Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2020-10-14 (WEDNESDAY) - TA551 (SHATHAK) WORD DOCS WITH MACROS FOR ICEDID:
- CHAIN OF EVENTS:
- - malspam --> password-protected zip attachment --> extracted Word doc --> enable macros --> installer DLL --> IcedID EXE
- NOTE:
- - As part of the infection process, Word macros from today's wave created a copy of MSHTA.EXE saved as C:\Users\Public\in.com to run and HTML file with Javascript saved as C:\Users\Public\in.html.
- 20 EXAMPLES OF TA551 WORD DOCS WITH MACROS FOR ICEDID:
- - 9b153e5e5d2b637de5d6370dd3499207e7533e68af8bd77e5db8f9fd5b603e58 adjure 010.14.2020.doc
- - 1117b86e0ce1848b8955b7179d5e86d9aabb58d790bdc459545df5a1afba4143 adjure,010.20.doc
- - 7cd0eb70e309d108d305320882f261ab9d6a5af5937bffadade79191d139002b certificate 010.14.2020.doc
- - 3fd7e776861d6e22673ef53f90ffc8d6f3cd7963f655a0fdcd94b12a8ef00469 command 010.20.doc
- - 3db1065c09e317c8a2114d87695bceb61157e3ddd7d693d7143daae60e81226f command-010.14.20.doc
- - 5919ed5ef45599600051473cc342c11d2a9bdfdfeb2504ad89481fa630775b3d commerce -010.20.doc
- - 6a0f95283a40f325c0c2489f8cb6b1781d2ee553c1d44ed86795d61ea967fb47 commerce _010.20.doc
- - 213347251fc9f4b6812547ecfef2b3783789067ccffee1521eb88c36003a742e docs 010.20.doc
- - 7ace9d0f9f906f3b9151077698b386065e4e093418c7ba136c2aa4b91790f2b9 facts 010.20.doc
- - dcfbb405b77d475ece5c8ff18820293dc8de93eab3e67c481a3a09a6c28e7591 facts,010.20.doc
- - 2f97c22262ad2ea88a948b08c40662fe86232234b376f29582918044f0050aa7 figures.010.14.2020.doc
- - c8fcc2de3b0ed395e1455978c61cfe5640fda525569640ab73b0bd97d848bfaf figures_010.14.2020.doc
- - a04b9bea432dfe50a7526c1cd2392f369dad2801cd6a85d1a757946bccc5f381 input-010.20.doc
- - 6dc29a394cd2c86368edfa7d7721c5c56cd9deea4bdca045cf0eb76549a1152d instrument indenture.010.14.2020.doc
- - 555d2f6c1ecbb661b9aab93c79b5f895be592942ecb0a3a20da386c11f23143d legal agreement.010.20.doc
- - f48c78d02de1ec751ab4eecd01452b9d370b97514ca24384575de3b1d555b168 official paper_010.20.doc
- - 9b6aeea1915244ff07f391b7c855d96678f0f7ea43a646c84fdea47486dc7fff ordain.010.14.2020.doc
- - eca134d5ba493b631f1961738e4af190b9ffcb430fde25940e77c2ce91dc6815 question-010.14.2020.doc
- - bd8138c3d6c0934008e29896c0975f65fdca3d5fae105b9851725a37933176d9 require 010.20.doc
- - 304c7f8c6863bf44fb5c75f3d909b81937bc29169db3e2890d3535ea8cddd840 statistics_010.14.2020.doc
- AT LEAST 8 DOMAINS HOSTING THE INSTALLER DLL:
- - c7cyzl[.]com - 149.154.64[.]179
- - dsv3tk[.]com - 45.8.124[.]36
- - foud7v4[.]com - 45.12.4[.]207
- - i5hibsc[.]com - 185.98.87[.]52
- - tynupd[.]com - 83.166.241[.]191
- - vx1sz8[.]com - 178.250.156[.]190
