Advertisement
VRad

#rurat_020224

Feb 2nd, 2024 (edited)
410
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.98 KB | None | 0 0
  1. #IOC #OptiData #VR #rurat #RemoteUtilitiesLLC #EXE #bitbucket #GDrive
  2.  
  3. https://pastebin.com/GNKhyVNq
  4.  
  5. previous_contact:
  6. 22/01/24 https://pastebin.com/KdtLzhQF
  7. 11/01/24 https://pastebin.com/j8h6XpV7
  8. 28/01/22 https://pastebin.com/7ndYBz5Q
  9.  
  10. FAQ:
  11. https://www.remoteutilities.com/download/
  12.  
  13. attack_vector
  14. --------------
  15. email body URL > bitbucket _org / Gdrive > GET .7z > .rar (PWD) > .exe > UAC > install > rutserv.exe > 185_70_104_90
  16.  
  17. # # # # # # # #
  18. email_headers
  19. # # # # # # # #
  20. Date: Fri, 2 Feb 2024 06:00:33 +0300
  21. Subject: вихідна вимога № 103793 /2024
  22. From: Жирко Чеслава Азарівна <progetti@ internetdays_it>
  23. Reply-To: Одеський апеляційний господарський суд <inbox @ oda_arbitr_gov_ua>
  24. Received: from smtp.mmm.it ([213_140_4_220])
  25. Received: from DESKTOP-TCRDU4C ([109_107_182_205]) by smtp_mmm_it id 202402020400331496
  26.  
  27. # # # # # # # #
  28. files
  29. # # # # # # # #
  30. SHA-256 4dfb87c005fac26c0b4c999c66d7760bc02774eacf82f7f5d37d1cb7656ef8a6
  31. File name docs.pdf.7z [7-zip archive data, version 0.4]
  32. File size 19.76 MB (20721376 bytes)
  33.  
  34. SHA-256 76e52326c3beab02d2ae15a1bd7083dc95006ad3368d5db5f78de3cc5b3957e5
  35. File name Рахунок.rar [RAR archive data, v5] !PWD
  36. File size 19.76 MB (20719710 bytes)
  37.  
  38. SHA-256 92192af947017c20ad861faf4459fb705e63f7083b34c77c1727891b88091573
  39. File name Рахунок.pdf.exe [PE32+ executable, RAR, msi] !UAC
  40. File size 19.98 MB (20949417 bytes)
  41.  
  42. SHA-256 e495d63914ad7f23cb14c9d09a7af8d94106d7eed7a6b7c8f5e9aa593d30db25
  43. File name Рахунок.7z [7-zip archive data, version 0.4]
  44. File size 19.76 MB (20721612 bytes)
  45.  
  46. SHA-256 906d5be9ac30eabcdfaa83dd22bc12ef5c3213617f3894c80d6ebbd50f7b6b5d
  47. File name Рахунок-фактура Medoc.pdf.rar
  48. File size 19.76 MB (20719918 bytes) [RAR archive data, v5] !PWD
  49.  
  50. SHA-256 5c8d64d3278816980498d063560f2ad04b4a823b577f7979f43c8e3bf33e5b3c
  51. File name Рахунок-фактура Medoc.pdf.exe [PE32+ executable, RAR, msi] !UAC
  52. File size 19.98 MB (20949417 bytes)
  53.  
  54. SHA-256 0c89262a283c80121ba1176345b230d0ade61cfcf682b92e555a48206fb4074a
  55. File name rfusclient.exe [PE32 executable] !RuRAT
  56. File size 10.42 MB (10931000 bytes)
  57.  
  58. SHA-256 760e2fd3e57186b597d40b996811768e6c4a28ca54685e029104fcf82f68238d
  59. File name rutserv.exe [PE32 executable , BobSoft Mini] !RuRAT
  60. File size 20.17 MB (21148984 bytes)
  61.  
  62. # # # # # # # #
  63. activity
  64. # # # # # # # #
  65.  
  66. PL_SCR drive_google_com /file / d / 14AtQ3u1GbjbJx5jz_3yuujOdjPhR8l4J
  67. bitbucket_org / obmen-medoc / medoc / downloads / docs.pdf.7z !downloaded more than 2938 times for ~9 hours
  68.  
