{"id":84645,"date":"2017-08-03T18:26:59","date_gmt":"2017-08-03T12:56:59","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84645"},"modified":"2017-08-03T18:33:39","modified_gmt":"2017-08-03T13:03:39","slug":"analysis-blank-slate-malspam-campaign-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/analysis-blank-slate-malspam-campaign-quick-heal-security-labs\/","title":{"rendered":"An analysis of the Blank Slate Malspam Campaign by Quick Heal Security Labs"},"content":{"rendered":"<p>Malspam email or malicious spam email is considered as one of the favorite malware delivery channels for attackers to deliver their malware to their targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users.<\/p>\n<p>For attackers to succeed, two things are important &#8211; first is to get through the installed security product&#8217;s spam email filters and the secondly, the attachment should be opened by the user. To accomplish the second task, attackers use different social engineering tactics to make their malicious email look as legitimate as possible in order to trick users into opening such attachments.<\/p>\n<p><strong>About the Blank Slant Malspam Campaign<\/strong><\/p>\n<p>Since March 2017 we have been observing this campaign where the attacker has used emails leaving the body blank and subject line blank or unclear; hence the name \u2018Blank Slate\u2019. We found the sender\u2019s email ID to be spoofed. Users are receiving emails with attachments only. Due to the absence of these fields, other than looking for an attachment, there is no way for the user to understand what the email is about. This tricks the user into opening the malicious attachments out of curiosity and this triggers an infection. A typical malspam used in the Blank Slate Campaign looks like the below figure.<\/p>\n<figure id=\"attachment_84646\" aria-describedby=\"caption-attachment-84646\" style=\"width: 814px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84646\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1.jpg\" alt=\"Fig 1. Blank Slate Campaign Email\" width=\"814\" height=\"463\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1.jpg 814w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1-300x171.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1-768x437.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1-650x370.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign1-789x449.jpg 789w\" sizes=\"(max-width: 814px) 100vw, 814px\" \/><figcaption id=\"caption-attachment-84646\" class=\"wp-caption-text\">Fig 1. Blank Slate Campaign Email<\/figcaption><\/figure>\n<p><strong>Infection Routine<\/strong><\/p>\n<p>Attachments of these email campaigns contain a nested zip file &#8211; a zip file inside a zip file. Inside the second zip file, the actual malware downloader is placed. For now, we have observed that either a JavaScript (.js) file or Microsoft Word Document (.doc) file is delivered via this malspam. The Blank Slate Campaign follows the below infection routine.<\/p>\n<figure id=\"attachment_84647\" aria-describedby=\"caption-attachment-84647\" style=\"width: 314px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84647\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign2.jpg\" alt=\"Fig 2. Blank Slate Infection Routine\" width=\"314\" height=\"557\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign2.jpg 314w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign2-169x300.jpg 169w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign2-220x390.jpg 220w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><figcaption id=\"caption-attachment-84647\" class=\"wp-caption-text\">Fig 2. Blank Slate Infection Routine<\/figcaption><\/figure>\n<p>The final infection in both the cases (JavaScript or Word) was observed to be a variant of a ransomware. In some instances, doc files also were observed to be trying to exploit CVE-2017-0199 on MS-Office vulnerable systems.<\/p>\n<p><strong>Blank Slate Delivering Ransomware Variants<\/strong><\/p>\n<p><strong>Cerber Ransomware<\/strong><\/p>\n<p>The Blank Slate Campaign was first observed in March 2017 and was used further to spread Cerber Ransomware for a long period of time. The spam email used in this particular campaign is the one shown in fig 1. The zip attachment in the spam email contained another zip file with the name &#8220;45214_ZIP.zip&#8217;. This file contained an actual malware downloader with the name 44582.js. When the user clicks on this .js file, it automatically downloads and executes the Cerber Ransomware. This ransomware was getting downloaded from a domain whose name ends with \u201c.top\u201d. Cerber has been one of the most dominating ransomware families for the last 2 years. After successful encryption, this variant appends the .aeac extension to the encrypted files<strong><em>.<\/em><\/strong><\/p>\n<figure id=\"attachment_84648\" aria-describedby=\"caption-attachment-84648\" style=\"width: 1145px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84648 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3.jpg\" alt=\"blank_slate_campaign3\" width=\"1145\" height=\"671\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3.jpg 1145w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3-300x176.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3-768x450.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3-650x381.