2025-05-12: Unidentified malware infection from email attachment
2025年5月12日发生一起未知恶意软件感染事件,通过邮件附件传播。该恶意软件从ZIP附件中提取并运行可执行文件,在系统中创建持久化启动项,并与C2服务器通信。 2025-4-13 00:7:0 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:1 收藏

2025-05-12 (MONDAY): UNIDENTIFIED MALWARE INFECTION FROM EMAIL ATTACHMENT

NOTES:

  • Zip files are password-protected.  Of note, this site has a new password scheme.  For the password, see the "about" page of this website.

ASSOCIATED FILES:

2025-05-12 (MONDAY): UNIDENTIFIED MALWARE INFECTION FROM EMAIL ATTACHMENT

INFECTION CHAIN:

- email --> attachment --> extracted EXE file for the malware

SELECT HEADER LINES FROM THE EMAIL:

- Received: from etsdc.com (unknown [185.222.57[.]74]); Mon, 12 May 2025 08:45:35 UTC
- Date: 12 May 2025 01:45:33 -0700
- From: Sedra Al Jundi 
- Subject: RE: Urgent: Confirmation Required for Invoice & Down Payment Details
- Message-ID: <20250512014532.63FE56B89701F86C@etsdc[.]com>
- Attachment file name: invoice_10988.xz

ATTACHMENT AND EXTRACTED MALWARE:

- SHA256 hash: 341f58943626dec0cabc58fbec4f7263125ec1ed75e0c97418cefe0ca23c6a25
- File size: 1,427,085 bytes
- File name: invoice_10988.xz
- File type: Zip archive data, at least v2.0 to extract
- File description: Email attachment, a zip archive with an .xz file extension

- SHA256 hash: f757fc452dbb8eb564081d3decfdb31ec24fc4b91e22ee8088cb5884729cc99a
- File size: 1,515,520 bytes
- File name: invoice_10988.img
- File type: ISO 9660 CD-ROM filesystem data 'KTMBE25040170'
- File description: Disk image extracted from the above zip archive

- SHA256 hash: 116c096a488f53b298d3bac99942770afd3d791ae376534f050e6e4642c2fbb4
- File size: 1,464,320 bytes
- File name: KTMBE25040170.exe
- Post-infection file location: C:\Users\[username]\AppData\Roaming\Count.exe
- File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
- File description: Windows EXE extracted from the above disk image

POST-INFECTION TRAFFIC:

- 176.65.144[.]169 port 7702 - mxcnss.dns04[.]com - encoded/encrypted TCP traffic

PERSISTENCE:

- Location: C:\Users\[username]\AppData\Roaming\Windows\Start Menu\Programs\Startup\Count.vbs
- File content: CreateObject("WScript.Shell").Run """C:\Users\[username]\AppData\Roaming\Count.exe"""


Shown above:  Screenshot of the email with the malicious attachment.


Shown above:  Traffic from an infection filtered in Wireshark, and TCP stream showing 412 kB of data sent from C2 server to the infected host.


Shown above:  TCP stream showing 1,224 kB of data sent from the infected host to the C2 server.


Shown above:  The malware persistent on an infected Windows host.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2025/05/12/index.html
如有侵权请联系:admin#unsafe.sh