MalwareCleaning

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, February 26, 2013

FedEx spam loads malware

Posted on 7:43 AM by Unknown

Received an email from (supposedly) FedEx today, seems my parcel was unable to be delivered:

Print your receipt!

















    Mail details:
Subject: Shipping Information‏


Sender: stoiciu_ro01@uhost.ro


X-Originating-IP: 195.78.124.42
Content: 
FedEx
Tracking ID: 1795-21492944
Date: Monday, 18 February 2013, 10:22 AM
Dear Client,
Your parcel has arrived at February 20.Courier was unable to deliver the parcel to you at 20 February 06:33 PM.
To receive your parcel, please, print this receipt and go to the nearest office.
Print Receipt  
Best Regards, The FedEx Team.
FedEx 1995-2013


The 'Print Receipt' button points to a filesharing website, where a ZIP file gets downloaded. Inside the ZIP is an EXE file with a neat little Word icon. When running the file:


Postal Receipt  information













You get a Notepad file with some information. Is your name Mark Smith? No? Then you're infected. Is your name Mark Smith? Then you're infected anyway. 

Does this behaviour look familiar? Well noticed, we've seen this in a post from some months ago:
UPS spam downloads malware



Gathered files. Contact me for a copy.









Some more details about the downloaded file:
Postal-Receipt.exe
MD5: d335b890e1bc260a259b994533333d02
VirusTotal Report
Anubis Report
ThreatExpert Report


The following file was dropped in the %appdata% folder:
ujfhmdlk.exe
MD5: d335b890e1bc260a259b994533333d02
VirusTotal Report
Anubis Report
ThreatExpert Report


The malware tries to connect to the following IPs:

46.105.143.110
50.115.116.201
74.117.61.123
77.79.81.166
81.93.248.152
87.106.51.52
91.121.140.40
91.121.28.146
93.125.30.232
95.140.203.241
109.235.252.2
118.97.15.13
122.155.18.53
149.62.168.76
188.165.205.46
190.111.176.13
190.111.176
202.153.132.24
213.229.106.32
217.11.63.194



It performs the following GET request on port 8080, probably to download more malware.  
(I was however unable to reproduce any additional droppers or system modifications): /509A37A363A4A88C8B6BBD234F063B9CEE4072C470F04B0AB239C05FF89DA4B98D1E54BF77C0CD96CD8BC4004B3459C13194D0F9E0D64CF108A635F7468E817F408A20EF7149233F1356D2B3565F49





Conclusion
  • Don't click on any link(s) of unknown senders. In fact, don't even open mail from unknown senders.
  • Have you indeed ordered something? Check the status of it directly on the supplier's website.
  • Don't be fooled by the Adobe or Word icons, they are actually EXE files. You can enable an option in Windows so you're always sure of the filetype being used:
    Enable Viewing of Filename Extensions for Known File Types
  • Install an antivirus and antimalware product and keep it up-to-date & running. In this case, the payload is at least 4 months old! This should be easily detected by your antivirus product.


    Email ThisBlogThis!Share to XShare to Facebook
    Posted in blog update, FedEx, FedEx spam, lame old malware, malware, spam | No comments
    Newer Post Older Post Home

    0 comments:

    Post a Comment

    Subscribe to: Post Comments (Atom)

    Popular Posts

    • League of Legends RP hack
      I recently blogged about a (still current) scam targeting players of the online game League of Legends: Free Riot codes scam . When re-check...
    • test for the blog
      Just testing ... :-)
    • Gina Lisa Facebook scam
      Yet another Facebook scam, this time luring users with a sextape from Gina Lisa, whom is apparently a German model: Yet another Facebook sca...
    • Increase in malicious spam
      Rodel Mendrez from M86 Security labs has made an excellent post on a Massive Rise in Malicious Spam: http://labs.m86security.com/2011/08/mas...
    • Facebook Support. Personal data has been changed!
      There appears to be a new malicious email being sent out with the subject: " Facebook Support. Personal data has been changed! ID7530...
    • FedEx spam loads malware
      Received an email from (supposedly) FedEx today, seems my parcel was unable to be delivered: Print your receipt!     Mail details: Subject: ...
    • Analysing malicious PDF files
      This is an ongoing blogpost on how to analyse malicious PDF files... More information coming soon... Content coming soon! [...] Source of PD...
    • A word on XDocCrypt/Dorifel/Quervar
      I'm sure everyone has heard by now about the so called XDocCrypt/Dorifel/Quervar malware. It has mostly damaged machines in The Netherla...
    • Malware Puzzle
      A malware (crossword) puzzle you say? Yes! Why not? I've made a puzzle about malware (and security) related keywords. It comes in .PNG f...
    • [SPAM] He found himself leading the process
      Nothing new here, but interesting to note that this type of trick is still going around. I am talking about an email you receive with (appar...

