Last Updated: 2014-05-30 13:44:46 UTC
by Johannes Ullrich (Version: 1)
Our reader Mark sent us a link he recovered from a Phishing e-mail. We don't have the e-mail right now, but the web site delivering the malware is kind of interesting in itself.
The e-mail claims to come from "Energy Australia", an actual Australian utility company, and the link leads to:
hxxp://energymar.com/ data/ electricity/ view/get/ energy.php ?eid=[long number]
Note the somewhat plausible domain name (energymar.com). The actual domain name for Energy Australia is "www.energyaustralia.com.au".
The first screen presented to the user asks the user to solve a very simple CAPTCHA. This is likely put in place to hinder automatic analysis of the URL:
(click on images to see full size)
The layout of the page matches the original very well. Users are confronted with CAPTCHAs regularly in similar sites, so I doubt this will raise suspicion.
Next, we are asked to download the file, again using a similar layout.
The "bill" itself is a ZIP file that includes a simple ZIP file that expands to an EXE. Virustotal shows spotty detection:
You can also review the full updated results here: https://www.virustotal.com/en/file/ad9692b0d589faf72121e4c390138dfe872fe913f73dd1edb699e60bab38f875/analysis/
It doesn't look like the checksum of this sample changes between downloads, so I hope AV signatures will catch up quickly.
Once downloaded and unzipped, the malware presents itself as a PDF:
But then, as soon as the malware is launched, it does reveal it's true nature:
We ran this on a fresh Windows 7 Ultimate SP1 32 Bit install with one round of patches, so there wasn't much to encrypt for Cryptolocker.
After launching the malware, the system connected via https to 184.108.40.206.( vps.regruhosting.ru ), likely to retrieve/send the key. I did not see a DNS lookup. The self signed SSL certificate include the IP address 220.127.116.11 as a Subject:
Signature Algorithm: sha1WithRSAEncryption
Not Before: Apr 10 09:41:14 2012 GMT
Not After : Apr 8 09:41:14 2022 GMT