VRad

#avemaria_rat_200720

Jul 20th, 2020
731
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.11 KB | None | 0 0
  1. #IOC #OptiData #VR #avemaria #rat #RAR #EXE
  2.  
  3. https://pastebin.com/LV9NKUiy
  4.  
  5. previous_contact:
  6. 17/02/20 https://pastebin.com/DCPutqaR
  7.  
  8. FAQ: https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
  9.  
  10. attack_vector
  11. --------------
  12. email URL > .z(RAR) > exe > C2 > drop dll > dism > ...
  13.  
  14. email_headers
  15. --------------
  16. Received: from slot0.brookvvoodcos.com (slot0.brookvvoodcos.com [45.95.170.152])
  17. From: Purchase A. S <[email protected]>
  18. Subject: Re: New Supplier enquiry-PO/Contract Brookswoods
  19. Date: 20 Jul 2020 01:00:22 -0700
  20. Return-Path: [email protected]
  21.  
  22. files
  23. --------------
  24. SHA-256 5a458dda2000f0d7d0f5e821765933191f15bfabbff7618fc761ef37ba1f0398
  25. File name New Supplier inquiry 0720THAMZ_ doc.z [RAR archive data, v1d, os: Win32]
  26. File size 294.40 KB (301467 bytes)
  27.  
  28. SHA-256 5da3ddb36051056f35b74336c9f548557bcfc118adf8a8f454124bc7a986b7f9
  29. File name New Supplier inquiry 0720THAMZ_ doc.exe [ .NET executable ]
  30. File size 762.97 KB (781280 bytes)
  31.  
  32. activity
  33. **************
  34. PL_SCR
  35. https://onedrive.live.com/download?cid=1B9A2752AF248CE2&resid=1B9A2752AF248CE2%21109&authkey=AFxFOCOUl8etxDU
  36.  
  37. C2
  38. 87.98.158.105:6080 [divine.awsmppl.com]
  39.  
  40. netwrk
  41. --------------
  42. [tcp]
  43. 87.98.158.105 50071 → 6080
  44.  
  45. comp
  46. --------------
  47. New Supplier inquiry 0720THAMZ_ doc.exe 4044 TCP 87.98.158.105 6080 ESTABLISHED
  48.  
  49. proc
  50. --------------
  51. C:\Users\operator\Desktop\New Supplier inquiry 0720THAMZ_ doc.exe
  52. C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe Get-MpPreference -verbose
  53. C:\Users\operator\Desktop\New Supplier inquiry 0720THAMZ_ doc.exe
  54. C:\Users\operator\Desktop\New Supplier inquiry 0720THAMZ_ doc.exe
  55. C:\Users\operator\Desktop\New Supplier inquiry 0720THAMZ_ doc.exe
  56. C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\pkgmgr.exe" /n:%temp%\ellocnak.xml
  57. "C:\Windows\SysWOW64\pkgmgr.exe" /n:%temp%\ellocnak.xml
  58. "C:\Windows\SysWOW64\dism.exe" /online /norestart /apply-unattend:"C:\Users\support\AppData\Local\Temp\ellocnak.xml"
  59.  
  60. persist
  61. --------------
  62. n/a
  63.  
  64. drop
  65. --------------
  66. C:\tmp\nss3.dll
  67. C:\tmp\msvcp140.dll
  68. C:\tmp\freebl3.dll
  69. C:\tmp\freebl3.dll
  70. C:\tmp\mozglue.dll
  71. C:\tmp\vcruntime140.dll
  72. C:\tmp\dismcore.dll
  73. C:\tmp\ellocnak.xml
  74.  
  75. ellocnak.xml
  76. --------------
  77. <?xml version="1.0" encoding="utf-8"?>
  78. <unattend xmlns="urn:schemas-microsoft-com:unattend">
  79. <servicing>
  80. <package action="install">
  81. <assemblyIdentity name="Package_1_for_KB929761" version="6.0.1.1" language="neutral" processorArchitecture="x86" publicKeyToken="31bf3856ad364e35"/>
  82. <source location="%configsetroot%\Windows6.0-KB929761-x86.CAB" />
  83. </package>
  84. </servicing>
  85. </unattend>
  86.  
  87. # # #
  88. URL
  89. https://www.virustotal.com/gui/url/575fe79e424c56a9366f7bbfd821caa5e052ee46f8bfb15b0da6295eef0ceaba/details
  90.  
  91. RAR
  92. https://www.virustotal.com/gui/file/5a458dda2000f0d7d0f5e821765933191f15bfabbff7618fc761ef37ba1f0398/details
  93.  
  94. EXE
  95. https://www.virustotal.com/gui/file/5da3ddb36051056f35b74336c9f548557bcfc118adf8a8f454124bc7a986b7f9/details
  96.  
  97. https://analyze.intezer.com/analyses/5d1b6409-beaf-4714-87ff-af387246ebc5
  98.  
  99. VR
Add Comment
Please, Sign In to add comment