{"id":2322,"date":"2024-09-25T17:34:26","date_gmt":"2024-09-25T17:34:26","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2322"},"modified":"2025-07-29T03:35:02","modified_gmt":"2025-07-29T03:35:02","slug":"under-the-hood-of-a-phishing-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/under-the-hood-of-a-phishing-campaign\/","title":{"rendered":"Under the hood of a phishing campaign"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"425\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/spam-1.webp\" alt=\"\" class=\"wp-image-2343\" style=\"width:597px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Despite a deep bag of tricks, cyber scammers often fall back on the tried-and-true method of spoofing legitimate emails to trick victims into executing malware. If you\u2019ve ever heard the term \u2018phishing\u2019, that\u2019s what we\u2019re talking about today.<br><br>It\u2019s not original, but it is effective.<br><br>Check your spam folder now and you\u2019ll have dozens of emails purporting to include tracking numbers from DHL or UPS, the location of hot singles in your area or, as we\u2019ll be looking at today, payment advice from your bank.<br><br>All a victim needs to do is click on the links or open the attachments in these emails, and they\u2019ve already lost the battle. Their device is no longer theirs.<br><br>Given the prevalence of phishing attacks, today we\u2019re going to unpack one such campaign. Masquerading as payment advice from HSBC, the scammers in this case are dropping the Fareit (aka Pony) Password Stealer. In addition to its \u2018Stealer\u2019 functionality, Fareit can also be used as a Downloader, allowing the attacker to remotely load any other malware on the system.&nbsp;<br><br>A few years ago, <a href=\"https:\/\/threatpost.com\/latest-instance-of-pony-botnet-pilfers-200k-700k-credentials\/104463\/\" target=\"_blank\" rel=\"noopener\">Fareit\/Pony<\/a> was used to steal more than $200,000 in bitcoins and more than 700,000 credentials. See? Effective. &nbsp;<br><br><strong>Email Analysis<\/strong><br><br>Before we analyse the malware, let\u2019s take a look at what the potential victim sees \u2013 the email. The campaign\u2019s primary email is said to have been sent from \u201cHSBC BANK Advising Service\u201d by spoofing <a href=\"http:\/\/mailto:advising.service556421@hsbc.com\" target=\"_blank\" rel=\"noopener\">Mail-id advising.service556421@hsbc.com<\/a> from IP \u2013 198.57.177.246.<br><br>So far in this campaign we\u2019ve seen two variants of the HSBC email, one sent from \u2018<strong>HSBC BANK Advising Service<\/strong>\u2019 and the other from \u2018<strong>HSBC Bank Service<\/strong>\u2019. The Header Info for both is below:<br><br>Received: from server.hollandi.com (server.hollandi.com [198.57.177.246])<br><br>&nbsp;&nbsp; &nbsp;for ; Tue, 1 Aug 2017 16:50:44 +1200<br><br>Received: from [127.0.0.1] (port=37168 helo=hollandi.com)<br><br>&nbsp;&nbsp; &nbsp;by server.hollandi.com with esmtpa (Exim 4.87)<br><br>&nbsp;&nbsp; &nbsp;(envelope-from ) Tue, 01 Aug 2017 04:34:59 +0000<br><br>Content-Type: multipart\/alternative;<br><br>Date: Tue, 01 Aug 2017 04:34:57 +0000<br><br><strong>From: HSBC BANK Advising Service<\/strong><br><br>To: undisclosed-recipients:;<br><br>Subject: \u00a9HSBC Bank Plc&#8230; Payment Advice \/ Swift Copy<br><br>User-Agent: Roundcube Webmail\/1.1.4<br><br><strong>OR<\/strong><br><br>Received: From e-marketing@hsbc.com.hk Wed Jul 26 07:56:07 2017&nbsp;<br><br>Wed, 26 Jul 2017 07:56:07 -0400&nbsp;<br><br>Received: from [198.57.177.246] (helo=server.hollandi.com)&nbsp;<br><br>by mail.victim.example with esmtps (Exim 4.63)&nbsp;<br><br><strong>From: HSBC Bank Service &nbsp;<\/strong><br><br>&nbsp;To: undisclosed-recipients:;&nbsp;<br><br>&nbsp;Subject: Fwd: Wire Transfer<br><br>Interestingly, we found the above IP address is being used in multiple simultaneous campaigns \u2013 see the table