ExecuteMalware

2021-08-09 Aggah IOCs

Aug 9th, 2021 (edited)
14,690
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.52 KB | None | 0 0
  1. THREAT IDENTIFICATION: AGGAH / AVEMARIA RAT / WARZONE STEALER
  2.  
  3. SUBJECTS OBSERVED
  4. FW: Re: Invoice for July 2021 and Stateement od Account.pdf
  5.  
  6. SENDERS OBSERVED
  7.  
  8. MALDOC FILE HASHES
  9. 14 Invoice & Statement of Account for JULY 2021,pdf.ppam.zip
  10. 60fe5c88b6442a4e6b536ab4ba358895
  11.  
  12. Which contains:
  13. 14 Invoice & Statement of Account for JULY 2021,pdf.ppam
  14. c53ca10d6aa2f4dd9d7cba4ca14bec24
  15.  
  16. AGGAH PAYLOAD DOWNLOAD URLS
  17. http://bitly.com/ddwddgwfwowklwooooi
  18.  
  19. which points to:
  20. https://fckusecurityresearchermotherfkrs.blogspot.com/p/15_17.html
  21.  
  22. FOLLOW UP PAYLOAD URLS
  23. https://35d42729-3b2d-44cd-88c7-59a76492301c.usrfiles.com/ugd/35d427_aba34aefaf6944578eaddcbf518b0d51.txt
  24. https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_31d30f382d85478e8fe7e5f1d2052054.txt
  25. http://1230948%[email protected]/p/15.html
  26.  
  27. PAYLOAD FILE HASHES EXTRACTED FROM TEXT FILES
  28. 1stPayload.exe
  29. 6a7ae0e207f646c9e5b876196cf736e4
  30.  
  31. 2ndPayload.exe
  32. 49e8b5130c4421276e268198d714778b
  33.  
  34. AVE MARIA/WARZONE C2
  35. emalifegogo.duckdns.org
  36.  
  37. STRINGS FOUND IN MEMORY OF THE ASPNET_COMPILER.EXE PROCESS
  38. Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
  39. C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe
  40.  
  41. SUPPORTING EVIDENCE
  42. https://www.virustotal.com/gui/file/6c132e1219d1a4210edeb5dd367568f16f08ddf1ca794a32bf067c22b3e9a113/detection
  43. https://www.virustotal.com/gui/file/17c8a8ef913ea0a4dbb41e6e55e35c28afade971935457caa44b362b9eec8eb9/detection
Add Comment
Please, Sign In to add comment