- - wqmxf8k[.]com - 45.8.124[.]36
- - yg2zdng[.]com - 45.150.64[.]100
- URLS FOR ICEDID DLL:
- - GET /docat/hyra.php?l=dybe1.cab
- - GET /docat/hyra.php?l=dybe2.cab
- - GET /docat/hyra.php?l=dybe3.cab
- - GET /docat/hyra.php?l=dybe4.cab
- - GET /docat/hyra.php?l=dybe5.cab
- - GET /docat/hyra.php?l=dybe6.cab
- - GET /docat/hyra.php?l=dybe7.cab
- - GET /docat/hyra.php?l=dybe8.cab
- - GET /docat/hyra.php?l=dybe9.cab
- - GET /docat/hyra.php?l=dybe10.cab
- - GET /docat/hyra.php?l=dybe11.cab
- - GET /docat/hyra.php?l=dybe12.cab
- - GET /docat/hyra.php?l=dybe13.cab
- - GET /docat/hyra.php?l=dybe14.cab
- - GET /docat/hyra.php?l=dybe15.cab
- - GET /docat/hyra.php?l=dybe16.cab
- - GET /docat/hyra.php?l=dybe17.cab
- - GET /docat/hyra.php?l=dybe18.cab
- 8 EXAMPLES OF ICEDID INSTALLER DLLS:
- - 835311c50b675c6303b6ec069e6dd090ea490e6ed4a6a6621e856a4bf6f8dcc6
- - 99933acb9924e02af90c47a256c1aeef47b4b93ad787c0611a1722232ff96fa5
- - ab037590458a18587639666fe8a6b68e64b2bcae099df9c3b631e3ed4be1ce20
- - ee9d161ad1be9aeccee4c296424fe65c6cbe29b0cc3b3e3ac1b917a4601e7dd4
- - bbadde28126494cb587eae843c7febcdbd0b1bd67bba5213ca0d4e6a1d58e0d6
- - bd0bb23a35eaeb24dd86a89a614ac17f330a164fcb0182c4da0b191b7be3f52d
- - eefa08d95fe3273638d5597cc1c51781412eaf87fa3e8d2877a56c8f22c7c973
- - f40669f099d60042e67e676b2a24b17dc33f9aa00222c0dd71a4f8cde63d9732
- EXAMPLES OF LOCATION FOR THE INSTALLER DLL FILES:
- - C:\Users\[username]\AppData\Local\Temp\temp.tmp
- DLL RUN METHOD:
- - regsvr32.exe [filename]
- HTTPS traffic to legitimate domains caused by the installer DLL files:
- - port 443 - www.intel.com
- - port 443 - support.oracle.com
- - port 443 - www.oracle.com
- - port 443 - support.apple.com
- - port 443 - support.microsoft.com
- - port 443 - help.twitter.com
- At least 2 different URLs for HTTPS traffic generated by the installer DLL files:
- - 134.209.25[.]122 port 443 - huntysmally[.]top - GET /background.png
- - 134.209.25[.]122 port 443 - smalleryurta[.]club - GET /background.png
- 2 examples of SHA256 hashes of IcedID EXEs created by installer DLLs:
- - 78cba4c94ad3bbf06a43904c0281b95178aa56bcc56c14a6af48a7a151e1d360 (initial)
- - af459cb93ef9b02f0a1bc65a32c13ba9022323874be4fb5f979f1235e9146ee6 (presistent)
- HTTPS traffic to malicious domains caused by the above IcedID EXE files (same as samples from yesterday):
- - 143.110.176[.]28 - port 443 - minishtab[.]cyou
- - 143.110.176[.]28 - port 443 - novemberdejudge[.]cyou
- - 143.110.176[.]28 - port 443 - xoxofuck[.]cyou
- - 143.110.176[.]28 - port 443 - suddekaster[.]best
- - 143.110.176[.]28 - port 443 - sryvplanrespublican[.]cyou
Add Comment
Please, Sign In to add comment