Advertisement
VRad

#smokeloader_290523

May 29th, 2023 (edited)
270
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.16 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #ZIP #HTML #JS
  2.  
  3. https://pastebin.com/AayUSaXq
  4.  
  5. previous_contact:
  6. https://pastebin.com/RDVXCe0J
  7. https://pastebin.com/QpG70u8T
  8. https://pastebin.com/BJzcXqkK
  9. https://pastebin.com/kBW7nkZ5
  10. https://pastebin.com/Z7zq0YkW
  11. https://pastebin.com/b8PkhMyN
  12. https://pastebin.com/hkskwKvc
  13. https://pastebin.com/JmthzrL4
  14. https://pastebin.com/1scwT0f8
  15. https://pastebin.com/MP3kCSSh
  16.  
  17. FAQ:
  18. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  19. https://research.checkpoint.com/2019-resurgence-of-smokeloader/
  20.  
  21. attack_vector
  22. --------------
  23. email attach .zip1 > .html > .zip2 > JS > WSH > cmd > PowerShell > GET 1URL > exe
  24.  
  25.  
  26. # # # # # # # #
  27. email_headers
  28. # # # # # # # #
  29. Received: from ds103.mirohost.net (ds103.mirohost.net [89.184.69.128])
  30. Received: from 31-43-15-226.dks.com.ua ([31.43.15.226]:16605 helo=[127.0.0.1])
  31. Reply-To: otspotartm@ukr.net
  32. From: Глав Бух <chancellory@kyiv.e-u.in.ua>
  33. Subject: Рахунок до оплати
  34. Message-Id: <1AB47DD9-5AD1-2AA8-9373-20FE929FD5D9@kyiv.e-u.in.ua>
  35. Date: Mon, 29 May 2023 02:51:23 +0300
  36. X-Mailer: iPhone Mail (13E238)
  37.  
  38.  
  39. # # # # # # # #
  40. other_senders
  41. # # # # # # # #
  42.  
  43. ivalyaeva[@]medsklad[.]dp.ua
  44. buh_hm[@]tlauto.com[.]ua
  45. inbox2[@]kirrda.kr-admin.gov[.]ua
  46. count[@]khustpharm.com[.]ua
  47. viktor[@]promarma.com[.]ua
  48. chancellory[@]kyiv.e-u.in[.]ua
  49.  
  50.  
  51. # # # # # # # #
  52. files
  53. # # # # # # # #
  54. SHA-256 5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b
  55. File name акт_звірки_рахунки.zip [Zip archive data]
  56. File size 19.73 KB (20205 bytes)
  57.  
  58. SHA-256 c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8
  59. File name акт_звірки_та_рахунки.html [HTML document, Unicode text]
  60. File size 19.51 KB (19983 bytes)
  61.  
  62. SHA-256 b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c
  63. File name акт_звірки_та_рахунки.zip [Zip archive data]
  64. File size 5.98 KB (6128 bytes)
  65.  
  66. SHA-256 51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c
  67. File name акт_звірки_від_05_2023р.js (рахунок_№415_2023.js , рахунок_№416_2023.js) [ JavaScript ]
  68. File size 4.54 KB (4644 bytes)
  69.  
  70. SHA-256 6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7
  71. File name renew.exe (TempuwN57.exe) [ PE32 executable (GUI)]
  72. File size 326.50 KB (334336 bytes)
  73.  
  74.  
  75. # # # # # # # #
  76. activity
  77. # # # # # # # #
  78.  
  79. PL_SCR http://premiumjeck.site/one/renew.exe [176.124.193.111]
  80.  
  81.  
  82. C2
  83.  
  84. polinamailserverip[ .ru/
  85. lamazone[ .site/
  86. criticalosl[ .tech/
  87. maximprofile[ .net/
  88. zaliphone[ .com/
  89. humanitarydp[ .ug/
  90. zaikaopentra[ .com.ug/
  91. zaikaopentra-com-ug[ .online/
  92. infomalilopera[ .ru/
  93. jskgdhjkdfhjdkjhd844[ .ru/
  94. jkghdj2993jdjjdjd[ .ru/
  95. kjhgdj99fuller[ .ru/
  96. azartnyjboy[ .com/
  97. zalamafiapopcultur[ .eu/
  98. hopentools[ .site/
  99. kismamabeforyougo[ .com/
  100. kissmafiabeforyoudied[ .eu/
  101. gondurasonline[ .ug/
  102. nabufixservice[ .name/
  103. filterfullproperty[ .ru/
  104. alegoomaster[ .com/
  105. freesitucionap[ .com/
  106. droopily[ .eu/
  107. prostotaknet[ .net/
  108. zakolibal[ .online/
  109. verycheap[ .store/
  110.  
  111.  
  112. netwrk
  113. --------------
  114. 176.124.193.111 premiumjeck.site 80 HTTP GET /one/renew.exe HTTP/1.1 Google Chrome
  115.  
  116.  
  117. comp
  118. --------------
  119.  
  120.  
  121. proc
  122. --------------
  123.  
  124.  
  125. persist
  126. --------------
  127. n/a
  128.  
  129.  
  130. drop
  131. --------------
  132. C:\Users\%username%\AppData\Local\TempuwN57.exe
  133.  
  134.  
  135. # # # # # # # #
  136. additional info
  137. # # # # # # # #
  138. n/a
  139.  
  140.  
  141. # # # # # # # #
  142. VT & Intezer
  143. # # # # # # # #
  144. https://www.virustotal.com/gui/file/5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b/details
  145. https://www.virustotal.com/gui/file/c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8/details
  146. https://www.virustotal.com/gui/file/b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c/details
  147. https://www.virustotal.com/gui/file/51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c/details
  148. https://analyze.intezer.com/analyses/d229d44a-c9b0-4edc-acc7-eb53db8c0035/behavior
  149. https://www.virustotal.com/gui/file/6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7/details
  150. https://analyze.intezer.com/analyses/69caff4b-913e-4b7d-a80c-a763bcdf461f
  151.  
  152. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement