
SonicWALL UTM Research team observed reports of a new Rogue AV downloader being spammed in the wild since yesterday via Invoice e-mail spam and Ecard e-mail spam campaigns. The Downloader Trojan arrives as an e-mail attachment or gets downloaded via a URL in the e-mail.
Campaign #1 - Transaction Invoice e-mail spam
Subject: Your transaction has been processed
Attachment: invoice.zip (contains invoice.exe)
Email Body:
------------------------
Your transaction has been processed by WorldPay, on behalf of Amazon Inc.
The invoice file is attached to this message.
This is not a tax receipt.
We processed your payment.
Amazon Inc has received your order,
And will inform you about delivery.
Sincerely,
Amazon Team
------------------------
The e-mail message looks like below:
Campaign #2 - Ecard e-mail spam
Subject: You Have Received a Greeting Card
Attachment: none
Email Body:
------------------------
Good day.
You have received an eCard
To pick up your eCard, click on the following link (or copy & paste it
into your web browser):
htt://groups.google.com/group/{REMOVED}/setup.zip
Your card will be available for pick-up beginning for the next 30
days.
Please be sure to view your eCard before the days are up!
We hope you enjoy you eCard.
Thank You!
------------------------
The e-mail message looks like below:
When the user clicks the URL, it will lead to this Google Groups page pointing to the Rogue AV downloader.
Installation
Installs itself as the following files and could use different file names per every infection:
It attempts to connect to securehttpss.com and downloads Desktop Security 2010 Installer vi following HTTP request:
Installs the Desktop Security 2010 Rogue AV as seen below:
Registry Changes
Value: SAPI5WindowsTM
Data: "c:program filescommon filesmicrosoft sharedspeech1033windowstmoperating.exe"
Value: wordpadWindows
Data: "Program FilesWindows NTAccessoriesWindowsMicrosoft.exe"
Value: NotificationsSubscriber
Data: "Program FilesCommon FilesMicrosoft SharedDWApplicationReporting.exe"
Value: moreInternet
Data: "Program FilesOnline ServicesProvidersRefer.exe"
Value: SecurityCenter
Data: "Application DataDesktop Security 2010securitycenter.exe"
Value: UninstallString
Data: "Application DataDesktop Security 2010securityhelper.exe" /UNINSTALL
Value: DisplayIcon
Data: "Application DataDesktop Security 2010securityhelper.exe",1
Remote Server Connection:
SonicWALL Gateway AntiVirus provided protection against these spammed Rogue AV variants via following signatures:
Share This Article

An Article By
An Article By
Security News
Security News