New Mobile Malware Spotted in the Wild, Hundreds of Users Affected

September 23, 2016
We've, recently, intercepted, a, currently, circulating, spam, campaign, affecting, hundreds, of, thousands, of, users, while, exposing, the, confidentiality, integrity, and, availability, of, their, devices, to, a, multi-tude, of, malicious, software.

Largely, relying, on, a, set, of, social, engineering, vectors, the, campaign, tries, to, trick, users, into, installing, rogue, software, on, their, devices, potentially, exposing, the, confidentiality, availability, and, integrity, of, their, devices, to, a, multi-tude, of, malicious, software.

In, this, post, we'll, profile, the, campaign, provide, actionable, intelligence, on, the, infrastructure, behind, it, and, discuss, in-depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind, it.

Related malicious URLs known to have participated in the campaign:
hxxp://market155.ru - 81.94.205.227; 31.31.204.59
hxxp://illuminatework.ru - 81.94.205.228; 31.31.204.59
hxxp://yetiathome15.ru - 81.94.205.228; 31.31.204.59
hxxp://leeroywork3.co - 81.94.205.228; 198.54.117.210
hxxp://morning3.ru - 81.94.205.228; 31.31.204.59

Once executed a sample malware (MD5: d846f7ac66a9a932235fb415b96fee5d) phones back to the following C&C server IPs:
hxxp://52.24.219.3

Related malicious MD5s known to have phoned back to the same C&C server IP (52.24.219.3):
MD5: e683af18e47c4441d5077e827c902e9e
MD5: a0c825e870f5f882cb25765151d10450
MD5: 2ce7dc2e46216887c42ba52ab3de422d
MD5: bb9dd2c44be5e2b6bc99b0cf2d1fcce1
MD5: dba5578c7271d6759ba3283a030eda33

Once executed a sample malware (MD5: 246f497dc26d18d87f9398758ca1bcc2) phones back to the following C&C server IPs:
hxxp://192.227.137.154

Related malicious MD5s known to have phoned back to the same C&C server IP (192.227.137.154):
MD5: 18e3c021ee369c34998393d5fa2cb2c4
MD5: b6a1bab3fba59504f837498719ce6e4c
MD5: ed646bbbace5bc21ea177e1ec740eb13
MD5: a991a02b269a038ff691b60cb8d23708
MD5: 1125cab12accbfd9632bdb8cd3d50742

Once executed a sample malware (MD5: 7969e4ef1b2fece87b806b5dfe25a3bb) phones back to the following C&C server IPs:
hxxp://23.227.163.110

Related malicious MD5s, known, to, have, phoned, back, to, the, same, malicious, C&C, server IP:
MD5: b6a1bab3fba59504f837498719ce6e4c
MD5: ed646bbbace5bc21ea177e1ec740eb13
MD5: 1125cab12accbfd9632bdb8cd3d50742
MD5: 9cf11dee06d875a713348296d6482d31
MD5: 0413ed5dfe30b8a326b979506d224258

Known to have responded to the same malicious C&C server IPs (market155.ru - 81.94.205.227; 31.31.204.59), are, also, the, following, malicious, domains:
hxxp://volga18.ru
hxxp://dommmsc.ru
hxxp://droid175.ru
hxxp://market155.ru
hxxp://43tywer.ru
hxxp://42qtes.ru
hxxp://41warter.ru
hxxp://zappylessy.ru
hxxp://myrevansh.ru
hxxp://slon404.ru
hxxp://defmusic4.ru
hxxp://imail15.ru
hxxp://mrkt-applications.xyz
hxxp://wrkme2.ru
hxxp://youtri.ru
hxxp://market155.ru
hxxp://bascetcom4.ru

Related malicious MD5s known to have phoned back to the same C&C server IPs (81.94.205.227):
MD5: 4ed28716716a7f6dc9f6ad1526512b26

Once executed a sample malware phones back to the following C&C server IPs:
hxxp://192.227.137.154/request.php
hxxp://23.227.163.110/locker.php

Related malicious MD5s known to have phoned back to the same C&C server IPs (31.31.204.59):
MD5: e683af18e47c4441d5077e827c902e9e

Once executed a sample malware (MD5: e683af18e47c4441d5077e827c902e9e) phones back to the following C&C server IPs:
208.100.26.234
195.22.28.199
208.100.26.234
98.124.243.46
109.94.1.133
216.239.36.21
208.100.26.234
195.22.26.248
208.73.211.70
162.242.249.192
157.7.107.29
50.62.91.212
50.62.150.186
98.124.243.44
200.29.217.151
212.83.129.135
141.8.192.44
192.232.216.164
178.170.164.188
114.200.196.31
69.172.201.153
182.162.95.55
216.104.165.91
195.22.28.197
112.124.104.218
98.124.243.31
31.31.204.59
184.168.221.63
50.63.202.56
97.74.22.1
52.76.64.5
5.79.71.226
98.124.243.32
144.48.5.153
184.168.221.3
98.124.243.43
167.114.213.199
185.62.206.64
216.35.197.43
69.64.76.61
64.98.145.30
109.206.190.54
66.96.160.194
8.5.1.38
103.11.229.100

