{"id":7293,"date":"2017-04-10T08:10:42","date_gmt":"2017-04-10T16:10:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/10\/news-1084\/"},"modified":"2017-04-10T08:10:42","modified_gmt":"2017-04-10T16:10:42","slug":"news-1084","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/10\/news-1084\/","title":{"rendered":"USPS-themed malspam now delivering 1-2-3 Knock-out"},"content":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Mon, 10 Apr 2017 15:00:43 +0000<\/strong><\/p>\n<p>We\u2019ve detected an uptick in USPS-themed malspam walloping users with a 1-2-3 knock-out of nasty malware designed to infiltrate your system and steal all your most valuable information. This malware-laced email is actively being distributed with various Subject and Body messages containing references to missing and\/or late USPS parcels.<\/p>\n<div id=\"attachment_17351\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17351 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps1-600x438.png\" alt=\"\" width=\"600\" height=\"438\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps1-600x438.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps1-300x219.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps1.png 799w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Example of USPS-themed malspam<\/em><\/p>\n<\/div>\n<p>Should receivers of this mail be convinced of the content and validity of the enclosed message, and thus, be inclined to unpack the included file titled \u201cDelivery-Details.zip\u201d and then proceed against all better known judgement to launch the included JavaScript file titled Delivery-Details.js, they will be subjected to a slew of malware designed to commandeer their PC and steal their most valuable financial information.<\/p>\n<div id=\"attachment_17352\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17352 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps2-600x343.png\" alt=\"\" width=\"600\" height=\"343\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps2-600x343.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps2-300x172.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps2.png 668w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Deobfuscated Javascript showing server addresses<\/em><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>This particular downloader, known by some as JS\/Nemucod or simply JS\/Downloader by others, is a well-known JavaScript downloader that is sent out via spam email. Historically this downloader will install 1 or 2 different malware families to infected machines, but the most recent campaign has upped that to 3 different malware families being installed post-detonation.<\/p>\n<div id=\"attachment_17353\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17353 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps3-600x48.png\" alt=\"\" width=\"600\" height=\"48\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps3-600x48.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps3-300x24.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps3-630x51.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps3.png 639w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Shows installed payloads<\/em><\/p>\n<\/div>\n<p>The 3 malware families are all different in their design but make no mistake about it, all 3 will compromise your security and put your financials at risk.<\/p>\n<p>Trojan.Nymaim is first to come down the line using filename exe1[1].exe. This Trojan provides attackers with remote access to infected machines allowing for everything, from the collection of banking credentials to backdoor functionality allowing attackers full use of the machine.<\/p>\n<div id=\"attachment_17354\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17354 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps4-600x29.png\" alt=\"\" width=\"600\" height=\"29\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps4-600x29.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps4-300x14.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps4.png 731w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p class=\"wp-caption-text\"><em>Trojan.Nymaim at execution<\/em><\/p>\n<\/div>\n<p>Trojan.Kovter comes down next in the form of exe2[1].exe and using a fancy WinAmp icon and NullSoft description. Trojan.Kovter is known as fileless malware by its ability to execute code directly through the registry. This Trojan also has the ability to steal personal information, download additional malware, or grant attackers full use of the machine. The below image shows how Trojan.Kovter manages it&#8217;s &#8216;fileless&#8217; capabilities with the use of Javascript commands embedded within the Windows registry.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17355 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps5.png\" alt=\"\" width=\"254\" height=\"97\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17356\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps6.png\" alt=\"\" width=\"1397\" height=\"68\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps6.png 1397w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps6-300x15.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps6-600x29.png 600w\" sizes=\"auto, (max-width: 1397px) 100vw, 1397px\" \/><\/p>\n<p>Finally, exe3[1].exe is identified as Trojan.Boaxxe, which as you may guess is also a Trojan with backdoor and stealing capabilities. This Trojan scans the PC for any trace of information deemed valuable by the creators and transmits this information to the attacker&#8217;s server for use in further attacks. Information is saved in the form of encrypted registry strings that are continuously updated by the malware.<\/p>\n<div id=\"attachment_17357\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17357\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps7.png\" alt=\"\" width=\"1024\" height=\"190\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps7.png 1024w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps7-300x56.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps7-600x111.png 600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p class=\"wp-caption-text\">Information harvesting<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Taken together, these 3 malware families will take hold of your machine, drain your bank accounts, and leave you high and dry. So just be wary of suspicious looking shipping notices arriving via email and never install files received in email without certainty of their origin.<\/p>\n<p>But should you find yourself curious by the contents of this email message and tempted to install the included Javascript file in the attempts of finding that lost USPS package, then have no worries because you can rest assured that <a href=\"https:\/\/www.malwarebytes.com\/premium\/\" target=\"_blank\">Malwarebytes<\/a> has your back.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17358 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps8.png\" alt=\"\" width=\"1196\" height=\"518\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps8.png 1196w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps8-300x130.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps8-600x260.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/usps8-195x85.png 195w\" sizes=\"auto, (max-width: 1196px) 100vw, 1196px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>IOC\u2019s:<\/h3>\n<p>Delivery-Details.js\u00a0 &#8211;\u00a0 877480DBDE4FCFF9E21E294EF6B64E50<\/p>\n<p>Exe1[1].exe &#8211; F22807784588C2117457634494943729<\/p>\n<p>Exe2[1].exe &#8211; B10A08A1ACB1B42CA91032EBED613A2A<\/p>\n<p>Exe3[1].exe &#8211; 423213BD6A167D4B7DEEC18E7B18E13E<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/usps-themed-malspam-now-delivering-1-2-3-knock-out\/\">USPS-themed malspam now delivering 1-2-3 Knock-out<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/usps-themed-malspam-now-delivering-1-2-3-knock-out\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Mon, 10 Apr 2017 15:00:43 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/usps-themed-malspam-now-delivering-1-2-3-knock-out\/' title='USPS-themed malspam now delivering 1-2-3 Knock-out'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_572643571.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We\u2019ve detected an uptick in USPS-themed malspam walloping users with a 1-2-3 knock-out of nasty malware designed to infiltrate your system and steal all your most valuable information. This malware-laced email is actively being distributed with various Subject and Body messages containing references to missing and\/or late USPS parcels.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/javascript\/\" rel=\"tag\">JavaScript<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-boaxxe\/\" rel=\"tag\">Trojan.Boaxxe<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-kovter\/\" rel=\"tag\">Trojan.Kovter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/usps\/\" rel=\"tag\">USPS<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/usps-themed-malspam-now-delivering-1-2-3-knock-out\/' title='USPS-themed malspam now delivering 1-2-3 Knock-out'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/usps-themed-malspam-now-delivering-1-2-3-knock-out\/\">USPS-themed malspam now delivering 1-2-3 Knock-out<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10871,11928,3764,10494,10833,11929,11930,11931],"class_list":["post-7293","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-javascript","tag-malspam","tag-malware","tag-threat-analysis","tag-trojan","tag-trojan-boaxxe","tag-trojan-kovter","tag-usps"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7293"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7293\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}