Site icon WinCert

UPS Tracking Number # Virus warning!

<p><a href&equals;"http&colon;&sol;&sol;wincert&period;net&sol;wp-content&sol;uploads&sol;2015&sol;01&sol;security&period;jpg"><img class&equals;"alignnone size-full wp-image-564" src&equals;"http&colon;&sol;&sol;wincert&period;net&sol;wp-content&sol;uploads&sol;2015&sol;01&sol;security&period;jpg" alt&equals;"security box&comma;secure&comma;malware&comma;virus&comma;protection&comma;messenger" width&equals;"720" height&equals;"340" &sol;><&sol;a><&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;008000&semi;">Update&colon; Upon our submission of this threat to Microsoft&comma; they have confirmed that this threat is classified as the new variant of TrojanDownloader&colon;Win32&sol;Bredolab&period;AC&period; &lpar;check the rest of the article for more information&rpar;<&sol;span><&sol;p>&NewLine;<p>I&&num;8217&semi;ve received several suspicious e-mails in the last couple of days&comma; so I&&num;8217&semi;ve decided to check the contents of the attached &period;zip file and without a surprise&comma; there was an &period;exe file in it&period;<&sol;p>&NewLine;<p><&excl;--more--><&sol;p>&NewLine;<p>What is not good&comma; is the fact that neither Microsoft Security Essentials antivirus nor Eset Nod32 wasn&&num;8217&semi;t able to detect it once I&&num;8217&semi;ve scanned the file&period;<&sol;p>&NewLine;<p>At least Microsoft Outlook mail scanner marked this mail as spam&period; So I wasn&&num;8217&semi;t entirely unprotected &colon;&rpar;<&sol;p>&NewLine;<p>The bogus message subject is something like this&colon;<&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;003366&semi;">Subject&colon; UPS Tracking Number 8279775&period;<&sol;span><&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;993300&semi;"><span style&equals;"color&colon; &num;003366&semi;">Sender&colon; UPS Manager Ramona Mock<&sol;span> &lpar;<a href&equals;"mailto&colon;parcel&commat;ups&period;com">parcel&commat;ups&period;com<&sol;a>&rpar;<&sol;span><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>Here&&num;8217&semi;s the subject of the mail&colon;<&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>Dear customer&excl; <&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>The courier company was not able to deliver your parcel by your address&period;<br &sol;>&NewLine;Cause&colon; Error in shipping address&period; <&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>You may pickup the parcel at our post office personaly&excl;<&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>Please attention&excl;<br &sol;>&NewLine;The shipping label is attached to this e-mail&period;<br &sol;>&NewLine;Please print this label to get this package at our post office&period;<&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>Please do not reply to this e-mail&comma; it is an unmonitored mailbox&period;<&sol;em><&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><em>Thank you&period;<br &sol;>&NewLine;United Parcel Service&period;<br &sol;>&NewLine;The attachment actually contains a virus which may infect the user&&num;8217&semi;s computer&period; <&sol;em><&sol;p>&NewLine;<p>When I googled for more information on this virus&comma; I&&num;8217&semi;ve found out that similar virus was released almost 2 years ago&comma; so apparently this is a new variant of it&comma; as AV scanners were unsuccessful in detecting the threat&period; So far I&&num;8217&semi;ve tried to detect the threat using &&num;8216&semi;only&&num;8217&semi; Microsoft Security Essentials and Nod32 antivirus&period;<&sol;p>&NewLine;<p>Here is the warning about UPS virus which was released about 18 months ago&period;<&sol;p>&NewLine;<p style&equals;"padding-left&colon; 30px&semi;"><span style&equals;"color&colon; &num;008000&semi;">The newest virus circulating is the