Once executed a sample malware (MD5: e683af18e47c4441d5077e827c902e9e) phones back to the following C&C server IPs:
hxxp://riddenstorm.net
hxxp://lordofthepings.ru
hxxp://learnthrew.net
hxxp://learncross.net
hxxp://senseshade.ru
hxxp://sensecross.net
hxxp://senseshade.net
hxxp://learnshade.net
hxxp://sensefloor.net
hxxp://learnfloor.net
hxxp://torethrew.net
hxxp://fallthrew.ru
hxxp://waitcross.ru
hxxp://fallcross.net
hxxp://weekfloor.net
hxxp://muchshade.net
hxxp://torefloor.net
hxxp://veryshade.net
hxxp://fallthrew.net
hxxp://fallfloor.net
hxxp://muchshade.ru
hxxp://muchthrew.net
hxxp://torecross.net
hxxp://piecefloor.net
hxxp://muchfloor.net
hxxp://pieceshade.net
hxxp://piececross.net
hxxp://veryfloor.net
hxxp://verythrew.net
hxxp://toreshade.net
hxxp://weekshade.net
hxxp://verycross.net
hxxp://waitthrew.net
hxxp://fallshade.net
hxxp://muchcross.net
hxxp://takethrew.net
hxxp://weekcross.net
hxxp://weekthrew.net
hxxp://torefloor.ru
hxxp://piecethrew.net
hxxp://verycross.ru
hxxp://piecethrew.ru
hxxp://waitcross.net
hxxp://takecross.net
hxxp://waitshade.net
hxxp://takeshade.net
hxxp://triesteach.net
hxxp://triesteach.ru
hxxp://yourcould.net
hxxp://triescould.net
hxxp://yourusual.net
hxxp://triesusual.net
hxxp://takefloor.net
hxxp://takefloor.ru
hxxp://waitfloor.net
hxxp://yourteach.net
hxxp://triesgrave.net
hxxp://yourgrave.net
hxxp://lrstnusual.net
hxxp://viewusual.ru
hxxp://viewusual.net
hxxp://lrstncould.net
hxxp://viewcould.net
hxxp://lrstnteach.net
hxxp://lrstngrave.ru
hxxp://viewteach.net
hxxp://lrstngrave.net
hxxp://viewgrave.net
hxxp://fillcould.ru
hxxp://plantusual.net
hxxp://fillusual.net
hxxp://fillcould.net
hxxp://plantcould.net
hxxp://fillteach.net
hxxp://plantgrave.net
hxxp://senseusual.ru
hxxp://senseusual.net
hxxp://plantteach.net
hxxp://fillgrave.net
hxxp://learnusual.net
hxxp://sensecould.net
hxxp://learncould.net
hxxp://learnteach.ru
hxxp://senseteach.net
hxxp://learnteach.net
hxxp://sensegrave.net
hxxp://learngrave.net
hxxp://toreusual.net
hxxp://fallusual.net
hxxp://fallgrave.net
hxxp://toregrave.net
hxxp://fallteach.net
hxxp://toreteach.net
hxxp://fallcould.net
hxxp://torecould.net
hxxp://torecould.ru
hxxp://weekusual.net
hxxp://fallgrave.ru
hxxp://veryusual.net
hxxp://verycould.net
hxxp://weekteach.ru
hxxp://weekteach.net
hxxp://weekcould.net
hxxp://veryteach.net
hxxp://weekgrave.net
hxxp://verygrave.net
hxxp://pieceusual.net
hxxp://muchusual.ru
hxxp://muchusual.net
hxxp://piececould.net
hxxp://muchcould.net
hxxp://pieceteach.net
hxxp://muchteach.net
hxxp://piecegrave.ru
hxxp://muchgrave.net
hxxp://waitusual.net
hxxp://takeusual.net
hxxp://waitcould.net
hxxp://piecegrave.net
hxxp://takecould.ru
hxxp://takecould.net
hxxp://waitteach.net
hxxp://taketeach.net
hxxp://waitgrave.net
hxxp://takegrave.net
hxxp://triesstate.ru
hxxp://triesstate.net
hxxp://yourstate.net
hxxp://triesbroke.net
hxxp://yourbroke.net
hxxp://lrstnbroke.net
hxxp://lrstnbroke.ru
hxxp://viewstate.net
hxxp://lrstnstate.net
hxxp://yournews.net
hxxp://triesnews.net
hxxp://yourmark.net
hxxp://yourmark.ru
hxxp://triesmark.net
hxxp://viewbroke.net
hxxp://lrstnmark.net
hxxp://viewmark.net
hxxp://lrstnnews.net
hxxp://viewnews.ru
hxxp://viewnews.net
hxxp://fillstate.net
hxxp://plantbroke.net
hxxp://fillbroke.net
hxxp://plantstate.net
hxxp://plantmark.ru
hxxp://plantmark.net
hxxp://fillmark.net
hxxp://fillnews.net
hxxp://sensestate.net
hxxp://plantnews.net
hxxp://learnstate.ru
hxxp://sensebroke.net
hxxp://learnstate.net
hxxp://learnbroke.net
hxxp://learnmark.net
hxxp://sensemark.net
hxxp://sensenews.ru
hxxp://sensenews.net
hxxp://learnnews.net
hxxp://torestate.net
hxxp://fallstate.net
hxxp://torebroke.net
hxxp://fallbroke.ru
hxxp://fallbroke.net
hxxp://toremark.net
hxxp://fallmark.net
hxxp://torenews.net
hxxp://weekstate.ru
hxxp://fallnews.net
hxxp://weekstate.net
hxxp://verystate.net
hxxp://weekbroke.net
hxxp://verybroke.net
hxxp://weekmark.net
hxxp://verymark.ru
hxxp://piecestate.net
hxxp://muchstate.net
hxxp://verynews.net
hxxp://weeknews.net
hxxp://verymark.net
hxxp://piecebroke.ru
hxxp://piecebroke.net
hxxp://muchbroke.net
hxxp://piecemark.net
hxxp://muchmark.net
hxxp://piecenews.net
hxxp://muchnews.ru
hxxp://muchnews.net
hxxp://waitstate.net
hxxp://waitbroke.net
hxxp://takebroke.net
hxxp://waitmark.ru
hxxp://waitmark.net
hxxp://takestate.net
hxxp://takemark.net
hxxp://waitnews.net
hxxp://takenews.net
hxxp://triesthan.net
hxxp://yourthan.ru
hxxp://yourthan.net
hxxp://triesread.net
hxxp://yourread.net
hxxp://yourmile.net
hxxp://triesking.ru
hxxp://triesmile.net
hxxp://triesking.net
hxxp://yourking.net
hxxp://lrstnthan.net
hxxp://viewthan.net
hxxp://lrstnread.net
hxxp://viewread.ru
hxxp://lrstnmile.net
hxxp://viewread.net
hxxp://viewmile.net
hxxp://lrstnking.net
hxxp://viewking.net
hxxp://plantthan.ru
hxxp://plantthan.net
hxxp://fillthan.net
hxxp://plantread.net
hxxp://fillread.net
hxxp://plantking.net
hxxp://fillmile.net
hxxp://fillmile.ru
hxxp://plantmile.net
hxxp://fillking.net
hxxp://sensethan.net
hxxp://learnthan.net
hxxp://senseread.ru
hxxp://senseread.net
hxxp://learnread.net
hxxp://sensemile.net
hxxp://learnmile.net
hxxp://senseking.net
hxxp://learnking.ru
hxxp://learnking.net
hxxp://torethan.net
hxxp://fallthan.net
hxxp://toreread.net
hxxp://fallread.net
hxxp://toremile.net
hxxp://toremile.ru
hxxp://toreking.net
hxxp://fallking.net
hxxp://fallmile.net
hxxp://weekthan.net
hxxp://verythan.ru
hxxp://verythan.net
hxxp://weekread.net
hxxp://veryread.net
hxxp://weekmile.net
hxxp://verymile.net
hxxp://weekking.net
hxxp://weekking.ru
hxxp://veryking.net
hxxp://piecethan.net
hxxp://muchthan.net
hxxp://pieceread.net
hxxp://muchread.ru
hxxp://muchread.net
hxxp://piecemile.net
hxxp://muchmile.net
hxxp://pieceking.net
hxxp://muchking.net
hxxp://waitthan.ru
hxxp://waitthan.net
hxxp://takethan.net
hxxp://waitread.net
hxxp://waitmile.net
hxxp://takeread.net
hxxp://takemile.ru
hxxp://takemile.net
hxxp://waitking.net
hxxp://takeking.net
hxxp://triessaturday.net
hxxp://triesthousand.net
hxxp://yourthousand.net
hxxp://yoursaturday.net
hxxp://triesthousand.ru
hxxp://triesloud.net
hxxp://yourloud.net
hxxp://triestree.net
hxxp://yourtree.ru
hxxp://yourtree.net
hxxp://lrstnsaturday.net
hxxp://viewsaturday.net
hxxp://lrstnthousand.net
hxxp://viewthousand.net
hxxp://lrstnloud.ru
hxxp://lrstnloud.net
hxxp://viewloud.net
hxxp://viewtree.net
hxxp://lrstntree.net
hxxp://fillsaturday.ru
hxxp://plantsaturday.net
hxxp://fillsaturday.net
hxxp://plantthousand.net
hxxp://fillthousand.net
hxxp://plantloud.net
hxxp://fillloud.net
hxxp://planttree.ru
hxxp://planttree.net
hxxp://filltree.net
hxxp://sensesaturday.net
hxxp://learnsaturday.net
hxxp://sensethousand.net
hxxp://learnthousand.ru
hxxp://learnthousand.net
hxxp://senseloud.net
hxxp://learnloud.net
hxxp://sensetree.net
hxxp://learntree.net
hxxp://toresaturday.ru
hxxp://toresaturday.net
hxxp://fallsaturday.net
hxxp://torethousand.net
hxxp://fallthousand.net
hxxp://toreloud.net
hxxp://fallloud.ru
hxxp://fallloud.net
hxxp://toretree.net
hxxp://falltree.net
hxxp://weeksaturday.net
hxxp://verysaturday.net
hxxp://weekthousand.ru
hxxp://weekthousand.net
hxxp://verythousand.net
hxxp://weekloud.net
hxxp://veryloud.net
hxxp://weektree.net
hxxp://verytree.ru
hxxp://verytree.net
hxxp://piecesaturday.net
hxxp://muchsaturday.net
hxxp://piecethousand.net
hxxp://muchthousand.net
hxxp://pieceloud.ru
hxxp://pieceloud.net
hxxp://muchtree.net
hxxp://piecetree.net
hxxp://muchloud.net
hxxp://waitsaturday.net
hxxp://takesaturday.ru
hxxp://takesaturday.net
hxxp://waitthousand.net
hxxp://takethousand.net
hxxp://takeloud.net
hxxp://waitloud.net
hxxp://waittree.ru
hxxp://waittree.net
hxxp://taketree.net
hxxp://triesstock.net
hxxp://yourstock.net
hxxp://triesthrow.net
hxxp://yourthrow.ru
hxxp://yourthrow.net
hxxp://triesreply.net
hxxp://yourreply.net
hxxp://trieswhole.net
hxxp://yourwhole.net
hxxp://lrstnstock.net
hxxp://viewstock.net
hxxp://lrstnstock.ru
hxxp://lrstnthrow.net
hxxp://viewthrow.net
hxxp://lrstnreply.net
hxxp://viewreply.ru
hxxp://viewreply.net
hxxp://lrstnwhole.net
hxxp://viewwhole.net
hxxp://plantstock.net
hxxp://fillstock.net
hxxp://plantthrow.net
hxxp://plantthrow.ru
hxxp://fillthrow.net
hxxp://plantreply.net
hxxp://fillreply.net
hxxp://plantwhole.net
hxxp://fillwhole.ru
hxxp://fillwhole.net
hxxp://sensestock.net
hxxp://learnstock.net
hxxp://sensethrow.net
hxxp://learnthrow.net
hxxp://sensereply.ru
hxxp://sensereply.net
hxxp://learnreply.net
hxxp://sensewhole.net
hxxp://fallstock.net
hxxp://fallstock.ru
hxxp://torestock.net
hxxp://learnwhole.net
hxxp://fallreply.net
hxxp://torereply.net
hxxp://fallthrow.net
hxxp://torethrow.net
hxxp://torewhole.ru
hxxp://fallwhole.net
hxxp://torewhole.net
hxxp://weekstock.net
hxxp://verystock.net
hxxp://weekthrow.net
hxxp://verythrow.net
hxxp://verythrow.ru
hxxp://weekreply.net
hxxp://weekwhole.net
hxxp://veryreply.net
hxxp://verywhole.net
hxxp://piecestock.ru
hxxp://piecestock.net
hxxp://muchstock.net
hxxp://piecethrow.net
hxxp://muchthrow.net
hxxp://piecereply.net
hxxp://muchreply.ru
hxxp://muchreply.net
hxxp://piecewhole.net
hxxp://muchwhole.net
hxxp://waitstock.net
hxxp://takestock.net
hxxp://waitthrow.ru
hxxp://waitthrow.net
hxxp://takethrow.net
hxxp://waitreply.net
hxxp://takereply.net
hxxp://takewhole.ru
hxxp://waitwhole.net
hxxp://triescold.net
hxxp://takewhole.net
hxxp://yourcold.net
hxxp://trieswrote.net
hxxp://triesbone.net
hxxp://yourbone.net
hxxp://triesbone.ru
hxxp://yourwrote.net
hxxp://triesfire.net
hxxp://yourfire.net
hxxp://lrstncold.net
hxxp://viewcold.net
hxxp://viewcold.ru
hxxp://lrstnwrote.net
hxxp://lrstnbone.net
hxxp://viewwrote.net
hxxp://viewbone.net
hxxp://lrstnfire.ru
hxxp://viewfire.net
hxxp://lrstnfire.net
hxxp://plantcold.net
hxxp://fillcold.net
hxxp://plantwrote.net
hxxp://fillwrote.ru
hxxp://plantbone.net
hxxp://fillwrote.net
hxxp://fillbone.net
hxxp://plantfire.net
hxxp://fillfire.net
hxxp://sensecold.ru
hxxp://sensecold.net
hxxp://learncold.net
hxxp://sensewrote.net
hxxp://learnwrote.net
hxxp://sensebone.net
hxxp://learnbone.ru
hxxp://learnbone.net
hxxp://sensefire.net
hxxp://learnfire.net
hxxp://torecold.net
hxxp://fallcold.net
hxxp://torewrote.ru
hxxp://torewrote.net
hxxp://fallwrote.net
hxxp://fallbone.net
hxxp://fallfire.ru
hxxp://torefire.net
hxxp://torebone.net
hxxp://fallfire.net
hxxp://weekcold.net
hxxp://weekwrote.net
hxxp://verycold.net
hxxp://verywrote.net
hxxp://weekbone.net
hxxp://weekbone.ru
hxxp://weekfire.net
hxxp://verybone.net
hxxp://veryfire.net
hxxp://piececold.net
hxxp://muchcold.net
hxxp://muchcold.ru
hxxp://piecewrote.net
hxxp://muchwrote.net
hxxp://piecebone.net
hxxp://muchbone.net
hxxp://piecefire.ru
hxxp://piecefire.net
hxxp://muchfire.net
hxxp://waitcold.net
hxxp://takecold.net
hxxp://waitwrote.net
hxxp://takewrote.ru
hxxp://takewrote.net
hxxp://waitbone.net
hxxp://takebone.net
hxxp://waitfire.net
hxxp://takefire.net
hxxp://longride.ru
hxxp://longride.net
hxxp://soilride.net
hxxp://longsmall.net
hxxp://soilsmall.net
hxxp://longought.net
hxxp://soilought.ru
hxxp://soilought.net
hxxp://longmarry.net
hxxp://soilmarry.net
hxxp://wheelsmall.ru
hxxp://wheelride.net
hxxp://saidride.net
hxxp://wheelsmall.net
hxxp://saidsmall.net
hxxp://wheelought.net
hxxp://saidought.net
hxxp://wheelmarry.net
hxxp://saidmarry.net
hxxp://saidmarry.ru
hxxp://ballride.net
hxxp://stickride.net
hxxp://sticksmall.net
hxxp://ballsmall.net
hxxp://stickought.net
hxxp://stickought.ru
hxxp://ballought.net
hxxp://stickmarry.net
hxxp://ballmarry.net
hxxp://enemyride.net
hxxp://liferide.ru
hxxp://liferide.net
hxxp://enemysmall.net
hxxp://lifesmall.net
hxxp://enemyought.net
hxxp://lifeought.net
hxxp://enemymarry.ru
hxxp://enemymarry.net
hxxp://lifemarry.net
hxxp://mouthride.net
hxxp://tillride.net
hxxp://mouthsmall.net
hxxp://tillsmall.ru
hxxp://tillsmall.net
hxxp://mouthought.net
hxxp://tillought.net
hxxp://mouthmarry.net
hxxp://tillmarry.net
hxxp://shallride.ru
hxxp://shallride.net
hxxp://deepride.net
hxxp://shallsmall.net
hxxp://deepsmall.net
hxxp://shallought.net
hxxp://deepought.ru
hxxp://deepought.net
hxxp://shallmarry.net
hxxp://deepmarry.net
hxxp://pushride.net
hxxp://pushsmall.ru
hxxp://fridayride.net
hxxp://pushsmall.net
hxxp://fridaysmall.net
hxxp://pushought.net
hxxp://pushmarry.net
hxxp://fridayought.net
hxxp://fridaymarry.ru
hxxp://fridaymarry.net
hxxp://alongride.net
hxxp://alongsmall.net
hxxp://decemberride.net
hxxp://decembersmall.net
hxxp://alongought.ru
hxxp://alongought.net
hxxp://decemberought.net
hxxp://alongmarry.net
hxxp://decembermarry.net
hxxp://longthem.net
hxxp://soilthem.ru
hxxp://soilthem.net
hxxp://longbest.net
hxxp://soilbest.net
hxxp://longconsiderable.net
hxxp://soilconsiderable.net
hxxp://longeasy.ru
hxxp://longeasy.net
hxxp://soileasy.net
hxxp://wheelthem.net
hxxp://saidthem.net
hxxp://wheelbest.net
hxxp://saidbest.ru
hxxp://saidbest.net
hxxp://wheelconsiderable.net
hxxp://saidconsiderable.net
hxxp://wheeleasy.net
hxxp://saideasy.net
hxxp://stickthem.ru
hxxp://stickthem.net
hxxp://ballthem.net
hxxp://stickbest.net
hxxp://ballbest.net
hxxp://stickconsiderable.net
hxxp://ballconsiderable.ru
hxxp://ballconsiderable.net
hxxp://stickeasy.net
hxxp://balleasy.net
hxxp://enemythem.net