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign3-789x462.jpg 789w\" sizes=\"(max-width: 1145px) 100vw, 1145px\" \/><figcaption id=\"caption-attachment-84648\" class=\"wp-caption-text\">Fig 3. Cerber-infected system with a ransom note and encrypted files<\/figcaption><\/figure>\n<p>Some other instances of spam emails were also observed where doc files were getting delivered. These files were trying to exploit CVE-2017-0199 that downloads and executes malware on the victim&#8217;s computer.<\/p>\n<p><strong>Aleta \u2013 a variant of BTCWare Ransomware<\/strong><\/p>\n<p>In the last week of July 2017, the Aleta variant of BTCWare ransomware was getting delivered via the Blank Slate Campaign. Once inside a computer, it encrypts its data and appends \u201c.aleta\u201d to the encrypted files. We also observed that the Aleta variant using RDP (Remote Desktop Protocol) brute-forcing attack to infect the victim. In both the cases, its encryption activity remains the same irrespective of the change in its infection vector.<\/p>\n<p><strong>Globeimposter Ransomware also used Blank Slate<\/strong><\/p>\n<p>Globeimposter Ransomware has been active in the wild since last month. It appends different extensions like .HappyDayzz, .707, .700, .GOTHAM, and .crypt to the encrypted files. This ransomware is delivered to the users via malicious spam emails.<\/p>\n<p>In the case of the &#8220;.crypt&#8221; variant, it has been observed that the ransomware is delivered using the Blank Slate Campaign via .js files contained in nested zip files. Once encryption is complete, it drops the below ransom note file with the name &#8220;!back_files!.html&#8221;, containing instructions on how to pay the ransom to get the decryption keys.<\/p>\n<figure id=\"attachment_84649\" aria-describedby=\"caption-attachment-84649\" style=\"width: 1141px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84649\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4.jpg\" alt=\"Fig 4. Globeimposter ransom note\" width=\"1141\" height=\"665\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4.jpg 1141w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4-300x175.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4-768x448.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4-650x379.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign4-789x460.jpg 789w\" sizes=\"(max-width: 1141px) 100vw, 1141px\" \/><figcaption id=\"caption-attachment-84649\" class=\"wp-caption-text\">Fig 4. Globeimposter ransom note<\/figcaption><\/figure>\n<p><strong>Quick Heal Detection<br \/>\n<\/strong>Quick Heal Email Protection successfully detects and blocks the Blank Slate campaign at its initial level.<\/p>\n<figure id=\"attachment_84650\" aria-describedby=\"caption-attachment-84650\" style=\"width: 297px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84650\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/08\/Blank_Slate_Campaign5.jpg\" alt=\"Fig 5\" width=\"297\" height=\"183\" \/><figcaption id=\"caption-attachment-84650\" class=\"wp-caption-text\">Fig 5<\/figcaption><\/figure>\n<p><strong>Stay away from ransomware with these security tips<\/strong><\/p>\n<ul>\n<li>Do not download attachments that arrive in emails from unwanted or unexpected sources. Even if such emails seem to be from a known source, it is better to call up the sender and verify them first.<\/li>\n<li>If you get an email that seems unclear or strange, do not let your curiosity get the better of you. Do not respond to the email.<\/li>\n<li>Back up your files on a regular basis. Remember to disconnect the Internet while you are backing up on an external hard drive. Unplug the drive before you go online again. Several free and paid Cloud backup services available on the market that can take data backup periodically.<\/li>\n<li>Provide read\/write privileges to network shares only when required. Try not to keep open shares as they are likely to fall prey to encryption if there is a ransomware infection.<\/li>\n<li>Use an <a href=\"https:\/\/bit.ly\/2ncPU26\">antivirus software<\/a> that gives multilayered protection against infected emails, malicious websites, and stop infections that can spread through USB drives. Keep the software up-to-date.<\/li>\n<li>Apply recommended security updates for your computer\u2019s Operating System and all other programs such as Adobe, Java, Internet browsers, etc.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Acknowledgment<\/strong><\/p>\n<ul>\n<li>Subject Matter Expert<br \/>\nPrashil Moon |\u00a0 Quick Heal Security Labs<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malspam email or malicious spam email is considered as one of the favorite malware delivery channels for attackers to deliver their malware to their targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are important &#8211; first is to get [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84651,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[910,5],"tags":[1483],"class_list":["post-84645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-security","tag-blank-slate-malspam-campaign"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84645"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84645"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84645\/revisions"}],"predecessor-version":[{"id":84656,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84645\/revisions\/84656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84651"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}