  69. C2 185_70_104_90
  70.  
  71. netwrk
  72. --------------
  73. 64_20_61_146 5655 TCP 49262 → 5655 [SYN]
  74. 77_105_132_70 5651 TCP 49275 → 5651 [SYN]
  75. 101_99_94_54 80 TCP 49276 → 80 [SYN]
  76. 101_99_94_54 5651 TCP 49277 → 5651 [SYN]
  77. 77_105_132_70 80 TCP 49278 → 80 [SYN]
  78. 185_70_104_90 5651 TCP 49280 → 5651 [SYN]
  79.  
  80. comp
  81. --------------
  82. rutserv.exe 3392 TCP 64_20_61_146 5655 ESTABLISHED
  83. rutserv.exe 3392 TCP 101_99_94_54 80 ESTABLISHED
  84. rutserv.exe 3392 TCP 101_99_94_54 5651 ESTABLISHED
  85. rutserv.exe 3392 TCP 101_99_94_54 465 ESTABLISHED
  86. rutserv.exe 3392 TCP 77_105_132_70 5651 ESTABLISHED
  87. rutserv.exe 3392 TCP 185_70_104_90 5651 ESTABLISHED
  88. rutserv.exe 3392 TCP 77_105_132_70 80 ESTABLISHED
  89. rutserv.exe 3392 TCP 101_99_94_54 5651 ESTABLISHED
  90.  
  91. proc
  92. --------------
  93. C:\Users\operator\Desktop\files0202\1_docs_pdf\3_Рахунок.pdf.exe [user]
  94. C:\Users\operator\Desktop\files0202\1_docs_pdf\3_Рахунок.pdf.exe [admin]
  95. C:\Windows\System32\msiexec.exe /i Exel.msi /qn
  96.  
  97. [another_context_admin_SYSTEM]
  98.  
  99. C:\Windows\system32\msiexec.exe /V
  100. C:\Windows\syswow64\MsiExec.exe -Embedding A071272EA45F17245E5A31A8AAD07DB6
  101. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" -msi_copy "C:\Users\support\AppData\Local\Temp\Exel.msi"
  102. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /silentinstall
  103. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /firewall
  104. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /start
  105. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -service
  106. C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
  107. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
  108. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
  109.  
  110. persist
  111. --------------
  112. RManService Allows Remote Utilities users to connect to this machine.
  113. Remote Utilities Pty (Cy) Ltd. c:\program files (x86)\remote utilities - host\rutserv.exe 25.10.2023 14:51
  114.  
  115.  
  116. drop
  117. --------------
  118. C:\Users\%admin%\AppData\Local\Temp\Exel.msi
  119. C:\Program Files (x86)\Remote Utilities - Host\*
  120. C:\ProgramData\Remote Utilities\*
  121.  
  122. # # # # # # # #
  123. additional info
  124. # # # # # # # #
  125. n/a
  126.  
  127. # # # # # # # #
  128. VT & Intezer
  129. # # # # # # # #
  130. https://www.virustotal.com/gui/file/4dfb87c005fac26c0b4c999c66d7760bc02774eacf82f7f5d37d1cb7656ef8a6/details
  131. https://www.virustotal.com/gui/file/76e52326c3beab02d2ae15a1bd7083dc95006ad3368d5db5f78de3cc5b3957e5/details
  132. https://www.virustotal.com/gui/file/92192af947017c20ad861faf4459fb705e63f7083b34c77c1727891b88091573/details
  133. https://www.virustotal.com/gui/file/e495d63914ad7f23cb14c9d09a7af8d94106d7eed7a6b7c8f5e9aa593d30db25/details
  134. https://www.virustotal.com/gui/file/906d5be9ac30eabcdfaa83dd22bc12ef5c3213617f3894c80d6ebbd50f7b6b5d/details
  135. https://www.virustotal.com/gui/file/5c8d64d3278816980498d063560f2ad04b4a823b577f7979f43c8e3bf33e5b3c/details
  136. https://www.virustotal.com/gui/file/0c89262a283c80121ba1176345b230d0ade61cfcf682b92e555a48206fb4074a/details
  137. https://www.virustotal.com/gui/file/760e2fd3e57186b597d40b996811768e6c4a28ca54685e029104fcf82f68238d/details
  138.  
  139. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement