MTA - Mike's Computer

Example lead - highlighted near the title

Executive Summary

Impact

A user’s system has been infected with a malware family known as Dyreza which can be used to do any of the following:

  • Perform man-in-the-middle attacks via browser injections
  • Monitor/take screenshots of browser activity
  • Steal personal security certificates
  • Steal online banking/login credentials
  • Track the affected user’s location through STUN (Session Traversal Utilities for NAT).

This malware is most commonly used by criminals to steal bank credentials from individual users rather than attack large corporations. However, any credentials a user enters while infected are forwarded back to the attacker. If a victim works in an account role or in an R&D role, the attack could accidentally gain credentials to company accounts.

More information on Dyrza: The Dire Implications of DYREZA - Threat Encyclopedia

Timeline

TimeStamp Activity
2015-02-06-17:07:25 Email was sent from john.santoro@dascosupply[.]com containing malicious program intended to download an additional payload (document8961294.scr)
2015-02-08 18:31:00 File was opened by user, initiating additional download of malicious files (SMowFtlw.exe and arrowu.jpg)

Next Steps

Notification

The initial phishing email came from a dascosuppy[.]com domain but this company may be another vicitim of an attack rather than a malicious party. If DAS Co. Supply is a supplier or customer of the company, reach out via phone call to make company aware of possible breach. Avoid using email communication as we will be blocking the domain and we do not know if the attack still retains control over the email accounts.

Remediation

Search for other hosts impacted by the infection by using the indicators below:

DNS queries/HTTP Requests

  • cwvancouver[.]com
  • harveyouellet[.]com

Netflow

  • Outbound connections to 178.47.141[.]100

Emails

  • From the dascosupply[.]com domain
  • Originating from 96.57.102[.]59
  • Emails containing document8961294.zip

Intel and Detections

Known bad indicators:

Indicator Description
96.57.102[.]59 Attack Controlled Mail Server
cwvancouver[.]com
harveyouellet[.]com
1d38c362198ad67329fdf58b4743165e MD5 Hash for document8961294.scr
278d5ff287ca2172b5308fe04bb20431 MD5 Hash for SMowFtlw.exe
6643e36630b9826fc740a79d6212a0cf MD5 Hash for arrowu.jpg

Suricata/IDS

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:“Unusual Machine IP Lookup”, sid:1; http.host; content: “checkip.dyndns.org”; http.method; content:“GET”; classtype:external-ip-check;)

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:“GET Request to suspicious domain cwvancouver - Possible Dyreza Infection”, sid:2; http.host; content: “cwvancouver.com”; http.method; content:“GET”; classtype:trojan-activity;)

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:“GET Request to suspicious domain harveyouellet - Possible Dyreza Infection”, sid:3; http.host; content: “harveyouellet.com”; http.method; content:“GET”; classtype:trojan-activity;)

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:“GET Request to suspicious file arrowu.jpg - Possible Dyreza Infection”, sid:3; http.uri; content: “arrowu.jpg”; http.method; content:“GET”; classtype:suspicious-filename-detect;)

YARA

alert http $HOME_NET any -> $EXTERNAL_NET any (msg: “Possible Download”; sid 343123; content; )

Workflow

PCAP

Email

john.santoro@dascosupply.com Subject: Your document

Lessons learned

1d38c362198ad67329fdf58b4743165e - document8961294.scr 278d5ff287ca2172b5308fe04bb20431 SMowFtlw.exe 6643e36630b9826fc740a79d6212a0cf - arrowu.jpg extract_files/extract-1423420287.087185-HTTP-FOZ7nc3YykKIk5TA84: data

2015-02-08 18:31:26.843669 278d5ff287ca2172b5308fe04bb20431 SMowFtlw.exe 1d38c362198ad67329fdf58b4743165e - document8961294.scr

document8961294.scr: PE32 executable (GUI) Intel 80386, for MS Windows