Known to have phoned back to the same malicious C&C server IPs (illuminatework.ru - 81.94.205.228; 31.31.204.59), are, also, the, following, malicious, MD5s:
MD5: 04c8e24f19308bd92e0bcdb6f02e8b4e
MD5: ca2747377512d13afb9a4a7f21fda0fc
MD5: 79e2b3abdbf33552677660069f891b88

Once executed a sample malware (MD5:79e2b3abdbf33552677660069f891b88) phones back to the following malicious C&C server IPs:
hxxp://23.227.163.110

Related malicious MD5s known to have phoned back to the same malicious C&C server IPs (illuminatework.ru - 81.94.205.228; 31.31.204.59):
MD5: e683af18e47c4441d5077e827c902e9e
MD5: a0c825e870f5f882cb25765151d10450
MD5: 2ce7dc2e46216887c42ba52ab3de422d
MD5: bb9dd2c44be5e2b6bc99b0cf2d1fcce1
MD5: dba5578c7271d6759ba3283a030eda33

Related malicious MD5s known to have phoned back to the same C&C server IPs (leeroywork3.co - 81.94.205.228; 198.54.117.210):
MD5: 754fbdc3d2f2133d1922e3edae033637
MD5: be4432facc4a67acf102715a9baadbec
MD5: 42524e4cd01f1e92151e4221cb727d4e
MD5: 5abb2cc25bb3e53e7427bc9bbdc898ab
MD5: b05409a33f1409ef48e4cdbe29480edf

Once executed, a, sample, malware (MD5: 754fbdc3d2f2133d1922e3edae033637), phones, back, to, the, following, C&C, server, IPs:
hxxp://bonezyard.oo3.co - 198.54.117.210

