After few days of inactivity, this malspam campaign is back and yesterday it was delivering Locky ransomware. The campaign is known for using PDF attachments with embedded malicious Word documents. 

Here is the traffic for a download session in NetWitness Logs and Packets:

malspam-locky-session.png

Note that an obfuscated file is first downloaded to an infected machine:

malspam-locky-files.png

Once the download is complete, it is de-obfuscated and the final payload is saved to the same directory:

malspam-locky-processtree.png

The checksum of the final payload is shown below:

malspam-locky-dropped.png

Analysis results on VirusTotal suggest it is a Locky ransomware variant. Malware-Traffic-Analysis.net mentions that this Locky variant would run only on a Windows XP machine.

Submitting the delivery document to What's This File service shows more information about the malicious PDF document.

malspam-locky-wtf-1.png

malspam-locky-wtf-2.png

malspam-locky-wtf-3.png

All the IOCs from those HTTP sessions were added to RSA FirstWatch Command and Control Domains feed on Live with the following meta values:

  • threat.source = 'rsa-firstwatch'
  • threat.category = 'malspam'
  • threat.description = 'delivery-domain'
Topic: