Last Updated: 2021-09-08 01:14:32 UTC
by Brad Duncan (Version: 1)
Another day, another wave of malware. Although there's plenty to find, I've been focusing on BazarLoader as it comes through various distribution channels. One such channel is the "Stolen Images Evidence" campaign, which Microsoft describes here. This campaign was pushing IcedID as we entered 2021, but it switched to BazarLoader as early as July 2021.
The "Stolen Images Evidence" campaign uses emails generated through contact forms on various websites. So these messages don't originate through normal spam methods. They appear through contact form submissions describing a copyright violation to the intended victim. These form-submitted messages include a Google firebase storage URL in the message text. This malicious link supposedly provides proof of stolen images that resulted in a copyright violation.
Downloaded zip archives
BazarLoader from the JS file
Infection traffic is typical for what we normally see with BazarLoader.
Indicators of Compromise (IOCs)
The following is malware retrieved from an infected Windows host.
- File size: 4,763 bytes
- File name: Stolen Images Evidence.zip
- File description: zip archive downloaded after clicking Google Firebase Storage link
- File size: 15,755 bytes
- File name: Stolen Images Evidence.js
- File description: JS file extracted from the above zip archive
- File size: 203,281 bytes
- File location: hxxp://mabiorex[.]space/333g100/main.php
- File location: C:\Users\[username]\AppData\Local\Temp\motHf.dat
- File description: BazarLoader DLL retreived by the above JS file
- Run method: rundll32.exe [filename],StartW
Google Firebase URL used to deliver the malicious zip archive:
Malicious domain called when using the above Google Firebase URL:
- 172.67.145[.]134 port 443 - zvanij[.]space - HTTPS traffic
- 184.108.40.206 port 80 - mabiorex[.]space - GET /333g100/index.php
- 220.127.116.11 port 80 - mabiorex[.]space - GET /333g100/main.php
Bazar C2 traffic:
The associated malware samples have been submitted to bazaar.abuse.ch, and they're available using links from the above SHA256 hashes.
This campaign uses "Stolen Images Evidence" and copyright violation as its primary theme. However, it also used a "DDoS attack proof" theme last month. Either way, this campaign has been fairly active in 2021, and we expect it to continue throughout the rest of this year. It will probably continue into 2022 as well.
brad [at] malware-traffic-analysis.net
Last Updated: 2021-09-08 00:20:22 UTC
by Johannes Ullrich (Version: 1)
Microsoft today published an advisory with a workaround to mitigate an unpatched vulnerability in Microsoft Office. This vulnerability is currently used in targeted attacks.
CVE-2021-40444 is a code execution vulnerability in MSHTML. The exploit would arrive as an Office document that includes a malicious ActiveX control. As a workaround, Microsoft recommends disabling ActiveX in Internet Explorer and the advisory includes the necessary registry changes. At this point, it should be pretty low impact to disable ActiveX, but of course, there may be individual enterprise applications that still use ActiveX.
For more details, see Microsoft's advisory here: