Advertisement
VRad

#rurat_110124

Jan 11th, 2024 (edited)
873
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.33 KB | None | 0 0
  1. IOC #OptiData #VR #rurat #RemoteUtilitiesLLC #EXE #UPX
  2.  
  3. https://pastebin.com/j8h6XpV7
  4.  
  5. previous_contact:
  6. 28/01/22 https://pastebin.com/7ndYBz5Q
  7. 09/08/21 https://pastebin.com/rh0bNZpN
  8. 22/03/21 https://pastebin.com/Dn4w1h8K
  9. 09/03/21 https://pastebin.com/70CvpLRE
  10. 03/03/21 https://pastebin.com/vBf6Wyr5
  11. 03/03/21 https://pastebin.com/br4Cayaz
  12.  
  13. FAQ:
  14. https://cert.gov.ua/article/18163
  15. https://www.remoteutilities.com/download/
  16.  
  17. attack_vector
  18. --------------
  19. email attach .rar1 > .rar2 (multi) PWD > .exe > UAC > msi > install > service > C2
  20.  
  21. # # # # # # # #
  22. email_headers
  23. # # # # # # # #
  24. Date: Thu, 11 Jan 2024 08:23:35 +0300
  25. Subject: Запит від компанії Медок
  26. From: Субботин Ираклий Васильевич <transport@edytrans.ro>
  27. Received: from mail.edytrans.ro ([193.33.25.31])
  28. Received: from pathetic-fuel.aeza.network (unknown [176.124.198.222])
  29. by mail.itfusion.ro (Postfix) with ESMTPA id E915230C07B0
  30. Reply-To: Сирко Чеслав Валериевич <secretariat@moldexpo.md>
  31. Message-Id: <20240111052334.E915230C07B0@mail.itfusion.ro>
  32.  
  33. # # # # # # # #
  34. files
  35. # # # # # # # #
  36. SHA-256 5a03f51625adb3bc44429dffd6d4808ef4c57d79efd50032eb4cb2c4c6333364
  37. File name Запит.rar [RAR archive data, v5]
  38. File size 16.90 MB (17723321 bytes)
  39.  
  40. SHA-256 c2ace97deed180300407035e9c6cfc9536df5d660be9ff46c26a9ca86f5c47b2
  41. File name Запит документів.part1.rar [RAR archive data, v5] Multi, PWD
  42. File size 5.00 MB (5242880 bytes)
  43.  
  44. SHA-256 48b65d2d67eb92eeb330ad37e0b29eaaad5c81549807c6c7dccb5f6e2f90a647
  45. File name Запит документів.part2.rar [RAR archive data, v5] Multi, PWD
  46. File size 5.00 MB (5242880 bytes)
  47.  
  48. SHA-256 42a7eb275e343f838095582afd641629fafea581c27624707c4f0d9aa04d61be
  49. File name Запит документів.part3.rar [RAR archive data, v5] Multi, PWD
  50. File size 5.00 MB (5242880 bytes)
  51.  
  52. SHA-256 4cd6fa9df98b6b0246dd40ec64d0088a7f589e13038dc76dd71abc077bd91596
  53. File name Запит документів.part4.rar [RAR archive data, v5] Multi, PWD
  54. File size 1.90 MB (1993646 bytes)
  55.  
  56. SHA-256 5f983f2d494f11050a85dcf38b74da937eb67ea13d0d445e8a89ef4753824499
  57. File name reportservlet.pdf [PDF document, version 1.7, 1 pages] CLEAN
  58. File size 36.44 KB (37311 bytes)
  59.  
  60. SHA-256 1c0b5baceb177598bafee74d48d91567428e3033521caec287021164db19b96e
  61. File name Електронний запит Medoc.exe [PE32, UPX 2.90 [LZMA]] Installer
  62. File size 17.33 MB (18167808 bytes)
  63.  
  64. SHA-256 322ef7eee9de6bcda974e9e1509b1f1e96e3538078ab4874a106dbe34064b52c
  65. File name rutserv.exe [PE32, BobSoft Mini Delphi] Server
  66. File size 12.56 MB (13174240 bytes)
  67.  
  68. SHA-256 d1ec641ce4e2883c19a21863c3b21bf45bbf08040f19c4af99be640b43f99d80
  69. File name rfusclient.exe [PE32] Client
  70. File size 6.33 MB (6636512 bytes)
  71.  
