View difference between Paste ID: H418X4u2 and qkQnFhAF
SHOW: | | - or go back to the newest paste.
1
THREAT IDENTIFICATION:  BAZARCALL / BAZARLOADER
2
3
SENDERS OBSERVED
4
N/A
5
6
SUBJECTS OBSERVED
7
N/A
8
9
LURE PHONE NUMBER
10
UNKNOWN
11
12
MALDOC LANDING PAGE URLS
13
https://bomovie.net/
14
https://bomovie.net/FAQ
15
https://bomovie.net/subscribe
16
https://bomovie.net/account
17
18
MALDOC DOWNLOAD URLS
19
https://bomovie.net/cancel.php
20
21
MALDOC (XLSB) FILE HASHES
22
cancel_sub_M0272029458353238.xlsb
23
f5ce1af32099da1ca924e098b5d1c5d0
24
25
CAMPO LOADER FILE HASHES
26
6123.xlsb
27
dc1aa65f8e0c02a05e23ca4d4ce1a32e
28
29
6123.xsd
30
dc1aa65f8e0c02a05e23ca4d4ce1a32e
31
32
6123.xdo
33
0377cf2c20658c5e78d53a17cd4a109f
34
35
CAMPOLOADER URLS
36
http://out2.xyz/campo/o/u
37
38
BAZARLOADER PAYLOAD URLS
39
http://admin.nfooz.com/ster.exe
40
41
BAZARLOADER FILE HASH
42
ster.exe
43
5cef87c65c9a2545eb8c9151a5fa1e1d
44
45
Later renamed to:
46
vyue.exe
47
5cef87c65c9a2545eb8c9151a5fa1e1d
48
49
BAZARLOADER C2s
50
https://18.237.242.195/g1_262/bt_64_g1_262
51
https://34.215.31.225/g1_262/bt_64_g1_262
52
https://194.5.249.224/g1_262/bt_64_g1_262
53
54
Then later:
55
https://45.142.158.76/g1_262/bt_64_g1_262
56
57
INTERESTING MEMORY STRING
58
C:/Users/Admin/source/repos/bld1/bin/x64/Debug/ld1.exe
59
60
SUPPORTING EVIDENCE
61
https://urlhaus.abuse.ch/url/1201580/
62
63