Friday, 23 January 2015

Delivery Confirmation mereway kitchens documents


Delivery Confirmation mereway kitchens emails are still being spammed containing a macro

These emails aren't from Mereway Kitchens at all, they just being used to make the email look more genuine, ie. from a real company.
Note
It's also worth remembering that the company itself  may not have any knowledge of this email and it's link(s) or attachment as it won't have come from their servers and IT systems but from an external bot net.

It's not advised to ring them as there won't really be anything they can do to help you.
Company:

Mereway Kitchens are leading manufacturers of high quality kitchen furniture, supplying to an extensive network of independent retail outlets nationwide.

Message Header:

From: "mereway kitchens" {sales.north@mereway.co.uk}
Subject: Delivery Confirmation
Message Body:
Delivery Confirmation
 Attachment:

K-DELC-28279.doc
Md5 Hashes:
6670f68ba6bdde18686210ba04abb727 [1]
a56a066bdac2a6ad9bee97ba1ae14483 [2]

Malware Macro document information:

VirusTotal Report [1] (hits 0/57 Virus Scanners)

VirusTotal Report [2] (hits 0/57 Virus Scanners)

Malwr Report [1]

Malwr Report [2]

Decoded Macro [1]

Decoded Macro [2]

Payload Information

Payload [1] : downloads from: http://webcredit.be/js/bin.exe
Payload [2] : downloads from: http://www.gmilitaru.home.ro/js/bin.exe

VirusTotal Report Payload [1] (hits 1/57 Virus Scanners)
VirusTotal Report Payload [2] (hits 1/57 Virus Scanners)

Hybrid-analysis Report Payload [1
Hybrid-analysis Report Payload [2]

Hosts Contacted:

185.48.56.72     80     TCP     United Kingdom
37.1.215.144     443     TCP     Ukraine
62.113.223.228     443     TCP     Germany
91.212.124.11     443     TCP     Ukraine


Sanesecurity signatures are blocking this as:

Sanesecurity.Malware.24676.DocHeur

NOTE

The current round of Word and Excel attachments are targeted at Windows users.

Apple and Android software can open these attachments and may even manage to run the macro embedded inside the attachment.

The auto-download file is normally a windows executable and so will not currently run on  any operating system, apart from Windows.

However, if you are an Apple/Android user and forward the message to a Windows user, you will them put them at risk of opening the attachment and auto-downloading the malware.

Currently these attachments try to auto-download Dridex, which is designed to

steal login information regarding your bank accounts (either by key logging, taking auto-screens hots or copying information from your clipboard (copy/paste))

Cheers,
Steve

No comments: