VRad

#MassLogger_180820

Aug 18th, 2020 (edited)
1,187
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.41 KB | None | 0 0
  1. #IOC #OptiData #VR #MassLogger #NET #Stealer #RAR #EXE #PowerShell
  2.  
  3. https://pastebin.com/4uXgesYV
  4.  
  5. MassLogger identified with help of @James_inthe_box
  6. Binaries was correctly decoded by @ni_fi_70
  7.  
  8. FAQ:
  9. https://medium.com/@mariohenkel/decrypt-masslogger-2-4-0-0-configuration-eff3ee0720a7
  10. https://github.com/advanced-threat-research/Yara-Rules/blob/master/malware/MALW_masslogger_stealer.yar
  11. https://www.fireeye.com/blog/threat-research/2020/08/bypassing-masslogger-anti-analysis-man-in-the-middle-approach.html
  12. https://www.seqrite.com/blog/masslogger-an-emerging-spyware-and-keylogger/
  13. https://fr3d.hk/blog/masslogger-frankenstein-s-creation
  14.  
  15. attack_vector
  16. --------------
  17. email attach .dat (RAR) > EXE > PowerSHelll > GET .jpg > decode > inject > steal
  18.  
  19. email_headers
  20. --------------
  21. Return-Path: <[email protected]>
  22. Received: from diez.sitserver.es (localhost.localdomain [127.0.0.1])
  23. by diez.sitserver.es (Postfix) with ESMTPSA id E09911203E87;
  24. Received: from r-199-61-62-5.ff.avast.com (r-199-61-62-5.ff.avast.com
  25. [5.62.61.199]) by webmail.publiactiva.com (Horde Framework)
  26. Date: Tue, 18 Aug 2020 05:53:43 +0000
  27. Subject: Fwd: Супровідний платіж 18-18-2020 08:49:43
  28. User-Agent: Horde Application Framework 5
  29. X-FE-ORIG-ENV-FROM: [email protected]
  30. X-FEAS-CLIENT-IP: 95.216.245.200
  31.  
  32. files
  33. --------------
  34. SHA-256 21bb50ff9f59c9381ba79763f53ee12563502fd647ae20f54868074640a4911d
  35. File name Untitled attachment 00182.dat [ RAR archive data, vc1, Locked, os: OS/2 ]
  36. File size 24.01 KB (24586 bytes)
  37.  
  38. SHA-256 2f49691118a908eb48c777e70065854e619b438bc317199b3559a1d8d5cddc6d
  39. File name Доказ оплати...exe [PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly]
  40. File size 53.50 KB (54784 bytes)
  41.  
  42. SHA-256 c06d5538f6d2e875d49601a403d1cbd3ac636004b4ee106f69a1aa2fa13aeabf
  43. File name Q9.jpg [ASCII text, with very long lines, with no line terminators]
  44. File size 5.38 MB (5640802 bytes)
  45.  
  46. SHA-256 9fa11ac7c21c590f61767f2cbf7f3e17235cd43bd0587875817d02a624e3c6a4
  47. File name InstallUtil.exe.inactive [ .NET executable ]
  48. File size 709.50 KB (726528 bytes)
  49.  
  50. SHA-256 82bd8e28f81160039e462330daee5190d7f474e76723aea057ddeadb201bc55c
  51. File name beef.dll [.NET executable]
  52. File size 25.00 KB (25600 bytes)
  53.  
  54. activity
  55. **************
  56. PL_SCR privatnidoktoricacak.com/Q9.jpg
  57.  
  58. C2 94.127.7.174
  59. exfil on smtp.gmail.com
  60.  
  61. netwrk
  62. --------------
  63. [ssl]
  64. smtp.gmail.com
  65.  
  66. [http]
  67. 217.26.215.27 privatnidoktoricacak.com GET /Q9.jpg HTTP/1.1
  68.  
  69. comp
  70. --------------
  71. powershell.exe 3392 TCP 217.26.215.27 80 ESTABLISHED
  72.  
  73. proc
  74. --------------
  75. C:\Users\operator\Desktop\1.exe
  76.  
  77. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass $NjBXI='...';$jm=$NjBXI.Split('^') | forEach {[char]([convert]::toint16($_,16))};$jm -join ''|I`E`X
  78.  
  79. C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
  80.  
  81. persist
  82. --------------
  83. n/a
  84.  
  85. drop
  86. --------------
  87. n/a (all done by powershell)
  88.  
  89. # # #
  90. https://www.virustotal.com/gui/file/21bb50ff9f59c9381ba79763f53ee12563502fd647ae20f54868074640a4911d/details
  91. https://www.virustotal.com/gui/file/2f49691118a908eb48c777e70065854e619b438bc317199b3559a1d8d5cddc6d/details
  92. https://www.virustotal.com/gui/file/c06d5538f6d2e875d49601a403d1cbd3ac636004b4ee106f69a1aa2fa13aeabf/details
  93. https://www.virustotal.com/gui/file/9fa11ac7c21c590f61767f2cbf7f3e17235cd43bd0587875817d02a624e3c6a4/details
  94.  
  95.  
  96. VR
  97.  
Add Comment
Please, Sign In to add comment