Excel is being used as fresh bait for phishers- here's how.

Reading time icon 2 min. read


Readers help support MSpoweruser. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help MSPoweruser sustain the editorial team Read more

Evil Corp has found a new way to phish their victims- using Microsoft Excel documents.

The cybercrime group, also known as TA505 and SectorJo4, are financially motivated cybercriminals.  They’re renowned for targeting retail companies and financial institutions with large-sized malicious spam campaigns, using Necurs botnet; but now, they’ve adopted a new technique.

In their latest scam, they’re sending attachments featuring HTML redirectors with malicious Excel documents.  Through the links, they’re distributing remote access Trojans (RATs), as well as the malware downloaders that delivered the Dridex and Trick banking Trojans.  This also includes Locky, BitPaymer, Philadelphia, GlobeImposter, Jaff ransomware strains.

“The new campaign uses HTML redirectors attached to emails. When opened, the HTML leads to the download Dudear, a malicious macro-laden Excel file that drops the payload,”

“In contrast, past Dudear email campaigns carried the malware as an attachment or used malicious URLs.” -Microsoft Security Intelligence’s researchers.

Upon opening the HTML attachment, the victim will automatically download the Excel file.  Once they open it, this is what they’re met with:

Once the target clicks on “Enable Editing” as they’re instructed to in the document, they’ll unleash the malware on their system.

After this point, their device will also be infected with an IP traceback service, which “track(s) the IP addresses of machines that download the malicious Excel file.”

Threat Analytics report (Microsoft)

As well as this, the malware includes GraceWire- an info-stealing Trojan, which collects sensitive information and relays it back to the perpetrators via a command-and-control server.

View the full list of Indicators of Compromise (IOCs), including SHA-256 hashes of the malware samples used in the campaign, here and here.

Source: bleepingcomputer 

User forum

0 messages