Malspam activity was observed on February 13th delivering a variant of ISR password stealer. ISR was reportedly used in spear phishing attacks against food and machine industries. In this blog post we will discuss the network activity using RSA NetWitness Packets.
The delivery document Payment receipt.doc is crafted to exploit CVE-2017-11882. You can learn more about the vulnerability in this FirstWatch threat advisory.
Opening the malicious document with an un-patched Microsoft Word application led to the following network activity:
Once 99v.exe executes on the victim machine, it starts to communicate with what looks to be a compromised Wordpress website transeagleperu[.]com:
Since the User-Agent string used in this session is common to ISR variants, it was tagged with the value known bad ua credentialleak under Indicators of Compromise meta key:
It is worth mentioning that the delivery domain menorasarainc[.]info has been active over the past week:
Payment receipt.doc (SHA256):
99v.exe (SHA256):
All the IOC from those HTTP sessions were added to RSA FirstWatch Command and Control Domains on Live with the following meta:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.