Phishing PDF Received in my ISC Mailbox

Published: 2022-05-07
Last Updated: 2022-05-07 16:40:57 UTC
by Guy Bruneau (Version: 1)
0 comment(s)

I received several PDF like these in the past few days in my ISC mailbox and decided to look at 3 that were very similar. All 3 files are a one page picture with nothing else in it except a URL.

Looking at the first one using Didier's pdfid.py tool:

There is something interesting in all 3 of them, they all have a URL (/URI) embedded in them. Using pdf-parser.py, lets extract the URLs:

PDF 1


PDF 2


PDF 3

What is interesting about all 3 email is they all have the same behavior with the same location /a/. The first 2 URLs do not resolve, only aleksalekss[.]ru resolve to 80.66.78.78 which was recently activated on the 28 March 2022. Several files have been submitted to VirusTotal in the past 4 days with 0 to low detection[1]. None of the 3 files below had any matches (submissions) in VirusTotal.

Indicator of Compromised (IOCs)

Domains & IP

lsochi-tour[.]ru/a/
ljmail1[.]ru/a/
aleksalekss[.]ru/a/ [4]
80.66.78.78 [2][3]

Hashes

183ca34d4b44b7829691914f061bc464d3ac69242e447376b3c9ac6b17e9cecf  31395491-c4be-410a-bced-33c5ffa3dfa8.pdf
71a43d397b93206e7834e7e85b230b4e8391546c37a9b23bfe94d66f573deedc  3c269e40-66de-4b73-927d-d432a657f3c5.pdf
5c0c5306b1ca1f5c98bcb050fa31407318ab3a8ff4ecd44365cc1d32acb553e9  f9098979-c185-4256-bec9-5ea786d7ac7a.pdf

[1] https://www.virustotal.com/gui/ip-address/80.66.78.78/relations
[2] https://cybergordon.com/result.html?id=422bee43-b3d2-49db-8b29-2d1287b1f195
[3] https://otx.alienvault.com/indicator/ip/80.66.78.78
[4] https://otx.alienvault.com/indicator/domain/aleksalekss.ru

-----------
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

0 comment(s)

Comments

What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
https://defineprogramming.com/
https://defineprogramming.com/
Enter comment here... a fake TeamViewer page, and that page led to a different type of malware. This week's infection involved a downloaded JavaScript (.js) file that led to Microsoft Installer packages (.msi files) containing other script that used free or open source programs.
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
Enter corthrthmment here...

Diary Archives