DHL spam campaign leads to MokesLoader Trojan Downloader

January 6, 2012

SonicWALL UTM Research team observed a increase in spam campaigns employing DHL package delivery schemes. The emails pretending to be from DHL informs the user of a package being sent to their address and that the relevant tracking number is in the attachment. The zipped attachment in the email is a newer variant of the MokesLoader Trojan downloader.

Email subjects used in this spam campaign include:

  • DHL Delivery refuse
  • DHL Error package delivery
  • DHL shipment status No***
  • Error in the delivery address
  • Error in the delivery address No*******
  • Error package delivery
  • Get your parcel No***
  • Shipment Status No***
  • Track your parcel No******
  • Track your shipment No****

The body of the email is as shown below:

 ---------------------------------------------------------------------  Dear customer.     Your package has been sent to your address.    Please find a post label attached which contains a track number of    your package.     Thank you for your attention.    DHL Global Services.  ---------------------------------------------------------------------	 

The following file with a misleading icon is present in the zip attachment:

screenshot

It performs the following activities when executed:

  • It creates the following files:
    • %appdata%csrss.exe (Copy of itself) [Detected as GAV: "MokesLoader.MS (Trojan)]
    • %appdata%MicrosoftProtectqbfbv.xx
    • %appdata%MicrosoftProtectrpphtrt.nv
  • It reports new infection to a remote server using a uniquely generated login id:
    • GET /aaa/index.php?cmd=getload&login={removed}&sel=sp3ya&ver=5.1&bits=0&file=1&run=ok
  • It creates the following registry entries to ensure infection on reboot:
    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun Clients "%appdata%csrss.exe"
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun mcoyr "rundll32 %appdata%MICROS~1Protectrpphtrt.nv, itgn"
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun imfblgk "rundll32 %appdata%MICROS~1Protectqbfbv.xx, namn"
  • It creates a TCP backdoor on the infected machine
    screenshot
  • It reports backdoor port to remote server:
    • GET /aaa/index.php?cmd=getsocks&login={removed}&port=2592 HTTP/1.1
  • The following commands were used to communicate with remote server
    • getgrab
    • getproxy
    • getload
    • getsocks
  • It receives instructions from remote server and downloads additional malware.

SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:

  • GAV: MokesLoader.MS (Trojan)
  • GAV: MokesLoader.MK (Trojan)
  • GAV: MokesLoader.LS (Trojan)
  • GAV: MokesLoader.LH (Trojan)
  • GAV: Dofoil.L#email (Trojan)

screenshot