# Vawtrak and UrlZone Banking Trojans Target Japan **[proofpoint.com/us/threat-insight/post/Vawtrak-UrlZone-Banking-Trojans-Target-Japan](https://www.proofpoint.com/us/threat-insight/post/Vawtrak-UrlZone-Banking-Trojans-Target-Japan)** February 5, 2016 ----- [Blog](https://www.proofpoint.com/us/blog) [Threat Insight](https://www.proofpoint.com/us/blog/threat-insight) Vawtrak and UrlZone Banking Trojans Target Japan ----- February 05, 2016 Proofpoint Staff **Overview** In January and February 2016, Proofpoint researchers observed threat actors spreading banking Trojans in Japan and other countries that had not recently experienced high volumes of this family of malware. These countries certainly have not been targeted previously in the same way as the UK, United States, and others. Instead, it appears that the new campaigns in Japan (and Spain) are [continuations of the trend first observed with Shifu in October 2015. The key takeaways are:](https://www.proofpoint.com/us/threat-insight/post/dridex-shifu-give-spam-bots-day-off) The UrlZone banking Trojan is spreading via email spam and targeting Japanese and Spanish banks The Vawtrak Trojan is spreading using Angler Exploit Kit and targeting Japanese banks Both Trojans are using the same dynamic injects system that allows them to manipulate a financial institution’s website content (likely sharing resources or renting from the same third party) The injects system appears to be written by a Russian author **UrlZone Banking Trojan Campaigns** On January 21st of this year, Proofpoint researchers observed a large spam campaign consisting of tens of thousands of emails targeting Japanese email accounts. Other researchers have also [observed an uptick in UrlZone activity](https://securityintelligence.com/organized-cybercrime-big-in-japan-urlzone-now-on-the-scene) [in Japan but there are additional details behind this emerging](https://www.fireeye.com/blog/threat-research/2016/01/urlzone_zones_inon.html) threat that are worth pointing out. Emails with the subject “copy 3” from multiple Gmail accounts contained a zipped executables and an empty email body. Proofpoint observation of actors such as those spreading Dridex over the past year shows increasing use of very simple lure techniques like this throughout 2015. The simplicity and lack of apparent ruse does not appear to hinder this technique: it is simple to create, requires no imagination on the part of the actor, needs no localization, and may be sufficient to entice the user to click. _[Figure 1: Email lure]_ ----- [The attachment utilized in this campaign is Andromeda. Andromeda is multi-purpose bot, but in this](https://blog.fortinet.com/post/a-good-look-at-the-andromeda-botnet) case it is primarily used to download UrlZone. However, as is often the case in malware ecosystems, Andromeda was also observed loading a plethora of additional malware. _[UrlZone: a man-in-the-browser banking Trojan that has been around for several years](http://www.arbornetworks.com/blog/asert/an-update-on-the-UrlZone-banker/)_ _Pushdo Downloader: aside from_ [adding the infected computer to a spam botnet, the loader](https://www.virusbtn.com/virusbulletin/archive/2013/04/vb201304-Pushdo) also downloaded a Neutrino Bot _[Neutrino Bot: a multi-purpose bot capable of stealing passwords, DDoS, loading additional](http://malware.dontneedcoffee.com/2014/06/neutrino-bot-aka-kasidet.html)_ payloads, etc. In this instance, it downloaded Pony for additional stealing. _[Pony: primarily used for loading additional malware and stealing passwords and Bitcoin](https://www.damballa.com/pony-loader-2-0-steals-credentials-bitcoin-wallets-source-code-sale/)_ wallets. This instance was used for its stealing capabilities. It is also worth mentioning that Proofpoint observed a related large related Cryptowall campaign on January 27, 2016. The Cryptowall downloaded the same Neutrino Bot that was present in the UrlZone campaign. Also, on December 11, 2015, we observed an email campaign delivering the same Andromeda botnet found in the UrlZone campaign, but in the December campaign, Andromeda only downloaded Pushdo. The observations suggest that these campaigns are likely connected by shared affiliates and/or spamming partners. _Figure 2: UrlZone and related campaigns_ The table below shows the banks (and customers) targeted in the UrlZone campaign. **Bank** **County** **Targeted Domains** Bankiter Spain empresas.bankinter.com Banco Sabadell Spain www.bancsabadell.com ww1.sabadellcam.com ww1.sabadellurquijo.com Banca Multicanal Spain www.ruralvia.com Sumitomo Mitsui Banking Corporation Japan directd?.smbc.co.jp The Musashino Bank Japan ib1.musashinobank.co.jp The Yamagata Bank Japan ib1.yamagatabank.co.jp Juroku Bank Japan bk.juroku.co.jp ----- Chugoku Bank Japan direct.chugin.co.jp Bank of The Ryukyus Japan direct.ryugin.co.jp Hachijuni Bank Japan direct1.82bank.co.jp The Daishi Bank Japan ib.daishi-bank.co.jp Hokkoku Bank Japan ib.hokkokubank.co.jp Shinkin Bank Japan www11.ib.shinkin-ib.jp The Norinchukin Bank Japan *direct.jabank.jp The Tajima Bank Japan *parasol.anser.ne.jp Resona Bank Japan *ib.resonabank.co.jp The Japan Net Bank Japan *login.japannetbank.co.jp Tsukuba Bank Japan ib.tsukubabank.co.jp The Awa Bank Japan ib1.awabank.co.jp MIYAZAKIBANK Japan mib.miyagin.co.jp The Hiroshima Bank Japan direct.ib.hirogin.co.jp _Figure 3: Japanese and Spanish banking sites targeted by this instance of UrlZone_ **Vawtrak Banking Trojan Campaigns** [While our colleagues at Sophos and](https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-vawtrak-international-crimeware-as-a-service-tpna.pdf) [Trend previously wrote about Vawtrak targeting Japan in 2014](http://www.trendmicro.com.au/vinfo/au/threat-encyclopedia/web-attack/3141/vawtrak-plagues-users-in-japan) [and earlier, there are so far no documented campaigns of the updated Vawtrak Trojan targeting](https://www.proofpoint.com/us/threat-insight/post/In-The-Shadows) Japan in 2015 or 2016. On February 2, 2016, however, we observed Angler EK delivering Vawtrak ID 28 to Japanese users. _[Figure 4: Angler EK delivering Vawtrak payload with Japanese targeting]_ The table below shows the banks specifically targeted by Vawtrak in the recent campaign: ----- **Bank** **County** **Targeted Domains** Sumitomo Mitsui Banking Corporation Japan directd?.smbc.co.jp The Musashino Bank Japan ib1.musashinobank.co.jp The Yamagata Bank Japan ib1.yamagatabank.co.jp Juroku Bank Japan bk.juroku.co.jp Chugoku Bank Japan direct.chugin.co.jp Bank of The Ryukyus Japan direct.ryugin.co.jp The Daishi Bank Japan ib.daishi-bank.co.jp Hokkoku Bank Japan ib.hokkokubank.co.jp Hachijuni Bank Japan direct1.82bank.co.jp Tsukuba Bank Japan ib.tsukubabank.co.jp The Awa Bank Japan ib1.awabank.co.jp MIYAZAKIBANK Japan ib.miyagin.co.jp The Hiroshima Bank Japan direct.ib.hirogin.co.jp Shinkin Bank Japan www11.ib.shinkin-ib.jp The Norinchukin Bank Japan direct.jabank.jp Resona Bank Japan ib.resonabank.co.jp The Japan Net Bank Japan login.japannetbank.co.jp The Tajima Bank Japan parasol.anser.ne.jp ----- SBI Sumishin Net Bank Japan netbk.co.jp _Figure 5: Japanese banking sites targeted by Vawtrak ID 28_ **Dynamic Injects Shared by Vawtrak and UrlZone** After extracting the injects code from both Trojans we observed that there is an overlap in the targeted banks. Both banking Trojans are using the same dynamic injects system that allows them to manipulate a financial institution’s website content. This means that the two banking Trojans use the same JavaScript code