CIS CYBER ALERT
01/16/2015 - Updated
Invoice Phishing Spam Campaign Distributing Dyre Banking Trojan
View the updated version of this CIS Cyber Alert here:
CIS recently became aware of a massive spam campaign targeting users in various sectors. Phishing emails used in the campaign contains a PDF attachment named Invoice621785.pdf. This attachment is a weaponized PDF document exploiting a vulnerability in Adobe Reader (CVE-2013-2729). After successful exploitation, user’s system will download additional malware from hxxp://rlmclahore.com/Resources/Search/1510out\.exe. This is a banking trojan similar to Zeus/Citadel that it targets sensitive user information including banking credentials. As of this writing, all of the major AV products are detecting this malware as Tojan Dyre/Zbot/Fondu.
UPDATED - JANUARY 16, 2015
CIS has discovered that some phishing emails may not have a malicious attachment, but may simply include a link to a malicious page that prompts the user to download a file. Most links appear to follow either of these forms:
CIS has also discovered the possible use with/possible merger of Upatre, a trojan downloader, with the Dyre banking trojan. The CIS has observed that a spambot is consistently downloaded well after the initial download and deletion of the Upatre downloader.
Phishing Email Characteristics:
- Subject: "Unpaid invoic” [Please note the typo in the subject line]
- Attachment: Invoice621785.pdf
Updated Phishing Email Characteristics - JANUARY 16, 2015
- “Wire transfer receive”
- “Medicines here”
- “Complaint against your company”
- “Payment Advice - advice Ref:[xxxxxx]/CHAPS credits”
- “Company repor” - (note the missing t in “report")
- “Wire transfer complete”
- “Important - New Outlook Settings”
System Level Indicators (If successful in exploitation):
- Copies itself under C:\Windows\[RandomName].exe
- Created a Service named ""Google Update Service” by setting the following registry keys:
- HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\ImagePath: "C:\WINDOWS\pfdOSwYjERDHrdV.exe"
- HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\DisplayName: "Google Update Service"
Network Level Indicators:
First Stage Download:
Updated First Stage Download - JANUARY 16, 2015
- baypipo\.com/mandoc/eulu22.pdf (IP: 213.232.24\.115)
- els-law\.com/mandoc/eulu22.pdf (IP: 192.185.146\.201)
- leagleconsulting\.com/mandoc/team21.pdf (IP: 209.235.144\.9)
- morph-x\.com/mandoc/page_241.pdf (IP: 67.228.164\.177)
- coffeeofthemonth\.biz/mandoc/page_241.pdf (IP: 216.55.187\.235)
- absurdherd\.com/dev/ml2from2.tar (IP: 74.220.195\.45)
- absurdherd\.com/dev/ml1from1.tar (IP: 74.220.195\.45)
- absurdherd\.com/dev/heap2.tar (IP: 74.220.195\.45)
- sdgaccounting\.com/mandoc/ml2from2.tar (IP: 64.29.145\.15)
- skippers-products\.com/Images/ml1.tar (IP: 216.251.32\.98)
Second Stage C2
Updated Second Stage C2 - JANUARY 16, 2015
Please note that the Domain and IP indicators above were observed during our analysis and the list does not represent all network indicators for this campaign.
We also noted that the network communication is using a certificate with organization name “internet widgits pty ltd”.
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Do not open email attachments from unknown or untrusted sources.
- Limit user account privileges to those required only.
- Remind users not to visit untrusted websites or follow links provided by unknown or untrusted sources.
- Keep all operating system, applications and essential software up to date to mitigate potential exploitation by attackers.
- Ensure that systems are hardened with industry-accepted guidelines.
- Make sure all AV products are up-to-date with their signatures.
- Implement filters at your email gateway for filtering out emails with subject line “Unpaid invoic”. [Note the typo]