    Categories

    • ACH transfer
    • adobe
    • adobe exploit
    • ADP
    • adware
    • affiliate
    • all your data are belong to us
    • antimalware
    • asprox
    • bancos
    • banking trojan
    • basic malware cleaning
    • battle.net
    • blackhole exploit kit
    • blog update
    • botnet
    • brazilian banking trojan
    • brucon
    • change facebook color
    • conduit
    • cracked hotmail
    • credit card blocked
    • crimeware kit
    • CVE-2006-0003
    • CVE-2010-0840
    • CVE-2012-4681
    • cybercrime
    • d3
    • diablo
    • diablo III
    • diablo phishing
    • DLL injection
    • Dorifel
    • dorkbot
    • encryption
    • end of july
    • exploit
    • exploit kit
    • exprez
    • facebook
    • facebook dislike button
    • facebook event
    • facebook scam
    • Facebook spam
    • facepalm
    • Fake Symantec security check
    • fakeAV
    • fareit
    • FedEx
    • FedEx spam
    • first post
    • flv media player
    • foistware
    • free riot code scam
    • free riot codes
    • free riot points
    • free riot points scam
    • free RP generator
    • fun
    • gina lisa
    • google earth
    • google image poisoning
    • google images
    • hacked hotmail
    • Hacked Hotmail accounts
    • hakin9
    • Hewlett-Packard ScanJet
    • hotfile
    • hotmail
    • illegal games
    • infostealer
    • ING
    • IP and RP Hack Download
    • java
    • java exploit
    • kuluoz
    • lame old malware
    • League of Legends
    • League of Legends MultiHack Generator
    • League of Legends RP generator
    • League of Legends RP hack
    • linkedIN
    • LoL
    • LoL RP Hack
    • low detection
    • malvertising
    • malware
    • malware analysis
    • malware analysis lab
    • malware cleaning
    • malware lab
    • malware puzzle
    • malware tools
    • medfos
    • messenger
    • MSN
    • neosploit exploit kit
    • paypal
    • paypal spammail
    • PC Speed Maximizer
    • pcspeedplus
    • PDF
    • phishing
    • poker games
    • potentially unwanted program
    • pricegong
    • PUP
    • pushdo
    • Quervar
    • Question and Answer
    • rabobank
    • ransomware
    • rapidshare
    • redkit exploit kit
    • RemovalTool.exe
    • Riot codes scam
    • Riot points scam
    • roguevertising
    • rogueware
    • rootkit
    • sasfis
    • scam
    • scareware
    • security
    • security conference
    • security.nl
    • skype
    • skype worm
    • social engineering
    • spam
    • spear phishing
    • spim
    • survey scam
    • team cymru
    • technoviking
    • tepfer
    • test
    • trojan
    • twitter
    • United Parcel Service
    • UPS
    • UPS spam
    • verizon spam
    • video
    • vmware
    • wellsfargo
    • whitesmoke
    • Windows Antibreaking System
    • windows live
    • WinMHR
    • worm
    • XDocCrypt
    • yontoo
    • youtube
    • youtube comment spam
    • youtube spam
    • youtube top comments
    • zeus

    Blog Archive

    • ▼  2013 (18)
      • ►  September (2)
      • ►  August (2)
      • ►  July (1)
      • ►  June (3)
      • ►  May (2)
      • ►  April (1)
      • ►  March (1)
      • ▼  February (3)
        • FedEx spam loads malware
        • Facebook in a different color? Nah, just a survey ...
        • New exploit kit tricks
      • ►  January (3)
    • ►  2012 (14)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (3)
      • ►  July (1)
      • ►  June (2)
      • ►  April (3)
    • ►  2011 (15)
      • ►  December (1)
      • ►  September (1)
      • ►  June (1)
      • ►  April (3)
      • ►  March (1)
      • ►  February (5)
      • ►  January (3)
    • ►  2010 (14)
      • ►  December (3)
      • ►  November (1)
      • ►  October (6)
      • ►  September (2)
      • ►  August (1)
      • ►  March (1)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile