Rise in Zeus spam campaigns (July 30, 2010)

By

Updated on August 02, 2010 11:30 AM PST

SonicWALL UTM Research team has observed an increase in spam campaigns involving new variants of Zeus banking Trojan in last 24 hours. These spam campaigns included two new themes like Social Security Annual statement pretending to be arriving from Social Security Administration and Fraudulent Credit Card transaction report pretending to arriving from ATM Electronic Report system.

SonicWALL has received more than 100,000 e-mail copies from these spam campaigns till now. The email messages in all these spam campaigns have a zip archived attachment which contain the new variants of Zbot Trojan executable. The sample e-mail format from each spam campaign is shown below:

Campaign #1 – Social Security Annual statement

Attachment: statement.zip (contains statement.exe)

Subject: Review your annual Social Security statement

Email Body:
————————
Due to possible calculation errors, your annual Social Security statement may contain errors.

Open attached file to review your annual Social Security statement.
————————

The email message looks like:

screenshot

Campaign #2 – Fraudulent Credit Card Transaction report

Attachment: report.zip (contains report.exe)

Subject: Possible Fraudulent Transaction

Email Body:
————————
Dear VISA card holder,

A recent review of your transaction history determined that your card was used at an ATM located in Peru, but for security reasons the requested transaction was refused.Please carefully review electronic report for your VISA card (attach to this letter)
————————

The email message looks like:

screenshot

Campaign #3 – Password Reset

Attachment: password.zip (contains password.exe)

Subject: Password Reset Confirmation

Email Body:
————————
Hello,

Because of the measures taken to provide safety to our clients, your password has been changed. You can find your new password in attached document.

Thanks,
————————

The email message looks like:

screenshot

The executable files inside the attachment looks like:

screenshot

If the user downloads and executes the malicious executable inside the zip attachment, it performs following activity:

  • Drops following files:
    • (Application Data)Adliudikz.exe – Detected as GAV: Zbot.ALYP (Trojan)
    • (Application Data)Cutufymus.piz
  • Registry modification:
    • HKUSoftwareMicrosoftInternet ExplorerPrivacyCleanCookies = 0x00000000
    • HKU\SoftwareMicrosoftWindowsCurrentVersionRun{31F6212F-0693-C632-DA88-C26F74578F5F}: (Application Data)Adliudikz.exe
  • Network activity:
    • Downloads encrypted configuration file from a predetermined Zeus C&C domain zephehooqu.ru – GET /bin/koethood.bin
    • Sends information to a predetermined Zeus C&C domain jocudaidie.ru – POST /9xq/_gate.php
  • Deletes the original copy of the malware executable.

SonicWALL Gateway AntiVirus provided proactive protection against above spam campaigns by following signatures:

  • GAV: Zbot.PSQ (Trojan) [1,611,630 hits recorded in last 24 hours]
  • GAV: Suspicious#bredolab_3 (Trojan) [983,152 hits recorded in last 24 hours]

screenshot

screenshot

[Update – August 02, 2010] SonicWALL UTM Research team observed a big spike in the Zeus spam campaign over the weekend and SonicWAL Gateway AntiVirus continued to provide proactive protection via following signature:

  • GAV: Suspicious#bredolab_3 (Trojan) [15 million hits recorded in last 4 days]

screenshot

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.