Even Bad Malware Works

Published: 2014-09-15
Last Updated: 2014-09-15 17:51:13 UTC
by Johannes Ullrich (Version: 1)
3 comment(s)

For a few weeks now, I keep receiving a few "Delta Ticket" e-mails a day with zipped executables as attachments. The e-mails are done about as bad as it gets:

  • The "From" address uses a random domain
  • The e-mail does not use the typical "Delta" formating/branding.
  • The attachment is a straight executable, just zipped.
  • Antivirus is ok on a new sample received right now (8/55 according to virustotal) and excellent (>30/55) on older samples. [1]
  • The e-mail (flight information) is very specific and does not appear to be customized to the sender
  • Delta doesn't send tickets as attachments like this.

Fake Delta Ticket e-mail

So they could do a lot better. The sad part is, that they apparently have no need to do better.

The "From" name, which is what most people are looking at, reads "Delta Air Lines". Some major/popular AV tools still don't detect it well at all, and well, users like to click on stuff I guess.

The initial piece of malware appears to be a generic downloader. In my system, it installed what looked like a fake Adobe update. Still running it to see what is exactly going on, but not expecting too much.

 

[1] https://www.virustotal.com/en/file/4cf652e71bbbe37eecda58169471df27db15ca1e5a8f14006128a4883b095409/analysis/1410799974/
 

 

 

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

Keywords:
3 comment(s)

Comments

I got one from the Bank of Africa say I was being awarded a 2.5 million check.

I was supposed to reply to a Gmail account?

Bank of Africa uses Gmail?
I've seen similar delivery method (.exe in a .zip file) as a vector for major breaches at allegedly secure institutions. If your systems allow an average user to run executable code from arbitrary locations (e.g. Outlook temp directory, zip file (or zip temp directory) in their documents directory, etc.) then you're not serious about security. Of course, our typical computer systems allow this by default, and in fact don't make it easy to disable.

Software restriction policies in Windows, however, has a lot of the qualities that are needed (e.g. free, built-in).
I've seen similar delivery method (.exe in a .zip file) as a vector for major breaches at allegedly secure institutions. If your systems allow an average user to run executable code from arbitrary locations (e.g. Outlook temp directory, zip file (or zip temp directory) in their documents directory, etc.) then you're not serious about security. Of course, our typical computer systems allow this by default, and in fact don't make it easy to disable.

Software restriction policies in Windows, however, has a lot of the qualities that are needed (e.g. free, built-in).

Diary Archives