Advertisement
VRad

#smokeloader_021023

Oct 2nd, 2023 (edited)
393
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.90 KB | None | 0 0
  1. #IOC #OptiData #VR #smokeloader #RAR #polyglot #SFX #bat #EXE
  2.  
  3. https://pastebin.com/e46KzBWE
  4.  
  5. previous_contact:
  6. https://pastebin.com/xEwN5JPc
  7. https://pastebin.com/GMwv38g4
  8. https://pastebin.com/DgFvarG0
  9. https://pastebin.com/AayUSaXq
  10. https://pastebin.com/RDVXCe0J
  11. https://pastebin.com/QpG70u8T
  12. ...
  13.  
  14. FAQ:
  15. https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
  16. https://radetskiy.wordpress.com/2018/10/19/ioc_smokeloader_111018/
  17.  
  18. attack_vector
  19. --------------
  20. email attach .RAR (polyglot) > .doc (ZIP) > .jpg [smokeloader] + .EXE (SFX)> .bat > run smokeloader > C2
  21.  
  22. # # # # # # # #
  23. email_headers
  24. # # # # # # # #
  25. Date: Mon, 2 Oct 2023 04:22:26 +0300
  26. Received: from mail.domtele.com (85.159.1.130)
  27. Reply-To: <support@ukr.net>
  28. Return-Path: mtb@rivne.com
  29. From: Технічний відділ <mtb@rivne.com>
  30. Subject: Fw: Рахунок, акт звiки
  31. X-Mailer: Apple Mail (2.2104)
  32. MIME-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
  33. Message-ID: <4797EB44-D0AE-6B5E-D7BD-E84A419D087B@rivne.com>
  34.  
  35. &
  36.  
  37. Received: from ds163.mirohost.net (89.184.68.199)
  38. Received: from [31.43.159.185] (port=27258 helo=[127.0.0.1])
  39. by ds163.mirohost.net with esmtpa (Exim 4.95)
  40. (envelope-from <nataliya.don@pp-galaktika.com.ua>)
  41. Reply-To: <sokal.dnz_7@meta.ua>
  42. From: Отдел контроля <nataliya.don@pp-galaktika.com.ua>
  43. Subject: Fw: Рахунок, акт звiки
  44. Date: Mon, 2 Oct 2023 07:54:13 +0300
  45. Message-ID: <j1t9lbu-p2rzsa-8C@pp-galaktika.com.ua>
  46. Return-Path: nataliya.don@pp-galaktika.com.ua
  47.  
  48. # # # # # # # #
  49. files
  50. # # # # # # # #
  51. SHA-256 31be756b4315098a94855a8b236bcf6e55d97acbc5cebe75d1a668dff45bb82b
  52. File name рахунок_фактура_СФ-0001871_та_акт_звiрки_вiд_29_09_2023р.zip [polyglot]
  53. File size 700.03 KB (716834 bytes)
  54.  
  55. SHA-256 3ac06154dea00c6f17fba1c52956affdda59eba036b3d5d077c37c93fe277a26
  56. File name Рахунок_фактура_СФ-0001871.XLS [clean if extracted in UNIX]
  57. File size 19.00 KB (19456 bytes)
  58.  
  59. SHA-256 90ed5f6719265e25c3483b11704e3158622128816def1f7515988b7de5f5f1de
  60. File name спiсок.doc [ZIP]
  61. File size 695.92 KB (712623 bytes)
  62.  
  63. SHA-256 e5314f7a9969af109606c84567ecf951570dd1495c400a1e5bf215fd5cdb3fd2
  64. File name Pax_9312_0580_6944_3255_29.09.2023p.jpg [EXE]
  65. File size 192.00 KB (196608 bytes)
  66.  
  67. SHA-256 8b4b9b473f73b70c55d21d33149ced0c234fff919d15ff73cca22b93818a785c
  68. File name акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191.JPEG.exe [SFX]
  69. File size 683.98 KB (700393 bytes)
  70.  
  71. SHA-256 9b50c4624bd60aea94b85afeeac6d61c485bee42fdeeffedc5d9617f4650c51c
  72. File name Payment_9312_0580_6944_3255.bat [BAT commad _ start EXE]
  73. File size 56 B (56 bytes)
  74.  
