jroosen

Bokbot Malware IoCs 2019/10/29

Oct 29th, 2019
1,734
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.95 KB | None | 0 0
  1. #Bokbot
  2. Notes:
  3. I got a run of odd #bokbot loader sent via email as .doc but is actually .docx. They are still coming in now.
  4. Loads the following goofy screen attached. Executes VBS embedded to call WSCRIPT and download from an open dir full of #trickbot and other garbage.
  5. _____________________________
  6. Email Template example:
  7. Date: Tue, 29 Oct 2019 11:17:27 -0600
  8. From: "=?utf-8?Q?Loan_Services?=" <ldb3@homesc.com>
  9. Organization: dzldcilvcijcj
  10. X-Priority: 3 (Normal)
  11. Message-ID: <6650300744.20191029111727@homesc.com>
  12. To: Victim@yourdomain.tld
  13. Subject: =?utf-8?Q?You_have_received_message_about_your_unpaid_invoice?=
  14. MIME-Version: 1.0
  15. Content-Type: multipart/mixed;boundary="----------4F3D0D45A18DE123E5"
  16. X-DLP-OUTBOUND: 137.118.40.128/25
  17. X-MAG-OUTBOUND: greymail.redcondor.net@137.118.40.128/25
  18. X-Modus-SPF-Results: spf=pass, details=homesc.com: Sender is authorized to use 'homesc.com' in 'mfrom' identity (mechanism
  19. 'include:spf1.neonova.net' matched)
  20.  
  21. ------------4F3D0D45A18DE123E5
  22. Content-Type: text/plain; charset=utf-8
  23. Content-Transfer-Encoding: 8bit
  24.  
  25. Dear Valuable Customer,
  26.  
  27. This letter is simply a cordial notice. We haven’t accredited the payment for the following monthly bill yet, plus it is three working days delayed. Don't forget to make the payment for the following bill followed below, as fast as possible. If you could have issues, i highly recommend you e-mail us to discuss the matter.
  28. Statement attached to this email.
  29.  
  30. We would appreciate your immediate attention to this subject.
  31.  
  32. Most sincerely,
  33. Justin Parrish
  34. Sucent Loan Services
  35. ------------4F3D0D45A18DE123E5
  36. Content-Type: application/octet-stream;
  37. name="efax_document675724_270.doc"
  38. Content-transfer-encoding: base64
  39. Content-Disposition: attachment;
  40. filename="efax_document675724_270.doc"
  41. ______________
  42. Alternate Body
  43.  
  44. Dear Client,
  45.  
  46. This email is simply a cordial notification. We have not validated the compensation for this invoice still, in addition it's 4 days overdue. Be sure to make payment for the account invoice down the page, in a timely manner. In case you have got concerns, i highly recommend you contact us to talk about the concern.
  47. Statement attached to this e-mail.
  48.  
  49. We'd truly value your prompt focus on this matter.
  50.  
  51. With gratitude,
  52. Damari Quinn
  53. Demimbu Credit Services
  54. ________________________________________
  55.  
  56. Subjects seen:
  57. You have got message about your unpaid invoice
  58. You have collected message about your unpaid invoice
  59. You have got email about unpaid statement
  60. You have received message about your unpaid invoice
  61.  
  62. Doc Template Run:
  63. https://app.any.run/tasks/6d6bdf97-86f2-4880-8e83-6fa44e8dbc14
  64.  
  65. Doc hashes:
  66. 127f34cf8a2f322d30a3d7c651bf75ea3fb31d21b6665273fb75429c36d3bc39
  67. 50dbd9c8754a11a14cc1e94057d23ccbf504af390e2153371d0184cf16bbe772
  68. 3008746ebf3544ee583eee3e32ec39378d581347699ae02143dbd500cf7eadec
  69. 56fc206f8906fd463f0958760c546a15ee573870aeabc2898d9daf445a7510eb
  70.  
  71. Direct execution of payload:
  72. https://app.any.run/tasks/e7e2cbdc-82cf-4ac6-a62a-26620e082e84
  73.  
  74. Binary Hashes:
  75. f61bc27063dbca08901b133ae611e0752fcc3da28df46739fc7bc1661a72e075
  76.  
  77. C2:
  78. https://gfthwards.com/photo.png?id=0120AC7B8F28F965A80000000000FF40000001
  79. https://gfthwards.eu/photo.png?id=0120AC7B8F28F965A80000000000FF40000001
  80. https://gfthwards.net/photo.png?id=0120AC7B8F28F965A80000000000FF40000001
  81. https://presifered.com/photo.png?id=0120AC7B8F28F965A80000000000FF40000001
  82. https://coujtried.com/photo.png?id=0120AC7B8F28F965A80000000000FF40000001
  83.  
  84. Other malware found in open directory:
  85. https://www.kbtseafood.com/wp-content/uploads/2019/07/
  86.  
  87. #Trickbot
  88. https://www.kbtseafood.com/wp-content/uploads/2019/07/Print_Version.exe
  89. https://www.kbtseafood.com/wp-content/uploads/2019/07/LEO2KLDCXZ.exe
  90. https://www.kbtseafood.com/wp-content/uploads/2019/07/crypt.exe
  91. https://www.kbtseafood.com/wp-content/uploads/2019/07/eag12e.tiff
  92. https://www.kbtseafood.com/wp-content/uploads/2019/07/eag12ec.tiff
  93. https://www.kbtseafood.com/wp-content/uploads/2019/07/eag12e.res
Add Comment
Please, Sign In to add comment