  72. # # # # # # # #
  73. activity
  74. # # # # # # # #
  75.  
  76. PL_SCR email_attach
  77.  
  78. C2 77_105_132_124 : 465
  79. 77_105_132_124 : 5651
  80. 77_105_132_70 : 465
  81. 77_105_132_70 : 5651
  82.  
  83. netwrk
  84. --------------
  85. 64_20_61_146 5655 TCP
  86. 77_105_132_124 465 TCP
  87. 77_105_132_124 5651 TCP
  88. 77_105_132_70 465 TCP
  89. 77_105_132_70 5651 TCP
  90.  
  91. comp
  92. --------------
  93. rutserv.exe 3128 TCP 64_20_61_146 5655 ESTABLISHED
  94. rutserv.exe 3128 TCP 188_127_224_64 5651 ESTABLISHED
  95.  
  96. proc
  97. --------------
  98. C:\Users\operator\Desktop\4_Електронний запит Medoc.exe [user]
  99. C:\Users\operator\Desktop\4_Електронний запит Medoc.exe [UAC_admin]
  100. C:\Windows\SysWOW64\msiexec.exe /i "C:\Users\support\AppData\Local\Temp\RUT_{C2D52927-DA4D-4AA8-9C60-79FA2FDACCBF}\STAB_unsigned.msi" /qn
  101.  
  102. [another context]
  103.  
  104. C:\Windows\system32\msiexec.exe /V
  105. C:\Windows\syswow64\MsiExec.exe -Embedding DDE9BB63CF51031705D7E971FC89DC24
  106. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" -msi_copy "C:\Users\support\AppData\Local\Temp\RUT_{C2D52927-DA4D-4AA8-9C60-79FA2FDACCBF}\STAB_unsigned.m
  107. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /silentinstall
  108. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /firewall
  109. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /start
  110.  
  111. [another context]
  112.  
  113. C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
  114. C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
  115. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
  116. "C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /
  117. "C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -firewall
  118.  
  119. persist
  120. --------------
  121. RManService Allows Remote Utilities users to connect to this machine.
  122. Remote Utilities LLC
  123. c:\program files (x86)\remote utilities - host\rutserv.exe
  124. 02.07.2019 15:44
  125.  
  126. drop
  127. --------------
  128. C:\Windows\Installer\40021b.msi
  129. C:\Windows\Installer\MSI438A.tmp
  130. C:\Windows\Installer\40021b.msi
  131. C:\Windows\Installer\40021f.msi
  132. C:\Windows\Installer\{E5803A4B-5A4B-44F6-A759-882FB6AD7982}\*.exe
  133. C:\Program Files (x86)\Remote Utilities - Host\*
  134.  
  135. # # # # # # # #
  136. additional info
  137. # # # # # # # #
  138. n/a
  139.  
  140. # # # # # # # #
  141. VT & Intezer
  142. # # # # # # # #
  143. https://www.virustotal.com/gui/file/5a03f51625adb3bc44429dffd6d4808ef4c57d79efd50032eb4cb2c4c6333364/details
  144. https://www.virustotal.com/gui/file/c2ace97deed180300407035e9c6cfc9536df5d660be9ff46c26a9ca86f5c47b2/details
  145. https://www.virustotal.com/gui/file/48b65d2d67eb92eeb330ad37e0b29eaaad5c81549807c6c7dccb5f6e2f90a647/details
  146. https://www.virustotal.com/gui/file/42a7eb275e343f838095582afd641629fafea581c27624707c4f0d9aa04d61be/details
  147. https://www.virustotal.com/gui/file/4cd6fa9df98b6b0246dd40ec64d0088a7f589e13038dc76dd71abc077bd91596/details
  148. https://www.virustotal.com/gui/file/5f983f2d494f11050a85dcf38b74da937eb67ea13d0d445e8a89ef4753824499/details
  149. https://www.virustotal.com/gui/file/1c0b5baceb177598bafee74d48d91567428e3033521caec287021164db19b96e/details
  150. https://www.virustotal.com/gui/file/322ef7eee9de6bcda974e9e1509b1f1e96e3538078ab4874a106dbe34064b52c/details
  151. https://www.virustotal.com/gui/file/d1ec641ce4e2883c19a21863c3b21bf45bbf08040f19c4af99be640b43f99d80/details
  152.  
  153. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement