Rewterz Threat Alert – New Ursnif Variant Spreading Using Word Documents

Friday, August 9, 2019



Analysis Summary

A recent version of the Ursnif Trojan (aka Dreambot, Gozi, and ISFB) which was discovered when a number of malicious Word documents were captured in the wild. The documents in this particular campaign used a common format for file names “info_[date].doc” and the provided example of “info_07.25.doc”. The documents attempt to trick the victim into enabling macros, which are required for the infection process to complete. If the victim enables macros, VBA code is used to which in turn generates PowerShell code that downloads the Ursnif payload. There are some anti-analysis techniques utilized in an attempt to make analysis more difficult. Once the infection process is complete, Ursnif will begin to communicate with its C&C server. The goal of Ursnif is to steal information from the victim. FortiGuard describes this campaign as an active and “currently expanding threat”.


Information theft

Indicators of Compromise


  • https[:]//cdevinoucathrine[.]info
  • https[:]//zcei60houston[.]club
  • https[:]//kenovella[.]club
  • https[:]//z76johnson[.]club
  • https[:]//s75eagtyec[.]com
  • https[:]//s97pe2360[.]club




  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Data Sheets

Corporate Brochure

Our Story



Managed Security

Upcoming Rewterz Trainings/Events

Rewterz News

  • 20, November 2019 Rewterz Threat Alert – Malspam Campaigns Spreading Dridex Banking Trojan
  • 20, November 2019 Rewterz Threat Alert – McDonalds-Themed Facebook Malvertising Deploys Mispadu Banking Trojan
  • 19, November 2019 Rewterz Threat Alert – Active Exploitation of Firefox 0-Day Targets Cryptocurrency
  • 19, November 2019 Rewterz Threat Alert – Buran Ransomware Infects PCs via Microsoft Excel Web Queries

Copyright © Rewterz. All rights reserved.