Advertisement
VRad

#smokeloader_170823

Aug 20th, 2023 (edited)
460
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.92 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #lzh #pdf #RARsfx #packed
  2.  
  3. https://pastebin.com/GMwv38g4
  4.  
  5. previous_contact:
  6. https://pastebin.com/DgFvarG0
  7. https://pastebin.com/AayUSaXq
  8. https://pastebin.com/RDVXCe0J
  9. https://pastebin.com/QpG70u8T
  10. https://pastebin.com/BJzcXqkK
  11. https://pastebin.com/kBW7nkZ5
  12. https://pastebin.com/Z7zq0YkW
  13. https://pastebin.com/b8PkhMyN
  14. https://pastebin.com/hkskwKvc
  15. https://pastebin.com/JmthzrL4
  16. https://pastebin.com/1scwT0f8
  17. https://pastebin.com/MP3kCSSh
  18.  
  19. FAQ:
  20. https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
  21. https://malpedia.caad.fkie.fraunhofer.de/details/win.xorist
  22. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  23.  
  24.  
  25. attack_vector
  26. --------------
  27. email attach .lzh1 > .lzh2 > .exe > .pdf > .bat > execute .jpg [smokeloader]
  28.  
  29.  
  30. # # # # # # # #
  31. email_headers
  32. # # # # # # # #
  33. Received: from mail.agm.kh.ua (88.198.13.209)
  34. Received: from [194.187.111.205] (helo=[127.0.0.1]) by mail.agm.kh.ua with esmtpa (Exim 4.92)
  35. From: ДПС Украiни gov.ua <[email protected]>
  36. Subject: Помилкове зарахування вiд 15.08.2023p.
  37. Date: Thu, 17 Aug 2023 06:39:29 +0000
  38. Message-ID: <[email protected]>
  39.  
  40.  
  41. # # # # # # # #
  42. files
  43. # # # # # # # #
  44. SHA-256 eaaef25918f5de5a755c88813cba1ae5da87d98d49f903ed88ddd6f33029828d
  45. File name Платiжна iнструкцiя Код документа 9312_0580_6944_3255.Archive.lzh [ LHARK ]
  46. File size 397.05 KB (406575 bytes)
  47.  
  48. SHA-256 1409d44a8858a7ecd81e8eceab7314dee31e1f7622cc780df4adb68d71998494
  49. File name 1.Платiжна iнструкцiя Код документа 9312_0580_6944_3255 [ LHARK ]
  50. File size 396.35 KB (405861 bytes)
  51.  
  52. SHA-256 c8286ba2b48eded78d0f168a63a1da3311f298eecf95eb6de3de09ee18060fe6
  53. File name 1.Платiжна iнструкцiя Код документа 9312_0580_6944_3255.pdf.exe [ WinRAR Self Extracting ]
  54. File size 375.74 KB (384754 bytes)
  55.  
  56. SHA-256 edfc02f5bb09b2c3871148d13f4bdcc2aa5444aa4dac170c8ab3342e353ce71a
  57. File name Payment_9312_0580_6944_3255.pdf [ PDF document, version 1.4 ] - clean, decoy
  58. File size 96.78 KB (99100 bytes)
  59.  
  60. SHA-256 0f438d68adc2af0ecafaacd25f42437d45fbe07ca4660bbec14ef246c57c7837
  61. File name Payment_9312_0580_6944_3255.bat [ ASCII text ]
  62. File size 45 B (45 bytes)
  63.  
  64. SHA-256 521526a7850de04b3cf1f592b932621a59e5af4b8d56e258443994edd42dbbce
  65. File name Pax_9312_0580_6944_3255_15.08.2023p.jpg [ PE32 executable (GUI) Intel 80386 ]
  66. File size 232.50 KB (238080 bytes)
  67.  
  68.  
  69. # # # # # # # #
  70. activity
  71. # # # # # # # #
  72.  
  73. PL_SCR email_attach
  74.  
  75. C2
  76.  
  77. metallergroup{ .ru/
  78. infomailforyoumak{ .ru/
  79. coinmakopenarea{ .su/
  80. internetcygane{ .ru/
  81. zallesman{ .ru/
  82. maxteroper{ .ru/
  83. kilomunara{ .com/
  84. napropertyhub{ .eu/
  85. nafillimonilini{ .net/
  86. goodlenuxilam{ .site/
  87. jimloamfilling{ .online/
  88. vertusupportjk{ .org/
  89. liverpulapp{ .ru/
  90. zarabovannyok{ .eu/
  91. cityofuganda{ .ug/
  92. hillespostelnm{ .eu/
  93. humanitarydp{ .ru/
  94. zaikaopentra{ .com.ru/
  95. zaikaopentra-com-ug{ .su/
  96. jslopasitmon{ .com/
  97. zaikadoctor{ .ru/
  98. sismasterhome{ .ru/
  99. supermarioprohozhdenie{ .ru/
  100. krasavchikoleg{ .net/
  101. samoramertut{ .ru/
  102. polinamailserverip{ .ru/
  103. lamazone{ .site/
  104. criticalosl{ .tech/
  105. maximprofile{ .net/
  106. kismamabeforyougo{ .ru/
  107. kissmafiabeforyoudied{ .ru/
  108. gondurasonline{ .ru/
  109.  
  110.  
  111. netwrk
  112. --------------
  113. 185.244.183.112 metallergroup{ .ru 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  114. 185.244.183.112 internetcygane{ .ru 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  115. 195.123.219.57 maximprofile{ .net 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  116. 185.244.183.112 jskgdhjkdfhjdkjhd844{ .ru 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  117. 195.123.219.57 azartnyjboy{ .com 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  118. 195.123.219.57 alegoomaster{ .com 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  119. 195.123.219.57 freesitucionap{ .com 80 HTTP POST / HTTP/1.1 Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  120.  
  121. comp
  122. --------------
  123. n/a
  124.  
  125. proc
  126. --------------
  127. C:\Users\operator\Desktop\1.Платiжна iнструкцiя Код документа 9312_0580_6944_3255.pdf.exe
  128. "C:\Program Files\PDF\PDFXCview.exe" "C:\Users\operator\Desktop\Payment_9312_0580_6944_3255.pdf"
  129. C:\Windows\SysWOW64\cmd.exe /c ""C:\Users\operator\Desktop\Payment_9312_0580_6944_3255.bat" "
  130. C:\Users\operator\Desktop\Pax_9312_0580_6944_3255_15.08.2023p.jpg
  131.  
  132.  
  133. persist
  134. --------------
  135. n/a
  136.  
  137. drop
  138. --------------
  139. %userprofile%\Payment_9312_0580_6944_3255.pdf
  140. %userprofile%\Payment_9312_0580_6944_3255.bat
  141.  
  142.  
  143. # # # # # # # #
  144. additional info
  145. # # # # # # # #
  146. n/a
  147.  
  148.  
  149. # # # # # # # #
  150. VT & Intezer
  151. # # # # # # # #
  152. https://www.virustotal.com/gui/file/eaaef25918f5de5a755c88813cba1ae5da87d98d49f903ed88ddd6f33029828d/details
  153. https://www.virustotal.com/gui/file/1409d44a8858a7ecd81e8eceab7314dee31e1f7622cc780df4adb68d71998494/details
  154. https://www.virustotal.com/gui/file/c8286ba2b48eded78d0f168a63a1da3311f298eecf95eb6de3de09ee18060fe6/details
  155. https://analyze.intezer.com/analyses/0a484735-b3dc-49af-8a2f-e0af14b5bc54
  156. https://www.virustotal.com/gui/file/edfc02f5bb09b2c3871148d13f4bdcc2aa5444aa4dac170c8ab3342e353ce71a/details
  157. https://www.virustotal.com/gui/file/0f438d68adc2af0ecafaacd25f42437d45fbe07ca4660bbec14ef246c57c7837/details
  158. https://www.virustotal.com/gui/file/521526a7850de04b3cf1f592b932621a59e5af4b8d56e258443994edd42dbbce/details
  159. https://analyze.intezer.com/analyses/dffc731b-01d6-4355-8ac0-50e59f6828ad
  160.  
  161.  
  162. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement