VRad

#emotet_221020

Oct 23rd, 2020 (edited)
355
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.40 KB | None | 0 0
  1. #IOC #OptiData #VR #emotet #W97M #macro #WMI #powershell
  2.  
  3. https://pastebin.com/cNb8XhX1
  4.  
  5. previous_contact:
  6. https://pastebin.com/1XfkVE5e
  7. https://pastebin.com/F520pqQW
  8.  
  9. FAQ:
  10.  
  11. attack_vector
  12. --------------
  13. email attach .doc > macro > WMI > powershell -enc > GET 8! URL > \Users\%name%\*.exe > C:\Users\%name%\AppData\Local\*\*.exe
  14.  
  15. email_headers
  16. --------------
  17. Received: from ns.shimizuya.co.jp (ns.shimizuya.co.jp [210.143.104.170])
  18. Received: from [197.221.251.9] (unknown [197.221.251.9])
  19. by ns.shimizuya.co.jp (Postfix) with ESMTPA id 13DFA63586
  20. Date: Thu, 22 Oct 2020 14:40:57 +0200
  21. From: "spoofed_email" <[email protected]>
  22. Subject: FW: Надсилання: 1_16_41124-20(09.10.20), Концепція розвитку, Пояснювальна записка, Розпорядження(проект)
  23.  
  24. files
  25. --------------
  26. SHA-256 4008f8c88281fb6c543244f1701fb930aa6d1411a3209fcaa2997ee26f977d80
  27. File name PO6556850371IW.doc
  28. File size 178.00 KB (182272 bytes)
  29.  
  30. SHA-256 125411ad0784ac4750a1205b97e6a20c905baf5c117a27c4b417590494d80b11
  31. File name RMActivate_isv.exe
  32. File size 368.00 KB (376832 bytes)
  33.  
  34. activity
  35. **************
  36. PL_SCR
  37. http://launch.tactikafacewear.com/wp-content/Uk
  38. paasologrp.com/parseopmlo/5
  39. singohotel.com/dashboardl/Pq
  40. mymathlabhomework.com/wp-content/Po
  41. https://dietherbsindia.com/assets/k8oo
  42. dev-tech.eu/demoshop/P0
  43. mithraa.co/nMT
  44. chess-pgn.com/win-raid/Pl6T5
  45.  
  46. C2
  47. 200.116.145.225:443
  48. 5.196.108.185:8080
  49. 167.114.153.111:8080
  50.  
  51. netwrk
  52. --------------
  53. launch.tactikafacewear.com GET /wp-content/Uk/ HTTP/1.1
  54. 200.116.145.225:443 POST /hCnHn8M/... HTTP/1.1 Mozilla/4.0 (compatible; MSIE 7.0
  55. 5.196.108.185:8080 POST /rWnUmnc/... HTTP/1.1 Mozilla/4.0 (compatible; MSIE 7.0
  56. 167.114.153.111:8080 POST /dQok/1r/... HTTP/1.1 Mozilla/4.0 (compatible; MSIE 7.0
  57. 167.99.105.11:8080 POST /i8Elp07/... HTTP/1.1 Mozilla/4.0 (compatible; MSIE 7.0
  58.  
  59. comp
  60. --------------
  61. powershell.exe 170.10.164.154 443
  62. powershell.exe 3.10.134.94 80
  63.  
  64. RMActivate_isv.exe 200.116.145.225 443
  65.  
  66. RMActivate_isv.exe 5.196.108.185 8080
  67. RMActivate_isv.exe 167.114.153.111 8080
  68. RMActivate_isv.exe 212.42.75.240 993
  69. RMActivate_isv.exe 167.99.105.11 8080
  70.  
  71. proc
  72. --------------
  73. "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" /n /dde
  74.  
  75. [another]
  76.  
  77. C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
  78. C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe -ENCOD IAAkAGoAQwBGAFYAUABiACAAIAA9AFsAVABZAFAAZQBdACgAIgB7ADIAfQB7ADMAfQB7ADEAfQB7ADUAf
  79. C:\Users\operator\Qyj9bw1\A5vuovn\Rcrtkr.exe - moved
  80. C:\Users\operator\AppData\Local\appmgr\RMActivate_isv.exe
  81.  
  82. persist
  83. --------------
  84. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 22.10.2020 15:45
  85. RMActivate_isv EffectDemo MFC Application
  86. c:\users\operator\appdata\local\appmgr\rmactivate_isv.exe 23.10.2020 1:28
  87.  
  88. drop
  89. --------------
  90. C:\Users\operator\Qyj9bw1\A5vuovn\Rcrtkr.exe
  91. C:\Users\operator\AppData\Local\appmgr\RMActivate_isv.exe
  92.  
  93. # # #
  94. https://www.virustotal.com/gui/file/4008f8c88281fb6c543244f1701fb930aa6d1411a3209fcaa2997ee26f977d80/details
  95. https://www.virustotal.com/gui/file/125411ad0784ac4750a1205b97e6a20c905baf5c117a27c4b417590494d80b11/details
  96. https://analyze.intezer.com/analyses/10b857fe-3d77-4c66-a92b-46fb82549676
  97.  
  98. VR
Add Comment
Please, Sign In to add comment