postal-Receipt.exe
MD5: d335b890e1bc260a259b994533333d02
VirusTotal Report
Anubis Report
ThreatExpert Report


The following file was dropped in the %appdata% folder:
ujfhmdlk.exe
MD5: d335b890e1bc260a259b994533333d02
VirusTotal Report
Anubis Report
ThreatExpert Report


The malware tries to connect to the following IPs:

46.105.143.110
50.115.116.201
74.117.61.123
77.79.81.166
81.93.248.152
87.106.51.52
91.121.140.40
91.121.28.146
93.125.30.232
95.140.203.241
109.235.252.2
118.97.15.13
122.155.18.53
149.62.168.76
188.165.205.46
190.111.176.13
190.111.176
202.153.132.24
213.229.106.32
217.11.63.194



It performs the following GET request on port 8080, probably to download more malware.  
(I was however unable to reproduce any additional droppers or system modifications): /509A37A363A4A88C8B6BBD234F063B9CEE4072C470F04B0AB239C05FF89DA4B98D1E54BF77C0CD96CD8BC4004B3459C13194D0F9E0D64CF108A635F7468E817F408A20EF7149233F1356D2B3565F49





Conclusion
  • Don't click on any link(s) of unknown senders. In fact, don't even open mail from unknown senders.
  • Have you indeed ordered something? Check the status of it directly on the supplier's website.
  • Don't be fooled by the Adobe or Word icons, they are actually EXE files. You can enable an option in Windows so you're always sure of the filetype being used:
    Enable Viewing of Filename Extensions for Known File Types
  • Install an antivirus and antimalware product and keep it up-to-date & running. In this case, the payload is at least 4 months old! This should be easily detected by your antivirus product.


    Read More
    Posted in blog update, FedEx, FedEx spam, lame old malware, malware, spam | No comments

    Wednesday, February 20, 2013

    Facebook in a different color? Nah, just a survey scam

    Posted on 7:59 AM by Unknown

    I got messaged about an obvious scam on Facebook:


    New Facebook colors!













    Strangely enough, that person's Facebook color was still in blue. Is it possible this is just a scam? ;-)


    Going to the application:

    The application "Pick a col0r" requests your permissions


     Next screen....:
    I choose the blue color. Oh, right...




















    You've won!



    As with most applications like these, you first have to fill in a survey to get your Facebook in a different color. Obviously, you still won't be able to even if you have filled in all your information for a chance to win product X or Y.


    The application will make the same post on your wall as in the first picture. To remove it:

    Go to your privacy settings, applications and remove "Pick a C0lor".



    Confirm the removal and check the box. 




     Conclusion

    You cannot change the color of Facebook at this point, there is no dislike button, ....

    All of these 'applications' point to survey scams where you fill in all your information and your inbox will be flooded with spammail. And no, you haven't won anything.




    Read More
    Posted in blog update, change facebook color, facebook, facebook dislike button, facebook scam, Facebook spam, scam, survey scam | No comments

    Wednesday, February 13, 2013

    New exploit kit tricks

    Posted on 7:41 AM by Unknown

    In today's post, we'll be reviewing a (potentially) new trick by the exploit kit authors.

    As usual, it all starts with.... a great portion of spam:

    Verizon important account information! ;-)























    When clicking on any of the links you get redirected of course.... and some tasty exploits are served.... See for more information on Pastebin links further below....

    However, this time, when you don't have a vulnerable Java or Adobe version installed, you'll get redirected (after 61000 milliseconds ~1 minute to be exact) to another page where you can download the brand new version of Adobe Flash Player:


    Download the new Flash Player... Note it's not the official Adobe website!


















    Of course this is not the real Flash Player, in fact, as far as I could find, this version does not exist.

    Something that has always bothered me about the download of Flash is the notification circled in red. Yes, on the real website of Adobe, this notification is also present:
    "You may have to temporarily disable your antivirus software" --> Great thinking, right?


    The bad guys have basically just done a copy/paste of the download page of Flash and changed the version number. When clicking on Download now, you're presented with:





    update_flash_player.exe
    MD5: 1b7d3393018d65e9d37566089b7626d5
    VirusTotal Report
    Anubis Report
    ThreatExpert Report


    The payload seems to be Zeus/Zbot, it also phones home to:
    88.190.210.199

    Infection URLs from the same campaign, hat tip to @MalwareMustDie :
    URLquery search results



    Samples that were gathered, contact me if you'd like a copy:













    Pastebin links for the Javascripts:
    http://pastebin.com/hhQe6RCP
    http://pastebin.com/nt5JmGp3




    Conclusion

    - Don't click on any link(s) of unknown senders. In fact, don't even open mail from unknown senders
    - Patch your Java & Adobe or uninstall it if you don't need it
    - Install an antivirus and antimalware product and keep it up-to-date & running
    - Use NoScript in Firefox or NotScripts in Chrome


    Read More
    Posted in adobe exploit, blackhole exploit kit, blog update, exploit, exploit kit, java exploit, malware, spam, verizon spam | No comments
    Newer Posts Older Posts Home
    Subscribe to: Comments (Atom)

