Bank_Security

Gozi/Ursnif Banking Trojan targets Italy

Mar 20th, 2018
382
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.89 KB | None | 0 0
  1. Gozi/Ursnif Banking Trojan targets Italian Enterprise Organization
  2.  
  3. IOC:
  4.  
  5. Malspam:
  6.  
  7. Mittente:
  8. "Alfredo Rota" <direzione@alkaservizi.com>
  9. "Info - Hotel Cristina Napoli" <info@hotelcristinanapoli.com>
  10. (potrebbero variare, uso di potenziali account compromessi)
  11.  
  12. Oggetto:
  13. “Re: R: Turni del 19/03/2018”
  14. “Re: Rinnovo Convenzione - Dioniso's Hotels & Apartments”
  15. (potrebbero variare ulteriormente)
  16. Allegato:
  17. “Richiesta.doc”
  18. “<PREFISSO>-Richiesta.doc”
  19.  
  20. Dropurl:
  21. 107.152.196[.147
  22. dqwodnqwdoajndwqdqwdasd[.com
  23. qwdiqjdauqwdnaqudqawd.[com
  24. http:// qwdiqjdauqwdnaqudqawd.[com/NOIT/testv.php?l=borter<1-10>.class
  25.  
  26. Componenti:
  27. http:// horse-technology.[com/files/alex.bmp
  28. http:// horse-technology.[com/files/sofia.bmp
  29. http:// lnx.eridanoweb.[com/gestioni/footer.png
  30. http:// fioritononi.[it/modules/secure.doc
  31. http:// voloweb[.net/assistenze/img/wp-64.png
  32. http:// cmxsrl[.it/wp-64.zip
  33. http:// onliva[.at/jvassets/rk/docs.rar
  34. http:// playmuseek[.com/wp-admin/maint/admin.rar
  35. http:// www.experience[.it/imgs/system.exe
  36.  
  37. C2 (TOR):
  38. wpxsrrj7nektcxri[.onion
  39. nmct3onogb625qut[.onion
  40. vxe42hjcu4yjiins.[onion
  41. https:// wpxsrrj7nektcxri.[onion/wpdata
  42. https:// nmct3onogb625qut.[onion/wpdata
  43. https:// vxe42hjcu4yjiins[.onion/wpdata
  44.  
  45. C2:
  46. 47.74.247[.229
  47. onliva[.at
  48. farimon[.at
  49. karilor[.at
  50. fortares[.su
  51. swoqup[.at
  52. bukredo[.cn
  53. ledal[.at
  54. http:// onliva[.at/wpassets
  55. http:// fortares[.su/wpassets
  56. http:// swoqup.[at/wpassets
  57. http:// bukredo[.cn/wpassets
  58. http:// ledal.[at/wpassets
  59.  
  60. Hash:
  61. e918f6467e8b1b66633b71c45f9999e44e154101f41dda99e9df8cb01f8d10d9 doc
  62. 903a6e34b077822108b8dd38a8733636368e2450f8eaae8a5eb939dd5569bfd5 exe
  63.  
  64. Persistenza:
  65. “C:\Users\%USER%\AppData\Roaming\Microsoft\<NOMEAUTOGENERATO1>\<NOMEAUTOGENERATO2>.exe”, e.g.
  66. “C:\Users\%USER%\AppData\Roaming\Microsoft\Dot3gpui\bdeuroxy.exe”
  67. “C:\Users\%USER%\AppData\Roaming\Microsoft\Bitsdler\Audibrkr.exe”
Add Comment
Please, Sign In to add comment