Once executed, a, sample, malware (MD5: be4432facc4a67acf102715a9baadbec), phones, back, to, the, following, C&C, server, IPs:
hxxp://cidihifu.info
hxxp://sirabyso.info
hxxp://cinydota.info
hxxp://dixoxywy.info
hxxp://viherami.info
hxxp://dosujuba.info
hxxp://bowomacy.info
hxxp://fobefizi.info
hxxp://bozuceko.info
hxxp://ohopihe.info
hxxp://naselyfu.info
hxxp://gaquqoso.info
hxxp://mavagyte.info
hxxp://halybowu.info
hxxp://magisumi.info
hxxp://jepazana.info
hxxp://qeqywuvy.info
hxxp://jevijexi.info
hxxp://wekanila.info
hxxp://kefydeje.info
hxxp://wyticogu.info
hxxp://lymetydo.info
hxxp://rycukope.info
hxxp://lykomuru.info
hxxp://tyfegaqo.info
hxxp://zuruvuna.info
hxxp://tunopavy.info
hxxp://xuxelixi.info
hxxp://pujuwela.info
hxxp://xudohijy.info
hxxp://sirybyhi.info
hxxp://cinidofo.info
hxxp://sizaxyse.info
hxxp://vihyratu.info
hxxp://disijuwo.info
hxxp://vowamame.info
hxxp://fobyfiby.info
hxxp://boziceci.info
hxxp://fohatiza.info
hxxp://nopuleky.info
hxxp://gaqoqohi.info
hxxp://navegyfa.info
hxxp://halubose.info
hxxp://magosutu.info
hxxp://hapezawo.info
hxxp://jecojenu.info
hxxp://qekenivo.info
hxxp://qequwuqe.info
hxxp://kefidexa.info
hxxp://wetaxoly.info
hxxp://kymytyji.info
hxxp://rycikoga.info
hxxp://lykamydy.info
hxxp://rydygapu.info
hxxp://zyrivuro.info
hxxp://tunapaqe.info
hxxp://zuxylinu.info
hxxp://pujowevo.info
hxxp://xudehixe.info
hxxp://purubyly.info
hxxp://cibosoki.info
hxxp://sizexyha.info
hxxp://cihurafy.info
hxxp://disojusi.info
hxxp://viwemata.info
hxxp://dobufuwe.info
hxxp://bozacemu.info
hxxp://fogytibo.info
hxxp://bopilece.info
hxxp://goqaqozu.info
hxxp://navygyki.info
hxxp://galivoha.info
hxxp://magasufy.info
hxxp://hapyzasi.info
hxxp://mamiwuta.info
hxxp://jecejery.info
hxxp://qekuniqu.info
hxxp://jefodeno.info
hxxp://wetexive.info
hxxp://kemutyxu.info
hxxp://wycokolo.info
hxxp://lyjemyje.info
hxxp://rydufagy.info
hxxp://lyrovudi.info
hxxp://tynypapa.info
hxxp://zuxiliry.info
hxxp://tujaweqi.info
hxxp://xudyhino.info
hxxp://puwibyve.info
hxxp://xubasoxu.info
hxxp://sizyxyzo.info
hxxp://cihiroke.info
hxxp://sisajuhu.info
hxxp://viwunafi.info
hxxp://dibofusa.info
hxxp://volecety.info
hxxp://fogutiwi.info
hxxp://bopolema.info
hxxp://foqeqoby.info
hxxp://novugycu.info
hxxp://galovozo.info
hxxp://nagesuke.info
hxxp://hatizahu.info
hxxp://mamawufo.info
hxxp://hacyhasa.info
hxxp://qekinipy.info
hxxp://jefaderi.info
hxxp://qetyxiqa.info
hxxp://kemityny.info
hxxp://wexakovi.info
hxxp://kyjymyxo.info
hxxp://rydofale.info
hxxp://lyrevuju.info
hxxp://rynupago.info
hxxp://zyxolide.info
hxxp://tujeqepu.info
hxxp://zusuhiri.info
hxxp://puwobeqa.info
hxxp://xubesony.info
hxxp://puzuxyvi.info
hxxp://ciharoca.info
hxxp://sisyjuze.info
hxxp://ciwinaku.info
hxxp://divafuho.info
hxxp://vilycefe.info
hxxp://dogitisu.info
hxxp://bopaketo.info
hxxp://foqyqowa.info
hxxp://nafusyca.info
hxxp://gatozazy.info
hxxp://mamewuki.info
hxxp://hacuhaho.info
hxxp://makonife.info
hxxp://bovigymy.info
hxxp://golevobi.info
hxxp://jefededu.info
hxxp://qetuxipo.info
hxxp://jenoryre.info
hxxp://kejimyni.info
hxxp://wexykoqy.info
hxxp://wydafava.info
hxxp://lyryvuxy.info
hxxp://rynipali.info
hxxp://lyxaluja.info
hxxp://tyhyqege.info
hxxp://zusihidu.info
hxxp://tuwabepo.info
hxxp://xubusore.info
hxxp://puzozyqu.info
hxxp://xuherono.info
hxxp://sisujuba.info
hxxp://ciqonacy.info
hxxp://sivefuzi.info
hxxp://viluceka.info
hxxp://digotihy.info
hxxp://vopekefu.info
hxxp://foqiqiso.info
hxxp://bovagyte.info
hxxp://fokyvowu.info
hxxp://nofipymo.info
hxxp://gatazabe.info
hxxp://namywucy.info
hxxp://hacihazi.info
hxxp://makanika.info
hxxp://hafydehy.info
hxxp://qeroxigi.info
hxxp://jeneryda.info
hxxp://qexukope.info
hxxp://kejomyru.info
hxxp://wedefoqo.info
hxxp://kyrucune.info
hxxp://rynopavu.info
hxxp://lyzeluxi.info
hxxp://ryhuqela.info
hxxp://zysahijy.info
hxxp://tuwybegi.info
hxxp://zubisoda.info
hxxp://puzazypy.info
hxxp://xuhyroru.info
hxxp://pupijuqo.info
hxxp://ciqaname.info
hxxp://sivydubu.info
hxxp://cilicaco.info
hxxp://digetize.info
hxxp://vipukeky.info
hxxp://doqoqihi.info
hxxp://bocegyfa.info
hxxp://fokuvosy.info
hxxp://bofopyti.info
hxxp://gotezawo.info
hxxp://namuwume.info
hxxp://gacohabu.info
hxxp://makybico.info
hxxp://hadideze.info
hxxp://maraxiku.info
hxxp://jenyreji.info
hxxp://qexikoga.info
hxxp://jejamydy.info
hxxp://wedyfopi.info
hxxp://kericura.info
hxxp://wybapaqy.info
hxxp://lyzulunu.info
hxxp://ryhoqevo.info
hxxp://lysegixe.info
hxxp://tywubelu.info
hxxp://zubosojo.info
hxxp://tuzezyga.info
hxxp://xugurody.info
hxxp://pupojypi.info
hxxp://xuqenara.info
hxxp://sividuwy.info
hxxp://cilacami.info
hxxp://sigytibo.info
hxxp://vipikece.info
hxxp://dimamizu.info
hxxp://vocygyko.info
hxxp://fokivohe.info
hxxp://bofapyfu.info
hxxp://fotyzasi.info
hxxp://nomowuta.info
hxxp://gacehawy.info
hxxp://najubumi.info
hxxp://hadodeba.info
hxxp://marexice.info
hxxp://hanurezu.info
hxxp://qexojolo.info
hxxp://jejemyje.info
hxxp://qedufogu.info
hxxp://kewacudo.info
hxxp://webypapa.info
hxxp://kyzilury.info
hxxp://ryhaqeqi.info
hxxp://lysygina.info
hxxp://rywibevy.info
hxxp://zybasixi.info
hxxp://tulyzylo.info
hxxp://zugiwoje.info
hxxp://pupejygu.info
hxxp://xuqunado.info
hxxp://puvodupe.info
hxxp://cilecaty.info
hxxp://sigutiwi.info
hxxp://dimemiby.info
hxxp://vicugyci.info
hxxp://dokovoza.info
hxxp://bofypyke.info
hxxp://fotilohu.info
hxxp://bomawufo.info
hxxp://citokema.info
hxxp://goxyhase.info
hxxp://najibutu.info
hxxp://gadadewo.info
hxxp://maryxima.info
hxxp://hanireby.info
hxxp://maxajoci.info
hxxp://jejumyxa.info
hxxp://qesofoly.info
hxxp://jewecuju.info
hxxp://webutago.info
hxxp://kezolude.info
hxxp://wyheqapu.info
hxxp://lysugiro.info
hxxp://rywobeqe.info
hxxp://lyvesiny.info
hxxp://tylizyvi.info
hxxp://zugawoxa.info
hxxp://tupyjyly.info
hxxp://xuqinaji.info
hxxp://puvaduga.info
hxxp://xulyxade.info
hxxp://sifitisu.info
hxxp://citaketo.info
hxxp://simymiwe.info
hxxp://vicogemu.info
hxxp://dikevobi.info
hxxp://vofupyca.info
hxxp://fotolozy.info
hxxp://bonewuki.info
hxxp://foxuhaha.info
hxxp://nojobufy.info
hxxp://gadesesu.info
hxxp://naruxito.info
hxxp://hanarewe.info
hxxp://maxyjomu.info
hxxp://hahimybo.info
hxxp://qesafove.info
hxxp://jewycyxy.info
hxxp://qebitali.info
hxxp://kezaluja.info
hxxp://wehyqagy.info
hxxp://kysigidi.info
hxxp://ryqevepo.info
hxxp://lyvusire.info
hxxp://rylozyqu.info
hxxp://zygewono.info
hxxp://tupujyve.info
hxxp://zuqonaxu.info
hxxp://puveduli.info
hxxp://xukuxaja.info
hxxp://pufotugy.info
hxxp://citykefi.info
hxxp://simimisa.info
hxxp://cicafety.info
hxxp://dikyvowu.info
hxxp://vifipymo.info
hxxp://doralobe.info
hxxp://bonywucu.info
hxxp://foxihazo.info
hxxp://bojabuka.info
hxxp://godusehy.info
hxxp://naroxifi.info
hxxp://ganeresa.info
hxxp://mazujity.info
hxxp://hahonywi.info
hxxp://masefomo.info
hxxp://jewucyne.info
hxxp://qebotavu.info
hxxp://jezeluxo.info
hxxp://wehiqale.info
hxxp://kepagiju.info
hxxp://wyqyvegi.info
hxxp://lyvisida.info
hxxp://rylazypy.info
hxxp://lygywori.info
hxxp://typihyqa.info
hxxp://zuqanone.info
hxxp://tucyduvu.info
hxxp://xukoxaxo.info
hxxp://pufetule.info
hxxp://xutukeju.info
hxxp://simomiho.info
hxxp://cicefefa.info
hxxp://sikuvosy.info
hxxp://vidopyti.info
hxxp://direlowa.info
hxxp://vonuqumy.info
hxxp://foxahabi.info
hxxp://bojybuco.info
hxxp://fodisaze.info
hxxp://noraxiku.info
hxxp://gabyreho.info
hxxp://nazijife.info
hxxp://hahanysy.info
hxxp://masyfoti.info
hxxp://hawicywa.info
hxxp://qebetaqy.info
hxxp://jezukuni.info
hxxp://qegoqava.info
hxxp://kepegixe.info
hxxp://wequvelu.info
hxxp://kyvosijo.info
hxxp://rylezege.info
hxxp://lyguwodu.info
hxxp://rypohypo.info
hxxp://zymynora.info
hxxp://tuciduqy.info
hxxp://zukaxani.info
hxxp://pufyruva.info
hxxp://xutikexy.info
hxxp://pumamilu.info
hxxp://cicyfeko.info
hxxp://sijivohe.info
hxxp://cidapyfu.info
hxxp://diruloso.info
hxxp://vinoqyte.info
hxxp://doxehawy.info
hxxp://bojubumi.info
hxxp://fodosaba.info
hxxp://bowezicy.info
hxxp://goburezi.info
hxxp://nazojika.info
hxxp://gahenyhe.info
hxxp://masifofu.info
hxxp://hawacyso.info
hxxp://mabytate.info
hxxp://jelikuru.info
hxxp://qegaqaqi.info
hxxp://jepyguna.info
hxxp://weqivevy.info
hxxp://kevapixi.info
hxxp://wylyzela.info
hxxp://lygowojy.info
hxxp://rytehygu.info
hxxp://lymunodo.info
hxxp://tufuruqo.info
hxxp://zukexaru.info
hxxp://tycodupe.info
hxxp://xutokene.info
hxxp://pumemivy.info
hxxp://xuxufexi.info
hxxp://sijaciza.info
hxxp://cidypyky.info
hxxp://sirilohi.info
hxxp://vinaqyfo.info
hxxp://dixyhase.info
hxxp://vojibutu.info
hxxp://fosasawo.info
hxxp://bowyzime.info
hxxp://fobirebu.info
hxxp://nozejici.info
hxxp://gahunyza.info
hxxp://nasodoky.info
hxxp://hawecyhi.info
hxxp://mavutofa.info
hxxp://halokusy.info
hxxp://qegeqapu.info
hxxp://jepuguro.info
hxxp://qeqoveqe.info
hxxp://kevypinu.info
hxxp://welizevo.info
hxxp://kyfawoxa.info
hxxp://rytyhyly.info
hxxp://lymiboji.info
hxxp://rycaduga.info
hxxp://zykyxady.info
hxxp://tufirupi.info
hxxp://zutakaro.info
hxxp://punumiqe.info
hxxp://xuxofenu.info
hxxp://pujecivo.info
hxxp://cidupyce.info
hxxp://sirolozu.info
hxxp://cineqyki.info
hxxp://dixugaha.info
hxxp://vihobufy.info
hxxp://dosesasi.info
hxxp://bowizita.info
hxxp://fobarewe.info
hxxp://bozyjimu.info
hxxp://gohinebo.info
hxxp://nasadoce.info
hxxp://gaqycyzu.info
hxxp://mavitoko.info
hxxp://halakuha.info
hxxp://magymafy.info
hxxp://jepogudi.info
hxxp://qeqevepa.info
hxxp://jevupiry.info
hxxp://wekozeqi.info
hxxp://kefewono.info
hxxp://wytuhyve.info
hxxp://lymoboxu.info
hxxp://rycedylo.info
hxxp://lykuxaje.info
hxxp://tyfarugy.info
hxxp://zuryjadi.info
hxxp://tunimipa.info
hxxp://xuxafery.info
hxxp://siralobe.info
hxxp://xudipyna.info
hxxp://pujyciqi.info
hxxp://cinyqycu.info
hxxp://sizigazo.info
hxxp://vihebuke.info
hxxp://disusahu.info
hxxp://vowozufo.info
hxxp://fobewesa.info
hxxp://bozujity.info
hxxp://fohonewi.info
hxxp://nopedoma.info
hxxp://gaqucyby.info
hxxp://navotocu.info
hxxp://halykuzo.info
hxxp://magimake.info
hxxp://hapaguhu.info
hxxp://qeqyvego.info
hxxp://jecipide.info
hxxp://qekalepy.info
hxxp://kefywiri.info
hxxp://wetihyqa.info
hxxp://kymabony.info
hxxp://rycudyvi.info
hxxp://lykoxaxa.info
hxxp://ryderule.info
hxxp://zyrujaju.info
hxxp://tunomigo.info
hxxp://zuxefede.info
hxxp://pujucipu.info
hxxp://xudotyri.info
hxxp://pureloqa.info
hxxp://cibiqymy.info
hxxp://sizagobi.info
hxxp://cihybuca.info
hxxp://disisazy.info
hxxp://viwazuku.info
hxxp://dobyweho.info
hxxp://bozijife.info
hxxp://foganesu.info
hxxp://bopydoto.info
hxxp://goqoxywe.info
hxxp://navetomy.info
hxxp://galukubi.info
hxxp://magomaca.info
hxxp://hapeguzy.info
hxxp://mamuvaki.info
hxxp://jecopijo.info
hxxp://qekelege.info
hxxp://jefuwidu.info
hxxp://wetahypo.info
hxxp://kemybore.info
hxxp://wycisyqu.info
hxxp://lyjaxani.info
hxxp://rydyruva.info
hxxp://lyrijaxy.info
hxxp://tynamili.info
hxxp://zuxyfeja.info
hxxp://tujicigy.info
hxxp://xudetedu.info
hxxp://puwulopo.info
hxxp://xuboqyre.info
hxxp://sizegowu.info
hxxp://cihuvumo.info
hxxp://sisosaba.info
hxxp://viwezucy.info
hxxp://dibuwezi.info
hxxp://volojika.info
hxxp://fogynehy.info
hxxp://bopidofi.info
hxxp://foqaxyso.info
hxxp://novytote.info
hxxp://galikywu.info
hxxp://nagamamo.info
hxxp://mamivacu.info
hxxp://hacapizi.info
hxxp://qekulela.info
hxxp://jefowijy.info
hxxp://hatyfube.info
hxxp://qetehygi.info
hxxp://kemuboda.info
hxxp://wexosype.info
hxxp://kyjexaru.info
hxxp://ryduruqo.info
hxxp://lyrojane.info
hxxp://rynenuvu.info
hxxp://zyxifexo.info
hxxp://tujacila.info
hxxp://zusytejy.info
hxxp://puwilogi.info
hxxp://xubaqyda.info
hxxp://puzygopy.info
hxxp://cihivuti.info
hxxp://sisasawo.info
hxxp://ciwyzume.info
hxxp://divowebu.info
hxxp://vilehico.info
hxxp://doguneze.info
hxxp://bopodiky.info
hxxp://foqexyhi.info
hxxp://bovutofa.info
hxxp://golokysy.info
hxxp://nafemati.info
hxxp://gatufuwa.info
hxxp://mamavame.info
hxxp://hacypibu.info
hxxp://makileco.info
hxxp://jefaqixe.info
hxxp://qetyhylu.info
hxxp://jenibojo.info
hxxp://wexasyga.info
hxxp://kejyxody.info
hxxp://wydirupi.info
hxxp://lyrejara.info
hxxp://rynunuqy.info
hxxp://lyxofenu.info
hxxp://tyhecivo.info
hxxp://zusutexe.info
hxxp://tuwokolu.info
hxxp://xubeqyjo.info
hxxp://puzugoge.info
hxxp://xuhovudy.info
hxxp://sisysasi.info
hxxp://ciqizuta.info
hxxp://sivawawy.info
hxxp://vilyhimi.info
hxxp://digineba.info
hxxp://vopadice.info
hxxp://boviroko.info
hxxp://foqyxyzu.info
hxxp://fokakyhe.info
hxxp://nofumafu.info
hxxp://gatofusi.info
hxxp://namevata.info
hxxp://hacupiwy.info
hxxp://makolemi.info
hxxp://hafeqiba.info
hxxp://qeruhevy.info
hxxp://jenoboxu.info
hxxp://qexesylo.info
hxxp://kejizoje.info
hxxp://wedarugu.info
hxxp://kyryjado.info
hxxp://ryninupe.info
hxxp://lyzafery.info
hxxp://ryhyciqi.info
hxxp://zysitena.info
hxxp://tuwakovy.info
hxxp://zubyqyxi.info
hxxp://puzogolo.info
hxxp://xuhevyje.info
hxxp://pupupagu.info
hxxp://ciqozufo.info
hxxp://sivewase.info
hxxp://ciluhitu.info
hxxp://digonewi.info
hxxp://vipedima.info
hxxp://doquxyby.info
hxxp://bocaroci.info
hxxp://fokykyza.info
hxxp://bofimaky.info
hxxp://gotafuhu.info
hxxp://namycafo.info
hxxp://gacipuse.info
hxxp://makaletu.info
hxxp://hadyqiwo.info
hxxp://marihema.info
hxxp://jenebony.info
hxxp://qexusyvi.info
hxxp://jejozoxa.info
hxxp://wederuly.info
hxxp://kerujaji.info
hxxp://wybonugo.info
hxxp://lyzedede.info
hxxp://sso.anbtr.com
hxxp://ryhucipu.info
hxxp://lysotero.info
hxxp://tywykiqe.info
hxxp://zubiqynu.info
hxxp://tuzagovi.info
hxxp://xugyvyxa.info
hxxp://pupipaly.info
hxxp://xuqazuji.info
hxxp://sivywaha.info
hxxp://cilihife.info
hxxp://sigabesu.info
hxxp://vipudito.info
hxxp://dimoxywe.info
hxxp://voceromu.info
hxxp://fokukybo.info
hxxp://bofomoca.info
hxxp://fotefuzy.info
hxxp://nomucaki.info
hxxp://najelefy.info
hxxp://gacopuha.info
hxxp://hadiqisi.info
hxxp://marageto.info
hxxp://hanybowe.info
hxxp://qexisyqu.info
hxxp://jejazono.info
hxxp://qedyruve.info
hxxp://kewijaxy.info
hxxp://webanuli.info
hxxp://kyzydaja.info
hxxp://ryhocigy.info
hxxp://lysetedi.info
hxxp://rywukipa.info
hxxp://zybomyre.info
hxxp://tulegoqu.info
hxxp://zuguvyno.info
hxxp://pupopave.info
hxxp://xuqezuxu.info
hxxp://puvuwalo.info
hxxp://cilahika.info
hxxp://sigybehy.info
hxxp://citidifi.info
hxxp://dimaxesa.info
hxxp://vicyroty.info
hxxp://dokijywu.info
hxxp://bofamomo.info
hxxp://fotyfube.info
hxxp://bomicacu.info
hxxp://goxepuzo.info
hxxp://najuleke.info
hxxp://gadoqihy.info
hxxp://maregefi.info
hxxp://hanubosa.info
hxxp://maxosyty.info
hxxp://jejezori.info
hxxp://qesuwyqa.info
hxxp://jewojane.info
hxxp://webynuvu.info
hxxp://kezidaxo.info
hxxp://wyhacile.info
hxxp://lysyteju.info
hxxp://rywikigi.info
hxxp://lyvamyda.info
hxxp://tylygopy.info
hxxp://zugivyri.info
hxxp://tupapaqa.info
hxxp://xuquluny.info
hxxp://puvowavu.info
hxxp://xulehuxo.info
hxxp://sifubeze.info
hxxp://citodiku.info
hxxp://simexeho.info
hxxp://vicurofe.info
hxxp://dikojysy.info
hxxp://vofemoti.info
hxxp://fotifuwa.info
hxxp://bonacamy.info
hxxp://foxytubi.info
hxxp://nojileco.info
hxxp://gadaqize.info
hxxp://narygeku.info
hxxp://hanibiho.info
hxxp://maxasyfe.info
hxxp://hahyzosu.info
hxxp://qesowypi.info
hxxp://jewejara.info
hxxp://qebunuqy.info
hxxp://kezodani.info
hxxp://wehexiva.info
hxxp://kysutexy.info
hxxp://ryqokilu.info
hxxp://lyvemyjo.info
hxxp://rylugoge.info
hxxp://zygavydu.info
hxxp://tupypopo.info
hxxp://zuqilura.info
hxxp://puvawaqy.info
hxxp://xukyhuni.info
hxxp://pufibeva.info
hxxp://citasicy.info
hxxp://simyxezi.info
hxxp://ciciroko.info
hxxp://dikejyhe.info
hxxp://vifumofu.info
hxxp://dorofuso.info
hxxp://bonecate.info
hxxp://foxutuwu.info
hxxp://bojolami.info
hxxp://godeqiba.info
hxxp://narugecy.info
hxxp://ganovizi.info
hxxp://mazysyka.info
hxxp://hahizohe.info
hxxp://masawyfu.info
hxxp://jewyjado.info
hxxp://qebinupe.info
hxxp://jezadaru.info
hxxp://wehyxiqo.info
hxxp://kepitena.info
hxxp://wyqakivy.info
hxxp://lyvumexi.info
hxxp://rylofola.info
hxxp://lygevyjy.info
hxxp://typupogi.info
hxxp://zuqoludo.info
hxxp://tucewape.info
hxxp://xukuhuru.info
hxxp://pufobeqo.info
hxxp://xutesine.info
hxxp://simixeby.info
hxxp://cicaroci.info
hxxp://sikyjyza.info
hxxp://vidinoky.info
hxxp://dirafyhi.info
hxxp://vonycafa.info
hxxp://foxituse.info
hxxp://bojalatu.info
hxxp://fodyqiwo.info
hxxp://norogeme.info
hxxp://gabevibu.info
hxxp://nazusyco.info
hxxp://hahozoza.info
hxxp://masewyky.info
hxxp://hawuhahi.info
hxxp://qebonuga.info
hxxp://jezedady.info
hxxp://qeguxupu.info
hxxp://weqykiqe.info
hxxp://kepatero.info
hxxp://kyvimenu.info
hxxp://rylafovo.info
hxxp://lygyvyxe.info
hxxp://rypipoly.info
hxxp://zymaluji.info
hxxp://tucyqaga.info
hxxp://zukihudy.info
hxxp://pufebepi.info
hxxp://xutusira.info
hxxp://pumoxeqe.info
hxxp://cicerimu.info
hxxp://sijujybo.info
hxxp://cidonoce.info
hxxp://direfyzu.info
hxxp://vinucaki.info
hxxp://doxotuha.info
hxxp://bojykafy.info
hxxp://fodiqisi.info
hxxp://bowageta.info
hxxp://gobyviwy.info
hxxp://nazisymu.info
hxxp://gahazobo.info
hxxp://masywyce.info
hxxp://hawihozu.info
hxxp://mabanuko.info
hxxp://jeludaje.info
hxxp://qegoxugy.info
hxxp://jeperedi.info
hxxp://wequkipa.info
hxxp://kevomery.info
hxxp://wylefoqi.info
hxxp://lyguvyno.info
hxxp://rytopove.info
hxxp://lymeluxu.info
hxxp://tyciqalo.info
hxxp://zukahuje.info
hxxp://tufybagu.info
hxxp://xutisidi.info
hxxp://pumazepa.info
hxxp://xuxyriry.info
hxxp://sijijywi.info
hxxp://cidanoma.info
hxxp://siryfyby.info
hxxp://vinocacu.info
hxxp://dixetuzo.info
hxxp://vojukake.info
hxxp://fosoqihu.info
hxxp://bowegefo.info
hxxp://fobuvisa.info
hxxp://nozopety.info
hxxp://gahezowi.info
hxxp://nasuwyma.info
hxxp://hawahoby.info
hxxp://mavynuci.info
hxxp://halidazo.info
hxxp://qegaxule.info
hxxp://jepyreju.info
hxxp://qeqikigo.info
hxxp://kevamede.info
hxxp://welyfopu.info
hxxp://kyficyri.info
hxxp://rytepoqa.info
hxxp://lymulyny.info
hxxp://rycoqavi.info
hxxp://zykehuxa.info
hxxp://tufubale.info
hxxp://zutosiju.info
hxxp://punezego.info
hxxp://xuxuride.info
hxxp://pujojypu.info
hxxp://cidynoto.info
hxxp://siridywa.info
hxxp://cinacamy.info
hxxp://dixytubi.info
hxxp://vihikaca.info
hxxp://dosaquzy.info
hxxp://bowygeki.info
hxxp://fobiviho.info
hxxp://bozapefe.info
hxxp://gohuzosu.info
hxxp://nasowyto.info
hxxp://gaqehowe.info
hxxp://mavubumy.info
hxxp://halodabi.info
hxxp://magexuca.info
hxxp://jepurexy.info
hxxp://qeqokili.info
hxxp://jevemeja.info
hxxp://wekifige.info
hxxp://kefacydu.info
hxxp://wytypopo.info
hxxp://lymilyre.info
hxxp://rycaqaqu.info
hxxp://lykyguno.info
hxxp://tyfibava.info
hxxp://zurasixy.info
hxxp://tunyzeli.info
hxxp://xuxorija.info
hxxp://pujejygy.info
hxxp://xudunodu.info
hxxp://sirodyso.info
hxxp://cinecote.info
hxxp://sizutuwu.info
hxxp://vihokamo.info
hxxp://disemube.info
hxxp://vowugecy.info
hxxp://fobavizi.info
hxxp://bozypeka.info
hxxp://fohizohy.info
hxxp://nopawyfi.info
hxxp://gaqyhosa.info
hxxp://navibute.info
hxxp://haladawu.info
hxxp://magyxumo.info
hxxp://hapirabe.info
hxxp://qeqejivu.info
hxxp://jecumexi.info
hxxp://qekofila.info
hxxp://kefecyjy.info
hxxp://wetupogi.info
hxxp://kymolyda.info
hxxp://ryceqapy.info
hxxp://lykuguru.info
hxxp://rydobaqo.info
hxxp://zyrysine.info
hxxp://tunizevu.info
hxxp://zuxawixo.info
hxxp://pujyjele.info
hxxp://xudinojy.info
hxxp://puradygi.info
hxxp://cibycofa.info
hxxp://sizitusy.info
hxxp://cihakati.info
hxxp://disumuwo.info
hxxp://viwogeme.info
hxxp://dobevibu.info
hxxp://bozupeco.info
hxxp://fogoloze.info
hxxp://bopewyku.info
hxxp://goquhohi.info
hxxp://navobyfa.info
hxxp://galedasy.info
hxxp://magixuti.info
hxxp://haparawa.info
hxxp://mamyjimy.info
hxxp://jecimenu.info
hxxp://qekafivo.info
hxxp://jefycyxe.info
hxxp://wetitolu.info
hxxp://kemalyjo.info
hxxp://wycyqaga.info
hxxp://lyjogudy.info
hxxp://rydebapi.info
hxxp://lyrusura.info
hxxp://tynozeqy.info
hxxp://zuxewini.info
hxxp://tujujevo.info
hxxp://xudonoxe.info
hxxp://puwedylu.info
hxxp://xubuxojo.info
hxxp://sizatuhe.info
hxxp://cihykafu.info
hxxp://sisimusi.info
hxxp://viwageta.info
hxxp://dibyviwy.info
hxxp://volipemi.info
hxxp://fogaliba.info
hxxp://bopywyce.info
hxxp://foqihozu.info
hxxp://novebyko.info
hxxp://galusahe.info
hxxp://nagoxufu.info
hxxp://hateraso.info
hxxp://mamujita.info
hxxp://hacomewy.info
hxxp://qekefiqi.info
hxxp://jefucyna.info
hxxp://qetotovy.info
hxxp://kemylyxi.info
hxxp://wexiqolo.info
hxxp://kyjaguje.info
hxxp://lyrisudo.info
hxxp://rynazepe.info
hxxp://zyxywiry.info
hxxp://tujijeqi.info
hxxp://rydyvagu.info
hxxp://zusanona.info
hxxp://puwudyvy.info
hxxp://xuboxoxi.info
hxxp://puzetula.info
hxxp://cihukake.info
hxxp://sisomuhu.info
hxxp://ciwefafo.info
hxxp://divuvise.info
hxxp://vilopetu.info
hxxp://dogeliwo.info
hxxp://bopiwyma.info
hxxp://foqahoby.info
hxxp://bovybyci.info
hxxp://golisaza.info
hxxp://nafaxuky.info
hxxp://gatyrahu.info
hxxp://mamijifo.info
hxxp://hacanese.info
hxxp://makyfitu.info
hxxp://jefocero.info
hxxp://qetetoqe.info
hxxp://jenulyny.info
hxxp://wexoqovi.info
hxxp://kejeguxa.info
hxxp://wyduvaly.info
hxxp://lyrosuji.info
hxxp://rynezega.info
hxxp://lyxuwide.info
hxxp://tyhahepu.info
hxxp://zusynoro.info
hxxp://tuwidyqe.info
hxxp://xubaxonu.info
hxxp://puzytyvi.info
hxxp://xuhikaxa.info
hxxp://sisamuzy.info
hxxp://ciqyfaki.info
hxxp://siviviha.info
hxxp://vilepefy.info
hxxp://digulisu.info
hxxp://vopoqyto.info
hxxp://foqehowe.info
hxxp://bovubymu.info
hxxp://fokosabo.info
hxxp://nofexuce.info

