Bank_Security

CamuBot Banking Trojan Returns In Targeted Attacks

Feb 6th, 2020
14,232
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.44 KB | None | 0 0
  1. Indicators of Compromise (IoCs)
  2. Some of the IoCs we worked with when writing this blog can be used to detect CamuBot:
  3.  
  4. MD5:
  5.  
  6. E0EB6840DA0A24F8F67102417BFDF408 (suporte.exe)
  7. Phishing domain used by the CamuBot fraudsters to host their malware downloads:
  8.  
  9. suporteoperador[.]com
  10. Examples of URLs that were used in the attacks/fraudster’s control panels:
  11.  
  12. hxxps://empresas[.]suporteoperador[.]com/
  13. hxxps://office[.]suporteoperador[.]com/empresas/
Add Comment
Please, Sign In to add comment