ExecuteMalware

2021-02-01 Buerloader IOCs

Feb 1st, 2021 (edited)
3,966
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.50 KB | None | 0 0
  1. THREAT ATTRIBUTION: BUERLOADER
  2.  
  3. ANALYST NOTES
  4. Upon opening the .xls file, I got a "circular reference" warning alert box.
  5. The spreadsheet has an image that says "GlobalSign PKI Secure".
  6. Enabling macros in the spreadsheet creates a folder named "BlockSt" on the root of the C: drive.
  7. One of the payload download urls that I had was down but the second one was still available.
  8. After downloading the file, it's renamed to "Winword.exe" and launched.
  9. I saw C2 traffic in the form of POST data and with a user agent of "aaaa".
  10. The data are mostly POSTed as key/value pairs.
  11. The C2 traffic that I saw was just sent over port 80 (http).
  12.  
  13. SUBJECTS OBSERVED
  14. order 15973702 Parcel
  15. order 26753235 Package
  16. order 53960152 Parcel
  17. order 7051954 Package
  18. order 8596082 Package
  19.  
  20. SENDERS OBSERVED
  21.  
  22. BUERLOADER MALDOC FILE HASHES
  23. Invoice626914.xls
  24. 7ec855b49f5bfe392d1443476d5fc8c2
  25.  
  26. Invoice144009.xls
  27. 8916813eb4de23e8f1fb0df11ca89837
  28.  
  29. INV856686.xls
  30. e859858784ac3dea61a08492f439f16d
  31.  
  32. INV854614.xls
  33. 92d9e69157d22f81252d89cffeb8861e
  34.  
  35. BUERLOADER PAYLOAD FILE HASHES
  36. private.png
  37. f7fc343cbf86f08c7b529ab451677752
  38.  
  39. c:\BlockSt\winword.exe
  40. f7fc343cbf86f08c7b529ab451677752
  41.  
  42. BUERLOADER PAYLOAD
  43. http://213.252.244.176/dw.pm
  44. https://eshop.hydrotech.com.gr/wp-admin/images/private.png
  45.  
  46. hydrotech.com.gr
  47.  
  48. BUERLOADER C2
  49. http://tokacpebanking.com
  50.  
  51. SUPPORTING EVIDENCE
  52. https://urlhaus.abuse.ch/url/986773/
Add Comment
Please, Sign In to add comment