    Popular Posts

    • League of Legends RP hack
      I recently blogged about a (still current) scam targeting players of the online game League of Legends: Free Riot codes scam . When re-check...
    • test for the blog
      Just testing ... :-)
    • Gina Lisa Facebook scam
      Yet another Facebook scam, this time luring users with a sextape from Gina Lisa, whom is apparently a German model: Yet another Facebook sca...
    • Increase in malicious spam
      Rodel Mendrez from M86 Security labs has made an excellent post on a Massive Rise in Malicious Spam: http://labs.m86security.com/2011/08/mas...
    • Facebook Support. Personal data has been changed!
      There appears to be a new malicious email being sent out with the subject: " Facebook Support. Personal data has been changed! ID7530...
    • FedEx spam loads malware
      Received an email from (supposedly) FedEx today, seems my parcel was unable to be delivered: Print your receipt!     Mail details: Subject: ...
    • Analysing malicious PDF files
      This is an ongoing blogpost on how to analyse malicious PDF files... More information coming soon... Content coming soon! [...] Source of PD...
    • A word on XDocCrypt/Dorifel/Quervar
      I'm sure everyone has heard by now about the so called XDocCrypt/Dorifel/Quervar malware. It has mostly damaged machines in The Netherla...
    • Malware Puzzle
      A malware (crossword) puzzle you say? Yes! Why not? I've made a puzzle about malware (and security) related keywords. It comes in .PNG f...
    • [SPAM] He found himself leading the process
      Nothing new here, but interesting to note that this type of trick is still going around. I am talking about an email you receive with (appar...

    Categories

    • ACH transfer
    • adobe
    • adobe exploit
    • ADP
    • adware
    • affiliate
    • all your data are belong to us
    • antimalware
    • asprox
    • bancos
    • banking trojan
    • basic malware cleaning
    • battle.net
    • blackhole exploit kit
    • blog update
    • botnet
    • brazilian banking trojan
    • brucon
    • change facebook color
    • conduit
    • cracked hotmail
    • credit card blocked
    • crimeware kit
    • CVE-2006-0003
    • CVE-2010-0840
    • CVE-2012-4681
    • cybercrime
    • d3
    • diablo
    • diablo III
    • diablo phishing
    • DLL injection
    • Dorifel
    • dorkbot
    • encryption
    • end of july
    • exploit
    • exploit kit
    • exprez
    • facebook
    • facebook dislike button
    • facebook event
    • facebook scam
    • Facebook spam
    • facepalm
    • Fake Symantec security check
    • fakeAV
    • fareit
    • FedEx
    • FedEx spam
    • first post
    • flv media player
    • foistware
    • free riot code scam
    • free riot codes
    • free riot points
    • free riot points scam
    • free RP generator
    • fun
    • gina lisa
    • google earth
    • google image poisoning
    • google images
    • hacked hotmail
    • Hacked Hotmail accounts
    • hakin9
    • Hewlett-Packard ScanJet
    • hotfile
    • hotmail
    • illegal games
    • infostealer
    • ING
    • IP and RP Hack Download
    • java
    • java exploit
    • kuluoz
    • lame old malware
    • League of Legends
    • League of Legends MultiHack Generator
    • League of Legends RP generator
    • League of Legends RP hack
    • linkedIN
    • LoL
    • LoL RP Hack
    • low detection
    • malvertising
    • malware
    • malware analysis
    • malware analysis lab
    • malware cleaning
    • malware lab
    • malware puzzle
    • malware tools
    • medfos
    • messenger
    • MSN
    • neosploit exploit kit
    • paypal
    • paypal spammail
    • PC Speed Maximizer
    • pcspeedplus
    • PDF
    • phishing
    • poker games
    • potentially unwanted program
    • pricegong
    • PUP
    • pushdo
    • Quervar
    • Question and Answer
    • rabobank
    • ransomware
    • rapidshare
    • redkit exploit kit
    • RemovalTool.exe
    • Riot codes scam
    • Riot points scam
    • roguevertising
    • rogueware
    • rootkit
    • sasfis
    • scam
    • scareware
    • security
    • security conference
    • security.nl
    • skype
    • skype worm
    • social engineering
    • spam
    • spear phishing
    • spim
    • survey scam
    • team cymru
    • technoviking
    • tepfer
    • test
    • trojan
    • twitter
    • United Parcel Service
    • UPS
    • UPS spam
    • verizon spam
    • video
    • vmware
    • wellsfargo
    • whitesmoke
    • Windows Antibreaking System
    • windows live
    • WinMHR
    • worm
    • XDocCrypt
    • yontoo
    • youtube
    • youtube comment spam
    • youtube spam
    • youtube top comments
    • zeus

    Blog Archive

    • ▼  2013 (18)
      • ►  September (2)
      • ►  August (2)
      • ►  July (1)
      • ►  June (3)
      • ►  May (2)
      • ►  April (1)
      • ►  March (1)
      • ▼  February (3)
        • FedEx spam loads malware
        • Facebook in a different color? Nah, just a survey ...
        • New exploit kit tricks
      • ►  January (3)
    • ►  2012 (14)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (3)
      • ►  July (1)
      • ►  June (2)
      • ►  April (3)
    • ►  2011 (15)
      • ►  December (1)
      • ►  September (1)
      • ►  June (1)
      • ►  April (3)
      • ►  March (1)
      • ►  February (5)
      • ►  January (3)
    • ►  2010 (14)
      • ►  December (3)
      • ►  November (1)
      • ►  October (6)
      • ►  September (2)
      • ►  August (1)
      • ►  March (1)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile