{"id":12193,"date":"2018-05-03T10:10:02","date_gmt":"2018-05-03T18:10:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/03\/news-5962\/"},"modified":"2018-05-03T10:10:02","modified_gmt":"2018-05-03T18:10:02","slug":"news-5962","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/05\/03\/news-5962\/","title":{"rendered":"Internet Shortcut used in Necurs malspam campaign"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 03 May 2018 17:44:18 +0000<\/strong><\/p>\n<p>The Necurs botnet continues to be one of the most prolific malicious spam distributors, with regular waves of carefully-crafted attachments that are used to download malware.<\/p>\n<p>The majority of malspam campaigns that we track are targeting Microsoft Office with documents containing either macros or exploits. We also see a number of other types of malicious attachments that are zipped scripts (.VBS, .JS, etc)\u2014essentially downloaders for the final payload.<\/p>\n<p>In a new technique recently <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/necurs-evolves-to-evade-spam-detection-via-internet-shortcut-file\/\" target=\"_blank\" rel=\"noopener\">uncovered<\/a>, Necurs is changing things up a little bit by avoiding the aforementioned formats and using a different file type instead, crafting malicious .URL files (Internet Shortcut).<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23512\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/attachment\/malspam-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam.png\" data-orig-size=\"580,815\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"malspam\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam-213x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam-427x600.png\" class=\"size-full wp-image-23512 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam.png\" alt=\"\" width=\"580\" height=\"815\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam.png 580w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam-213x300.png 213w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/malspam-427x600.png 427w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/a><\/p>\n<p>This attack relies on the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/aa767731(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener\">file:\/\/ protocol<\/a> to load and execute a remote script from a samba (SMB) share. This is noteworthy because typically the attachment is used as a downloader, but instead here we see one additional step that pushes this function one degree further thanks to the .url shortcut.<\/p>\n<p>By not placing the malicious script directly within the attachment, attackers are also preventing the automated collection and sandbox analysis that usually takes place within spam traps.<\/p>\n<p>An obfuscated view of the WSF script can be seen in the screenshot below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23514\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/attachment\/script-11\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script.png\" data-orig-size=\"949,659\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"script\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script-300x208.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script-600x417.png\" class=\"size-full wp-image-23514 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script.png\" alt=\"\" width=\"949\" height=\"659\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script.png 949w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script-300x208.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/script-600x417.png 600w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/a><\/p>\n<p>The final payload is eventually downloaded from a remote server:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23515\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/attachment\/smb\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB.png\" data-orig-size=\"452,254\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SMB\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB-300x169.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB.png\" class=\"size-full wp-image-23515 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB.png\" alt=\"\" width=\"452\" height=\"254\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB.png 452w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB-300x169.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/SMB-400x225.png 400w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/p>\n<p>This is an interesting attack designed to bypass traditional security measures and administrative policies that may block the well-known Office macros.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are already protected against this technique.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Necurs.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23511\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/attachment\/necurs\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Necurs.gif\" data-orig-size=\"923,701\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Necurs\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Necurs-300x228.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Necurs-600x456.gif\" class=\"size-full wp-image-23511 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/04\/Necurs.gif\" alt=\"\" width=\"923\" height=\"701\" \/><\/a><\/p>\n<p>Malware authors are constantly looking for new evasion techniques as long as they generate good success rates. Social engineering attacks have relied upon the same lures for some time, but every now and again we see a slight variation in a technique that was perhaps known, but not yet leveraged by criminals.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/\">Internet Shortcut used in Necurs malspam campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 03 May 2018 17:44:18 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/' title='Internet Shortcut used in Necurs malspam campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/11\/photodune-6673197-spam-email-m-965x395.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The Necurs gang tries out a new trick to load malware and bypass security defenses.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/criminals\/\" rel=\"category tag\">Criminals<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/necurs\/\" rel=\"tag\">necurs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/samba\/\" rel=\"tag\">samba<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smb\/\" rel=\"tag\">SMB<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/' title='Internet Shortcut used in Necurs malspam campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-shortcut-used-necurs-malspam-campaign\/\">Internet Shortcut used in Necurs malspam campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10410,3108,11928,11977,18295,12321,10518,10494],"class_list":["post-12193","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-botnet","tag-criminals","tag-malspam","tag-necurs","tag-samba","tag-smb","tag-spam","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12193"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12193\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}