Related malicious URLs known to have participated in the campaign:
hxxp://melon25.ru - 81.94.205.228

Related malicious MD5s known to have phoned back to the same malicious C&C server IPs (melon25.ru - 81.94.205.228):
MD5: ca2747377512d13afb9a4a7f21fda0fc

Related malicious MD5s known to have phoned back to the same malicious C&C server IPs (melon25.ru - 81.94.205.228):
MD5: 4a71065a8996d38361bdb9d5ba6a9462
MD5: d6e6845ff3f0c2fbc55786f24240a3d4
MD5: 63fd18f6cf1b40f13d35268d314ed8d4
MD5: 2bea9dec83787c4686e5f8f9066cbf5b
MD5: 9877d0ad41b5589be300495c6acdd499

Related malicious MD5s known to have participated in the campaign:
MD5: d846f7ac66a9a932235fb415b96fee5d
MD5: 538ca97778ac886e121bc054574d7478
MD5: 246f497dc26d18d87f9398758ca1bcc2
MD5: 7969e4ef1b2fece87b806b5dfe25a3bb
MD5: e06dd5ba1a101f855604b486d90d2651

We'll, continue, monitoring, the, market, segment, for, mobile, malware, and, post, updates, as, soon, as, new, developments, take, place.
Continue reading →

New Mobile Malware Intercepted in the Wild, Hundreds of Users Affected

September 06, 2016
We've, recently, intercepted, a, currently, circulating, malicious, spam, campaign, affecting, hundreds, of, users, globally, potentially, exposing, the, confidentiality, availability, and, integrity, of, their, devices, to, a, multi-tude, of, malicious, software. Largely, relying, on, a, set, of, social, engineering, vectors, cybercriminals, continue, monetizing, and, earning, fraudulent, revenue, while, affecting, hundreds, of, thousands, of, users, globally. 

Thanks, to, the, overall, availability, of, affiliate, based, type, of, monetization, approaches, cybercriminals, continue, successfully, monetizing, hijacked, and, acquired, underground, market, type, of, hijacked, and, acquired, traffic, for, the, purpose, of, earning, fraudulent, revenue, in, the, process.

In, this, post, we'll, profile, the, campaign, provide, actionable, intelligence, on, the, infrastructure, behind, it, and, discuss, in-depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind, it.

Related malicious MD5s known to have participated, in, the, campaign:
MD5: 7197d23e61909aa16cd637cdba818ae7
MD5: 28bae60a1700b768de0a33275c22bee5

Once, executed, a, sample, malware, phones, back, to, the, following, C&C, server, IPs:
hxxp://android2update.com - 52.28.249.128; 52.28.3.6
hxxp://android2update.com - 52.28.249.128; 52.28.3.6
hxxp://androidversion.net - 52.28.249.128; 52.28.3.6
hxxp://androidssafe.com
hxxp://getupdateandroid.com
hxxp://updateandroid.biz
hxxp://softthrifty.com - 131.253.18.12

Related, malicious, MD5s, known, to, have, phoned, back, to, the, same, C&C, server, IPs (android2update.com - 52.28.249.128; 52.28.3.6):
MD5: 93ad90787391f9d4f15fe06f9d6a32dd
MD5: c678b20e4859ff7a24dcdf01644796f6
MD5: c6964ee454ff2885497c62220a963046
MD5: c2c1b9524017dc401365a0136edeb70a
MD5: efd14b0c1eff64a5e2b90ad5f6c92fdb

Related, malicious, MD5s, known, to, have, participated, in, the, campaign:
MD5: 02462f235a01a6f8287900d04598b4a4
MD5: 11c6792518c1389173ee626b87c44bd1
MD5: 1b497b1ddfcbb5457f4c8ba41d412b44
MD5: 2dfccca5a9cdf207fb43a54b2194e368
MD5: 5884d1134c636cdc8421d76fb288e37d

Related malicious MD5s known to have, participated, in, the, campaign:
MD5: ecbbce17053d6eaf9bf9cb7c71d0af8d
MD5: b1ae0d9a2792193bff8c129c80180ab0
MD5: e98791dffcc0a8579ae875149e3c8e5e

Related malicious, MD5s, known, to, have, participated, in, the, campaign:
MD5: 02462f235a01a6f8287900d04598b4a4
MD5: 11c6792518c1389173ee626b87c44bd1
MD5: 1b497b1ddfcbb5457f4c8ba41d412b44
MD5: 2dfccca5a9cdf207fb43a54b2194e368
MD5: 5884d1134c636cdc8421d76fb288e37d

We'll, continue, monitoring, the, market, segment, for, mobile, malware, and, post, updates, as, soon, as, new, developments, take, place.
Continue reading →

Managed SWF Injection Cybercrime-friendly Service Fuels Growth Within the Malvertising Market Segment

August 29, 2016
Cybercriminals, continue, launching, new, cybercrime-friendly, services, aiming, to, diversify, their, portfolio, of, fraudulent, services, while, earning, tens, of, thousands of fraudulent revenue in the process. Thanks, to, a vibrant, cybercrime ecosystem, and, the, overall, availability, of, DIY (do-it-yourself) type of, malicious, software, generating, tools, cybercriminals, continue, diversifying, their, portfolio, of, fraudulent, services, while, earning, tens, of, thousands, of, fraudulent, revenue, in, the, process.

Largely, relying, on, a diversified, set, of, tactics, techniques, and, procedures, cybercriminals, often, rely, on, automated, and, systematic, compromise, of, vulnerable, Web sites, for, the, purpose, of, active, traffic, acquisition, tactics, to hijack, intercept, and, monetize, the, acquired, traffic, for, the, purpose, of, earning, fraudulent, revenue, in, the, process. Thanks, to, a, vibrant, cybercrime-friendly, ecosystem, cybercriminals, continue, actively, hijacking, intercepting, and, monetizing, the, acquired, traffic, for, the, purpose, of, earning, fraudulent, revenue, in, the, process.



In, this, post, we'll discuss, a, newly, launched, managed SWF injecting, type, of, cybercrime-friendly, service (108.162.197.62), provide actionable, intelligence, on, the, infrastructure, behind, it, and, discuss, in-depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind it.

Malicious MD5s known to have been downloaded from the same C&C server IP (108.162.197.62):
MD5: 738ef8e826b5f9070f555dc8d5e3320f
MD5: 8dddf1d1786ff72adc60057305f4f2c9
MD5: 0042ef6b151d68824999ed27e320ab7b
MD5: ea0f806840a8f1765994d2941d24a18a
MD5: 9d0e32a4f1d4fb348f70f235e9731363

Related malicious MD5s known to have phoned back to the same C&C server IP (108.162.197.62):
MD5: 4e108296f11d99e56be375dcab2e03d4
MD5: 8f696a2995aa56be5a7fe6ac8639e94a
MD5: 2aa4fedd2626f4a210d13a356cf721a1
MD5: 822606bb2f5a86bd20e4d111705c9e99
MD5: 6267650eb343bc1fb063233aaf398c9a

The, service, is, currently, offering, basic, type, of, account, registration, process, priced, at $100, and, premium, type, of, account, registration, process, priced, at, $1,000.

