{"id":3042,"date":"2024-09-25T21:02:40","date_gmt":"2024-09-25T21:02:40","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=3042"},"modified":"2025-07-29T06:59:43","modified_gmt":"2025-07-29T06:59:43","slug":"hijacked-mailchimp-accounts-slinging-gootkit-trojan","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/hijacked-mailchimp-accounts-slinging-gootkit-trojan\/","title":{"rendered":"Hijacked Mailchimp accounts slinging Gootkit trojan"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"477\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/monkey-2753911_960_720.webp\" alt=\"\" class=\"wp-image-3049\" style=\"width:607px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Although GootKit has been around since 2014, it\u2019s hit the headlines in recent weeks due to the exploitation of a popular email service \u2013 Mailchimp. Mailchimp is commonly used by businesses to send EDMs, newsletters, and other mass-marketing mail messages.&nbsp;<br><br>Even in its earliest variants, GootKit was disseminated via phishing emails, but the use of Mailchimp in the most recent campaign shows increased sophistication as emails from the service are typically white-listed and therefore bypass spam filters.&nbsp;<br><br>GootKit is widely considered one of the more sophisticated banking trojans and is able to steal user credentials and manipulate the victim\u2019s browser once successfully executed.&nbsp;<br><br>Looking at the recent Mailchimp campaign, the spoofed sender address and Subject line is specifically crafted to lure the users and click the call-to-action URL, embedded in the body of the email. Below is a sample email from the Gootkit campaign:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"608\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-1-5-1024x608.webp\" alt=\"\" class=\"wp-image-3046\"\/><\/figure>\n\n\n\n<p>&nbsp;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<em>Fig 1: Spoofed Gootkit campaign email&nbsp;<\/em><br><br>In the above example, the hyperlink is used to download and execute the malicious payload from \u201chttps:\/\/afirmfwc[.]org\/10873[.]exe\u201d.&nbsp;<br><br><strong>Sample Analysis:<\/strong><br><br><strong>Md5:<\/strong> b03d1b73c96acdd7b8a7a2f27f77bc44<br><br><strong>Filename:<\/strong> Click.on.docx<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"379\" height=\"135\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/0-2.webp\" alt=\"\" class=\"wp-image-3045\"\/><\/figure>\n\n\n\n<p>&nbsp;<br><br>During our investigation, we discovered the malware file download was performed through the \u201cbitsAdmin\u201d Windows tool \u2013 we\u2019ve illustrated the complete infection cycle below:&nbsp;<br><br>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1251\" height=\"632\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-55.webp\" alt=\"\" class=\"wp-image-3047\"\/><\/figure>\n\n\n\n<p><br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <em>&nbsp;Fig 2: Gootkit Infection Cycle<\/em><br><br><strong>Dropped File:<\/strong><br><br>After executing the sample in a controlled environment, we saw a malicious Windows PE file drop multiple payment and Windows files \u2013 &nbsp;these can be used to exfiltrate the victim\u2019s payment and banking data.<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1342\" height=\"386\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-54.webp\" alt=\"\" class=\"wp-image-3048\"\/><\/figure>\n\n\n\n<p><br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<em>Fig 3: Dropped file details<\/em><br><br>&nbsp;A number of .doc and .exe filed were dropped, though in the above we\u2019ve highlighted the \u201ctxtpaymnetdocuments.LNK\u201d shortcut file which points to relative Windows directories on the victim\u2019s machine.