<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="http://info.threatstop.com/hubfs/ransomware-expert-tips-featured.jpg" alt="ransomware-expert-tips-featured.jpg" width="454" height="298" style="display: block; margin-left: auto; margin-right: auto;"></p> <p>Ransomware, to this day, is one of the major threats to individual users seen on a daily basis in the form of Malspam. Recently, researcher Brad Duncan published to<span>&nbsp;</span><a href="http://www.malware-traffic-analysis.net/2017/04/26/index.html">malware-traffic-analysis.net</a><span>&nbsp;</span>a<span>&nbsp;</span><a href="https://isc.sans.edu/forums/diary/Malspam+on+20170411+pushes+yet+another+ransomware+variant/22290/">report</a><span>&nbsp;</span>on a piece of Ransomware called Mole. Distributed by Malspam that spoofs United States Postal Service (USPS) status updates, the malware gains privilege escalation and encrypts user data.</p> <!--more--> <h2>The Campaign</h2> <p>The campaign includes different senders and various e-mail subjects, each crafted to look like USPS status updates. This allows the spam to get past most spam filters, and looks official enough to trick unwary users into both reading the email, and then clicking on a link.</p> <p>Each email contains a link that redirects to a spoofed Microsoft Office portal page, which requests permission to install an Office plugin. Users, after downloading the zip file, extract the contents (as of April 13th this is a JavaScript (.js) file containing a file downloader called<span>&nbsp;</span><a href="https://blog.threatstop.com/nemucod-spreads-through-facebook-messages">Nemucod</a>.</p> <h2>Infection</h2> <p style="line-height: 14.6pt; background: white;"><span style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #545454;">Attempting to execute the .js file (in an attempt to install the plugin) presents a download error, while the download of three executable files in the background succeeds. Execution of the downloaded files by the .js file creates a privilege escalation after which the user data is encrypted and stored with the extension “.MOLE” (thus the name), It then makes contact with its C&amp;C host and provides a public encryption key, and a file count of the encrypted files to the C&amp;C.</span></p> <p style="line-height: 14.6pt; background: white;"><span style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: #545454;">The user is then notified through a .txt file dropped on the desktop (and in any directory with encrypted files) that explains the encryption happened, and details where to pay the ransom.</span></p> <h2>Analysis</h2> <p>According to Duncan's report, the Ransomware has the ability to detect if it is being run in a VM or a sandbox, thus allowing it to evade detection and analysis efforts. The malware itself, is not particularly novel, and there is some dispute over it as it was also<span>&nbsp;</span><a href="https://www.bleepingcomputer.com/news/security/mole-ransomware-distributed-through-fake-online-word-docs/">addressed</a><span>&nbsp;</span>as a new version of the<span>&nbsp;</span><a href="https://www.webroot.com/blog/2016/07/22/about-cryptomix-ransomware/">CryptoMix</a><span>&nbsp;</span>Ransomware family.</p> <p>Another point of interest with this malware, reported by Brad Duncan in the<span>&nbsp;</span><a href="http://researchcenter.paloaltonetworks.com/2017/04/unit42-mole-ransomware-one-malicious-spam-campaign-quickly-increased-complexity-changed-tactics/">Palo Alto Networks</a> Unit 42 blog, is the way it has changed its action and malware distribution methods in the first few days of this campaign. The campaign was first found on April 11th, behaving as described above, and on April 13th it began to distribute<span>&nbsp;</span><a href="https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan:Win32/Kovter">Kovter</a><span>&nbsp;</span>and<span>&nbsp;</span><a href="https://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Win32/Miuref">Miuref</a><span>&nbsp;</span>as well as Mole. On April 14th, it had changed the link in the spam e-mail to direct to the fake USPS portal.</p> <p>Enabling the TSCritical targets to your user policy will add protection against Miuref, Kovter, and Mole Ransomware's campaign to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account click the button to try a demo.&nbsp;</p> <p style="text-align: center;"></p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a>&nbsp;or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our &nbsp;team.</p></span>