Threat Level: green Handler on Duty: Richard Porter

SANS ISC Internet Storm Center

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

ISC StormCast for Monday, November 30th 2015

Known ?Good? DNS, An Observation

Published: 2015-11-26
Last Updated: 2015-11-26 19:40:21 UTC
by Richard Porter (Version: 1)
0 comment(s)

This has come up enough it seems worth noting for this U.S. Thanks Giving Holiday. The concept of public Domain Name Service (DNS) is not new, but worth discussing both the merits and pitfalls.  We’ve discussed DNS here quite a bit over the years, for a prospectus [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14].

There are a few (this is not an endorsement *quickly looks around for legal counsel and dodges them*) good services around that are known. Some ones worth mentioning that seem to be well maintained and have a free service for personal use:



Google DNS

This might be a good way to also help out those friends and family that *sarcasm* inevitably call us for Information Technology support, and help make them a ‘little bit’ better off. Your mileage may vary… 

To those in the U.S., or abroad, or whomever is celebrating Thanks Given, have a happy one!















0 comment(s)

Malicious spam - Subject: RE: Bill

Published: 2015-11-25
Last Updated: 2015-11-26 01:15:27 UTC
by Brad Duncan (Version: 1)
8 comment(s)


Earlier today (Wednesday 2015-11-25), one of our readers notified the ISC of malicious spam (malspam) with a Word document designed to infect a Windows computer with malware.  I found examples of the malspam and looked into it.  Word documents from this particular campaign will download Pony malware to infect a Windows computer with Vawtrak.  This malspam was blocked by our spam filters, but others might see it, so I'm posting the information in a diary.

Thanks for the heads up, Travis!

The emails

The emails spoof your company name (or whatever domain you're using for your email address), and they have a Microsoft Word document as an attachment.  The one's I've found have all been plain-text.

From: "accounting@[your company].com"
Reply-To: "accounting@[your company].com"
Date: Wednesday, 2015-11-25 at 09:37 CDT
To: [your email address]
Subject: Re: bill

This bill just came through and it has your name on it.
What is this about?

Este email está livre de vírus e malware porque a proteção avast! Antivirus está ativa.

Attachment: Bill.doc

The messages all have a notification at the bottom stating "This email is free of viruses and malware protection because the Avast! Antivirus is active."  These antivirus messages were all in different languages, based on the host these emails were sent from.

Shown above: Example of the malspam with a different language for the antivirus notification.

We saw this malspam come from senders at the following IP addresses:

  • 2015-11-25 15:06 UTC -  (
  • 2015-11-25 15:36 UTC -  (
  • 2015-11-25 15:59 UTC -  (
  • 2015-11-25 16:14 UTC -  (
  • 2015-11-25 16:26 UTC -  (

Shown above:  An example of the email headers from this malspam.

The attachment

The attachment is a Microsoft Word document with malicious macros.  The sample had already been submitted to VirusTotal (link), but it only had a 1 / 55 detection rate when I first checked.  I enabled the document's macros in a controlled environment to infect a Windows host.

Shown above: The malicious document opened in Word 2007.

The infection traffic

Infecting a host with the malware generated traffic that matched a Pony downloader infecting a Windows computer with Vawtrak.

Shown above: A pcap of the infection traffic filtered in Wireshark by HTTP request.

I reviewed the infection traffic using Security Onion with the EmergingThreats Pro signature set.  I saw alerts for Fareit/Pony and Vawtrak.

Shown above: Some of the alerts in Sguil on Security Onion.

The following IP addresses and domain names were associated with this Pony/Vawtrak infection:

  • -
  • -
  • -
  • -
  • -

Malware and artifacts from the infected host

The Word document caused the following artifacts to appear in the infected user's AppData\Local\Temp directory:

Shown above: Artifacts from the infected user's AppData/Local/Temp directory.

  • 12.rtf - MD5 hash: 6dfd5c9274b1ecb1bad095cb8f00100e - VirusTotal link
  • 13.rft - MD5 hash: f08febf78a641505c13746fd38ed09c3 - VirusTotal link
  • 721723.exe (also HadFeqt.exe) - MD5 hash: a054dfe5575c59f6bd96fc395041eb93 - VirusTotal link
  • st11.exe - MD5 hash: bd86e1a8a35b12841ee6694dcc607cd0 - VirusTotal link

Both st11.exe and 721723.exe deleted themselves shortly after appearing in the directory.  st11.exe is the Pony downloader.  721723.exe is Vawtrack, which copied itself to another directory and updated the infected host's registry to remain persistent.

Shown above: The Vawtrak malware from this infection.

Final words

Malspam with a Word document that causes Pony to download more malware is not uncommon.  It's just another example of the many types of malspam we see blocked by our spam filters on a daily basis.

Email examples, traffic, and malware from this diary can be found here.

Many thanks to our readers, who continue to notify us of suspicious activity!

Brad Duncan
Security Researcher at Rackspace
Blog: - Twitter: @malware_traffic

8 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Malicious spam - Subject: RE: Bill
4 days ago by Brad (7 comments)

Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA
6 days ago by Johannes (4 comments)

BizCN gate actor sends CryptoWall 4.0
6 days ago by Brad (8 comments)

View All Diaries →

Latest Discussions

New software version released
created 1 week ago by Xme (0 replies)

AV Scans through a Write-Blocker
created 1 week ago by Anonymous (3 replies)

The Botnet of the Internet of Things
created 1 week ago by Xme (0 replies)

Twitter confirmation spam
created 2 weeks ago by Anonymous (1 reply)

ProtonMail DDOS Attacks
created 2 weeks ago by Rick (0 replies)

View All Forums →

Latest News

View All News →

Top Diaries

November 2015 Microsoft Patch Tuesday
2 weeks ago by Johannes (8 comments)

Microsoft Patch Tuesday followup: KB3097877 re-issued!
2 weeks ago by Rick (9 comments)

Cisco Cloud Web Security DNS Hijack
2 weeks ago by Rick (6 comments)

Actors using exploit kits - How they change tactics
1 week ago by Brad (2 comments)

Help Wanted: Please help test our experimental PFSense Client
1 week ago by Johannes (1 comment)