&nbsp;<br><br>IOC Details:&nbsp;<br><br>SHA 256 hashes of the current Gootkit sample, collected by the LMNTRIX Threat Intelligence platform:<br><br>\u2022&nbsp;&nbsp; &nbsp;9c9843cc2d600dd39b3f36ff01b758b13eb4d1026b96c73049529399e2df6d9e<br><br>\u2022&nbsp;&nbsp; &nbsp;352edc30405cad488e656eda4dfd05cc2ceb6721ea05b97599b9d5a63673c291<br><br>\u2022&nbsp;&nbsp; &nbsp;1b670eef9d165e5c35ef6ae37e71e381aa451698693685edac656377954c37e5<br><br>\u2022&nbsp;&nbsp; &nbsp;5d5cfe68ee1719829ec53cb8b01d9ac91fa7c30595c9cd21c447ca11cfde0aee<br><br>\u2022&nbsp;&nbsp; &nbsp;888df02b797b3aaa3bd16ac8c2428b3f8dd321738804b16e3234b174450b571c<br><br>\u2022&nbsp;&nbsp; &nbsp;14750e674dcdab0d67f7ab4300cf0dae709246ba821ec5ed445b96d1969cc174<br><br>\u2022&nbsp;&nbsp; &nbsp;3db2844fd10c861b8605accf75d5ccb5e0896a249716b88c396e9bc72c2e039d<br><br>\u2022&nbsp;&nbsp; &nbsp;8a286da6cafa6c3bc9068065fdc8244e8aa356a7fbbe52da27e22b9670e97d97<br><br>\u2022&nbsp;&nbsp; &nbsp;12d9782fff55c3c2c703678aabcd0861c93f466ab2c2a6fd45b695fc5785a5e7<br><br>\u2022&nbsp;&nbsp; &nbsp;21c06c2d263d15eeeda29b5c95793055c42f4f4e767ae326378a3ba88330967b<br><br>\u2022&nbsp;&nbsp; &nbsp;cdc7df25cb67fa3359129abbecad14a0fa929639f36265f7cf9e6f169e74fc67<br><br>\u2022&nbsp;&nbsp; &nbsp;6b91a0ea920e2c1c72996e5777cda27d14794da895818b5c1626faff206d1aca<br><br>\u2022&nbsp;&nbsp; &nbsp;d31c5eae01b6753f29a4db471237e40b12e0fbb438d8868fc6919a3e397603c9<br><br>\u2022&nbsp;&nbsp; &nbsp;c1a85a563a3a8db3e071ed01dce207d51241324f31f8d24972f9e046def3a9e0<br><br>\u2022&nbsp;&nbsp; &nbsp;82b0120dc84acf76d839107997d217a1c0eb3b7f549039db34d009d41b4c7a94<br><br>\u2022&nbsp;&nbsp; &nbsp;12251236e8335d98e0c21e31810bd0ab681d9f0415064cc1a68fd4bf9ea6b3f1<br><br>\u2022&nbsp;&nbsp; &nbsp;ab87b477edef7708ab822a2d1f3122fa120d0f7e3ef0b6679144e247878606b4<br><br>\u2022&nbsp;&nbsp; &nbsp;1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc<br><br>\u2022&nbsp;&nbsp; &nbsp;1d2f45c18cee72d9c7ef47dafb8ef5f4c6c35dd400c02b972a0116557596f0e8<br><br>\u2022&nbsp;&nbsp; &nbsp;e61082d8f711d775b5c427af649c64ab50fac695f334720dca467598c5817b7a<br><br>\u2022&nbsp;&nbsp; &nbsp;2abc86f387df1e680269235f830755f9132c24e46f3ae21cd99c918b309ce476<br><br>\u2022&nbsp;&nbsp; &nbsp;ca541592df917a40de2967cf40af0eb3b3c86ae361882a415fc7cf9dd69f9b9e<br><br>\u2022&nbsp;&nbsp; &nbsp;130a07ecfcfcdee4c25e1f3d5f4a4207d900edba65c4038038816d4e9c146245<br><br>\u2022&nbsp;&nbsp; &nbsp;210719fb7ae3e11d12df8842b7b3f655382da5a07466b4ef300bd0302afafe57<br><br>\u2022&nbsp;&nbsp; &nbsp;f4427001aa4df1ca057cffec368a51cfeead9e2e0ba74f9d14264b6ab267e7eb<br><br>\u2022&nbsp;&nbsp; &nbsp;23b63f00ea7d0196750bc36ab5d701e675539b6787c5bdb61378b5577fa78b2e<br><br>\u2022&nbsp;&nbsp; &nbsp;898145c00f8774acc1733210f0a69c871b88bd4e74a14ef49d63a51bb7132a96<br><br>\u2022&nbsp;&nbsp; &nbsp;7d25eaa86850ea0220a7ec14b83ed5905beec196e851bd49843b70c96076b59b<br><br>\u2022&nbsp;&nbsp; &nbsp;283f830917b6f0a97040b09ddc830fd67c3543ba1b7638b6f4d0495c28530141<br><br><strong>Prevention Yara Rule:<\/strong><br><br>{<br><br>&nbsp; &nbsp; &nbsp; &nbsp; meta:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; author = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; version = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; description = &#8220;Blackhole Gootkit&#8221;<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; strings:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $js = \/\\(\\\/\\[\\^A-.-.-9\\\\\\\\\\+\\\\\\\\\\\/\\\\\\\\\\=\\]\\\/g,&#8221;&#8221;\\)\\]\\(\\(.*?\\),\\(.*?\\)\\)\/<br><br>&nbsp; &nbsp; &nbsp; &nbsp; condition:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $js<br><br>}<\/p>\n\n\n\n<p>rule Blackhole_GootKit_deofuscated<br><br>{<br><br>&nbsp; &nbsp; &nbsp; &nbsp; meta:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; author = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; version = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; description = &#8220;Blackhole_Gootkit_deofuscated&#8221;<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; strings:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $js = \/&#8221;http:\\\/\\\/&#8221;\\+domainName\\+&#8221;\\\/runforestrun\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js1= \/&#8217;http:\\\/\\\/&#8217;\\+domainName\\+&#8217;\\\/in.cgi\/<br><br>&nbsp; &nbsp; &nbsp; &nbsp; condition:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $js or $js1&nbsp;<br><br>}<br><br>rule Malicious_Redirect_Code<br><br>{<br><br>&nbsp; &nbsp; &nbsp; &nbsp; meta:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; author = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; version = &#8220;X&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; description = &#8220;Blackhole&#8221;<br><br>&nbsp; &nbsp; &nbsp; &nbsp; strings:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $js = \/km0ae9gr6m\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js2=\/qhk6sa6g1c\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js3=\/\\.php\\?page=[a-zA-Z0-9]{16}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js4=\/iframe\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js5=\/%69%66%72%61%6d%65\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js6=\/%68%69%64%64%65%6e\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js7=\/unescape\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$js8=\/\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long=\/([0-9]{1,4},){256}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long2=\/([0-9]{1,2}\\.[0-9]{1,2}\\$){8}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long3=\/([0-9]{1,4}\\.\\.[0-9]{1,4}){8}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long4=\/([0-9a-zA-Z]{1,2}(\\$|@|#|!|,){1,2}){256}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long5=\/(&#8220;[0-9a-zA-Z]{1,2}&#8221;,){16}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long6=\/([0-9a-zA-Z]{2,3}&amp;&amp;){256}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$long7=\/(0x[0-9a-fA-F]{1,2},){256}\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$maliciousfor=\/for\\((.)=(.){1,10};(.){5}!=(.);(.)\\+\\+\\)\/<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;$maliciousif=\/if\\(&#8216;[a-zA-Z]{3,8}&#8217;=='[a-zA-Z]{3,8}&#8217;\\)\/<br><br>&nbsp; &nbsp; &nbsp; &nbsp; condition:<br><br>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ($js and $js2) or ($long or $long2 or $long3 or $long4 or $long6) or ($js3 and $js4) or ($js5 and $js6 and $js7) or ($long5 and $maliciousfor) or $maliciousif or $js8 or $long7<br><br>}<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><br><br>Creating a perimeter protection rule for the provided IOCs, along with the yara protection rule, will greatly limit your organisation\u2019s exposure to the latest Gootkit campaign. It may also be a good idea to update email spam filters and educate employees not to click any URLs embedded in Mailchimp emails until the issue is addressed.<br><br>If you\u2019re a current Mailchimp user, enable two-factor authentication to ensure your account is not hijacked and used in the campaign. &nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although GootKit has been around since 2014, it&rsquo;s hit the headlines in recent weeks due to the exploitation of a popular email service &ndash; Mailchimp. Mailchimp is commonly used by businesses to send EDMs, newsletters, and other mass-marketing mail messages.&nbsp; Even in its earliest variants, GootKit was disseminated via phishing emails, but the use of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3049,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-3042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=3042"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3042\/revisions"}],"predecessor-version":[{"id":4355,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3042\/revisions\/4355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/3049"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=3042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=3042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=3042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}