{"id":88898,"date":"2020-04-09T19:16:31","date_gmt":"2020-04-09T13:46:31","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=88898"},"modified":"2020-04-09T19:16:31","modified_gmt":"2020-04-09T13:46:31","slug":"dharma-targeting-covid-19","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/dharma-targeting-covid-19\/","title":{"rendered":"Dharma Ransomware Variant Malspam Targeting COVID-19"},"content":{"rendered":"<p>Since the outbreak of the Novel Coronavirus pandemic, many malware have been seen trying to lure people to open malicious emails, malicious domains and run other malware, etc. Some of these malicious domains are fully functional and provide real-time mapping of COVID-19 stats across the globe. However, they deliver malware on the system of victims visiting the site who are unaware of any suspicious events. They can steal personal and financial information stored on the browser by executing malicious Javascript on the visit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88912\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/1_map-2.png\" alt=\"Malicious domain with a fully functional map\" width=\"700\" height=\"360\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/1_map-2.png 1268w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/1_map-2-300x154.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/1_map-2-768x396.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/1_map-2-650x335.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/1_map-2-789x406.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Malicious domain with a fully functional map<\/p>\n<p>Few other malware are using spear-phishing emails impersonating WHO or other authentic organizations, providing safety measures about COVID-19 pandemic along with a means of malicious code execution.<\/p>\n<p>One such spear-phishing campaign is being used by the Dharma ransomware variant (Crysis). First noted in 2016, Dharma ransomware has been around for almost five years now and keeps popping out with a new variant, periodically. The threat actors want to leverage every scenario to escape detection and deliver the payload.<\/p>\n<p>The main payload is attached as \u20181covid.exe\u2019 \u2014 on the execution of the \u20181covid.exe\u2019, it begins to encrypt the files and the following ransom note is displayed on the screen. The extension of files after encryption is .ncov supposedly named after the Novel Coronavirus.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88920\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/2_note.png\" alt=\"Ransom Note Used by Dharma Variant\" width=\"700\" height=\"360\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/2_note.png 1752w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/2_note-300x154.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/2_note-768x395.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/2_note-650x334.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/2_note-789x405.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Ransom Note<\/p>\n<p>The ransom note is dropped in various formats. After encrypting the files, a ransom note asks the user to write an email to &#8220;<u>coronavirus@qq.com&#8221;<\/u>\u00a0to restore their files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88922\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/3_txt_note.png\" alt=\"txt version of ransom note\" width=\"700\" height=\"165\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/3_txt_note.png 518w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/3_txt_note-300x71.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: A text version of the ransom note<\/p>\n<p>Sample MD5: <strong><b>62D3E2CA818E515EDBB44CAD8355C91D<\/b><\/strong><\/p>\n<p><strong><b>Technical Analysis:<\/b><\/strong><\/p>\n<p>The Ransomware does not employ any UAC bypass and presents with the prompt to execute. The malware is not packed but it has encrypted API and library names. It decrypts the API and library names using the rc4 algorithm and after that, it loads libraries and resolves all APIs using Loadlibrary and Getprocaddress functions respectively.<\/p>\n<p><strong><b><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88924\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/4_decryption.png\" alt=\"rc4 decryption function\" width=\"700\" height=\"459\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/4_decryption.png 736w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/4_decryption-300x197.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/4_decryption-594x390.png 594w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/b><\/strong><\/p>\n<p style=\"text-align: center\">Fig: Decrypting names using rc4<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88925\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/5_resolve.png\" alt=\"Functions used to resolve the api's\" width=\"700\" height=\"506\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/5_resolve.png 1116w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/5_resolve-300x217.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/5_resolve-768x555.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/5_resolve-540x390.png 540w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/5_resolve-789x570.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p align=\"CENTER\"><span style=\"font-size: medium\">Fig: Function used to resolve the APIs<\/span><\/p>\n<p>After that, it creates the mutex name and checks if it is already present \u2014 if present it terminates itself. The mutex name is a combination of string \u2018Global\\\\syncronize_\u2019 and \u201c5GW7SU(U\/A)\u201d where the latter is a unique hard-coded sample id.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88926\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/6_mutex.png\" alt=\"Mutex Name\" width=\"400\" height=\"40\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/6_mutex.png 364w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/6_mutex-300x30.