{"id":87408,"date":"2019-01-21T13:07:49","date_gmt":"2019-01-21T07:37:49","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87408"},"modified":"2023-09-25T16:22:56","modified_gmt":"2023-09-25T10:52:56","slug":"malspam-email-jack-malware-master-none","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/malspam-email-jack-malware-master-none\/","title":{"rendered":"Malspam email &#8211; Jack of all malware, master of none."},"content":{"rendered":"<p>Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users.<\/p>\n<p>For attackers to succeed, two things are important \u2013 first is to get through the installed security product\u2019s spam email filters and secondly, the attachment should be opened by the user. To accomplish the second task, attackers use different tactics to make their malicious email look as attractive or legitimate as possible in order to trick users into opening such attachments.<\/p>\n<p>In earlier incidents, such spam campaigns were observed delivering the Monero (XMRig) cryptocurrency miner, Phorpiex spambot <em>and Gandcrab ransomware through <\/em>zipped \u2018.js\u2019 attachments having names which start with \u201cLove_You_\u201d.<\/p>\n<p><strong><u>How these attacks happen<\/u><\/strong><\/p>\n<p>Let us have a look at the below attack chain which depicts the execution sequence observed in this attack.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87409\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/1.jpg\" alt=\"\" width=\"740\" height=\"269\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1.jpg 740w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1-300x109.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1-650x236.jpg 650w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig: 1<\/strong> Attack chain<\/p>\n<p>The targeted victim will receive an email with subject name such as \u201cJust for You\u201d or \u201cLove You\u201d. Email contains attachments having names that start with \u201cLove_You_\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87410\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/2.jpg\" alt=\"\" width=\"543\" height=\"371\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/2.jpg 543w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/2-300x205.jpg 300w\" sizes=\"(max-width: 543px) 100vw, 543px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 2:<\/strong> Email with zip attachment.<\/p>\n<p>In the above screenshot, the attached\u00a0<strong>zip file<\/strong>\u00a0contains js file having the same name as the zip file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87411\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/3.png\" alt=\"\" width=\"818\" height=\"443\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3.png 818w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-300x162.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-768x416.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-650x352.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-789x427.png 789w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 3:<\/strong>\u00a0 JavaScript File<\/p>\n<p>As shown in fig. 3 The highlighted command which downloads the initial exe file with random_number as the name of the file through a bitsadmin command from the malicious link \u201chxxp:\/\/slpsrgpsrhojifdij.ru\u201d and drops the downloaded file at %temp%.<\/p>\n<p>This random_number.exe drops a copy of itself at \u201cC:\\Windows\u201d with name \u201cwinsvcs.exe\u201d which further acts as a malware downloader and downloads the exe files at %temp% as shown in the highlight below in the Wireshark traffic snippet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87412\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/4.png\" alt=\"\" width=\"1152\" height=\"824\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4.png 1152w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-300x215.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-768x549.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-545x390.png 545w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-789x564.png 789w\" sizes=\"(max-width: 1152px) 100vw, 1152px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 4:<\/strong>\u00a0 Malware downloader downloads exe files.<\/p>\n<p>Dropped Random_number.exe file performs Monero (XMRig) cryptocurrency miner activity. Below fig. shows traffic for Monero (XMRig) cryptocurrency miner.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87413\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/5.png\" alt=\"\" width=\"1105\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5.png 1105w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-300x66.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-768x168.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-650x142.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-789x173.png 789w\" sizes=\"(max-width: 1105px) 100vw, 1105px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 5<\/strong>: Traffic for Monero (XMRig) cryptocurrency miner<\/p>\n<p>Again it drops random_number.exe file at %temp% which is responsible for Phorpiex spambot malware. This Random_number.exe drops \u201cwincfg32svc.exe\u201d at \u201cC:\\Windows\u201d location. \u201cwincfg32svc.exe\u201d file tries to send spam emails from the infected host as shown in the below procmon snapshot.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87414\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/6.jpg\" alt=\"\" width=\"671\" height=\"124\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/6.jpg 671w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/6-300x55.