Security Alert: Booking.Com Fake Emails Infect Computers with Sodinokibi Ransomware
#1
Exclamation 
Quote:
[Image: heimdal-logo.svg]

Opening attachments will download and run a dangerous GandCrab strain

A new spam campaign pretending to be from Booking.com is now targeting users. The emails carry a document containing macro code. If someone clicks on the document, opens it, and allows the execution of the macro code, a loader will be spawned.

This will download and run ransomware of the Sodinokibi class.

How does the fake Booking.com email that infects you with ransomware work?

Below you can see how a Sodinokibi ransomware email looks like:

Quote:

From: [Compromised email account]

Subject:

Booking.]com – New booking! (1571165841, Monday, 17 June 2019)

Attached:

[name of recipient].doc

If one clicks on the content of the document, the embedded object will decode the file “ms-word.exe”.

Once the file is run, it will spawn a shell that will run the ransomware’s loader, as you can see below:

[Image: Sodinokibi1806.png]

Similar to other ransomware families, the spawned shell will start with deleting shadow in order to make the restoration of the machine more complicated:

“C:\Windows\System32\cmd.exe” /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures.

The payload is difficult to be analyzed since the loader is packed with a custom packer.

The packer is different from variant to variant. But what they all have in common is that they always use a PE overwrite technique.

Then, it will connect to the following URL, from which it will run the main component (sanitized by CSIS) http://btta[.]xyz/hoja.exe.
Continue Reading
Reply


Messages In This Thread
Security Alert: Booking.Com Fake Emails Infect Computers with Sodinokibi Ransomware - by harlan4096 - 20 June 19, 08:14

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
ESET 19.1.12.0
Changes in 19.1.12...harlan4096 — 14:49
Vivaldi 7.9 Build 3970.47
Vivaldi 7.9 Build ...harlan4096 — 07:31
Microsoft Defender Antivirus security in...
Stable channel upd...harlan4096 — 07:25
Microsoft Defender Antivirus security in...
Stable channel upd...harlan4096 — 07:25
Google Chrome 146.0.7680.177/178
Google Chrome 146....harlan4096 — 07:22

[-]
Birthdays
Today's Birthdays
avatar (44)lamSouse
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (47)creatralGuelm
avatar (38)procnipsut
avatar (44)accenwibly
avatar (41)ahyvily
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (48)cticigges
avatar (50)ecoFit
avatar (44)soccejeS
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)burntLaw
avatar (41)MrDoorsskibheeds
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (39)vemedProkbior
avatar (38)RobertUtelt
avatar (46)JamesZic
avatar (43)Sanfordbup
avatar (38)Der.Reisende
avatar (41)alapesihy
avatar (36)Kiran78

[-]
Online Staff
There are no staff members currently online.

>