We'll continue, monitoring, the, market, segment, for, malvertising, type, of, managed, cybercrime-friendly, services, and, post, updates, as, soon, as, new, developments, take, place.

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter. Continue reading →

Managed Hacked PCs as a Service Type of Cybercrime-friendly service Spotted in the Wild

August 28, 2016
With the cybercrime ecosystem, persistently, supplying, new, malware, releases, cybercriminals continue occupying multiple market segments, within, the, cybercrime, ecosystem, generating, tens, of, thousands, of fraudulent revenue, in, the, process, potentially, empowering, new market entrants, with, the, necessary, tools, and, know-how, to, continue, launching, related, malicious, attacks, potentially, generating, tens, of, thousands, of fraudulent, revenue, in, the, process, while, targeting, users, internationally.

In this, post, we'll profile a newly, launched, managed hacked PCs, as, a, service, type, of cybercrime-friendly, service, and, discuss, in, depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind it.





Next to the overall availability of malware infected hosts empowering novice cybercriminals with the necessary tools and know, to, conduct, related, malicious attacks, cybercriminals, often, rely, on basic, market segmentation, approaches, further, taking, advantage, of the, affected, users, to, launch, related, managed cybercrime-friendly, type, of, managed, services.

The service is currently offering access to malware-infected hosts, in, the United States, Italy, France, Spain, Brazil, Argentina, and Poland, further, empowering, novice, cybercriminals, with, the, necessary, tools, and, know-how, to, continue, launching, related, malicious attacks.

We'll continue monitoring, the, market, segment, for, hacked PCs, and, post, updates, as, soon, as, new developments, take, place.

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Continue reading →

New Cybercrime-Friendly Service Offers Fake Documents and Bills on Demand

August 28, 2016
The market segment, for, fake, documents, and, bills, continues, flourishing, thanks, to, a, vibrant, cybercrime, ecosystem, offering, access, to, a, variety, of commoditized, underground, market, items, further generating fraudulent revenue for the cybercriminals behind it. Thanks to the overall availability of DIY (do-it-yourself) type of malware generating tools, and, the, overall prevalence, of money mule recruitment scams, allowing, cybercriminals, an easy access to basic risk-forwarding, tactics, cybercriminals, continue, generating, tens, of thousands, of fraudulent revenue in the process.

In this, post, we'll discuss a newly launched managed cybercrime service offering access to fake documents, stolen credit cards, and, fake, bills, and, discuss, in-depth, the tactics, techniques, and procedures, of, the, cybercriminals behind it.




The service is currently offering fake documents for Australia, Belgium, Brazil, Canada, Denmark, Estonia, Finland, France, Germany, Greece, Italy, India, Netherlands, Norway, Latvia, Lithuania, Poland, Romania, Slovakia, Slovenia, Sweden, United Kingdom, USA, Russia, and fake bills for, Australia, Austria. Canada, Czech Republic, Estonia, France, Finland, Germany, Irland, Italy, United Kingdom, Latvia, Norway, Romania, Slovakia, Sweden, Switzerland, USA, Spain, Russia, France, Ukraine.

We'll continue monitoring the market segment for fake documents, and, post, updates, as soon, as, new, developments, take place.

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.

Continue reading →

Invitation - Private Party - Kings of Wisdom

August 19, 2016
Dear, blog, readers, I decided to invite selected, blog, readers, to, a, private, party, hosted, in, my, town, for, the, opening, of, Kings of Wisdom [hard copy] magazine.

If, you're, interested, in, attending, and, bringing, back, the, spirit, of, what, used, to, be, the, scene, you, can, approach, me, at ddanchev@confidantmail.org 1790eb593d891cec2e0cd07ee044b283cce9c011 to request, attendance, details.

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter. Continue reading →

Newly Launched Cybercrime Service Offers Access to POS Terminals on Demand

August 17, 2016
Cybercriminals continue applying basic market segmentation concepts, to their underground market propositions, to further ensure, that, they're capable of targeting the right audience, potentially generating hundreds of thousands of fraudulently generating revenues in the process.

From basic, malware as a service underground market propositions, offering access to country, city, ISP based type of malware-infected hosts, to cybercrime-friendly services, offering access to malware-infected hosts converted to anonymization proxies, to further target additional market segments, within the cybercrime ecosystem, cybercriminals continue to utilize basic market segmentation concepts, based on the targeted population.

In this post, we'll discuss a newly launched managed service, offering access to POS (Point of Sale) terminals, further empowering, both, novice, and sophisticated cybercriminals, with the necessary access to commit related fraudulent activities.





The service is currently offering access to POS (Point of Sale) terminals, located, in the United States, Canada, Australia, United Kingdom, the Netherlands and Germany, priced between $30 and $50 for access to a POS (Point of Sale) terminal.

Cybercriminals, continue relying on basic data mining concepts, while utilizing the overall target population, further, ensuring that their market-relevant propositions, while, continuing to generate fraudulent revenues, in, the, process.

We expect to continue observing an increase in underground market propositions, utilizing basic market segmentation concepts, further positioning, both, novice, and experienced market leaders, as relevant and competitive market participants, potentially generating tens of thousands of fraudulently obtained assets in the process.
Continue reading →

Managed Social Engineering Based Code Signing Generating Certificate Service Spotted in the Wild

August 17, 2016
Cybercriminals are masters of social engineering, potentially tricking, tens of thousands of users on a daily basis, into falling victims into fraudulent cybercrime-friendly campaigns, generating them, hundreds of thousands of fraudulent revenues, successfully, contributing to the growth of multiple underground market segments, within, the underground marketplace.

In this post, we'll discuss a newly launched service, empowering, both, novice, and experienced cybercriminals, with the necessary tools and know how, to further commit, fraudulent activities, in the form of socially engineered code signing certificates, obtained through the registration of bogus and non-existent companies.


Priced at $1,000 per certificate, the service is also offering discounts on a volume basis, including custom contacts based customization files, including detailed info about the rogue company, used in the code signing process. Relying on basic 'visual social engineering' concepts, cybercriminals are perfectly positioned, to execute a successful campaign on a mass scale, or in a targeted nature, successfully targeting tens of thousands of users.

We expect to continue observing relevant code signing as a service, type of cybercrime-friendly propositions, within the cybercrime ecosystem, with more market vendors, entering the market segment, further positioning themselves, as market leaders, through basic market segmentation, and efficient social engineering techniques.
Continue reading →

Spam-friendly Image Randomization Tool Released on the Underground Marketplace

August 17, 2016
Cybercriminals, continue applying basic QA (Quality Assurance) processes, to their fraudulent campaigns, on their way to achieve a posive ROI (Return on Investment) out of their fraudulent activities.

In this post, we'll discuss a newly launched commercial tool, that's capable of generating unique images, for the purpose of tricking spam filters, in an attempt to trick end users into falling victim into the fraudulent campaign.





Priced at $25, the API-enabled tool is capable of converting a regular image, executed in a spam campaign, into a new one, successfully bypassing spam filters, exposing end users to fraudulent attempts, generating fraudulent revenue, for the cybercriminals behind the campaign.

We expect to continue observing an increase in QA (Quality Assurance) driven underground market propositions, leading to a successful set of fraudulent propositions, dominating the underground marketplace.
Continue reading →

Cybercriminals Offer Fake/Fraudulent Press Documents Accreditation On Demand

August 16, 2016
In a cybercrime ecosystem, dominated by fraudulent market propositions, and new market entrants occupying new market segments on a daily basis, cybercriminals are perfectly positioned, to continue offering, commoditized underground market goods, such as, for instance, fake documents, for the purpose of generating fraudulent revenue, while empowering fellow cybercriminas, with the necessary tools to further commit fraudulent activities.

In this post, we'll, discuss a newly launched service, offering fake press accreditation documents, and discuss the overall relevance of the service, in the context of the underground marketplace's ongoing commoditization, basic market segmentation concepts, as well as newly applied concepts such as DIY (do-it-yourself) type of services, and basic OPSEC with QA (Quality Assurance) in mind.







The service is currently offering custom-made press accreditation documents for the Russian Federation, allowing potential cybercriminals the ability to access press-free zones, potentially commiting related fraudulent activities.

The price varies between $62 and $130 depending on the number of fake documents requested, including the option to request anonymous delivery of the fake documents.

Thanks to a vibrant DIY (do-it-yourself) custom-based type of fake documents generating market segment, cybercriminals, have also successfully managed to efficiently streamline the process of generating these documents, applying, both, basic OPSEC (Operational Security) measures in place, to ensure that they're perfectly positioned to reach to their targeted audience, while preserving a decent degree of their operational procedures, as well as Q&A (Quality Assurance) processes, to further ensure the quality of their underground market proposition.

We expect to continue observing a decent supply of segmented market propositions, targeting, both, novice and experienced cybercriminals, seeking to obtain fake documents, on their way to commit related fraudulent activities.

Related posts:
Continue reading →

Historical OSINT - Exposing the Market for Stolen Credit Card Data

August 16, 2016
With the carding underground continuing to flourish, for the purpose, of, monetizing commoditized underground items such as, stolen credit cards, cybercriminals continue to over-supply the market segment for stolen credit cards data, largely relying on a boutique type of cybercrime-operations business model, continuously supplying the market segment with tens of thousands of stolen credit cards data.

Thanks, to, the general availability of malicious software whose purpose is to obtain and process stolen credit cards data, cybercriminals continue to over-supply the marketplace with tens of thousands of stolen credit cards, further, continuing, to, monetize the commoditized underground marketplace item, through, the use of boutique E-shops, offering access to tens of thousands of stolen credit cards data.

In this post we'll profile several boutique E-shops for stolen credit cards data and provide actionable intelligence on the cybercriminals behind it.

