Currently being served up in a spam campaign, subject line of "Hot News":
http://www.infosecurity-magazine.com/vi ... um=twitter
Example URLs:
hxxp://
www.ceipjuandelacosa.es/xbnawwq/yqvjsycp/qlzgqergbpcrf
hxxp://
www.alive-jugo.de/txoc/ohbwwhrdifcs/wvvennwrhkhru
hxxp://
www.foto-saul.de/pjppdf/pxpyoicoyas/jpkhlsvjtmto
hxxp://akgunhakan.com/xirbgex/purjevbfzyrcchm?pappeuykctexb
URLs are the start of a 3 tier redirect chain, which will redirect to hxxp://androidcloudsecurityupdate.su if an Android UAS is detected.
The next two redirects follow if the correct referrer and UAS detected:
hxxp://androidcloudsecurityupdate.su/fixup.php
hxxp://androidcloudsecurityupdate.su/fixup2.php <-- serves security.update.apk
If a non-Android UAS is used, it simply serves up generic web spam.
Decrypted config file - C2 servers:
24377710093445.su:443
tazmanski.ru:443
20/45
https://www.virustotal.com/en/file/2df2 ... /analysis/