UPS&sol;Fed Ex Delivery Failure&period; You will receive an email from UPS&sol;Fed Ex Service along with a packet number&period;&period; It will say that they were unable to deliver a package sent to you on such-and-such a date&period; It then asks you to print out the invoice copy attached&period; DON&&num;8217&semi;T TRY TO PRINT THIS&period; IT LAUNCHES THE VIRUS&excl; Pass this warning on to all your PC operators at work and home&period; This virus has caused Millions of dollars in damage in the past few days&period;<&sol;span><&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;008000&semi;"><span style&equals;"color&colon; &num;333333&semi;">I can&&num;8217&semi;t be sure of what damage it can cause to your computer&comma; but I guess it is variant of UPS trojan virus and I can only advise you upon receiving similar mail&comma; to immediately delete it&period;<&sol;span><&sol;span><&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;008000&semi;"><span style&equals;"color&colon; &num;333333&semi;"><span style&equals;"color&colon; &num;008000&semi;">Update&colon;<&sol;span> I have submitted suspicious file to the Microsoft Malware Protection Center &lpar;MMPC&rpar;&period; I will update this article&comma; as soon as I get more info on this&period;<&sol;span><&sol;span><&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;008000&semi;">Update &num;2&colon; <&sol;span>I received a reply from Microsoft and they confirmed this threat this threat is classified as <span style&equals;"color&colon; &num;993300&semi;">TrojanDownloader&colon;Win32&sol;Bredolab&period;AC<&sol;span>&period; A downloader trojan accesses remote websites in an attempt to download and install malicious or potentially unwanted software&period;<&sol;p>&NewLine;<p>According to Microsoft&comma; this Trojan variant was discovered on Dec16&comma; 2009&comma; but this appears to be a new variant which is the reason why it wasn&&num;8217&semi;t discovered by Anti-Virus scanners&period;<&sol;p>&NewLine;<p>Important NOTE&colon; Upon my submission of this threat to Microsoft&comma; they have updated virus definitions as seen below&colon;<&sol;p>&NewLine;<p>Detection last updated&colon;<br &sol;>&NewLine;Definition&colon; 1&period;71&period;2267&period;0<br &sol;>&NewLine;Released&colon; Jan 15&comma; 2010<&sol;p>&NewLine;<p>BUT&comma; have in mind that if you&&num;8217&semi;re using Microsoft Security Essentials&comma; virus definitions might not be updated automatically&period; I adivise you to open the Microsoft Security Essentials&comma; select the &&num;8216&semi;update&&num;8217&semi; tab and click on the &&num;8216&semi;Update&&num;8217&semi; button&period; You will now be protected&period;<&sol;p>&NewLine;<p>Here is the screenshot of successful detection of this new threat<&sol;p>&NewLine;<p><img class&equals;" size-full wp-image-75" src&equals;"http&colon;&sol;&sol;wincert&period;net&sol;wp-content&sol;uploads&sol;2010&sol;01&sol;removing&lowbar;bredolab&period;PNG" alt&equals;"" width&equals;"586" height&equals;"315" border&equals;"0" &sol;><&sol;p>&NewLine;<p>Anyway&comma; let&&num;8217&semi;s get on what this Trojan actually does on your PC&period;<&sol;p>&NewLine;<p><strong>System changes<&sol;strong><&sol;p>&NewLine;<p>The following system changes may indicate the presence of this malware&colon;<br &sol;>&NewLine;The presence of the following files&colon;<br &sol;>&NewLine;<span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;digeste&period;dll<br &sol;>&NewLine;&lt&semi;system folder&gt&semi;&bsol;digiwet&period;dll<br &sol;>&NewLine;&lt&semi;system folder&gt&semi;&bsol;mcenspc&period;dll<br &sol;>&NewLine;&lt&semi;system