below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Date<\/strong><\/td><td><strong>&nbsp;&nbsp; Subject<\/strong><\/td><td><strong>&nbsp; IP<\/strong><\/td><\/tr><tr><td>03-08-17<\/td><td>Re: Bank Details Payment, Invoice<\/td><td>198.57.177.246 &#8211; server.hollandi.com<\/td><\/tr><tr><td>03-08-17<\/td><td>FedEx Shipment 784213218998: Delivery scheduled for tomorrow<\/td><\/tr><tr><td>01-08-17<\/td><td>UPS Exception Notification, Tracking Number 1Z36X67E03938098<\/td><\/tr><tr><td>01-08-17<\/td><td>Re: Bank Details Payment, Invoice<\/td><\/tr><tr><td>25-07-17<\/td><td>Fwd: Wire Transfer<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>We ran the IP address through IPVoid and had the below results: &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"438\" height=\"840\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s1.webp\" alt=\"\" class=\"wp-image-2329\"\/><\/figure>\n\n\n\n<p><br><em><strong>Image:<\/strong> IP info &amp; Geo location (using IPvoid.com)<\/em><br><br>Below we see the first email sent to potential victms. Note how all the links lead to the same malicious domain.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"562\" height=\"789\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s2.webp\" alt=\"\" class=\"wp-image-2330\"\/><\/figure>\n\n\n\n<p><em><strong>Image:<\/strong> Bank Account \/ Invoice spoofed mail<\/em><br><br>Here we have the second version of the email. Although the text is different, all links once again lead to the fall of Rome.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"753\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s3.webp\" alt=\"\" class=\"wp-image-2331\"\/><\/figure>\n\n\n\n<p><em><strong>Image: <\/strong>Bank Account \/ Invoice spoofed mail<\/em><br><br>Although the links in the above two emails are slightly different, both of them redirect to: hxxps:\/\/web.opendrive.com\/api\/v1\/download\/file.json\/OTJfMzY2OTAzNV8?inline=0<br><br>If successful, the following content is downloaded:<br><br><strong>Email One:<\/strong> File &#8211; Payment &amp; PI Invoice details.z<br><br>SHA256 &#8211; 6945c30a23c9fe3f58affaa35bfff40317b7eb11c2557a585d0d7f0b35cf03e9<br><br><strong>Email Two:<\/strong> File &#8211; Payment Swift Copy.jpeg.ace<br><br>SHA-256 &#8211; 407e12198559a468f711cd2ea480a046fe93632816602238228503b64d44b089<br><br>Inside both files we discovered a PE file:<br><br>File Name &#8211; Payment &amp; PI Invoice details.scr &amp; Payment Swift Copy.jpeg.scr<br><br>SHA 256 &#8211; 83fb46296b16ba69d8fe662fa0db65284bcc4cafb32bd3cdeb08ee8ca5d31194<br><br>We then ran the files through Virus Total, with the following results:&nbsp;<br><br>Only two antivirus (AV) vendors detected the Zip file (SHA-256 &#8211; 407e12198559a468f711cd2ea480a046fe93632816602238228503b64d44b089) as malicious.<br><br>The AV vendors fared slightly better (13\/57) with the PE file (SHA 256 &#8211; 83fb46296b16ba69d8fe662fa0db65284bcc4cafb32bd3cdeb08ee8ca5d31194) although there was no static detection found.<br><br>We also saw that the same file has been submitted with multiple different names.<br><br>Screenshots of all three results are below:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"970\" height=\"637\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s4.webp\" alt=\"\" class=\"wp-image-2332\"\/><\/figure>\n\n\n\n<p><em><strong>Image:&nbsp;<\/strong>Virustotal source for Zip detection<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"846\" height=\"759\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s5.webp\" alt=\"\" class=\"wp-image-2334\"\/><\/figure>\n\n\n\n<p><em><strong>Image:&nbsp;<\/strong>Virustotal source for PE detection<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"775\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s6.webp\" alt=\"\" class=\"wp-image-2335\"\/><\/figure>\n\n\n\n<p><em><strong>Image:&nbsp;<\/strong>Virustotal source for PE detection + Internal Info<\/em><br><br><strong>Malware Analysis<\/strong><br><br>As shown below, the malicious file comes with an LNK shortcut ICON, whose original name is \u201cCulpably1.exe\u201d. It is a Microsoft Visual Basic file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"988\" height=\"476\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s7.webp\" alt=\"\" class=\"wp-image-2336\"\/><\/figure>\n\n\n\n<p><em><strong>Image: <\/strong>PE file Internal info<\/em><br><br>The malicious file gets copied to the C:\\Users\\\\AppData\\Roaming\\subfolder as \u201cfilename.scr\u201d and the original copy is deleted. Also, the 14439072.bat file is dropped in %temp%.<br><br>Additionally, \u201cfilename.vbe\u201d is created in startup, so that the malware executes whenever the system starts up. The command which executes this file is:<br><br>&nbsp;objShell.ShellExecute &#8220;C:\\Users\\worker\\AppData\\Roaming\\subfolder\\filename.&#8221; &amp; &#8220;scr&#8221;<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"301\" class=\"wp-image-2338\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s8.webp\" alt=\"\"><\/p>\n\n\n\n<p>Next, we ran the malware through cuckoo \u2013 an automated analysis engine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"787\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s9.webp\" alt=\"\" class=\"wp-image-2339\"\/><\/figure>\n\n\n\n<p><em><strong>Image: <\/strong>Fareit Behavior &#8211; Cuckoo analysis<\/em><\/p>\n\n\n\n<p>This show us the full functionality: it steals private information from local Internet browsers and collects information to fingerprint the system and read cookies\/browser history.&nbsp;<\/p>\n\n\n\n<p><strong>Network Activities<\/strong><\/p>\n\n\n\n<p>Like any malware, a connection must be established in order to receive further instructions and configuration. In this case, it is trying to connect to the CnC server:<\/p>\n\n\n\n<p>hxxp:\/\/alliedharvast.com\/ramos\/panelnew\/gate.php<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"460\" class=\"wp-image-2341\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s10.webp\" alt=\"\">&nbsp;<br><br><em><strong>Image: <\/strong>Fareit Behavior and CnC connection seen during Cuckoo analysis<\/em><br><br>Finally, it also calls out to:<br><br>hxxp:\/\/pornhouse.mobi\/main.php?dir=\/\/Virgin%20Babes%20First%20Sex&amp;start=1&amp;sort=1<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"321\" class=\"wp-image-2342\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/s11.webp\" alt=\"\"><br><br><em><strong>Image: <\/strong>Network Activity via Wireshark<\/em><br><br><strong>Conclusion<\/strong><br><br>At a passing glance, these emails can look legitimate. Before opening them, however, take a minute to verify the sender\u2019s address. Also, most banks these days will never ask you to send them details via email and, finally, if in doubt you can always call the institution and check.&nbsp;<br><br>A few minutes diligence can save you from having your personal details fall in the hands of attackers who won\u2019t hesitate to milk you dry.&nbsp;<br><br>Another good tip is to configure your email server to block or remove emails that contains file attachments and\/or URLs commonly used to spread threats such as .vbs, .bat, .exe, .pif and .scr files.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite a deep bag of tricks, cyber scammers often fall back on the tried-and-true method of spoofing legitimate emails to trick victims into executing malware. If you&rsquo;ve ever heard the term &lsquo;phishing&rsquo;, that&rsquo;s what we&rsquo;re talking about today. It&rsquo;s not original, but it is effective. Check your spam folder now and you&rsquo;ll have dozens of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2343,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2322"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2322\/revisions"}],"predecessor-version":[{"id":4246,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2322\/revisions\/4246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2343"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}