for stealing login credentials, PINs, one-time-passwords, etc. This could also mean that the responsible actors are sharing resources or renting from the same third party. Additionally, the injects JavaScript code appears to be written by a Russian developer, as observed by code comments such as “Startuem nash interval na proverku statusa”, which translates to “Begin our interval for checking the status”. _[Figure 6: Screenshot of part of the inject code]_ **Conclusion** As others have noted, the emergence of banking Trojans in Japan and Spain presents some particular challenges. While organizations in other countries like the UK and the United States have been targets for massive Dridex, Dyre, Vawtrak (and other banking Trojans) campaigns and businesses there have implemented a number of protections, countries with less experience combatting these threats may find themselves vulnerable to considerable losses. Unfortunately, as threat actors saturate targets in many geographies, it's only a matter of time until new geographies begin experiencing the same sorts of volumes and persistence that characterize recent campaigns with Dridex and other malware. **Appendix A : IOCs from campaigns containing UrlZone** **Value** **Type** 1a86cf4fb4dcb0e4e3aad41bc039d8302e0fd6f9fabe203efc77e3aec35e2f66 Andromeda hash 606708C9479E1DF26545D469D3D54A0E268F01AD8AA061F6504968C3B1594A0C UrlZone hash 757F2C62637765CBC8C7B9F5F63ED4AB00F34485F516A66B2A81B4EDFB731920 Pushdo hash CE08A35831F6F5777DB6E8FEA9BAC40808917FEC019338BA00285082737611FB Neutrino Bot hash ----- E90050D963D376C1F75416EBF9BC6FFA2299046F8ADD1DDE6D67752443587411 Pony hash 1d6d7ea0eeec99da1add9e83f672533eeee900dc817018ee6edbf635bb08cf0a UrlZone hash f3b9815ea4a6c603eafadb26efebec21565deec315ee007d59e92f0f656a90bb UrlZone hash 15896a44319d18f8486561b078146c30a0ce1cd7e6038f6d614324a39dfc6c28 UrlZone hash [hxxp://huremoke[.]net/get.php] Andromeda C2 [hxxp://votehad[.]su/paris.php] Andromeda C2 [hxxp://shardsound[.]net/images.php] Andromeda C2 [hxxp://kernsmee[.]ru/news.php] Andromeda C2 [hxxp://masabodhi[.]com/andoluse.php] Andromeda C2 [hxxps://hwnbv5woeedjffn[.]com] UrlZone C2 [hxxp://5.45.179[.]179/ajax.php] Neutrino Bot C2 [hxxp://5.45.179[.]179/p/ajax.php] Pony C2 [hxxp://www.fondazionelanza[.]it/eng/v3.exe] Andromeda downloading UrlZone [hxxp://www.fondazionelanza[.]it/eng/akeyb.exe] Andromeda downloading Pushdo loader ----- [hxxp://www.tajjquartet[.]com/ff/serif/payload.exe] Pushdo loader downloading Neutrino Bot [hxxp://www.tajjquartet[.]com/ff/serif/ponik.exe] Neutrino Bot downloading Pony [hxxps://ifree-online[.]com] UrlZone Injects C2 **Appendix B: IOCs from campaigns containing Vawtrak** **Value** **Type** 9f1de72234dcf77ddf25b69df98058a7f9e633f803ddc2720209bb315ef3a04c Vawtrak hash [hxxp://begiekee[.]com/rss/feed/stream] Vawtrak C2 [hxxp://searalihid[.]com/rss/feed/stream] Vawtrak C2 [hxxp://zofienie[.]com/rss/feed/stream] Vawtrak C2 [hxxp://deehiesei[.]com/rss/feed/stream] Vawtrak C2 [hxxp://keanees[.]com/rss/feed/stream] Vawtrak C2 [hxxp://peazor[.]com/rss/feed/stream] Vawtrak C2 [hxxp://xeaberal[.]com/rss/feed/stream] Vawtrak C2 [hxxp://dietoog[.]com/rss/feed/stream] Vawtrak C2 [hxxp://mafoovoo[.]com/rss/feed/stream] Vawtrak C2 [hxxp://geeseazei[.]net/rss/feed/stream] Vawtrak C2 91.242.163[.]74:8080 Vawtrak C2 ----- [hxxp://5.187.2[.]19/module/272a5ad4a1b97a2ac874d6d3e5fff01d] Vawtrak downloading module [hxxp://5.187.2[.]19/module/2f6421d9a99d75c5d153edda3f1fe5e3] Vawtrak downloading module [hxxp://5.187.2[.]19/module/9079dae8e107342d8f3747fa74ab8a57] Vawtrak downloading module [hxxp://5.187.2[.]19/module/7afb9776a27d97b2f43f8de256448072] Vawtrak downloading module [hxxp://5.187.2[.]19/upd/28] Vawtrak downloading update Subscribe to the Proofpoint Blog -----