{"id":79022,"date":"2014-08-22T17:46:31","date_gmt":"2014-08-22T12:16:31","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=79022"},"modified":"2014-08-22T17:46:31","modified_gmt":"2014-08-22T12:16:31","slug":"banking-spam-emails-lead-to-cryptolocker","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/banking-spam-emails-lead-to-cryptolocker\/","title":{"rendered":"Banking Spam Emails Lead to Cryptolocker"},"content":{"rendered":"<p>Quick Heal Lab has analyzed a malicious email campaign via which attackers intend to install the malicious ransomware called CryptoLocker in the infected machines.<\/p>\n<p>Malware authors are still relying on email to spread malware using social engineering techniques. Such emails are sent with malicious attachments as zip, executable or with double extension. Over the last few weeks we have observed an increase in malicious emails that carry PDF or DOC attachments. PDF attachments contribute to 2% and DOC attachments contribute to 1% of the analyzed malicious emails.<\/p>\n<p>We have analyzed spam emails that seem like they have been sent from banks. In the below chart, it can be noticed that 24% of such fake emails seem to have arrived from HSBC &amp; 23% from Barclays.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79031 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection1.png\" width=\"655\" height=\"448\" \/><\/a><\/p>\n<p>These emails usually arrive with the following subject lines:<\/p>\n<p>&#8211; <span style=\"font-size: 12px; color: #006bb2; font-family: verdana; font-weight: bold;\">Wire Transfer Confirmation<\/span><br \/>\n&#8211; <span style=\"font-size: 12px; color: #006bb2; font-family: verdana; font-weight: bold;\">Barclays Transaction notification<\/span><br \/>\n&#8211; <span style=\"font-size: 12px; color: #006bb2; font-family: verdana; font-weight: bold;\">Attached is your Approved Payment from RBI<\/span><\/p>\n<p>The attachments that are sent with these emails contain malicious codes that exploit the Adobe Reader vulnerability <strong>CVE-2013-2729<\/strong> [Adobe Reader BMP\/RLE heap corruption vulnerability].<\/p>\n<p>Below are some examples of such emails received by targeted victims:<\/p>\n<p><strong>Sample Image 1<\/strong><\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79024 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection 1\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-1.jpg\" width=\"629\" height=\"535\" \/><\/a><\/p>\n<p><b>Sample Image 2<\/b><\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79025 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection2\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection2.png\" width=\"623\" height=\"336\" \/><\/a><\/p>\n<p>In sample image 1, the PDF attachment \u201cHSBC_Payment_9854711.pdf\u201d contains a shellcode [<i>a small piece of code used as the payload in the exploitation of a software vulnerability<\/i>] that downloads an executable file from a compromised website.<\/p>\n<p>Here, the attackers have used the PoC written by Felipe Manzano and added more ROP offsets to cover as many as 23 different Adobe Reader versions starting from 9.3.0.3 to 11.0.0.1.<\/p>\n<p>The below image shows ROP offsets coded for specific versions of Adobe Reader.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79026 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection 3\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-3.jpg\" width=\"627\" height=\"322\" \/><\/a><\/p>\n<p>Usually object-1 (the first stream) is encoded twice with\/FlateDecode format as (\/Fl \/Fl).<\/p>\n<p>This object-1 stream is 14 KB in size, which is normal. But after decoding it two times using the FlateDecode method, it occupies more than 86 MB of space.<\/p>\n<p>The decoded code contains Base64 encoded image and Javascript code within an XFA form.<\/p>\n<p>The encoded image is 84 MB in size; it is a BMP file with a repeating pattern \u201c\/AAAC\/wAAAv8AAAL\u201d.<\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79027 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection 4\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-4.jpg\" width=\"515\" height=\"183\" \/><\/a><\/p>\n<p>The AcroForm.api plugin handles the embedded BMP RLE8 encoded image. While parsing this image, Adobe Reader fails to validate the input and triggers a heap overflow, and this results into an arbitrary code execution. In this case, a payload is executed which in turn downloads malicious files from a compromised site.<\/p>\n<p>This PDF also creates four more files which helps the payload to use its data.<\/p>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-79028 aligncenter\" alt=\"Banking Spams Lead to Cryptolocker Infection 5\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/08\/Banking-Spams-Lead-to-Cryptolocker-Infection-5.jpg\" width=\"513\" height=\"288\" \/><\/a><\/p>\n<p>Thereafter, it injects its code into MSIEXEC.EXE and then attempts to write into the memory space of all running processes.<\/p>\n<p>After the execution of the first downloaded binary it downloads variant of ZeuS or Upatre malware which in turn downloads the infamous ransomware CryptoLocker.<\/p>\n<p>Read about the <a href=\"https:\/\/blogs.quickheal.com\/alert-ransomware-are-on-the-loose-know-what-precautions-you-should-take-to-prevent-data-loss\/\" target=\"_blank\">CryptoLocker Ransomware.<\/a><\/p>\n<p>Quick Heal Antivirus generically detects such exploit PDF files as \u201cExploit\/Pdfjsc.AMJ\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Lab has analyzed a malicious email campaign via which attackers intend to install the malicious ransomware called CryptoLocker in the infected machines. Malware authors are still relying on email to spread malware using social engineering techniques. Such emails are sent with malicious attachments as zip, executable or with double extension. Over the last [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":78590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-79022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79022"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=79022"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79022\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=79022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=79022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=79022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}