ExecuteMalware

2021-02-17 Remcos IOCs - 1st

Feb 17th, 2021
4,921
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.78 KB | None | 0 0
  1. THREAT IDENTIFICATION: REMCOS
  2.  
  3. SUBJECTS OBSERVED
  4. EFT Remittance Advice
  5.  
  6. SENDERS OBSERVED
  7.  
  8. MALDOC FILE HASHES
  9. EFT Remittance.xls
  10. e9dbdcfb6439bd0d888e907a71509937
  11.  
  12. JAVASCRIPT LOADER URL
  13. http://greenpayindia.com/king/file/ach/login/Protected%20Client.js
  14.  
  15. JAVASCRIPT LOADER FILE HASH
  16. Protected Client.js
  17. 53c6ba86eedbf52338675e5d806f7cfd
  18.  
  19. Copied to: C:\users\analyst\AppData\Roaming and renamed to notepad.js
  20.  
  21. PAYLOAD URL
  22. http://greenpayindia.com/king/file/ach/login/Attack.jpg
  23.  
  24. PAYLOAD FILE HASH
  25. Attack.jpg
  26. b0df36da77c4171eafae7ab7fbc9f64a
  27.  
  28. REMCOS C2
  29. https://isrealpicker.duckdns.org:672
  30.  
  31. SUPPORTING EVIDENCE
  32. https://urlhaus.abuse.ch/url/1016852/
  33. https://urlhaus.abuse.ch/url/1016853/
  34. https://app.any.run/tasks/0ab15224-b7c3-453a-8d13-a387e7356057/
Advertisement
Add Comment
Please, Sign In to add comment