Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #IOC #OptiData #VR #rurat #RemoteUtilitiesLLC #EXE #UPX
- https://pastebin.com/Dn4w1h8K
- previous_contact:
- 09/03/21 https://pastebin.com/70CvpLRE
- 03/03/21 https://pastebin.com/vBf6Wyr5
- 03/03/21 https://pastebin.com/br4Cayaz
- FAQ:
- https://www.remoteutilities.com/download/#
- attack_vector
- --------------
- email > attach .zip > .rar > .exe1 (UPX) > exe2 > install > service > 145.239.23.207, 178.210.76.171, 195.24.68.15, 194.156.99.64
- email_headers
- --------------
- Return-Path: <[email protected]>
- Received: from mailgw1.court.gov.ua (mailgw1.court.gov.ua. [212.90.190.159])
- by mx.google.com with ESMTPS id z7si9162796lfh.121.2021.03.21.16.38.11
- Received-SPF: pass (google.com: best guess record for domain of [email protected] designates 212.90.190.159 as permitted sender) client-ip=212.90.190.159;
- Message-Id: <[email protected]>
- From: Бузовський Віталій Володимирович <[email protected]>
- Subject: Судовий запит № 765251150
- Reply-To: Бузовський Віталій Володимирович <[email protected]>
- Date: Mon, 22 Mar 2021 01:37:39 +0200
- previous contact:
- **************
- Received: from mail.mepr.gov.ua (mail.menr.gov.ua [194.183.172.242])
- Received: from gmail.com (31.13.19.242) by SERV-MAIL.menr.local (10.11.12.9)
- with Microsoft SMTP Server id 14.3.498.0; Tue, 9 Mar 2021 03:45:16 +0200
- From: Чорнуцький Сергій Петрович <[email protected]> [spoofed]
- Subject: Судовий запит № 72137269
- Received: from mail.mepr.gov.ua (mail.menr.gov.ua [194.183.172.242])
- (envelope-from [email protected])
- Received: from gmail.com (176.100.167.8) by SERV-MAIL.menr.local (10.11.12.9)
- with Microsoft SMTP Server id 14.3.498.0; Wed, 3 Mar 2021 11:05:16 +0200
- From: Кравець Олександр Олександрович <[email protected]>
- Subject: Електронний запит (довіданий) Терміново!
- files
- --------------
- SHA-256 f65b5ba993f70b092df734bd504a63090cc621343e614c25f1e78643e46741e4
- File name Електронний судовий запит.zip [Zip archive data, at least v1.0 to extract]
- File size 19.94 MB (20907569 bytes)
- SHA-256 d88aeb0e0d5b88735950db9eb679414d5eb2d365d4d4238469c5ffd92497ceba
- File name Електронний судовий запит № 0990092883737373.rar [RAR archive data, v1d, flags: Solid, os: Win32]
- File size 19.94 MB (20904797 bytes)
- SHA-256 89bbc2f17098224b315c84003ee828959cd1e2155b3415cff861dd0c8a43d875
- File name Електронний судовий запит № 0990092883737373.docx.exe [PE32 executable, UPX 2.90 [LZMA]] ! Signed file, valid signature
- File size 20.41 MB (21402224 bytes) Date signed 08:35 PM 03/21/2021
- SHA-256 f5967507c1d320ff9388859419bebbc4caa3a07a298c4f666d3def053cded561
- File name unpack.exe [PE32 executable, BobSoft Mini Delphi]
- File size 22.81 MB (23913072 bytes) Creation Time 2021-02-28 12:26:30
- installed
- --------------
- SHA-256 24b9025944524d14721a9d4ac4fcc40285410a1753c973cd96c526adfa679bab
- File name host.msi [Microsoft Windows Installer] ! Signed file, valid signature
- File size 20.50 MB (21494784 bytes) Date signed 08:35 PM 03/21/2021
- SHA-256 85b67377703bb2b9509d2fb895bb96d2afd42fe2e69f3d6c265f3a5e5c239598
- File name rutserv.exe [PE32 executable, BobSoft Mini Delphi] ! Signed file, valid signature
- File size 17.39 MB (18236152 bytes) Date signed 12:28 PM 02/28/2021
- SHA-256 1f54cb5415178dcb7d43c158898aed122e443a2edd15c85f525fce9cad01ae41
- File name rfusclient.exe [ PE32 executable ] ! Signed file, valid signature
- File size 10.71 MB (11235064 bytes) Date signed 12:28 PM 02/28/2021
- original_utility (signed, not modified)
- --------------
- SHA-256 d4d3ef9196b5dac53d1e06d738eb3e529578752bf9e8cfd2900a600d5f10a7e5
- File name host7.0.0.1.exe [PE32 executable, UPX 2.90 [LZMA]]
- File size 20.41 MB (21397752 bytes)
- activity
- **************
- PL_SCR attached exe
- C2 145.239.23.207 WORLDBTCNEWS.COM [FR]
- 178.210.76.171 RU-CENTER-HOSTING [123308, Moscow, Russian Federation]
- 194.156.99.64 EXAMPLE.COM [Hong Kong]
- 195.24.68.15 NIC.RU [Moscow, Russian Federation]
- previous contact:
- **************
- 139.28.38.254
- 195.24.68.15 [Moscow, Russian Federation]
- 194.156.99.64 [Republic of Moldova, Chisinau]
- netwrk
- --------------
- tcp.port == 80 || tcp.port == 465 || tcp.port == 8080 || tcp.port == 5651
