A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #27357  by shibumi
 Fri Dec 04, 2015 6:23 pm
Dear Kernelmode-Community,
Some weeks ago I got some malware-attached emails by interfax.org. It' was a zip archive that contains a *.doc.js file as dropper for other binaries.
I want to share this case with you. Here is a quick-overview:

Image

You can read my full-report on my blog http://en.nullday.de/it-sec/2015/11/29/ ... rs-part-1/. So I will make it short.
I attached a 7z-archive with this post. You'll find in this archive:

3 directories with files:
executables (contains all executables that I could grab)
js-dropper (contains all JS-Droppers that I could collect)
payloads (The deobfuscated payload of all JS-Droppers)

and these two 'special'-files:

download.sh (it's a script for downloading all executables via crafted wget's. Created by me for collecting all executables)
whois-report.txt (Whois-Report about all malicious hosts.. many yahoo-hosts(!!) )
Attachments
password as usual
(1.29 MiB) Downloaded 65 times