Related data exposing the infrastructure behind the most popular boutique E-shops offering access to stolen credit cards data:
accessltd.ru - Email: admin@accessltd.ru
track2.name - Email: rubensamvelich@gmail.com;rubensamvelich@yahoo.com
bulba.cc - Email: bulbacc@rocketmail.com; bulbacc@yahoo.com
ccStore.ru - Email: ooo.service@yahoo.com
dumps.cc - Email: dumps.cc@safe-mail.net
ccmall.cc - Email: b2b.maxim@gmail.com; lvjiecong@yahoo.com.cn
trackstore.su - Email: roger.sroy@yahoo.com
magic-numbers.cc - Email: elche011@yahoo.com
allfresh.us - Email: keikomiyahara@yahoo.com; dcb725@gmail.com
freshstock.biz - Email: wattt80@yahoo.com
approven.su - Email: yurtan20@e1.ru
cv2shop.com - Email: vipforexbiz@gmail.com
vzone.tc - Email: Whois Privacy Activated
privateservices.ws - Whois Privacy Activated
trackservices.ws - Whois Privacy Activated
perfect-numbers.cc - Email: kachanaburi@yahoo.com
mega4u.biz - Email: persiks@online.ua
pwnshop.cc - Email: alexandanns@gmail.com
bestdumps.su - Email: bestdumpssu@live.com
mycc.su - Email: admin@mycc.su
bestdumps.biz - Email: admin@bestdumps.biz
dumpshop.bz - Email: tonchang2011@yahoo.com
cardshop.bz - Email: tonchang2011@yahoo.com

Thanks to the vibrant cybercrime ecosystem, cybercriminals will continue to actively monetize access to malware-infected hosts, for the purpose, of earning fraudulent revenue and achieving stolen assets liquidity, while earning fraudulent revenue in the process.

We'll continue monitoring the market segment for stolen credit cards data, and post updates as soon as new developments take place.

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter. Continue reading →

Malware Serving Campaign Intercepted, Hundreds of Users Affected

June 21, 2016
We've recently intercepted, a currently, circulating, malicious, spam, campaign, exposing, users, to, a, multi-tude, of, malicious, software, potentially, exposing, the, confidentiality, integrity, and, availability, of, their, PCs, to, a, variety, of, malicious, software.

In, this, post, we'll, profile, the, campaign, provide, malicious, MD5s, expose, the, infrastructure, behind, it, and, discuss, in-depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind, it.

Malicious MD5s known to have participated in the campaign:
MD5: 6b422988b8b66e54e68f110c64914744
MD5: 414fc339b2dd57bab972b3175a18d64a

Once executed, a, sample, malware, phones, back, to, the, following, C&C server:
hxxp://hrtests.ru/S.php - 136.243.126.105; 146.185.243.133; 5.135.104.91; 178.33.188.142; 178.32.238.223; 178.208.83.7; 88.214.200.145
hxxp://managtest.ru/WinRAR.exe - 176.126.71.5; 5.196.241.192; 88.214.200.145

Related malicious MD5s known to have phoned back to the same C&C server IPs (136.243.126.105):
MD5: e974e77d0f69b46b9f6c88d98c76c0c6
MD5: 908bb37015af1c863e8e73bb76fdb127
MD5: 87882046d21d2468ee993ea7c3159c4d
MD5: 299c6ac73e225ec5a355b2fb7a618e8f
MD5: 7f2862b5f399bc74dd6d8079da819126

Related malicious MD5s, known, to, have, phoned, back, to, the, same, C&C server IP (146.185.243.133):
MD5: 47c18c76540b74a1bca6ca3ae10ebd50
MD5: 024807c29f147dd77450a5bc62e59fa5
MD5: e283f13766be7f705c0271bc42681270
MD5: a29d67dad13eef259dc5c872706f15a6
MD5: 2cf7bf436ef8cbfda0136efd11e92341

Related malicious MD5s, known, to, have, phoned, back, to, the, same, C&C server IP (146.185.243.133):
MD5: 2cf7bf436ef8cbfda0136efd11e92341
MD5: 3a5f263a24728d3805045778978f00b5
MD5: 87435a3fc3799d271b3608955d1c6c4d
MD5: 95c0194351bc2685535544574eb3f5df
MD5: 7224e3698edec9590a5198defae66ef1

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server IP:
hxxp://worktests.ru/test0.txt

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server, IP:
hxxp://testswork.ru/test15.txt
hxxp://testswork.ru/test18.txt
hxxp://testswork.ru/test18.txt
hxxp://testswork.ru/test20.txt
hxxp://testswork.ru/test21.txt

Once executed a sample malware phones, back, to, the, following, C&C, server, IP:
hxxp://tradetests.ru/test0.txt

Related malicious MD5s, known, to, have, phoned, back, to, the, same, C&C, server, IP (176.126.71.5):
MD5: 44c3ac885206d641a6d2dce5a675f378
MD5: 2bf97da5f11b655428622fb10c68ff11
MD5: 6911f4a5a85e266229debfdf0832faad
MD5: 8f1b264ceef3e116522ec213ee691cd2
MD5: af7275d12796b53f0ad4d7866be49a4c

Once executed, a, sample, malware, phones, back, to, the, following, C&C server, IPs:
61.246.33.84:7974
187.2.210.167:6688
199.189.86.18:6199
62.103.89.163:9333
95.104.13.237:7158
203.231.71.85:6413
150.129.184.145:5560
213.184.4.236:5531
198.27.96.43:6327
115.110.36.121:8009
46.150.36.126:8404
118.233.56.195:6159
187.55.178.150:6984
219.71.10.251:6070
190.37.215.91:7443
122.117.152.249:7894
14.141.70.162:8811
188.173.150.210:6598
60.171.206.39:6349
103.47.194.115:6959
116.241.49.160:7023
175.45.228.54:6324
158.58.204.215:6789
82.76.230.210:6266
220.134.149.93:6688
201.24.187.30:9088
84.108.148.178:6822
186.95.199.115:5943
113.160.112.8:6439
24.190.4.178:6554
52.26.185.23:6549
115.165.241.228:6623
190.254.83.226:7961
177.103.154.31:6554
114.35.121.231:5774
202.65.136.234:7594
91.186.3.83:8673
31.170.141.113:11802
190.205.137.158:6554
223.255.202.23:5949
175.45.228.56:6249
202.143.149.66:9333
5.189.177.10:6843
91.224.25.225:7677
113.176.82.247:6315
121.42.15.50:11649
189.51.15.2:6018
108.61.213.137:9595
96.56.17.58:6126
61.216.32.170:8513
202.166.162.6:6519
119.236.147.67:6755
96.23.181.97:5531
190.142.66.233:7269

Related malicious MD5s known to have phoned back to the same C&C server IP (5.196.241.192):
MD5: 57f6c25f57f6af3feb149d2cf0ca7b70
MD5: 45bc494e569671ac902ac4abeaf52d0e
MD5: b23b41bc40dd6b2d707c07dfb7da8a8b
MD5: 6458ddbaa59448352cfd18d774af1114
MD5: 89bd709329d7a2666e538ee0fdc7e6a0

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server, IP:
hxxp://stafftest.ru/test.html

Related malicious MD5s known to have participated in the campaign:
MD5: 414fc339b2dd57bab972b3175a18d64a

Once executed, a, sample, malware, phones, back, to, the, following, C&C servers:
hxxp://stafftest.ru
hxxp://hrtests.ru
hxxp://profetest.ru
hxxp://testpsy.ru
hxxp://pstests.ru
hxxp://qptest.ru
hxxp://prtests.ru
hxxp://jobtests.ru
hxxp://iqtesti.ru

Related malicious MD5s known to have participated in the campaign:
MD5: 7838ccf4e448d8c7404bfe86f5c9d116

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server:
hxxp://managtest.ru/minerd
hxxp://hrtests.ru/S.php?ver=24&pc=%s&user=%s&sys=%s&cmd=%s&startup=%s/%s

We'll continue monitoring the campaign and post updates as soon as new developments, take, place. Continue reading →

Malware Serving Campaign Intercepted, Hundreds of Users Affected

June 20, 2016
We've recently intercepted, a, currently, circulating, malicious, campaign, affecting, hundreds, of, thousands, of, users, globally, potentially, exposing, their PCs, to, a, variety, of, malicious, software, compromising, the, integrity, confidentiality, and, availability, of, their, devices.

In, this, post, we'll, profile, the, campaign, provide, malicious, MD5s, expose, the, infrastructure, behind, it, and, discuss, in, depth, the, tactics, techniques, and, procedures, of, the, cybercriminals, behind, it.

Malicious URLs, known, to, have, participated, in, the, campaign:
hxxp://gv.com.my/0gcgs - 210.48.153.240
hxxp://test.glafuri.net/yxk6s - 176.223.121.193
hxxp://australiancheerleader.com.au/jsc1okam - 103.254.138.242

Related malicious MD5s known to have participated in the campaign:
MD5: c1f95adbcaf520bf182f9014970d33e5

Known to have phoned back to the same C&C server (210.48.153.240) are also the following malicious MD5s:
MD5: 8ea223d68856ba857a485b506259ae00
MD5: 8697121c56d20b602cd866dd1c0c1791
MD5: d668ee452efb2f1dd0dafc3f44b003e9
MD5: b1eedb69ad38d2e9ff3d5165163f1d0f

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server:
hxxp://138.201.93.46/userinfo.php

Related malicious C&C servers, known, to, have, participated, in, the, campaign:
hxxp://pariachat.ir
hxxp://mahshahrchat.top
hxxp://tandischat.xyz
hxxp://irancell-chat.ir
hxxp://shokolatt.ir
hxxp://mahshahrchat.ir
hxxp://roznazchat.com

Related malicious MD5s known to have participated in the campaign:
MD5: 47223a926f70206de5aa9e9f4f4182f0

Once executed, a, sample, malware, phones, back, to, the, following, C&C, server:
hxxp://138.201.93.46/userinfo.php
hxxp://91.200.14.139/userinfo.php
hxxp://104.131.182.103/userinfo.php
hxxp://164.132.40.47/userinfo.php
hxxp://tjpdcrsbkyqscdue.info/userinfo.php - 69.195.129.70

Related malicious MD5s known to have phoned back to the same C&C server IP (91.200.14.139):
MD5: 47223a926f70206de5aa9e9f4f4182f0

Known to have phoned back to the same C&C server IP (69.195.129.70) are also the following malicious MD5s:
MD5: cd867fa29b9cd9b4d16f96aecb179521
MD5: ec12c2a033b3a381a86072c20a0527f2
MD5: d27ecf75aeb611297ed5b9f70b9773f0
MD5: 3b6ad5215f20452417e4af71eefe7bc9
MD5: b75580959b8eef6574ac029333afafa5

Once executed, a, sample, malware, phones, back, to, the, following C&C server IPs:
hxxp://insamertojertoq.cc/in0odrfqwbio0sa
hxxp://tbiimhetdqyn.com/in0odrfqwbio0sa
hxxp://pmiqpskfkwkc.com/in0odrfqwbio0sa
hxxp://osghqrdmlyhh.net/in0odrfqwbio0sa
hxxp://lltlsiirjjjj.com/in0odrfqwbio0sa

Related malicious MD5s known to have participated in the campaign:
MD5: 90eb8948513e21a8c87f8295ac7e81f5

We'll, continue, monitoring, the, campaign, and, post, updates, as, soon, as, new, developments, take, place. Continue reading →