2016-05-05 - THURSDAY MALWARE HUNT - LOCKY RANSOMWARE AND DRIDEX

NOTICE:

ASSOCIATED FILES:

 

NOTES:

The Palo Alto Networks Unit 42 blog about Locky ransomware can be found here, and Proofpoint's blog about Dridex actors sending Locky ransomware is available here.

Zip attachments sent by "Jaypee" (a spoofed sender) contain text files, but the files names have no extentions.  I ran them after appending .js to the file names.

 

EMAILS AND ATTACHMENTS


Shown above:  Data from the .csv spreadsheet on 12 examples from today's emails.

 


Shown above:  Data from the .csv spreadsheet on 12 attachments from today's emails.

 

TRAFFIC


Shown above:  Traffic from executing the extracted .js files, filtered in Wireshark.

 


Shown above:  Post-infection traffic seen from the Dridex sample.

 

DRIDEX INFECTION TRAFFIC:

 

HTTP REQUEST BY .JS FILES FOR LOCKY RANSOMWARE:

 

LOCKY RANSOMWARE POST-INFECTION TRAFFIC:

 

ZIP ARCHIVE CONTENTS

 

Click here to return to the main page.