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/6-650x120.jpg 650w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 6:<\/strong> Phorpiex spambot send spam mail from infected host.<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/google-play-store-applications-laced-with-joker-malware-yet-again\/\">Malware<\/a> downloader then drops another random_number.exe which is a payload for Gandcrab V5.0.4 at %temp% which starts encryption activity on the victim\u2019s computer with AES encryption, and appends \u2018. random letters\u2019 extension to encrypted files.<\/p>\n<p>We found that it encrypts only NON-PE files from the victim\u2019s machine. It drops the below ransom note:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87415\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/7.png\" alt=\"\" width=\"1152\" height=\"824\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7.png 1152w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-300x215.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-768x549.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-545x390.png 545w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-789x564.png 789w\" sizes=\"(max-width: 1152px) 100vw, 1152px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 7:<\/strong>\u00a0 Ransom note<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87416\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/8.png\" alt=\"\" width=\"690\" height=\"338\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/8.png 690w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/8-300x147.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/8-650x318.png 650w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 8: <\/strong>\u00a0Encrypted file pattern<\/p>\n<p><strong>Quick Heal proactively protects its users from this threat:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87417\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/9.jpg\" alt=\"\" width=\"371\" height=\"202\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9.jpg 371w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-300x163.jpg 300w\" sizes=\"(max-width: 371px) 100vw, 371px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 9: Email protection.<\/strong><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-87418\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/10.jpg\" alt=\"\" width=\"379\" height=\"208\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig 10:<\/strong>\u00a0 Behavior Detection<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-87419\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/11.jpg\" alt=\"\" width=\"388\" height=\"223\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/11.jpg 460w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/11-300x172.jpg 300w\" sizes=\"(max-width: 388px) 100vw, 388px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Fig.11:<\/strong> Anti Ransomware<\/p>\n<p><strong>How to stay safe from ransomware attacks<\/strong><\/p>\n<ul>\n<li>Always take a backup of your important data in external drives like HDD and pen drives. Consider using a reliable Cloud service to store the data.<\/li>\n<li>Do not install any freeware or cracked versions of any software.<\/li>\n<li>Do not open any advertisement shown on websites without knowing that they are genuine.<\/li>\n<li>Disable macros while using MS Office.<\/li>\n<li>Update your antivirus to protect your system from unknown threats.<\/li>\n<li>Do not click on links or download attachments in emails from unexpected, unknown or unwanted sources.<\/li>\n<\/ul>\n<p><strong>Indicators of compromise: (SHA256)<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>Js files:<\/strong><\/p>\n<ul>\n<li>3dd7d393c47e25f9c6136cf03d26af84aea4c918ed8e5ccb41f109004332c0c7<\/li>\n<li>6d44af5f399d4630fae19014728af2f9225d3a5a5e40bbff5166f09e3cf49068<\/li>\n<\/ul>\n<p><strong>Malware Downloader:<\/strong><\/p>\n<ul>\n<li>4c0103c745fa6e173821035c304863d751bea9c073d19070d9ebf8685da95040<\/li>\n<\/ul>\n<p><strong>Monero (XMRig) cryptocurrency miner:<\/strong><\/p>\n<ul>\n<li>b8bf5b607b305139db81c48e96010a67768488b01edc8c615306ed303c545b0d<\/li>\n<\/ul>\n<p><strong>Phorpiex spambot:<\/strong><\/p>\n<ul>\n<li>4b9d5841d38b8658466dcaf409c34c0f6d2d1f9ecb64254391a4621465daf79b<\/li>\n<\/ul>\n<p><strong>Gandcrab Ransomware:<\/strong><\/p>\n<ul>\n<li>035ae8f389e0a4cb58428d892123bc3e3b646e4387c641e664c5552228087285<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Subject Matter Experts:<br \/>\n<\/strong>Priyanka Dhasade, Manish Patil | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are important \u2013 first is to [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":87420,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,133,24,303,5],"tags":[22,23,49,50],"class_list":["post-87408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-hacker","category-malware","category-phishing","category-security","tag-email-malware","tag-fraudulent-email","tag-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87408"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87408"}],"version-history":[{"count":3,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87408\/revisions"}],"predecessor-version":[{"id":92090,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87408\/revisions\/92090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87420"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}