Advertisement
VRad

#smokeloader_290523

May 29th, 2023 (edited)
320
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.16 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #ZIP #HTML #JS
  2.  
  3. https://pastebin.com/AayUSaXq
  4.  
  5. previous_contact:
  6. https://pastebin.com/RDVXCe0J
  7. https://pastebin.com/QpG70u8T
  8. https://pastebin.com/BJzcXqkK
  9. https://pastebin.com/kBW7nkZ5
  10. https://pastebin.com/Z7zq0YkW
  11. https://pastebin.com/b8PkhMyN
  12. https://pastebin.com/hkskwKvc
  13. https://pastebin.com/JmthzrL4
  14. https://pastebin.com/1scwT0f8
  15. https://pastebin.com/MP3kCSSh
  16.  
  17. FAQ:
  18. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  19. https://research.checkpoint.com/2019-resurgence-of-smokeloader/
  20.  
  21. attack_vector
  22. --------------
  23. email attach .zip1 > .html > .zip2 > JS > WSH > cmd > PowerShell > GET 1URL > exe
  24.  
  25.  
  26. # # # # # # # #
  27. email_headers
  28. # # # # # # # #
  29. Received: from ds103.mirohost.net (ds103.mirohost.net [89.184.69.128])
  30. Received: from 31-43-15-226.dks.com.ua ([31.43.15.226]:16605 helo=[127.0.0.1])
  31. From: Глав Бух <[email protected]>
  32. Subject: Рахунок до оплати
  33. Message-Id: <[email protected]>
  34. Date: Mon, 29 May 2023 02:51:23 +0300
  35. X-Mailer: iPhone Mail (13E238)
  36.  
  37.  
  38. # # # # # # # #
  39. other_senders
  40. # # # # # # # #
  41.  
  42. ivalyaeva[@]medsklad[.]dp.ua
  43. buh_hm[@]tlauto.com[.]ua
  44. inbox2[@]kirrda.kr-admin.gov[.]ua
  45. count[@]khustpharm.com[.]ua
  46. viktor[@]promarma.com[.]ua
  47. chancellory[@]kyiv.e-u.in[.]ua
  48.  
  49.  
  50. # # # # # # # #
  51. files
  52. # # # # # # # #
  53. SHA-256 5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b
  54. File name акт_звірки_рахунки.zip [Zip archive data]
  55. File size 19.73 KB (20205 bytes)
  56.  
  57. SHA-256 c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8
  58. File name акт_звірки_та_рахунки.html [HTML document, Unicode text]
  59. File size 19.51 KB (19983 bytes)
  60.  
  61. SHA-256 b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c
  62. File name акт_звірки_та_рахунки.zip [Zip archive data]
  63. File size 5.98 KB (6128 bytes)
  64.  
  65. SHA-256 51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c
  66. File name акт_звірки_від_05_2023р.js (рахунок_№415_2023.js , рахунок_№416_2023.js) [ JavaScript ]
  67. File size 4.54 KB (4644 bytes)
  68.  
  69. SHA-256 6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7
  70. File name renew.exe (TempuwN57.exe) [ PE32 executable (GUI)]
  71. File size 326.50 KB (334336 bytes)
  72.  
  73.  
  74. # # # # # # # #
  75. activity
  76. # # # # # # # #
  77.  
  78. PL_SCR http://premiumjeck.site/one/renew.exe [176.124.193.111]
  79.  
  80.  
  81. C2
  82.  
  83. polinamailserverip[ .ru/
  84. lamazone[ .site/
  85. criticalosl[ .tech/
  86. maximprofile[ .net/
  87. zaliphone[ .com/
  88. humanitarydp[ .ug/
  89. zaikaopentra[ .com.ug/
  90. zaikaopentra-com-ug[ .online/
  91. infomalilopera[ .ru/
  92. jskgdhjkdfhjdkjhd844[ .ru/
  93. jkghdj2993jdjjdjd[ .ru/
  94. kjhgdj99fuller[ .ru/
  95. azartnyjboy[ .com/
  96. zalamafiapopcultur[ .eu/
  97. hopentools[ .site/
  98. kismamabeforyougo[ .com/
  99. kissmafiabeforyoudied[ .eu/
  100. gondurasonline[ .ug/
  101. nabufixservice[ .name/
  102. filterfullproperty[ .ru/
  103. alegoomaster[ .com/
  104. freesitucionap[ .com/
  105. droopily[ .eu/
  106. prostotaknet[ .net/
  107. zakolibal[ .online/
  108. verycheap[ .store/
  109.  
  110.  
  111. netwrk
  112. --------------
  113. 176.124.193.111 premiumjeck.site 80 HTTP GET /one/renew.exe HTTP/1.1 Google Chrome
  114.  
  115.  
  116. comp
  117. --------------
  118.  
  119.  
  120. proc
  121. --------------
  122.  
  123.  
  124. persist
  125. --------------
  126. n/a
  127.  
  128.  
  129. drop
  130. --------------
  131. C:\Users\%username%\AppData\Local\TempuwN57.exe
  132.  
  133.  
  134. # # # # # # # #
  135. additional info
  136. # # # # # # # #
  137. n/a
  138.  
  139.  
  140. # # # # # # # #
  141. VT & Intezer
  142. # # # # # # # #
  143. https://www.virustotal.com/gui/file/5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b/details
  144. https://www.virustotal.com/gui/file/c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8/details
  145. https://www.virustotal.com/gui/file/b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c/details
  146. https://www.virustotal.com/gui/file/51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c/details
  147. https://analyze.intezer.com/analyses/d229d44a-c9b0-4edc-acc7-eb53db8c0035/behavior
  148. https://www.virustotal.com/gui/file/6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7/details
  149. https://analyze.intezer.com/analyses/69caff4b-913e-4b7d-a80c-a763bcdf461f
  150.  
  151. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement