We're currently receiving malware in at least five separate spam campaigns, with almost all of them being sent for the primary purpose of stealing login credentials.
The current campaign causing the most concern for us is the Microsoft Outlook Critical Update spam. This campaign comes in a very Official-looking email like this:
(click for larger image)
using one of these subject lines:
Critical Update for Microsoft Outlook
Install Critical Update for Microsoft Outlook
Install Update for Microsoft Outlook
Microsoft has released an update for Microsoft Outlook
Microsoft Outlook Critical Update
Microsoft Outlook Update
Update for Microsoft Outlook
which redirects the reader to a website that looks like this:
This is actually an image from one of the 79 different domain names used in this spam campaign, including these:
We have now received nearly 1,000 unique copies of this email, and have shared this information with appropriate Microsoft staff.
File size: 82432 bytes
MD5 : abadbbb846c07f71d4fb16dbde1cb561
VirusTotal shows 14 of 41 detects (25JUN09 AM)
This campaign is especially significant in that it ties to the dominant password stealing malware on the planet today, called "Zbot", which is short for the "Zeus Botnet". In this particular set of malware, the stolen login credentials are sent to the Ukrainian IP address 126.96.36.199, using the domain name "labormi.com".
This malware is especially interesting because it is clearly associated with a set of phishing sites which have been the most heavily spammed phishing campaign for a long time. Currently there is an active Bank of America phishing campaign and an active JP Morgan Chase phishing campaign using the same domain names as the Microsoft Critical Update malware distribution campaign:
With domain names like:
with domain names like:
Detecting ZBot Activity on your Network
One of the primary indicators of ZBot activity may be a computer which is fetching a ".bin" file from a remote computer. Zeus nodes do "context specific" keylogging. They are configured by updating a ".bin" file, which, after being decoded by the bot, will reveal a particular list of websites for which this node is supposed to steal passwords. In most cases, these are financial institution's websites. In addition to stealing passwords, injection of additional "personal information" questions is possible.
If you have nodes on your network downloading ".bin" files, it would be a good idea to do a google search using that domain name to see if you can find evidence that this is a Zeus node or Zbot node. For example, after being infected with the fake Microsoft Update malware above, our computers make a connection to "labormi.com" and fetch a file "lbr.bin". If we search Google for "labormi.com" and "zeus" we would quickly be able to see that this is a known Zeus controller, and we would know that the computer fetching this file is infected with a ZBot.
Other malware in the mail
There were several other malware-laden email messages we received today, just look at this inbox!!!
These messages looked like this . . .
"Unluckily we can't bring your parcel that was sent . . . "
Even more unluckily if you install the invoice they ask you to click on from:
Another email, pretending to be a fake "greeding card" (yeah, fooled me!) also linked to a "djellow" executable:
using the website http://76380.webhosting29.1blu.de/
Why would the malware be named "djellow.exe"? Because it also is a ZBot installer. And where is it's Zeus controller? Why on the website "djellow.com" of course!
But here is the best part . . .
The IP address for djellow.com? 188.8.131.52 ! The same as the Zeus controller for the fake Microsoft update!
We also received a ZBot claiming to be a "Statement Request".
this one asks us to "look at the statement on your account. The statement was issued today upon request, and your data has been successfully altered."
Of course the link to http://artemaliciacapoeira.be (slash) rep_7330.exe is yet another ZBot install!
Our last ZBot of the day came in looking like this:
and came from the site:
http://javiercubel.com (slash) video.exe
File size: 82432 bytes
MD5 : 4456e181232270adf022f682e8595ef3
This one turns out to be a slightly older ZBot. VirusTotal reports its detected by more than half of the 41 Anti-virus products they test -
Virus Total Report
More Naked Celebrities
The last round of malware today was naked celebrity spam. Subject lines included:
Best Hottest video! All Over The Net!
hottest movies updates
New portal of mad videos! Click Here!
With the entire message body as a link to the malware at:
ad-videozz.com (slash) movie.avi.exe
Message bodies included things like:
Jessica Alba Nude! The Dark Angel returns, but this time naked! Well, maybe not.
Jessica Alba nude is a fantasy for most straight men though.
Paris Hilton Video.
Information and links about the public scandal around Paris Hilton's alleged sex tape.
Private has gathered together a steamy collection of some of their best hardcore action, starring horny hotties like Sophie Evans, Patricia, Sandra Russo.
Janet Jackson Superbowl Scandal! Click below to see.
Tennis star Anna Kournikova can't play tennis, but she can strut her stuff!
Angelina Jolie Nude. Click below to see.
This malware isn't another ZBot though - this one is good old fashioned ScareWare.
File size: 132096 bytes
MD5 : 0029a989eb18e4215b122a3d565c7b3a
It currently detects at Virus Total by 10 of 41 anti-virus products:
Virus Total Report