2017-01-25 - ONGOING JAPANESE MALSPAM CAMPAIGN SPREADING URSNIF VARIANT

ASSOCIATED FILES:

 

NOTES:

 

EMAILS


Shown above:  Information from the spreadsheet tracker (part 1 of 2).

 


Shown above:  Information from the spreadsheet tracker (part 2 of 2).

 

EMAILS GATHERED:

(Read: Date/Time -- Sending address (spoofed) -- Subject -- Attachment)

 

ATTACHED ZIP ARCHIVES AND EXTRACTED FILES

SHA256 HASHES FOR THE EMAIL ATTACHMENTS:

 

SHA256 HASHES FOR THE EXTRACTED .WSF FILES:

 

TRAFFIC

HTTP REQUESTS BY THE .WSF FILES FOR THE URSNIF BINARY:

URSNIF POST-INFECTION TRAFFIC:

 

MALWARE

URSNIF SAMPLE:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.