Good find, Be Secure, good find. Checked it against two online cheks and they came up with the following:
With an iFrame check this came up: Suspicious
verification%20set-up_files/en-us1.html’
verification%20set-up_files/en-us.html’ (PHP /VerificationSetUp.html, part of a PHISH!)
The Javascript check flags this: uspicious
le=“width: 475px;”><iframe id=“i0278” marginheight=“0px” marginwidth=“0px” scrolling=“no” src=“verification%20set-up_files/en-us1.html” fram…
Oh and confirmed for IP, threat distribution 100% → https://www.reasoncoresecurity.com/ip-address-54.165.60.202.aspx
What’s spread from that IP:
Files
The IP address has been seen to host the following 3 files.
Threat.InstallMonster.DIREKTTUR (Medium)kerish doctor 2015 4.exe
PUP.iDatixCorporation.Installer (Medium)registrycleanersetup.exe
PUP.OOOSoftMedia (Medium)sdformatter3_1.rar.exe
Downloads
File URLs download from 54.165.60.202.
Threat.InstallMonster.DIREKTTUR (Medium)-http://tr.im/o21 (kerish doctor 2015 4.exe) *
PUP.iDatixCorporation.Installer (Medium)-http://tr.im/o44 (registrycleanersetup.exe) *
PUP.OOOSoftMedia (Medium)-http://tr.im/4t2dz (sdformatter3_1.rar.exe) *
- and should be added to detection…
polonus