Advertisement
Bank_Security

TA2101 IOCs

Nov 17th, 2019
23,143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.45 KB | None | 0 0
  1. German Cobalt Strike/German Tax Office spoof (October 23)
  2. Lure email address: [email protected]
  3.  
  4.  
  5. Italian Maze Campaign/Italian Ministry of Taxation spoof (October 29)
  6. Lure email address: [email protected]
  7.  
  8.  
  9. Proofpoint researchers have also determined that the IP address 91.218.114[.]37 is present in all Maze Ransomware downloads initiated by this actor.
  10.  
  11. German Maze Campaign/German Tax Office spoof (November 6)
  12. This campaign uses an identical lure that was observed on October 23, including the same "RSA Key" malicious Microsoft Word attachment. It is also where we observed the second use of word_/.tmp variation on the URL.
  13.  
  14. German Maze Campaign/German ISP spoof (November 7)
  15. This campaign, distributing Maze ransomware, impersonates a German internet service provider (1&1 Internet AG) and uses a nearly identical malicious Word Document with an "RSA Key" lure that was observed in the November 6 German Tax Office campaign and the October 23 German campaign using Cobalt Strike.
  16.  
  17. Lure email address: [email protected]
  18.  
  19. SOA: [email protected], which matches the October 23 Cobalt Strike campaign.
  20.  
  21. US IcedID Campaign / USPS Spoof (November 12)
  22. On November 12, Proofpoint researchers observed a campaign utilizing a USPS themed lure delivering the IcedID Trojan. While a .icu domain was not used in this campaign, instead choosing a different look-alike domain, uspsdelivery-service[.]com, these malicious documents used similar “RSA” style lures observed in the previous Cobalt Strike and Maze Ransomware campaigns, and added further evidence to support the theory that the same actor/group is behind the distribution of those malware families.
  23.  
  24. The SOA for uspsdelivery-service[.]com is [email protected] which matches previous campaigns.
  25.  
  26.  
  27.  
  28. Indicators of Compromise (IOCs)
  29. IOC
  30.  
  31. IOC Type
  32.  
  33. Description
  34.  
  35. 44991186a56b0d86581f2b9cc915e3af426a322d5c4f43a984e6ea38b81b7bed
  36.  
  37. SHA256
  38.  
  39. Document
  40.  
  41. cfd8e3a47036c4eeeb318117c0c23e126aea95d1774dae37d5b6c3de02bdfc2a
  42.  
  43. SHA256
  44.  
  45. Document
  46.  
  47. 9f2139cc7c3fad7f133c26015ed3310981de26d7f1481355806f430f9c97e639
  48.  
  49. SHA256
  50.  
  51. Document
  52.  
  53. 5f1e512d9ab9b915b1fc925f546ed559cbfa49df53229e2f954a1416cf6f5ee4
  54.  
  55. SHA256
  56.  
  57. Document
  58.  
  59. 97043f23defd510607ff43201bb03b9916a23bd71b5bdf97db357e5026732506
  60.  
  61. SHA256
  62.  
  63. Document
  64.  
  65. d617fd4b2d0824e1a7eb9693c6ec6e71447d501d24653a8e99face12136491a8
  66.  
  67. SHA256
  68.  
  69. Document
  70.  
  71. 7e3ab96d2628e0a9970802b47d0356dc9b99994d7f98492d4e70a5384891695a
  72.  
  73. SHA256
  74.  
  75. Document
  76.  
  77. antowortensienicht@bzst-infomieren[.]icu
  78.  
  79. Domain
  80.  
  81. Spoofed sending domain
  82.  
  83. info@agenziaentrate[.]icu
  84.  
  85. Domain
  86.  
  87. Spoofed sending domain
  88.  
  89. antwortensienicht@bzstinform[.]icu
  90.  
  91. Domain
  92.  
  93. Spoofed sending domain
  94.  
  95. uspsdelivery-service[.[com
  96.  
  97. Domain
  98.  
  99. Spoofed sending domain
  100.  
  101. hxxp://198.50.168.67/wordpack.tmp
  102.  
  103. Payload
  104.  
  105. Cobalt Strike
  106.  
  107. hxxp://conbase.top/sys.bat
  108.  
  109. Payload
  110.  
  111. Cobalt Strike
  112.  
  113. hxxp://104.168.198.208/wordupd.tmp
  114.  
  115. Payload
  116.  
  117. Maze Ransomware
  118.  
  119. hxxp://104.168.215.54/wordupd.tmp
  120.  
  121. Payload
  122.  
  123. Maze Ransomware
  124.  
  125. hxxp://104.168.174.32/wordupd_3.0.1.tmp
  126.  
  127. Payload
  128.  
  129. Maze Ransomware
  130.  
  131. hxxp://192.119.68.225/wordupd1.tmp
  132.  
  133. Payload
  134.  
  135. Buran Ransomware
  136.  
  137. hxxp://108.174.199.10/wordupd3.tmp
  138.  
  139. Payload
  140.  
  141. Buran Ransomware
  142.  
  143. hxxp://54.39.233.175/wupd19823.tmp
  144.  
  145. Payload
  146.  
  147. Buran Ransomware
  148.  
  149. hxxp://54.39.233.131/word1.tmp
  150.  
  151. Payload
  152.  
  153. Buran Ransomware
  154.  
  155. hxxp://104.168.198.230/wordupd.tmp
  156.  
  157. Payload
  158.  
  159. IcedID
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement