{"id":6341,"date":"2017-01-23T15:50:28","date_gmt":"2017-01-23T23:50:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-179\/"},"modified":"2017-01-23T15:50:28","modified_gmt":"2017-01-23T23:50:28","slug":"news-179","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-179\/","title":{"rendered":"Don\u2019t let this Black Friday\/Cyber Monday spam deliver Locky ransomware to you"},"content":{"rendered":"<p>We see it every year: social engineering attacks that take advantage of the online shopping activities around Black Friday and Cyber Monday, targeting customers of online retailers. This year, we\u2019re seeing a spam campaign that Amazon customers need to be wary of. The fake emails pretend to be notifications from\u00a0the online retailer\u00a0that a purchase has been sent out for delivery. To appear legitimate, the emails may also spoof delivery companies.<\/p>\n<p>These email messages start an infection chain that leads to a <a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/tag\/ransomware\/\">ransomware<\/a> infection. You don\u2019t want to find yourself at the end of this chain, because by then, your files will have been encrypted by the malware.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-9665\" alt=\"blackfridayspam3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/BlackFridaySpam3.svg\" \/><\/p>\n<p><em>Figure 1: The Black Friday\/Cyber Monday\u00a0themed spam triggers an infection chain that leads to a ransomware infection<\/em><\/p>\n<p>But, as it\u2019s a chain of events, you can stop the infection at several points. Let\u2019s trace the infection chain:<\/p>\n<ol>\n<li>The email is a fake Amazon notification. You can detect that it\u2019s fake, because even if it tries to look as legitimate as possible, it still doesn\u2019t look like the usual Amazon email. Amazon lists components of a fake email here: <a href=\"https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=15835501\">https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=15835501<\/a><\/li>\n<li>The attachment is a ZIP file. Don\u2019t open this attachment.\u00a0<span>\u00a0It contains as JavaScript (.js) file, not a file type often sent in legitimate email communications.<\/span><\/li>\n<li>The JavaScript in the ZIP file is obfuscated. Don\u2019t open this script. It\u2019s a <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">Nemucod<\/a> malware that downloads the payload. <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> detects this JavaScript downloader.<\/li>\n<li>The downloaded file is a ransomware detected as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Ransom%3aWin32%2fLocky.A\">Ransom:Win32\/Locky.A<\/a>. <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> detects this malware.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Locky\">Locky<\/a> is a ransomware family that encrypts files using a public key. It\u2019s been known to be spread by the downloader <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">Nemucod<\/a>. We have been tracking the <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/07\/23\/nemucod\/\">Nemucod-Locky<\/a> tandem, and we have seen it evolve over time, changing attachment file names and social engineering lures. This Black Friday\/Cyber Monday\u00a0version is just the latest of what looks like a continuous campaign.<\/p>\n<p>Here are samples of the fake Amazon email messages:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"967\" class=\"alignnone size-full wp-image-9585\" alt=\"black-friday-email-1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-email-1.png\" \/><\/p>\n<p><em>Figure 2: A sample fake Amazon email that also spoofs Royal Mail as the courier<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"967\" class=\"alignnone size-full wp-image-9595\" alt=\"black-friday-email-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-email-2.png\" \/><\/p>\n<p><em>Figure 3: A sample fake Amazon email that also spoofs FedEx as the courier<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"967\" class=\"alignnone size-full wp-image-9605\" alt=\"black-friday-email-3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-email-3.png\" \/><\/p>\n<p><em>Figure 4: A sample fake Amazon email that also spoofs DHL as the courier<\/em><\/p>\n<p>In what looks like an attempt to evade anti-spam solutions that depend on the hash of the email body, the character &#8220;=&#8221; is added in random places in the email. The malware authors could have reused the message from a previous spam campaign, and needed only to change the positions of the added character. This changes the hash of the email body, and\u00a0it might prove effective against some email filters.<\/p>\n<p>The email attachment is a ZIP file that contains an obfuscated JavaScript (.js) file, detected as\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">TrojanDownloader:JS\/Nemucod<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"759\" height=\"208\" class=\"alignnone size-full wp-image-9625\" alt=\"black-friday-spam-javascript-in-zip\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-spam-javascript-in-zip.png\" \/><\/p>\n<p><em>Figure 5: The ZIP attachment contains a malicious JavaScript file<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"404\" class=\"alignnone size-large wp-image-9635\" alt=\"black-friday-spam-obfuscated-javascript\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-spam-obfuscated-javascript-1024x404.png\" \/><\/p>\n<p><em>Figure 6: The JavaScript file is obfuscated<\/em><\/p>\n<p>When opened, the JavaScript connects to the following URLs to download a file:<\/p>\n<ul>\n<li>hxxp:\/\/ livingnetwork .co.za\/hfvg623?zvMNzYWImo=zvMNzYWImo<\/li>\n<li>hxxp:\/\/ ayurvedic .by\/hfvg623?zvMNzYWImo=zvMNzYWImo<\/li>\n<li>hxxp:\/\/ marcelrahner .com\/hfvg623?zvMNzYWImo=zvMNzYWImo<\/li>\n<li>hxxp:\/\/ copeigoan .net\/hfvg623?zvMNzYWImo=zvMNzYWImo<\/li>\n<li>hxxp:\/\/ sheerfoldy .com\/hfvg623?zvMNzYWImo=zvMNzYWImo<\/li>\n<\/ul>\n<p>The downloaded file is an encrypted blob, which the JavaScript decrypts to a .DLL file and then executes. This file is a DLL version of <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Ransom%3aWin32%2fLocky.A\">Ransom:Win32\/Locky.A<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Ransom%3aWin32%2fLocky.A\">Ransom:Win32\/Locky.A<\/a> encrypts files and renames them to this format: <em>[victim computer ID] \u2013 [hexadecimal file identifier].aeris<\/em>. The extension <em>.aeris<\/em> is the latest in a list that <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Locky\">Locky<\/a> has used for the files it encrypts: <em>.locky<\/em>, <em>.zepto<\/em>, <em>.odin<\/em>, <em>.shit<\/em>, and <em>.thor<\/em>.<\/p>\n<p>The ransomware assigns an ID to the victim computer, which it uses for the file name of encrypted files. It then connects to\u00a0command-and-control (C&amp;C) servers to report this ID and other information about the infected computer.<\/p>\n<p>It drops the following ransom note, which instructs the victim to pay to regain access to the files: <em>%Desktop%-INSTRUCTION.bmp<\/em>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"712\" height=\"621\" class=\"alignnone size-full wp-image-9615\" alt=\"black-friday-infection-ransom-note\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/11\/black-friday-infection-ransom-note.jpg\" \/><\/p>\n<p><em>Figure 7: <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Ransom%3aWin32%2fLocky.A\">Ransom:Win32\/Locky.A<\/a> leaves this ransom note<\/em><\/p>\n<p>The malware analyzed for the blog post have the following SHA1:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">TrojanDownloader:JS\/Nemucod<\/a> (JavaScript downloader)\n<ul>\n<li>4ef30bdcf4e858f6ed28c88434786c014b027fcc<\/li>\n<li>5e484feb2b9b7639b3a8c61a726f28087fbf3709<\/li>\n<li>df774d57a6491d83c0add823f4c04ca83b0d8b6c<\/li>\n<li>ec2046c728094f08e701339cde7dd205d4126d43<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Ransom%3aWin32%2fLocky.A\">Ransom:Win32\/Locky.A<\/a> (Decrypted payload)\n<ul>\n<li>1734ef2d44bdc71bdf81de0726a8da072d352ded<\/li>\n<li>449e33faef1646a667a44ea7d0e1bf0e924afade<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Prevention and mitigation<\/h2>\n<p>To avoid falling prey to this new ransomware, here are some tips:<\/p>\n<p><strong>For end users<\/strong><\/p>\n<ul>\n<li>Use an up-to-date, real-time antimalware product, such as <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> for Windows 10.<\/li>\n<li>Think before you click. Do not open emails from senders you don\u2019t recognize.\u00a0 Upload any suspicious files here: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx\">https:\/\/www.microsoft.com\/en-us\/security\/portal\/submission\/submit.aspx<\/a>. This campaign spoofs Amazon and the delivery companies Royal Mail, DHL, and FedEx. The attachment is a ZIP file, which may be a common attachment type, but it contains a .JS file. Be mindful of what the attachment is supposed to be (in this case, most likely a document) and the actual file type (a script).<\/li>\n<\/ul>\n<p><strong>For IT administrators<\/strong><\/p>\n<ul>\n<li>Use Office 365 Advanced Threat Protection. It has a machine learning capability to help your network administrators <a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">block dangerous email threats<\/a>. See the <a href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange<\/a>: new tools to stop unknown attacks, for details.<\/li>\n<li>Use <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> to help detect, investigate, and respond to advanced and targeted attacks on your enterprise networks.<\/li>\n<li>Use the <a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a> to prevent dubious software from running.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Duc Nguyen and Wei Li<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/11\/23\/dont-let-this-black-friday-cyber-monday-spam-deliver-locky-ransomware-to-you\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We see it every year: social engineering attacks that take advantage of the online shopping activities around Black Friday and Cyber Monday, targeting customers of online retailers. This year, we\u2019re seeing a spam campaign that Amazon customers need to be wary of. The fake emails pretend to be notifications from\u00a0the online retailer\u00a0that a purchase has&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[11013,10760,11014,11015,10871,10846,10795,3764,10831,10851,3765,1931,10518,10762],"class_list":["post-6341","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-anti-malware","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-black-friday","tag-cyber-monday","tag-javascript","tag-javascript-spam-attachment","tag-locky","tag-malware","tag-mmpc","tag-nemucod","tag-ransomware","tag-research","tag-spam","tag-windows-defender"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6341"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6341\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6341"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}