folder&gt&semi;&bsol;msansspc&period;dll<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;asgupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;dfqupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;dmaupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;fmnupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;ihaupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;imiupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;legupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;ppqupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;rqjupd32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;ikowin32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;wbhwin32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;hcgwin32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;fqosys32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;lecsys32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;necsys32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;rncsys32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;ysfsys32&period;exe<br &sol;>&NewLine;&percnt;startup&percnt;&bsol;zqosys32&period;exe<br &sol;>&NewLine;&lt&semi;system folder&gt&semi;&bsol;wbem&bsol;grpconv&period;exe<br &sol;>&NewLine;&percnt;appdata&percnt;&bsol;wiaserva&period;log<&sol;span><&sol;p>&NewLine;<p><strong>The presence of the following registry modifications&colon;<&sol;strong><br &sol;>&NewLine;To subkey&colon; HKLM&bsol;SYSTEM&bsol;CurrentControlSet&bsol;Control&bsol;SecurityProviders<br &sol;>&NewLine;Sets value&colon; &&num;8220&semi;SecurityProviders&&num;8221&semi;<br &sol;>&NewLine;With data&colon; &&num;8220&semi;msapsspc&period;dll&comma; schannel&period;dll&comma; digest&period;dll&comma; msnsspc&period;dll&comma; digeste&period;dll&&num;8221&semi;<&sol;p>&NewLine;<p><strong>Technical Information &lpar;Analysis&rpar;<&sol;strong><br &sol;>&NewLine;Win32&sol;Bredolab is a downloader which is able to download and execute arbitrary files from a remote host&period;<br &sol;>&NewLine;Installation<&sol;p>&NewLine;<p>Win32&sol;Bredolab has changed its method of installation over time&period; When older variants of Win32&sol;Bredolab are executed&comma; they copy themselves to one of the following locations&comma; converting their EXE to a DLL&colon;<&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;993300&semi;"><span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;digeste&period;dll<&sol;span><br &sol;>&NewLine;<span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;digiwet&period;dll<&sol;span><br &sol;>&NewLine;<span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;mcenspc&period;dll<&sol;span><br &sol;>&NewLine;<span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;msansspc&period;dll<&sol;span><br &sol;>&NewLine;<&sol;span><br &sol;>&NewLine;The registry is then modified to ensure that the DLL is loaded&period; For example&colon;<br &sol;>&NewLine;To subkey&colon; <span style&equals;"color&colon; &num;003366&semi;">HKLM&bsol;SYSTEM&bsol;CurrentControlSet&bsol;Control&bsol;SecurityProviders<&sol;span><br &sol;>&NewLine;Sets value&colon; <span style&equals;"color&colon; &num;993300&semi;"><span style&equals;"color&colon; &num;003366&semi;">&&num;8220&semi;SecurityProviders&&num;8221&semi;<&sol;span><br &sol;>&NewLine;<&sol;span>With data&colon; <span style&equals;"color&colon; &num;993300&semi;"><span style&equals;"color&colon; &num;003366&semi;">&&num;8220&semi;msapsspc&period;dll&comma; schannel&period;dll&comma; digest&period;dll&comma; msnsspc&period;dll&comma; digeste&period;dll&&num;8221&semi;<&sol;span><br &sol;>&NewLine;<&sol;span><br &sol;>&NewLine;More recent variants of Win32&sol;Bredolab copy themselves to the &percnt;startup&percnt; folder using one of the following variable filenames&colon;<&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;003366&semi;">asgupd32&period;exe<br &sol;>&NewLine;dfqupd32&period;exe<br &sol;>&NewLine;dmaupd32&period;exe<br &sol;>&NewLine;fmnupd32&period;exe<br &sol;>&NewLine;ihaupd32&period;exe<br &sol;>&NewLine;imiupd32&period;exe<br &sol;>&NewLine;legupd32&period;exe<br &sol;>&NewLine;ppqupd32&period;exe<br &sol;>&NewLine;rqjupd32&period;exe<br &sol;>&NewLine;ikowin32&period;exe<br &sol;>&NewLine;wbhwin32&period;exe<br &sol;>&NewLine;hcgwin32&period;exe<br &sol;>&NewLine;fqosys32&period;exe<br &sol;>&NewLine;lecsys32&period;exe<br &sol;>&NewLine;necsys32&period;exe<br &sol;>&NewLine;rncsys32&period;exe<br &sol;>&NewLine;ysfsys32&period;exe<br &sol;>&NewLine;zqosys32&period;exe<&sol;span><&sol;p>&NewLine;<p>Or they may use the following location&colon;<&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;003366&semi;">&lt&semi;system folder&gt&semi;&bsol;wbem&bsol;grpconv&period;exe<&sol;span><&sol;p>&NewLine;<p><strong>Payload<&sol;strong><&sol;p>&NewLine;<p>Downloads and executes arbitrary files<br &sol;>&NewLine;Win32&sol;Bredolab contacts a remote host&comma; and receives a response from the master server that contains at least one encrypted binary&period; Downloaded binaries are decrypted and executed&period;<&sol;p>&NewLine;<p>Win32&sol;Bredolab may use a randomly named file name for downloaded binaries on the local machine&period; Binaries may be saved to the following location&colon;<&sol;p>&NewLine;<p><span style&equals;"color&colon; &num;993300&semi;"><span style&equals;"color&colon; &num;003366&semi;">&percnt;windir&percnt;&bsol;Temp&bsol;wpv&lbrack;numbers&rsqb;&period;exe<&sol;span><br &sol;>&NewLine;<&sol;span><br &sol;>&NewLine;In the wild&comma; Win32&sol;Bredolab has been observed to contact the following control servers&colon;<br &sol;>&NewLine;58&period;65&period;235&period;41<br &sol;>&NewLine;78&period;109&period;29&period;116<br &sol;>&NewLine;78&period;109&period;29&period;112<br &sol;>&NewLine;91&period;207&period;61&period;12<br &sol;>&NewLine;213&period;155&period;4&period;82<br &sol;>&NewLine;dollarpoint&period;ru<br &sol;>&NewLine;imoviemax&period;ru<br &sol;>&NewLine;mudstrang&period;ru<br &sol;>&NewLine;vanni-van&period;cn<br &sol;>&NewLine;gssmedia&period;cn<br &sol;>&NewLine;www&period;qoeirq&period;com<&sol;p>&NewLine;<p><strong>The following list details just a small selection of the malware known to be downloaded by variants of Win32&sol;Bredolab&colon;<&sol;strong><br &sol;>&NewLine;Win32&sol;Ambler<br &sol;>&NewLine;Win32&sol;Boaxxe<br &sol;>&NewLine;Win32&sol;Busky<br &sol;>&NewLine;Win32&sol;Cbeplay<br &sol;>&NewLine;Win32&sol;Cutwail<br &sol;>&NewLine;Win32&sol;Daurso<br &sol;>&NewLine;Win32&sol;FakeRean<br &sol;>&NewLine;Win32&sol;FakeSpypro<br &sol;>&NewLine;Win32&sol;Haxdoor<br &sol;>&NewLine;Win32&sol;Hiloti<br &sol;>&NewLine;Win32&sol;Insnot<br &sol;>&NewLine;Win32&sol;Koobface<br &sol;>&NewLine;Win32&sol;Momibot<br &sol;>&NewLine;Win32&sol;Oderoor<br &sol;>&NewLine;Win32&sol;Oficla<br &sol;>&NewLine;Win32&sol;Otlard<br &sol;>&NewLine;Win32&sol;Rlsloup<br &sol;>&NewLine;Win32&sol;Rustock<br &sol;>&NewLine;Win32&sol;Sinowal<br &sol;>&NewLine;Win32&sol;Tedroo<br &sol;>&NewLine;Win32&sol;Ursnif<br &sol;>&NewLine;Win32&sol;Vundo<br &sol;>&NewLine;Win32&sol;Waledac<br &sol;>&NewLine;Win32&sol;Wantvi<br &sol;>&NewLine;Win32&sol;Winwebsec<br &sol;>&NewLine;Win32&sol;Wopla<br &sol;>&NewLine;Win32&sol;Zbot<&sol;p>&NewLine;<p><strong>Additional Information<&sol;strong><&sol;p>&NewLine;<p>Some variants of Win32&sol;Bredolab may create the following file during execution&colon;<br &sol;>&NewLine;&percnt;appdata&percnt;&bsol;wiaserva&period;log<&sol;p>&NewLine;<p>You can also get more information on <a href&equals;"https&colon;&sol;&sol;www&period;microsoft&period;com&sol;security&sol;portal&sol;Threat&sol;Encyclopedia&sol;Entry&period;aspx&quest;Name&equals;Win32&sol;Bredolab" target&equals;"&lowbar;blank">Microsoft Security Portal<&sol;a>&period;<&sol;p>&NewLine;

Exit mobile version