  75. SHA-256 41fe1fea884daee189076a5bb5b288852ed5b72d3b89576b740be6baceaa69c5
  76. File name akt.jpeg [JPEG _ clean _decoy]
  77. File size 486.37 KB (498045 bytes)
  78.  
  79. # # # # # # # #
  80. activity
  81. # # # # # # # #
  82.  
  83. PL_SCR email_attach
  84.  
  85. C2
  86.  
  87. dublebomber {.ru/
  88. yavasponimayu {.ru/
  89. nomnetozhedenyuzhkanuzhna {.ru/
  90. prostosmeritesya {.ru/
  91. ipoluchayteudovolstvie {.ru/
  92. super777bomba {.ru/
  93. specnaznachenie {.ru/
  94. zakrylki809 {.ru/
  95. propertyminsk {.by/
  96. iloveua {.ir/
  97. moyabelorussiya {.by/
  98. tvoyaradostetoya {.ru/
  99. zasadacafe {.by/
  100. restmantra {.by/
  101. kozachok777 {.ru/
  102. propertyiran {.ir/
  103. sakentoshi {.ru/
  104. popuasyfromua {.ru/
  105. diplombar {.by/
  106.  
  107. netwrk
  108. --------------
  109. 85.143.172.45 dublebomber {.ru 80 HTTP POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  110. 194.58.112.174 specnaznachenie{ .ru 80 HTTP POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  111. 85.143.172.45 sakentoshi{ .ru 80 HTTP POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  112. 194.58.112.174 popuasyfromua{ .ru 80 HTTP POST / HTTP/1.1 (application/x-www-form-urlencoded) Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
  113.  
  114. comp
  115. --------------
  116. n/a
  117.  
  118. proc
  119. --------------
  120. C:\Users\operator\Desktop\акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191.JPEG.exe
  121. C:\Windows\SysWOW64\cmd.exe /c ""C:\Users\operator\Desktop\Payment_9312_0580_6944_3255.bat" "
  122. C:\Users\operator\Desktop\Pax_9312_0580_6944_3255_29.09.2023p.jpg
  123.  
  124. persist
  125. --------------
  126. n/a
  127.  
  128. drop
  129. --------------
  130. спiсок.doc
  131. Pax_9312_0580_6944_3255_29.09.2023p.jpg
  132. акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191.JPEG.exe
  133. Payment_9312_0580_6944_3255.bat
  134. akt.jpeg
  135.  
  136. # # # # # # # #
  137. additional info
  138. # # # # # # # #
  139. Payment_9312_0580_6944_3255.bat
  140. -------------------------------
  141. @echo off
  142. start Pax_9312_0580_6944_3255_29.09.2023p.jpg
  143.  
  144. # # # # # # # #
  145. VT & Intezer
  146. # # # # # # # #
  147. https://www.virustotal.com/gui/file/31be756b4315098a94855a8b236bcf6e55d97acbc5cebe75d1a668dff45bb82b/details
  148. https://www.virustotal.com/gui/file/3ac06154dea00c6f17fba1c52956affdda59eba036b3d5d077c37c93fe277a26/details
  149. https://www.virustotal.com/gui/file/90ed5f6719265e25c3483b11704e3158622128816def1f7515988b7de5f5f1de/details
  150. https://www.virustotal.com/gui/file/e5314f7a9969af109606c84567ecf951570dd1495c400a1e5bf215fd5cdb3fd2/details
  151. https://www.virustotal.com/gui/file/e5314f7a9969af109606c84567ecf951570dd1495c400a1e5bf215fd5cdb3fd2/details
  152. https://analyze.intezer.com/analyses/dec09107-5121-46c7-ac2b-4fc7e801a904
  153. https://www.virustotal.com/gui/file/8b4b9b473f73b70c55d21d33149ced0c234fff919d15ff73cca22b93818a785c/details
  154. https://www.virustotal.com/gui/file/9b50c4624bd60aea94b85afeeac6d61c485bee42fdeeffedc5d9617f4650c51c/details
  155. https://www.virustotal.com/gui/file/41fe1fea884daee189076a5bb5b288852ed5b72d3b89576b740be6baceaa69c5/details
  156.  
  157. VR
  158.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement