Malicious spam with links to CryptoWall 3.0 - Subject: Domain [name] Suspension Notice

Published: 2015-11-05
Last Updated: 2015-11-06 02:03:39 UTC
by Brad Duncan (Version: 1)
9 comment(s)

2015-11-05 update:  After posting this diary, we started seeing reports of CryptoWall 4.0.  One of the people who analyzed this new CryptoWall variant provided me details, which you can read about at: http://malware-traffic-analysis.net/2015/11/05/index2.html

Introduction

Since Monday 2015-10-26, we've noticed a particular campaign sending malicious spam (malspam) with links to download CryptoWall 3.0 ransomware.  This campaign has been impersonating domain registrars.  Conrad Longmore blogged about it last week [1], and Techhelplist.com has a good write-up on the campaign [2].  Several other sources have also discussed this wave of malspam [3, 4, 5, 6, 7, 8 to name a few].

For this diary, we'll take a closer look at the emails and associated CryptoWall 3.0 malware.

The malspam

Based on what I've seen, this malspam was delivered to recipients who didn't use privacy protection when they registered their domains.  Their contact information is publicly-listed in the whois records for their domains.  Criminals behind the campaign are collecting this publicly-available information, impersonating the registrars, and sending malspam to the email addresses listed as points of contact.  Below are two examples of the emails I've found.


Shown above: Screenshot from one of the emails that spoofed Enom, Inc.


Shown above: Screenshot from one of the emails that spoofed Tucows, Inc.

Enom and Tucows are just two of the many examples people have reported.  When looking at the email headers, you'll find these were not sent from the actual registrars.  The sender addresses were spoofed.


Shown above: Header lines that show the first example was not sent by Enom, Inc.


Shown above: Header lines that show the second example was not sent by Tucows, Inc.

If you receive one of the emails, the link follows a specific pattern: http://[unrelated compromised website]/abuse_report.php?[your domain name].  The domain names are not important.  You can always get the malware by substituting any string of characters for the domain name in the URL (assuming no one has fixed the compromised website yet).


Shown above: I substituted a string of "X"s for the domain name in a URL from one of the emails.

The emails have different senders, and they contain a variety of domains in the URLs to download the malware.  I've compiled a list of the first 100 emails I found to provide an idea on the scope of this campaign.  Click here for a .CSV file of the list.


Shown above: Some of the emails seen from this CryptoWall 3.0 malspam campaign.

The malware

I grabbed a sample of the CryptoWall 3.0 on Tuesday 2015-11-03.  The sample was first submitted to Virus Total the previous day (Monday).

File name:  [domain name]_copy_of_complaints.pdf.scr

  • File size:  223.0 KB ( 228,354 bytes )
  • MD5 hash:  866f551ac050ce293bddfca62110d35a
  • SHA1 hash:  f11dcc4069e86d09f4b8a5a37a3a56756391ea40
  • SHA256 hash:  02f61cebe546041985f4dac3ad6cee83c4cdc6511ec265dc78afcd69c8ac46a9
  • First submitted to VirusTotal:  2015-11-02 20:17:03 UTC
  • Detection ratio:  25 / 55
  • VirusTotal Link  -  Malwr.com link  -  Hybrid-Analysis.com link

I ran the sample on two different Windows hosts and got two different Bitcoin addresses for the ransom payment.


Shown above: Decrypt instructions from the first infection with the CryptoWall 3.0 sample.


Shown above: Decrypt instructions from the second infection with the same CryptoWall 3.0 sample.

Traffic from the two infected hosts is consistent with CryptoWall 3.0 activity.


Shown above: Traffic filtered in Wireshark on the first infection with the CryptoWall 3.0 sample.


Shown above: Traffic filtered in Wireshark on the second infection with the same CryptoWall 3.0 sample.

I used tcpreplay in Security Onion on a pcap of traffic from the first infection.  The EmergingThreats (ET) and ET Pro rulesets showed alerts related to CryptoWall.


Shown above: ET and ET Pro alerts on traffic from the first infection.

I also used Snort with the Talos Registered ruleset to read the pcap.  That showed CryptoWall alerts as well.


Shown above: Alerts logged after reading a pcap of the infection traffic with Snort.

Final Words

If you receive one of these emails, and you download the file, you should see plenty of warnings the file is not safe.  In a company environment, properly-administered Windows hosts should prevent people from running the malware.

In my personal opinion, this malspam isn't a serious threat, especially to anyone aware of computer security.  So why do criminals run these campaigns?  Apparently, enough of their emails get through, people still fall for the malware, and their Windows computers are configured so they can run it.

As of Wednesday 2015-11-04, I haven't found any more of this malspam.  This might be temporary, or the criminals behind it might have started a different campaign.  Either way, it's always interesting to see the daily changes in our cyber threat landscape.

Pcaps and the malware sample used in this diary are available here.

---
Brad Duncan
Security Researcher at Rackspace
Blog: www.malware-traffic-analysis.net - Twitter: @malware_traffic

References:

[1] http://blog.dynamoo.com/2015/10/malware-spam-domain-domain-suspension.html
[2] https://techhelplist.com/spam-list/958-domain-suspension-notice-malware
[3] http://botcrawl.com/beware-of-fake-domain-suspension-notice-emails/
[4] https://grahamcluley.com/2015/10/bogus-web-domain-suspension-notice-leads-malware/
[5] http://www.hoax-slayer.com/domain-suspension-notice-malware-emails.shtml
[6] http://domainnamewire.com/2015/10/26/warning-domain-name-phishing-email-blast-going-on-right-now/
[7] http://www.domaininvesting.com/enom-spear-phishing-email-received/
[8] http://www.onlinethreatalerts.com/article/2015/10/29/domain-name-suspension-notice-for-the-violation-of-melbourne-it-ltd-abuse-policy/

Keywords:
9 comment(s)

Comments

Private registration's may not protect the registrant at least initially. I'm using 1and1's private registration. They use a proxy+number email address like proxy######@1and1-private-registration.com. I received 4 of these domain suspended emails between 10/27 and 11/2 from 2 different domains I have registered. 1and1 may be filtering them out now. According to their status page, they're aware of the problem.
I wonder if SPF / DKIM / DMARC might help prevent this malspam from getting through in the first place?

Or are the malspammers being careful to use a different domain name than what the purported registrar uses?
SmSec,

Thanks for the additional info! I figured that might be the case for some people, but I wasn't able to find any examples.

- Brad
[quote=comment#35501]I wonder if SPF / DKIM / DMARC might help prevent this malspam from getting through in the first place?

Or are the malspammers being careful to use a different domain name than what the purported registrar uses?[/quote]

It's possible. At least half of the emails I ran across were blocked by our mail filters as spam.

- Brad
I'm a Gandi customer. They have email protection enabled by default on all accounts. After sending their abuse department several samples, I was told that changing my email address would solve the issue. I've since sent them a link to this post in the hopes they pull their heads out of their backsides.

Thanks for the write-up!
Great timing with this article, as I was just reading about the NEW Cryptowall: CryptoWall 4.0 which has been released with new features such as encrypted file names!
See the links below:

http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/
https://www.reddit.com/r/sysadmin/comments/3rmv57/cryptowall_40_released_weve_already_seen_it_with/

As suggested, will blocking the malicious IP block work for thwarting this?
AAInfoSec,

Thanks! I just posted a guest blog by one of the people who helped with that Bleeping Computer blog post. For some more details, see: http://malware-traffic-analysis.net/2015/11/05/index2.html

Blocking the IP address or address blocks they posted in the Reddit discussion may not be very effective, because the criminals behind the campaign can easily switch to other IP addresses or blocks of addresses. If an organization's spam filter can detect zip-ed .js files as file attachments in an email, that would be effective against the malspam.

- Brad
I have a contact at Proofpoint - They are requesting we submit email samples - do you have any I could share with them?

http://www.proofpoint.com/us/mcafee

Thanks!
I found more information about CryptoWall ransomware from:http://guides.uufix.com/what-can-you-do-once-your-pc-is-infected-by-cryptowall-4-0-ransomware/

Diary Archives