Malspam activity was noted on July 20 2017 delivering BEBLOH banking trojan. BEBLOH has been around since 2009 and has the ability to steal money from unsuspecting victims right off their bank accounts . Based on the noticed delivery documents it seems this campaign is targeting users in Japan.
Scan results of a delivery document can be found here. Here is a screenshot taken of the malicious spreadsheet:
Submitting the spreadsheet to RSA's pre-release What's This File service shows maximum threat score:
What's This File service also shows the embedded VBA code:
Here is the host behavior upon opening the delivery document on a machine with RSA NetWitness Endpoint agent installed:
Obfuscated powershell code is used to download an executable to a local directory. The screenshot below shows the download activity in RSA NetWitness:
VirusTotal scan results of the download executable suggest it is a BEBLOH variant. The EXE is saved to the user Documents folder as %appdata%.exe
Here is the process tree:
The download sessions are tagged with different meta values in RSA NetWitness including http two headers, http no referer, http no user-agent, http get no post under Service Analysis and exe filetype under File Analysis
BEBLOH delivery documents (SHA256):
BEBLOH Trojan (SHA256):
All the IOC from those HTTP sessions were added to FirstWatch Command and Control Domains feed on Live with the following meta values:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.