2016-11-04 - MALWARE INFECTION FROM LINK IN EMAIL

NOTICE:

ASSOCIATED FILES:

  • 2016-11-04-infection-traffic-from-link-in-email.pcap   (7,508,637 bytes)
  • 2016-11-04-email-spoofing-Facebook-1230-UTC.eml   (10,865 bytes)
  • File-Fwd.dll   (4,108,800 bytes)
  • IMG_68794206_0521890.js   (9,587 bytes)
  • IMG_68794206_0521890.zip   (3,238 bytes)

NOTES:

 

EMAIL


Shown above:  Screenshot of the email.

 


Shown above:  Clicking on one of the links in the email (it's a goo[.]gl URL).

 


Shown above:  File downloaded from the goo[.]gl link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  Alerts using tcpreplay on the first pcap with the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion.

 

ASSOCIATED DOMAINS:

 

FILE HASHES

Zip archive downloaded from any of the goo[.]gl links in the email:

.js file extracted from the zip archive:

DLL file dropped on the infected Windows host:


Shown above:  Artifacts from the infected host.

 

Click here to return to the main page.