Copyright Lawsuit Filed Against You Themed Malware Campaign

Having just received a copy of what appears to be the last active domain involved in last week’s “Copyright Lawsuit filed against you” themed malware campaign, it’s time to conduct a brief assessment of its inner workings.

Subject used: Copyright Lawsuit filed against you
Sample message: March 24, 2010
Crosby & Higgins
350 Broadway, Suite 300
New York, NY 10013

To Whom It May Concern: 
On the link bellow is a copy of the lawsuit that we filed against you in court on March 11, 2010. Currently the Pretrail Conference is scheduled for April 11th, 2010 at 10:30 A.M. in courtroom #36. The case number is 3485934. The reason the lawsuit was filed was due to a completely inadequate response from your company for copyright infrigement that our client Touchstone Advisories Inc is a victim of Copyright infrigement /lawsuit/suit_documents.doc

Touchstone Advisories Inc has proof of multiple Copyright Law violations that they wish to present in court on April 11th, 2010.

Mark R. Crosby
Crosby & Higgins LLP

Detection rates:
complaint.docDownloader.Lapurd – Result: 22/39 (56.42%)
complaint_docs.pdfTrojan-Clicker.Win32.Cycler.odn – Result: 27/42 (64.29%)

Samples phone back to:
– /fwq/indux.php?U=RANDOM_DATA – AS4134, CHINA-TELECOM China Telecom
– /hia12/ter.php?u=UserName&c=COMPUTERNAME&v=RANDOM_DATA

Active C&C administration panel at: /hia12/sca.php – returns “SSL ONLY.. USE HTTPS

Spamvertised domains involved in the campaign:
– /lawsuit/suit_documents.doc –
– /s/r439875.doc –
– /complaint.doc –
– /suit/complaint.doc – ACTIVE
– – Email:

The same phone back IP was also profiled in another campaign from January, 2010.

Clearly, the cybercriminals behind it are aiming to stay beneath the radar, by relying on not so well profiled malicious infrastructure, combined with newly introduced campaigns in an attempt to make it harder to establish historical connections (Read about the “aggregate-and-forget” concept in respect to botnets/malware) between the rest of the their malicious activities.

This post has been reproduced from Dancho Danchev’s blog. Follow him on Twitter.

Author: Dancho Danchev

Leave a Reply

Your email address will not be published. Required fields are marked *