{"id":13121,"date":"2022-04-11T11:31:33","date_gmt":"2022-04-11T11:31:33","guid":{"rendered":"https:\/\/myonlinesecurity.co.uk\/?p=13121"},"modified":"2023-04-03T12:23:07","modified_gmt":"2023-04-03T12:23:07","slug":"freaky-friday-malware-delivery-failure-necurs-botnet-sending-malformed-emails-supposed-to-deliver-globeimposter-ransomware","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/freaky-friday-malware-delivery-failure-necurs-botnet-sending-malformed-emails-supposed-to-deliver-globeimposter-ransomware\/","title":{"rendered":"Freaky Friday Malware Delivery Failure \u2013 Necurs Botnet Sending Malformed Emails \u2013 Supposed To Deliver Globeimposter Ransomware"},"content":{"rendered":"

Welcome to Freaky Friday. Whichever apprentice has been left in charge of the Necurs botnet this Friday has messed up AGAIN!!. Instead of actually attaching a 7z attachment to the email, he or she has somehow managed to embed a base64 encoded \u201cfile\u201d as plain text in the email body instead.<\/p>\n

This isn\u2019t the first time this has happened recently and we can all be quite glad a days respite form the constant onslaught of Globeimposter ransomware being sent by this spam. It is trivially easy for a researcher to decode the content, create the 7z archive and then extract the javaScript file. But most recipients will either just see a load of garbled text, or the virus scanner on the mailserver should see these as unscannable or undeliverable so automatically quarantine them. All the several hundred I have received in the last hour have been quarantined on my mail server.<\/p>\n

The next in the never ending series of malware downloaders is an email with the subject of Scan pretending to come from random names and email address<\/p>\n

The name in the email body matches the alleged sender<\/p>\n

They use email addresses and subjects that will entice, persuade, scare or shock a recipient to read the email and open the attachment.<\/p>\n

You can now submit suspicious sites, emails and files via our Submissions system<\/strong><\/p>\n

Scan_0041.7z : Extracts to: -6dt874p53077.js Current Virus total detections: Hybrid Analysis | Anyrun Beta | VirusBay<\/p>\n

This particular js has these 3 urls embedded in it ( there will be dozens of other Urls that download the payload in different js files) It uses the first url & only moves to the next if the first does not respond ( VirusTotal) ( VirusBay)<\/p>\n