• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz threat advisory – CVE-2015-1283 – Juniper Junos OS Expat Buffer Overflow Vulnerability
January 11, 2019
Rewterz Threat Alert – “Office 365 Account Temporarily Disabled” Phishing Emails Resurface
January 16, 2019

Rewterz Threat Alert : ‘Love You’ MalSpam campaign dropping Grandcrab Ransomware, Phorpiex Spambot and Cryptocurrency miner

January 15, 2019

SEVERITY: High

 

 

ANALYSIS SUMMARY

 

 

A massive Malspam campaign using zipped JavaScript (.js) files as malicious email attachments is discovered. The
attachments begin with ‘Love_You_’ indicating the subject matter to be love letters.

 

 

 

 

Behind this LoveYou campaign are hidden malicious hate-worthy entities. The infection traffic includes GandCrab
ransomware, a Monero (XMRig) cryptocurrency miner, and Phorpiex spambot traffic.

Several HTTP requests for additional malware were spotted in the infection traffic, creating multiple copies of same malware on the infected host, which generated Monero (XMRig) cryptocurrency mining traffic as well as the expected post-infection traffic patterns for GandCrab ransomware. The infected host also turned into a spambot for the Phorpiex botnet.

 

 

 

 

GrandCrab dominated the infected host and its file downloader also established itself on a USB thumb drive plugged into the infected host.

 

 

 

 

 

IMPACT

 

 

  • Malware Infection
  • System Compromise
  • Ransomware infection
  • Loss of information

 

 

INDICATORS OF COMPROMISE

 

 

IP(s) / Hostname(s)

  • 92[.]63[.]197[.]48
  • 198[.]105[.]244[.]228
  • 78[.]46[.]77[.]98
  • 217[.]26[.]53[.]161
  • 74[.]220[.]215[.]73
  • 136[.]243[.]13[.]215
  • 138[.]201[.]162[.]99

 

Ports

  • 80
  • 443
  • 9090
  • 25
  • 53

 

URLs

  • icanhazip[.]com
  • slpsrgpsrhojifdij[.]ru
  • osheoufhusheoghuesd[.]ru
  • suieiusiueiuiuushgf[.]ru
  • www[.]2mmotorsport[.]biz
  • www[.]haargenau[.]biz
  • www[.]bizziniinfissi[.]com
  • www[.]holzbock[.]biz
  • www[.]fliptray[.]biz
  • gandcrabmfe6mnef[.]onion

 

Extension

  • .exe
  • .txt
  • .zip
  • .js

 

Email Address

  • Teddy31@8038[.]com
  • Imogene99@0354[.]com
  • Imelda31@1529[.]com
  • Ted93@4302[.]com
  • Deanne11@5387[.]com
  • Bob01@0437[.]com
  • Teddy21@8381[.]com
  • Bradford99@2804[.]com
  • Taylor74@4656[.]com
  • Deena49@1659[.]com

 

 

Email Subject

  • Always thinking about you
  • Felt in love with you!
  • I love you
  • Just for you!
  • My letter just for you
  • My love letter for you
  • Wrote this letter for you
  • 😀

 

Malware Hash (MD5/SHA1/SH256)

  • 72429571f4ca62fceb5a4fc0a17a8f8ab88c1ed01b9d657f7e9778c7939cea06
  • 27ac0e9011294c2152d224052280f7fa434df572809a6f96f9a306f3d5c965e3
  • 99a1e83e77850b59995cdf29b61e9f29f9c38882363027668030df0a62059645
  • 06e61032bccfe0ccd51ddbab480e1eb6392bccb318639ecac0092e96b9d794ad
  • 7818e108a16f096eb71feb564ce92095c4ac1e613933630169cc16606bb5f68d
  • 0a27af16b991cbe0f5445022cb1d752a9144abeede6b8de0055247e6fd6c1698
  • 32ee086fbc82ddd0675c0293656f813493ce6d96d02e0bcbeccee4d1a6adfb20
  • 12e3038b2ed0663cba3c6a05ac0a27b61dce694dffc27aafb4cb3f2f229ff6b8
  • 6ad3e68e2e8c5088bc8544bc230a2e333645d3c246ace772bf61f80cd0e93002
  • 99fe714a365f8e4a74687592700b27f2016a59c7527b5d4ef7cfd97e63468349
  • d189f44528dfa3f8dba2632ae26f564a37931cb89668d31402fc7fb05ae63c1a
  • c3683096f91b00dfe248e388b4302d5471fb090ab8092c96c991a467c26f26b0
  • f3c369edc2ea96465c49a14f64bdce83c0a401e0ae12e809bced8f99b977c5dc
  • f4d3ba58e91dc95877ba13804df6fe307ef6efcef74d3a00792387625a624cf4
  • 9ff78056e225c08ef1f1ff71f305201387f3ec766c8727361851287a74de1f45
  • ba23af4480611fb19fad2cd83a41bd347d183e0ef8e1c5477916bebe32955d87
  • cf9a20874089ec7aa1a84a27f74928c71266a684e7fee4c1ac8d37aaf57d6bf2
  • 0de30f9dbe37aea5932e5df85b4f1aa5cefe28f3bffb58d4d8ae40ccd040a4a7
  • 056b7eb0c06645e1f51ed77f4fa18a4bed47135108371a84f0482f141ae0d769
  • 035ae8f389e0a4cb58428d892123bc3e3b646e4387c641e664c5552228087285
  • b8bf5b607b305139db81c48e96010a67768488b01edc8c615306ed303c545b0d
  • 4b9d5841d38b8658466dcaf409c34c0f6d2d1f9ecb64254391a4621465daf79b
  • 4c0103c745fa6e173821035c304863d751bea9c073d19070d9ebf8685da95040

 

 

REMEDIATION

 

 

Consider blocking the threat indicators at their respective controls and strictly avoid opening spam emails coming from unknown sources.

 

 

If you think you’re a victim of a cyber-attack, immediately send an email to soc@rewterz.com.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.