COVID-19 Themed Multistage Malware, (Thu, Mar 19th)

COVID-19 Themed Multistage Malware, (Thu, Mar 19th)

More and more countries are closing their borders and ask citizens to stay at home. The COVID-19 virus is everywhere and also used in campaigns to lure more victims who are looking for information about the pandemic. I found a malicious email that delivers a multi-stage malware.


It spoofs a World Health Organisation email and pretends to provide recommendations to the victim:



From: World Health Organisation
To: xxx
Subject: CORONAVIRUS TRAVEL RECOMMENDATIONS Dear Sir / Madam, Following the vertiginous spread of the CORONAVIRUS epidemic, which has already left more than 4,200 people dead and 119,000 cases worldwide; we
recommend these sanitary measures. Download these measures [1] Kind Regards, WORLD HEALTH ORGANIZATION Avenue Appia 20
1202 Geneva
Swiss
Phone: + 41-22-7912111 Links:
------
[1] hxxp://bit[.]ly/2W1eAvU

The shortened link redirects to an URL that serves a malicious Word document:



hxxp://216[.]189[.]145[.]11/RECOMMENDATIONS CORONAVIRUS.doc

(This IP is located in the US (a hosting company)


The downloaded document (SHA256:c3379e83cd3e8763f80010176905f147fcc126b5e7ad9faa585d5520386bd659) has a current VT score of 6/60[1]! The document does  have any macro but has two embedded objects:



root@remnux:/malwarezoo# oledump.py “RECOMMENDATIONS CORONAVIRUS.doc” 1: 114 'x01CompObj' 2: 280 'x05DocumentSummaryInformation' 3: 416 'x05SummaryInformation' 4: 7340 '1Table' 5: 5304 'Data' 6: O 26260 'ObjectPool/_1645425484/x01Ole10Native' 7: 6 'ObjectPool/_1645425484/x03ObjInfo' 8: O 26359 'ObjectPool/_1645425485/x01Ole10Native' 9: 6 'ObjectPool/_1645425485/x03ObjInfo'
10: 4096 'WordDocument'


The two embedded documents are the same and are DOS batch files (SHA256:c8aace2ca96c6e308f374f4b2e425849ca94287aa8ea9768c5a24b38a2167d24), unknown on VT.


When you look at the file, it is heavily obfuscated using Chinese characters:



Support the originator by clicking the read the rest link below.