Oficla Trojan Spam Campaign (October 1, 2010)
SonicWALL UTM Research team observed a Facebook spam campaign involving a newer variant of Oficla Trojan in the last 3 days. The spam emails arrive with a zip archived attachment which contains the Oficla Trojan executable. The e-mail is drafted to appear as a Facebook password reset notification.
Campaign #1
Attachment: FacebookPassword.zip
Subject: Facebook password has been changed! ID444
Email Body:
————————
How to Avoid Moving Scams
Mass. woman pleads guilty in glass-eating scheme
————————
Campaign #2
Attachmentc: FaceBook_Password_Nr2829.zip
Subject: Your New Facebook password
Email Body:
————————
Dear user of facebook.
Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.
Thanks,
Your Facebook.
————————
Campaign #3
Attachmentc: FaceBook_Password_Nr27477.zip
Subject: Facebook Password Reset Confirmation!
Email Body:
————————
Dear user of facebook.
Because of the measures taken to provide safety to our clients, your password has been changed.
You can find your new password in attached document.
Thanks,
Your Facebook.
————————
Sample email messages looks like:
The executable files inside the attachment looks like this:
If the user opens the malicious attachment then it performs following activities on the victim’s machine:
- Network Activity:
- It connects to C&C server and receives commands
- It donwloads file from URL specified in command
- It send process information to remote C&C server
- File Activity:
It creates the following files
- %temp%4.tmp – Detected as GAV: Oficla.AFZ (Trojan)
- %temp%5.tmp – Detected as GAV: Scar.CUQT (Trojan)
- %windirsystem32bfky.ojo – Detected as GAV: Oficla.AFZ (Trojan)
- %windirsystem32svrwsc.exe – Detected as GAV: Scar.CUQT (Trojan)
- Process Activity:
- It injects itself into running svchost.exe process
- Registry Activity:
- It creates HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSvrWsc: %windirsystem32svrwsc.exe ensuring infection on system restart
- It modifies HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon with new value “Explorer.exe rundll32.exe bfky.ojo bwapp” ensuring malicious dll is loaded on system restart
SonicWALL Gateway AntiVirus provides protection against this Oficla Trojan variant with GAV: Oficla.AHB (Trojan) signature. [517,120 hits recorded in last 3 days]