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p align=\"CENTER\"><span style=\"font-size: medium\">Fig: Mutex name<\/span><\/p>\n<p>The ransomware manages a list of recognized valuable extensions to it as below<\/p>\n<ol>\n<li>Doc<\/li>\n<\/ol>\n<p>(.doc;.docx;.pdf;.xls;.xlsx;.ppt;)<\/p>\n<ol start=\"2\">\n<li>Arc<\/li>\n<\/ol>\n<p>(.zip;.rar;.bz2;.7z;)<\/p>\n<ol start=\"3\">\n<li>Dbf<\/li>\n<\/ol>\n<p>(.dbf;)<\/p>\n<p>1c8(.1cd;)<\/p>\n<ol start=\"5\">\n<li>Jpg<\/li>\n<\/ol>\n<p>(.jpg;)<\/p>\n<p>&nbsp;<\/p>\n<p>It carries a list of processes to kill so that there is blocking of files related to them during encryption.<\/p>\n<p><u>\u201c1c8.exe, 1cv77.exe, outlook.exe, postgres.exe, mysqld-nt.exe, mysqld.exe, sqlservr.exe;\u201d<\/u><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88935\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/7_kill_process.png\" alt=\"Function to kill predetermined list of processes\" width=\"700\" height=\"597\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/7_kill_process.png 1096w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/7_kill_process-300x256.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/7_kill_process-768x655.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/7_kill_process-457x390.png 457w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/7_kill_process-789x673.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Function to kill predetermined list of processes<\/p>\n<p>Following list of services are killed if found: \u201cFirebirdGuardianDefaultInstance, FirebirdServerDefaultInstance, sqlwriter, mssqlserver and sqlserveradhelper\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88927\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/8_kill_service.png\" alt=\"Function to kill the services\" width=\"700\" height=\"595\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/8_kill_service.png 1085w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/8_kill_service-300x255.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/8_kill_service-768x653.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/8_kill_service-458x390.png 458w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/8_kill_service-789x671.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Function to kill the services<\/p>\n<p>Further, it uses multiple ways to instantiate persistence.<\/p>\n<p><strong><b>Persistence Techniques:<\/b><\/strong><\/p>\n<ol>\n<li>Drop a self-copy to %windir%system32<\/li>\n<li>Set HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run with above entry %windir%system32<\/li>\n<li>Read registry entry \u2018startup\u2019 in &#8220;Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Explorer\\\\User Shell Folders&#8221; and drop a self-copy in retrieved path i.e. in &#8220;%USERPROFILE%\\\\AppData\\\\Roaming\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\\u201d<\/li>\n<li>Read registry entry \u2018common startup\u2019 in \u201cSoftware\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Explorer\\\\User Shell Folders\u201d and drop a self-copy in retrieved path I.e in &#8220;%ProgramData%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup&#8221;<\/li>\n<\/ol>\n<p>The main process creates cmd.exe and pipes the command to delete the shadow copy using the vssadmin tool.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88928\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/9_shadow_copy.png\" alt=\"Deleting Shadow Copy\" width=\"700\" height=\"61\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/9_shadow_copy.png 564w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/9_shadow_copy-300x26.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Deleting shadow copy<\/p>\n<p>The process flow of the executable is shown in the below figure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88929\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/10_process_flow.png\" alt=\"Process flow of malware\" width=\"800\" height=\"124\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/10_process_flow.png 1442w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/10_process_flow-300x47.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/10_process_flow-768x119.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/10_process_flow-650x101.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/10_process_flow-789x123.png 789w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Process flow of sample<\/p>\n<p><strong><b>Encryption Technique:<\/b><\/strong><strong><b>\u00a0<\/b><\/strong><\/p>\n<p>The ransomware uses AES-256 (128-bit block + 256-bit key) in CBC mode along with the RSA algorithm. The below image shows the function used for encrypting the given data with AES in CBC Mode.<strong><b>\u00a0<\/b><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88930\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/11_aes_cbc.png\" alt=\"Algorithm AES in cbc mode\" width=\"700\" height=\"527\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/11_aes_cbc.png 1202w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/11_aes_cbc-300x226.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/11_aes_cbc-768x578.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/11_aes_cbc-518x390.png 518w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/11_aes_cbc-789x594.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: AES algorithm in cbc mode<\/p>\n<p>The 32-bit AES key is generated by a function gen_key_random. The RSA public key is decrypted from the sample and imported via RSA_pub_key_new function which is further used for encrypting the previously generated 32-bit AES key. The same gen_key_random function is used for generating the 16-bit Initialization Vector for AES CBC mode.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88931\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/12_gen_random.png\" alt=\"random key generation\" width=\"700\" height=\"135\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/12_gen_random.png 854w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/12_gen_random-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/12_gen_random-768x148.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/12_gen_random-650x126.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/12_gen_random-789x152.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: random key generation<\/p>\n<p>The implementation of AES and RSA algorithms are done using a static library which can found at\u00a0<a href=\"https:\/\/github.com\/joyent\/syslinux\/blob\/master\/gpxe\/src\/crypto\/axtls\/aes.c\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/joyent\/syslinux\/blob\/master\/gpxe\/src\/crypto\/axtls\/aes.c<\/a>\u00a0 and <a href=\"https:\/\/github.com\/joyent\/syslinux\/blob\/master\/gpxe\/src\/crypto\/axtls\/rsa.c\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/joyent\/syslinux\/blob\/master\/gpxe\/src\/crypto\/axtls\/rsa.c<\/a> respectively.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88923\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/13_rsa_encryption.png\" alt=\"\" width=\"700\" height=\"374\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/13_rsa_encryption.png 1175w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/13_rsa_encryption-300x160.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/13_rsa_encryption-768x410.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/13_rsa_encryption-650x347.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/13_rsa_encryption-789x422.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Function responsible for rsa encryption<\/p>\n<p>The ransomware also encrypts the drives and network shares. There is a separate thread for encrypting the Network shares using the WNetOpenEnumW API family.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88932\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/14_wnet_enum.png\" alt=\"Enumerating Network shares\" width=\"700\" height=\"171\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/14_wnet_enum.png 848w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/14_wnet_enum-300x73.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/14_wnet_enum-768x187.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/14_wnet_enum-650x159.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/14_wnet_enum-789x193.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Enumerating Network shares<\/p>\n<p>The mitre attack vector mapping of this ransomware is as follows.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88933\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/15_mitre.png\" alt=\"Mitre techniques touched by this malware\" width=\"700\" height=\"328\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/15_mitre.png 1719w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/15_mitre-300x141.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/15_mitre-768x360.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/15_mitre-650x305.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/15_mitre-789x370.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: Mitre techniques touched by this malware<\/p>\n<p>Quick Heal detects this malware as <strong><b>Ransom.Crysis.A3. <\/b><\/strong>Apart from real-time protection, this malware is also detected by Quick Heal ARW (Anti Ransomware Protection) and BDS (Behaviour Detection System).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-88934\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/04\/16_qh_detection.png\" alt=\"ARW and BDS detection of 1covid.exe\" width=\"700\" height=\"219\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/16_qh_detection.png 856w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/16_qh_detection-300x94.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/16_qh_detection-768x240.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/16_qh_detection-650x204.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/04\/16_qh_detection-789x247.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center\">Fig: ARW and BDS detection of 1covid.exe<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>Coronavirus pandemic has become a target for threat vectors using it as an Initial Vector for all sorts of malicious activities. Quick Heal detects many malicious domains and spear-phishing emails and saves the user from falling into those traps. However, to be on the safer side, below are the steps that can be taken to minimize the risk.<\/p>\n<ol>\n<li>Turn on email protection on your anti-virus software.<\/li>\n<li>Do not open any link or attachment in an email if you doubt the authenticity of the email.<\/li>\n<li>Do not download and open any attachments from an unknown source.<\/li>\n<\/ol>\n<p><strong>IOC:<\/strong><\/p>\n<p>Malicious domains pertaining to the Coronavirus.<\/p>\n<table style=\"height: 2767px\" width=\"751\">\n<tbody>\n<tr>\n<td width=\"335\"><strong>Suspicious URLs and Domains<\/strong><\/td>\n<td width=\"132\"><strong>Category<\/strong><\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/mohanlakshmipathy[.]com\/COVID-19.doc<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/64.227.17[.]38\/bins\/covid.x86<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/crack.relaxationcards[.]com\/health\/application\/COVID\/2019\/Covid_19_test_form.doc<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/tusa.mindbodyspiritsydney[.]com\/application\/health\/test\/Covid2019\/2019_nCoV_Application_Test.doc<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/tks.enzacurrenti[.]com\/application\/health\/test\/Covid2019\/Test_COVID_2019.doc<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/185.242.104[.]197\/wzjd\/Covid19-UPDATE_PDF.exe<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/corona-virus-map[.]net\/data\/mapdata.jar<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/corona-map-data[.]com\/bin\/regsrtjser346.exe<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/192.3.193[.]251\/Corona.ppc<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/91.234.99[.]234\/Corona.mips<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/phamchilong[.]com\/22\/CORONA<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/45.32.78[.]111\/Corn\/Calin\/Corona.exe<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/recoverrryasitalycovid-19[.]xyz\/over<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/toyswithpizzazz[.]com.au\/service\/coronavirus<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/coronasafetymask[.]tk<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/coronavirusapp[.]site\/mobile.html<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/corona-masr2[.]com\/chase-support.wepay.com\/ChaseClean\/Chase%20Clean\/login\/<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/corona-masr2[.]com\/chase-support.wepay.com\/ChaseClean\/Chase%20Clean\/login\/auth.php<\/td>\n<td>Phishing &amp; Fraud<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/dtipgifts[.]com\/E-Transfer\/COVID-19\/files6546541204\/down45640\/banks\/directing\/atbonline\/question.php<\/td>\n<td>Phishing &amp; Fraud<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/uk-covid-19-relieve[.]com<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/covid-19[.]bdtime.news\/directing\/www1.royalbank.com\/cgi-bin\/rbaccess\/rbunxcgi\/ClientSignin.htm<\/td>\n<td>Phishing &amp; Fraud<\/td>\n<\/tr>\n<tr>\n<td>hxxp:\/\/covid-19[.]bdtime.news<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/raymondne[.]buzz\/COVID-19PRECAUTIONS\/<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/footytube[.]top\/admin\/covid-19\/office365\/office365\/office365\/office365\/office365\/office365\/office365<\/td>\n<td>Phishing &amp; Fraud<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/covid-19-business-continuity-epic-uk-limited.azurewebsites[.]net\/Corona_Virus_2020\/passw.php?client_id_redirect_uri=_authenticate_\/common\/oauth2\/authorize_token=9d84bdf0dfc3d870ee7e328eff7d2e597c924200<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/kampcbation[.]info\/COVID-19\/<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>hxxps:\/\/www.brightparcel[.]com\/corona\/owa.php<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusstatus[.]space\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirus[.]zone\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirus-realtime[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirus[.]app\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cCoronavirusaware[.]xyz\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgoiglecoronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronavvirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronavirua[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronavirs[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronavius[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronaviru[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgooglecoronacirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cgoolgecoronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronaviruspatientobservation[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusremotepatientobservation[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirus-com[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronaviruscovid19-information[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-map-data[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusgovernmentrelief[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusfired[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccheapcorona[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-defence[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirushomeinternet[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cchildcarecorona[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona5[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusfactsandfears[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cthankscoronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusapp[.]site\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201calphacoronavirusvaccine[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201canticoronaproducts[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbeatingcorona[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbeatingcoronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbestcorona[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbetacoronavirusvaccine[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbuycoronavirusfacemasks[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cbyebyecoronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccdc-coronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccombatcorona[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccontra-coronavirus[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-armored[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-crisis[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-emergency[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-explained[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-iran[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-ratgeber[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronadatabase[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronadeathpool[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronadetect[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronadetection[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccoronavirusmedicalkit[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccorona-masr2[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201cuk-covid-19-relieve[.]com\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccovid-19.bdtime[.]news\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<tr>\n<td>\u201ccovid-19-business-continuity-epic-uk-limited[.]azurewebsites.net\u201d<\/td>\n<td>Malware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><br \/>\nSubject Matter Expert<\/strong><\/p>\n<p>Rahul Sharma, Akshay Gaikwad | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the outbreak of the Novel Coronavirus pandemic, many malware have been seen trying to lure people to open malicious emails, malicious domains and run other malware, etc. Some of these malicious domains are fully functional and provide real-time mapping of COVID-19 stats across the globe. However, they deliver malware on the system of victims [&hellip;]<\/p>\n","protected":false},"author":77,"featured_media":88911,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1725,910],"tags":[1721,1727,534,1728,50],"class_list":["post-88898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coronavirus","category-ransomware","tag-coronavirus","tag-covid-19","tag-cybersecurity","tag-pandemic","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88898"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88898"}],"version-history":[{"count":35,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88898\/revisions"}],"predecessor-version":[{"id":88963,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88898\/revisions\/88963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88911"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}