Paul Scott

Paul Scott
on January 16, 2019

Threat Report Wednesday January 16th 2019

Threat Report

A lot has happened over the last week, so we have a bit more to cover than usual. The malspam campaigns are getting more creative than ever and some recent news about Ryuk ransomware attribution could have a big impact on your cyber insurance coverage.

Love-Letter malspammer, “always thinking about you”

With Valentine’s day right around the corner, the “Love Letter” malspam campaign is using email subject lines engineered to tug user’s heartstrings into infection with GandCrab Ransomware, XMRig miner, and Phorpiex spambot. Here were some example subject lines:

  • This is my love letter to you
  • My love letter for you
  • Wrote the fantasy about us down
  • Always thinking about you

The campaign contains ZIP attachments, which contain a JavaScript file that runs a PowerShell command, resulting in a download of an executable named “krablin.exe from “slpsrgpsrhojifdij.ru”. Once executed, the malware will be copied to “%UserProfile%\[number]\winsvcs.exe” and downloads five other malware samples to the infected machine and executes them. Users should always be cautious when viewing email content that pretends to be legitimate from a company and asks for personal information to avoid any potential attacks. The following indicators of compromise were released by bleeping computer.

Hashes

32ee086fbc82ddd0675c0293656f813493ce6d96d02e0bcbeccee4d1a6adfb20 

f4d3ba58e91dc95877ba13804df6fe307ef6efcef74d3a00792387625a624cf4 

035ae8f389e0a4cb58428d892123bc3e3b646e4387c641e664c5552228087285 

ba23af4480611fb19fad2cd83a41bd347d183e0ef8e1c5477916bebe32955d87 

99fe714a365f8e4a74687592700b27f2016a59c7527b5d4ef7cfd97e63468349 

27ac0e9011294c2152d224052280f7fa434df572809a6f96f9a306f3d5c965e3 

99a1e83e77850b59995cdf29b61e9f29f9c38882363027668030df0a62059645 

12e3038b2ed0663cba3c6a05ac0a27b61dce694dffc27aafb4cb3f2f229ff6b8 

f3c369edc2ea96465c49a14f64bdce83c0a401e0ae12e809bced8f99b977c5dc 

72429571f4ca62fceb5a4fc0a17a8f8ab88c1ed01b9d657f7e9778c7939cea06 

4b9d5841d38b8658466dcaf409c34c0f6d2d1f9ecb64254391a4621465daf79b 

0de30f9dbe37aea5932e5df85b4f1aa5cefe28f3bffb58d4d8ae40ccd040a4a7 

4c0103c745fa6e173821035c304863d751bea9c073d19070d9ebf8685da95040 

06e61032bccfe0ccd51ddbab480e1eb6392bccb318639ecac0092e96b9d794ad 

b8bf5b607b305139db81c48e96010a67768488b01edc8c615306ed303c545b0d 

056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769 

9ff78056e225c08ef1f1ff71f305201387f3ec766c8727361851287a74de1f45 

6ad3e68e2e8c5088bc8544bc230a2e333645d3c246ace772bf61f80cd0e93002 

0a27af16b991cbe0f5445022cb1d752a9144abeede6b8de0055247e6fd6c1698 

d189f44528dfa3f8dba2632ae26f564a37931cb89668d31402fc7fb05ae63c1a 

cf9a20874089ec7aa1a84a27f74928c71266a684e7fee4c1ac8d37aaf57d6bf2 

7818e108a16f096eb71feb564ce92095c4ac1e613933630169cc16606bb5f68d 

c3683096f91b00dfe248e388b4302d5471fb090ab8092c96c991a467c26f26b0 

Email Addresses

deanne11@5387.com 

bob01@0437.com 

teddy31@8038.com 

deena49@1659.com 

ted93@4302.com 

bradford99@2804.com 

imogene99@0354.com 

imelda31@1529.com 

taylor74@4656.com 

teddy21@8381.com 

IP Addresses

198.105.244.228 

136.243.13.215 

217.26.53.161 

92.63.197.48 

74.220.215.73 

78.46.77.98 

138.201.162.99 

Domain

Slpsrgpsrhojifdij[.]ru 

Mjag pairs up with Punisher RAT

Zscaler security firm released a report for a variant dubbed “Mjag dropper” that is using decoy documents to deliver Remote Access Trojan (RAT). Mjag dropper is compiled in the Microsoft .NET framework and its original binary is obfuscated using Smart Assembly. Zscaler disclosed the flaw after they detected the infection cycle involving Punisher RAT. The malware is publicly available and can be configured with a range of features: Password stealing module, Anti-task manager, Keylogging, Persistence, Spreading vector, and AV checks. The following indicators of compromise were released with these findings.

Filename

NEFTIOBAN1830369427520181030ABBIdiaLtddt30102018_pdf.exe 

Hash

0a459c18e3b8bdef87a6fb7ea860acdb 

Domains

Chris101.ddns[.]net 

tenau[.]pw 

DarkHydrus grows back new heads in on-going Middle East campaign

The DarkHydrus campaign reemerged and is targeting Middle East entities. 360 Threat Intelligence Center identified that the attackers use VBA macros in the dropper, with DNS tunneling for C2 communication. The malware was uploaded to VirusTotal from Oman.

Domains

data-microsoft.services 

phicdn.world 

akamai.agency 

sharepoint.agency 

nsatc.agency 

akdns.live 

akamaized.live 

iecvlist-microsoft.live 

trafficmanager.live 

0ffice365.services 

azureedge.today 

microsoftonline.agency 

hotmai1.com 

skydrive.services 

asimov-win-microsoft.services 

akamaiedge.live 

0nedrive.agency 

skydrive.agency 

akamaiedge.services 

edgekey.live 

corewindows.agency 

akadns.live 

t-msedge.world 

cloudfronts.services 

microsoftonline.services 

onecs-live.services 

onedrive.agency 

0ffice365.life 

Hash

513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8

IP Addresses

88.221.117.88 

216.58.192.174 

Ryuk moves to Russia with Grim Spider

Multiple security intelligence communities, like CrowdStrike, report that Ryuk ransomware is most likely the creation of Russian financially-motivated cybercriminals, not North Korean state-sponsored attackers. The clarification came after several news outlets attributed a Ryuk ransomware infection targeting U.S. newspaper agencies to North Korean attackers.  We have previously reported on Ryuk activities and the U.S. newspaper hack

The ransomware was created by a threat actor, which Crowdstrike calls Grim Spider, who allegedly bought a version of Hermes ransomware from an underground forum and modified it into Ryuk ransomware. The confusion possibly stems from North Korea state-sponsored actors reportedly infected the Far Eastern International Bank (FEIB) in Taiwan with Hermes ransomware in October 2017.

Researchers believe that North Korean attackers purchased the same Hermes ransomware kit, similar to Grim Spider, and deployed it on the bank’s network as a distraction in an attempt to cover their tracks. Researchers believe there is no connection between North Korean state-sponsored attackers and the Ryuk ransomware strain. Researchers note that multiple Ryuk ransomware victims were infected with TrickBot before Ryuk was deployed on their systems and speculate that attackers selected machines infected with Trickbot to deploy Ryuk.

Since Ryuk’s appearance in August, threat actors have earned 705.80 Bitcoin across 52 transactions, for a current value of $3,701,893.98. The following indicators of compromise were released with these findings.

Hashes

78c6042067216a5d47f4a338dd951848b122bbcbcd3e61290b2f709543448d90 

795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f 

fe909d18cf0fde089594689f9a69fbc6d57b69291a09f3b9df1e9b1fb724222b 

5e2c9ec5a108af92f177cabe23451d20e592ae54bb84265d1f972fcbd4f6a409 

501e925e5de6c824b5eeccb3ccc5111cf6e312258c0877634935df06b9d0f8b9 

ac648d11f695cf98993fa519803fa26cd43ec32a7a8713bfa34eb618659aff77 

Insurance Group declines payout for Russian attributed ransomware

Bloomberg shared their findings with ZDNet after they reported a lawsuit against Zurich Insurance Group by Mondelez in a bid to seek $100M in damages after an insurance claim that was not paid out in NotPetya attack. NotPetya is a type of ransomware similar to Petya. Researchers noticed that the actors had been executing the exploit through the use of the much-discussed and patchable EternalBlue and EternalRomance exploits of yesteryear to launch attacks. (Yes, these attack vectors are still being exploited today.)

Once executed, the malware will reboot the system and overwrite the master boot record (MBR) with a custom loader and a ransom note which demands $300 in Bitcoin. Researchers note that NotPetya impacted business worldwide including TNT, Ukrainian banks, energy companies, airports, and shipping giant Maersk. Users and organizations should enforce strong security awareness, recognize phishing attacks, exercise caution when clicking on malicious links, and deploy two-factor authentication to mitigate cyber attacks. No indicators of compromise were released with this report.

Zurich chose not to cough up the money, citing the NotPetya was, “hostile or warlike action in time of peace or war,” which voided the claim. The security industry will be following this case closely to set precedent around this topic. With Ryuk’s move to Russia will Tribune’s cyber insurance policy cover fallout from a Russian cyber cold war?

Which brings up a question for you: What would your cybersecurity insurer say if your organization suffers a ransomware attack? Now is a good time to open the discussion before an incident might occur.

After several cups of perch-olated coffee and a blood sacrifice, the Perch SOC successfully reviewed the activity and IOCs listed for each threat and found zero Perch customers subjected or targeted by these active threats for the last 30 days.


We'd love to hear your thoughts. Find us on Twitter, LinkedIn or write in to hello@perchsecurity.com

Next: Threat Report Wednesday January 9th 2019

Share this on:

Paul Scott

Paul Scott
on January 16, 2019


Perchy Subscribe to our blog