Waledac Couponizer Trojan
This week, SonicWALL UTM Research team observed new variants of Waledac. They switched to using coupons theme: by making copies of couponizer.com and sending emails that link to the spoofed look-alike sites.
Users can differentiate between the infected sites and the legitimate couponizer.com website by pointing the mouse cursor over any of the images on the page and checking which link is displayed in the browser's status bar. If the link is to a executable file (.exe) this page is malware.
In addition these variants incorporate IP address geolocation, which is a way of determining a user's location based on the IP address. The user's IP address is queried to determine its location, then the results of that query are put into the webpage. The websites used in this attack include:
These domains resolve to different IP addresses every time they are visited. The filenames are also rotated. Some of the filenames used in this wave are:
When executed this Waledac variant is almost identical in its behavior to the previous variant.
The malware has very low AV detection at the time of writing this Security Alert. SonicWALL Gateway Antivirus will detect this new Waledac variant with GAV signatures: Suspicious#waledac.6 (Worm), Agent.AINT (Trojan), Suspicious#waledac.5 (Worm) .
Here are some screenshots of the attack websites.