- 145.239.23.207 51264 → 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
- 194.156.99.64 51266 → 8080 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
- 178.210.76.171 51262 → 8080 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
- 195.24.68.15 51261 → 8080 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
- !previous contact:
- **************
- tcp.port == 80 || tcp.port == 8080 || tcp.port == 5651
- tcp.port == 80 || tcp.port == 8080 || tcp.port == 5651
- tcp.port == 82 || tcp.port == 5652 || tcp.port == 465
- comp
- --------------
- rutserv.exe 2848 TCP 195.24.68.15 8080 SYN_SENT
- rutserv.exe 2848 TCP 178.210.76.171 8080 SYN_SENT
- rutserv.exe 2848 TCP 145.239.23.207 8080 ESTABLISHED
- rutserv.exe 2848 TCP 145.239.23.207 80 ESTABLISHED
- rutserv.exe 2848 TCP 145.239.23.207 5651 ESTABLISHED
- rutserv.exe 2848 TCP 194.156.99.64 8080 ESTABLISHED
- rutserv.exe 2848 TCP 194.156.99.64 465 SYN_SENT
- rutserv.exe 2848 TCP 195.24.68.15 5651 SYN_SENT
- rutserv.exe 2848 TCP 145.239.23.207 465 SYN_SENT
- rutserv.exe 2848 TCP 194.156.99.64 5651 ESTABLISHED
- [System] 0 TCP 178.210.76.171 8080 TIME_WAIT
- [System] 0 TCP 178.210.76.171 8080 TIME_WAIT
- proc
- --------------
- C:\Users\operator\Desktop\Електронний судовий запит № 0990092883737373.docx.exe
- C:\Users\operator\Desktop\Електронний судовий запит № 0990092883737373.docx.exe
- "C:\Windows\System32\msiexec.exe" /i "C:\Users\support\AppData\Local\Temp\RUT_{AAA8EB55-ADCE-43C6-95B0-CECF340AB2AD}\host.msi" /qn
- {another}
- C:\Windows\system32\msiexec.exe /V
- C:\Windows\syswow64\MsiExec.exe -Embedding C2D03485DC43F359294299D1A1278EF5
- "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" -msi_copy "C:\Users\support\AppData\Local\Temp\RUT_{AAA8EB55-ADCE-43C6-95B0-CECF340AB2AD}\host.msi"
- "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /silentinstall
- "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /firewall
- "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /start
- "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -service
- C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
- "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
- "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
- persist
- --------------
- HKLM\System\CurrentControlSet\Services 22.03.2021 11:40
- RManService Allows Remote Utilities users to connect to this machine. Remote Utilities LLC
- c:\program files (x86)\remote utilities - host\rutserv.exe 28.02.2021 14:25
- "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -service
- drop
- --------------
- C:\ProgramData\Remote Utilities\msi\70001_{CE1C66C6-55D6-4DAE-98B7-B8C7FE87342D}\host.msi
- C:\Users\support\AppData\Local\Temp\RUT_{AAA8EB55-ADCE-43C6-95B0-CECF340AB2AD}\host.msi
- C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
- C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
- C:\Program Files (x86)\Remote Utilities - Host\*.*
- # # #
- VT details
- Dropped files
- **************
- https://www.virustotal.com/gui/file/f65b5ba993f70b092df734bd504a63090cc621343e614c25f1e78643e46741e4/details
- https://www.virustotal.com/gui/file/d88aeb0e0d5b88735950db9eb679414d5eb2d365d4d4238469c5ffd92497ceba/details
- https://www.virustotal.com/gui/file/89bbc2f17098224b315c84003ee828959cd1e2155b3415cff861dd0c8a43d875/details
- https://www.virustotal.com/gui/file/f5967507c1d320ff9388859419bebbc4caa3a07a298c4f666d3def053cded561/details
- installed
- **************
- https://www.virustotal.com/gui/file/24b9025944524d14721a9d4ac4fcc40285410a1753c973cd96c526adfa679bab/details
- https://www.virustotal.com/gui/file/85b67377703bb2b9509d2fb895bb96d2afd42fe2e69f3d6c265f3a5e5c239598/details
- https://www.virustotal.com/gui/file/1f54cb5415178dcb7d43c158898aed122e443a2edd15c85f525fce9cad01ae41/details
- original_utility
- **************
- https://www.virustotal.com/gui/file/d4d3ef9196b5dac53d1e06d738eb3e529578752bf9e8cfd2900a600d5f10a7e5/details
- IP
- **************
- https://www.virustotal.com/gui/ip-address/145.239.23.207/details
- https://www.virustotal.com/gui/ip-address/178.210.76.171/details
- https://www.virustotal.com/gui/ip-address/194.156.99.64/details
- https://www.virustotal.com/gui/ip-address/195.24.68.15/details
- VR
Add Comment
Please, Sign In to add comment