2015-11-05 update: After posting this diary, we started seeing reports of CryptoWall 4.0. One of the people who analyzed this new CryptoWall variant provided me details, which you can read about at: http://malware-traffic-analysis.net/2015/11/05/index2.html Introduction Since Monday 2015-10-26, we've noticed a particular campaign sending malicious spam (malspam) with links to download CryptoWall 3.0 ransomware. This campaign has been impersonating domain registrars. Conrad Longmore blogged about it last week [1], and Techhelplist.com has a good write-up on the campaign [2]. Several other sources have also discussed this wave of malspam [3, 4, 5, 6, 7, 8 to name a few]. For this diary, we'll take a closer look at the emails and associated CryptoWall 3.0 malware. The malspam Based on what I've seen, this malspam was delivered to recipients who didn't use privacy protection when they registered their domains. Their contact information is publicly-listed in the whois records for their domains. Criminals behind the campaign are collecting this publicly-available information, impersonating the registrars, and sending malspam to the email addresses listed as points of contact. Below are two examples of the emails I've found.
Enom and Tucows are just two of the many examples people have reported. When looking at the email headers, you'll find these were not sent from the actual registrars. The sender addresses were spoofed.
If you receive one of the emails, the link follows a specific pattern: http://[unrelated compromised website]/abuse_report.php?[your domain name]. The domain names are not important. You can always get the malware by substituting any string of characters for the domain name in the URL (assuming no one has fixed the compromised website yet).
The emails have different senders, and they contain a variety of domains in the URLs to download the malware. I've compiled a list of the first 100 emails I found to provide an idea on the scope of this campaign. Click here for a .CSV file of the list.
The malware I grabbed a sample of the CryptoWall 3.0 on Tuesday 2015-11-03. The sample was first submitted to Virus Total the previous day (Monday). File name: [domain name]_copy_of_complaints.pdf.scr
I ran the sample on two different Windows hosts and got two different Bitcoin addresses for the ransom payment.
Traffic from the two infected hosts is consistent with CryptoWall 3.0 activity.
I used tcpreplay in Security Onion on a pcap of traffic from the first infection. The EmergingThreats (ET) and ET Pro rulesets showed alerts related to CryptoWall.
I also used Snort with the Talos Registered ruleset to read the pcap. That showed CryptoWall alerts as well.
Final Words If you receive one of these emails, and you download the file, you should see plenty of warnings the file is not safe. In a company environment, properly-administered Windows hosts should prevent people from running the malware. In my personal opinion, this malspam isn't a serious threat, especially to anyone aware of computer security. So why do criminals run these campaigns? Apparently, enough of their emails get through, people still fall for the malware, and their Windows computers are configured so they can run it. As of Wednesday 2015-11-04, I haven't found any more of this malspam. This might be temporary, or the criminals behind it might have started a different campaign. Either way, it's always interesting to see the daily changes in our cyber threat landscape. Pcaps and the malware sample used in this diary are available here. --- References: [1] http://blog.dynamoo.com/2015/10/malware-spam-domain-domain-suspension.html |
Brad 435 Posts ISC Handler Nov 6th 2015 |
Thread locked Subscribe |
Nov 6th 2015 6 years ago |
Private registration's may not protect the registrant at least initially. I'm using 1and1's private registration. They use a proxy+number email address like proxy######@1and1-private-registration.com. I received 4 of these domain suspended emails between 10/27 and 11/2 from 2 different domains I have registered. 1and1 may be filtering them out now. According to their status page, they're aware of the problem.
|
SmSec 2 Posts |
Quote |
Nov 5th 2015 6 years ago |
I wonder if SPF / DKIM / DMARC might help prevent this malspam from getting through in the first place?
Or are the malspammers being careful to use a different domain name than what the purported registrar uses? |
Grant 2 Posts |
Quote |
Nov 5th 2015 6 years ago |
SmSec,
Thanks for the additional info! I figured that might be the case for some people, but I wasn't able to find any examples. - Brad |
Brad 435 Posts ISC Handler |
Quote |
Nov 5th 2015 6 years ago |
Quoting Grant:I wonder if SPF / DKIM / DMARC might help prevent this malspam from getting through in the first place? It's possible. At least half of the emails I ran across were blocked by our mail filters as spam. - Brad |
Brad 435 Posts ISC Handler |
Quote |
Nov 5th 2015 6 years ago |
I'm a Gandi customer. They have email protection enabled by default on all accounts. After sending their abuse department several samples, I was told that changing my email address would solve the issue. I've since sent them a link to this post in the hopes they pull their heads out of their backsides.
Thanks for the write-up! |
Gary 2 Posts |
Quote |
Nov 5th 2015 6 years ago |
Great timing with this article, as I was just reading about the NEW Cryptowall: CryptoWall 4.0 which has been released with new features such as encrypted file names!
See the links below: http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/ https://www.reddit.com/r/sysadmin/comments/3rmv57/cryptowall_40_released_weve_already_seen_it_with/ As suggested, will blocking the malicious IP block work for thwarting this? |
AAInfoSec 51 Posts |
Quote |
Nov 5th 2015 6 years ago |
AAInfoSec,
Thanks! I just posted a guest blog by one of the people who helped with that Bleeping Computer blog post. For some more details, see: malware-traffic-analysis.net/2015/11/05/… Blocking the IP address or address blocks they posted in the Reddit discussion may not be very effective, because the criminals behind the campaign can easily switch to other IP addresses or blocks of addresses. If an organization's spam filter can detect zip-ed .js files as file attachments in an email, that would be effective against the malspam. - Brad |
Brad 435 Posts ISC Handler |
Quote |
Nov 5th 2015 6 years ago |
I have a contact at Proofpoint - They are requesting we submit email samples - do you have any I could share with them?
http://www.proofpoint.com/us/mcafee Thanks! |
7s3v3n7 4 Posts |
Quote |
Nov 6th 2015 6 years ago |
I found more information about CryptoWall ransomware from:http://guides.uufix.com/what-can-you-do-once-your-pc-is-infected-by-cryptowall-4-0-ransomware/
|
Anonymous |
Quote |
Feb 23rd 2017 5 years ago |
Sign Up for Free or Log In to start participating in the conversation!