ExecuteMalware

2021-07-19 WarZone IOCs

Jul 19th, 2021
15,163
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.08 KB | None | 0 0
  1. THREAT IDENTIFICATION: AVEMARIA STEALER / WARZONE RAT
  2.  
  3. SUBJECTS OBSERVED
  4. Attn: Order Department
  5.  
  6. SENDERS OBSERVED
  7.  
  8. EMAIL BODY
  9. Hi,
  10.  
  11. We are very much interested in your product and services urgently,
  12.  
  13. Can you please send me your company active phone number? because have called your office phone but cannot connect to you
  14.  
  15. Please can your company supply necessary document with quotation to the exact production sample picture as attached?
  16.  
  17. Awaiting your swift response.
  18.  
  19. Thank you
  20.  
  21. Regards,
  22.  
  23. DAVE MAKR
  24. Procurement Officer
  25. Al Saeid Trading Co.LLC
  26. Mike Building,2nd Floor
  27. Gabil Street,
  28. Al Balad Dist (Down Town),
  29. Jeddah,KSA
  30. Telephone : 920008292
  31.  
  32. MALDOC FILE HASHES
  33. picture.zip
  34. 6baddbce995ec8723d9ab85da6fe6032
  35.  
  36. AVE MARIA PAYLOAD FILE HASHES
  37. Full drawing and specification of needed materials with two different sample as seen requested.exe
  38. d4c6a1bb7773aa6b1d128f6eacd75add
  39.  
  40. AVE MARIA C2
  41. 176.31.159.203:5200
  42.  
  43. SUPPORTING EVIDENCE
  44. Strings in memory
  45. Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
Advertisement
Add Comment
Please, Sign In to add comment