attachments begin with ‘Love_You_’ indicating the subject matter to be love letters.
Behind this LoveYou campaign are hidden malicious hate-worthy entities. The infection traffic includes GandCrab
ransomware, a Monero (XMRig) cryptocurrency miner, and Phorpiex spambot traffic.
Several HTTP requests for additional malware were spotted in the infection traffic, creating multiple copies of same malware on the infected host, which generated Monero (XMRig) cryptocurrency mining traffic as well as the expected post-infection traffic patterns for GandCrab ransomware. The infected host also turned into a spambot for the Phorpiex botnet.
GrandCrab dominated the infected host and its file downloader also established itself on a USB thumb drive plugged into the infected host.
INDICATORS OF COMPROMISE
IP(s) / Hostname(s)
Malware Hash (MD5/SHA1/SH256)
Consider blocking the threat indicators at their respective controls and strictly avoid opening spam emails coming from unknown sources.
If you think you’re a victim of a cyber-attack, immediately send an email to firstname.lastname@example.org.