Table 1: Top spam recipients’ e-mail domains.
Domain Count TLD Count
gmail.com 2,520,188 com 16,593,050
hotmail.com 1,178,475 de 1,778,513
yahoo.com 1,165,326 net 1,756,130
aol.com 626,561 uk 939,508
t-online.de 192,105 org 923,466
indeedemail.com 169,215 ca 349,499
comcast.net 129,500 ch 313,862
web.de 125,372 mx 311,592
gmx.de 121,178 edu 311,347
msn.com 108,563 fr 289,616
eypot was Emotet
12
banking trojan. This advanced
and highly destructive malware was spread mostly
with malicious MS Word documents, but also URLs
to download such a file, which were placed directly
inside the e-mail or attached PDF. This malware fam-
ily was spreading throughout the whole monitoring
period, with several weeks pauses and many millions
of samples delivered. We are unable to state the exact
number of Emotet samples captured due to its mas-
sive spreading through PDF files, which we were un-
able to tag reliably, as well as through URLs, which
did not respond to our analysis server, arguably be-
cause of blacklisting. However, a detailed look at one
such campaign is provided in the next section 4.2.
Another banking trojan RTM
13
was less prevalent
with only 1,241 unique samples delivered, using more
than 10,000 e-mails totally. This family was spread-
ing in the late months of the monitored period, from
June 18th, 2019, in the form of MS Word documents
as well as executable binaries.
Another prevalent malware family was
credentials-stealing trojan Fareit
14
. Even though
only 35 unique samples were used to spread this
malware, more than 700,000 e-mails were captured.
Unusual attachment formats, ACE and ARJ archives,
were used to pack the binary. Similar to Emotet, the
Fareit family was repeatedly spreading throughout
both years, with several months pause after each
campaign.
Another credentials stealing malware called
FormBook
15
was observed in two campaigns. The
first observed campaign spreading this malware, con-
taining only eight e-mails, appeared on February
19th, 2019. Several months later, on May 2nd,
2019, a much larger campaign containing more than
12
https://www.us-cert.gov/ncas/alerts/TA18-201A
13
https://usa.kaspersky.com/about/press-releases/
2019 rtm-banking-trojan
14
https://blog.talosintelligence.com/2015/09/down-
rabbit-hole-botnet-analysis-for.html
15
https://www.sentinelone.com/blog/formbook-yet-
another-stealer-malware/
220,000 e-mails spread another sample of this spy-
ware.
The similar behaviour was observed with infos-
tealer AgentTesla
16
. Only five unique samples, ei-
ther ZIP or ARJ were used in two campaigns on
April 24th and July 26th, 2019. However, nearly
95,000 malicious e-mails were captured, spreading
this malware. Yet another infostealer, LokiBot
17
, was
spread throughout the monitoring period in 4 different
campaigns with the total of 160,000 samples deliv-
ered. While Fortinet originally reported
18
spreading
through PDF files and 7-Zip archives, in our honey-
pot, we captured ARJ archive, MS Word document,
as well as executable binaries.
There were also smaller one-time campaigns,
spreading different types of malware. On April 4th
2019, spreading of another banking trojan Qakbot
19
was detected. MS Word attachments were used to
send about 500 e-mails throughout a single hour. On
April 26th, a ransomware delivering downloader Ne-
mucod
20
was captured in a 2000 e-mails large cam-
paign. On June 18th, 2019, we captured several
samples of SmokeLoader
21
downloader, which cor-
related with the worldwide resurgence of this old
malware family. On July 22nd, 2019, at that time,
a brand new ransomware Sodinokibi
22
was captured
in a small campaign of 30 e-mails.
We also captured several backdoor and remote ac-
cess trojans (RAT), including Valyria
23
and REM-
COS
24
, spreading in February 2019 using MS Word
documents, and ZIP files respecitvely. Another cam-
paign of REMCOS was captured on July 3rd 2019 us-
ing executable binary attachments. NanoCore RAT
was observed on September 4th 2019 in small num-
bers.
Many of the malware samples were identified as
16
https://krebsonsecurity.com/2018/10/who-is-agent-
tesla/
17
https://www.fortinet.com/blog/threat-research/new-
infostealer-attack-uses-lokibot.html
18
https://www.fortinet.com/blog/threat-research/new-
loki-variant-being-spread-via-pdf-file.html
19
https://blog.talosintelligence.com/2016/04/qbot-on-
the-rise.html
20
https://www.cisecurity.org/blog/malware-analysis-
report-nemucod-ransomware/
21
https://research.checkpoint.com/2019-resurgence-of-
smokeloader/
22
https://www.cybereason.com/blog/the-sodinokibi-
ransomware-attack
23
https://threatpoint.checkpoint.com/ThreatPortal/
threat?threatType=malwarefamily&threatId=164669
24
https://www.fortinet.com/blog/threat-research/
remcos-a-new-rat-in-the-wild-2.html
Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot
259