Blank Slate is the nickname for a malicious spam (malspam) campaign pushing ransomware targeting Windows hosts. Ive already discussed this campaign in a previous diary back in March 2017. It has consistently sent out malspam since then. Today I collected 11 Blank Slate emails, so this diary examines recent developments from the Blank Slate campaign.
Today border-width:2px” />
Shown above: border-width:2px” />
Shown above: border-width:2px” />
Shown above: Screenshot of spreadsheet tracking for the 11 emails (image 3 of 3).
Normally, emails from this campaign are blank messages with vague subject lines and attachments that dont indicate what it is. Thats why Ive been calling it the Blank Slate border-width:2px” />
Shown above: Example of a typical Blank Slate email from today, Wednesday 2017-06-28.
However, since yesterday, the Blank Slate campaign has sent several Microsoft-themed messages. Weve seen this before. As recently as 2017-04-13, I documented Blank Slate malspam using fake Microsoft messages that led to fake Chrome installation pages. border-width:2px” />
Shown above: Microsoft-themed Blank Slate email from April 2017.
Today however, this time they dont have links to a fake Chrome page. border-width:2px” />
Shown above: Microsoft-themed Blank Slate email from today, Wednesday 2017-06-28.
Otherwise, these emails are similar to previous waves of Blank Slate malspam.
As usual, the zip attachments are double-zipped, and they contain a .js file designed to infect a Windows computer with ransomware. I saw two types of .js files. One was about 9 kB in size, and it ran the downloaded ransomware from the users AppDataLocalTemp directory. The other type of .js file was about 31 kB in size, and it ran the downloaded ransomware from the user border-width:2px” />
Shown above: Example of a 9 kB .js file from this wave of malspam.
Traffic is also typical of what weve seen before with Blank Slate malspam. border-width:2px” />
Shown above: Ransomware binary downloaded by one of the .js files.
No post-infection traffic was noted for todays GlobeImposter ransomware. I saw the typical post-infection for today border-width:2px” />
Shown above: Traffic generated by a Cerber sample from todays malspam, filtered in Wireshark.
As others have noted Twitter and elsewhere, recent Cerber samples use CRBR as their name in the decryption instructions. border-width:2px” />
Shown above: Desktop of a Windows host infected with one of today border-width:2px” />
Shown above: Based on the above MachineGuid, and all my encrypted files end with .BRAD
GlobeImposter also acts the same as weve seen before. border-width:2px” />
Shown above: Desktop from a Windows host infected with todays GlobeImposter sample.
Indicators of Compromise (IOCs)
The following are SHA256 hashes for the todays extracted .js files:
The following are SHA256 hashes for ransomware samples downloaded by the extracted .js files:
The following are domains, HTTP requests, and IP addresses associated with todays Blank Slate malspam:
Email from the GlobeImposter decryption instructions: email@example.com
As I noted last time, potential victims must open the zip attachment, open the enclosed zip archive, then double-click the final .js file. That works on default Windows configurations, but properly-administered Windows hosts and decent email filtering are enough, I think, to keep most people from worrying about Blank Slate.
This is definitely not as serious the recent Petya/NotPetya ransomware outbreak on 2017-06-27. I still wonder how many people are fooled by Blank Slate malspam. Does anyone know someone who was actually infected from these emails? If so, please share your story in the comments section below.
Pcap and malware samples for this ISC diary can be found here.
brad [at] malware-traffic-analysis.net
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.