ExecuteMalware

2021-07-30 BazarLoader IOCs

Jul 30th, 2021
15,638
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.68 KB | None | 0 0
  1. THREAT ATTRIBUTION: BAZARLOADER
  2.  
  3. SUBJECTS OBSERVED
  4. Contact Submission
  5.  
  6. SENDERS OBSERVED
  7. Christina <[email protected]>
  8.  
  9. EMAIL BODY
  10. name: Donna
  11. message: Hello! My name is Donna. Your website or a website that your
  12. organization hosts is infringing on a copyright protected images owned
  13. by me personally. Check out this official document with the hyperlinks
  14. to my images you used at www.<redacted>.com and my previous publications
  15. to obtain the evidence of my copyrights. Download it now and check
  16. this out for yourself:
  17. https://firebasestorage.googleapis.com/v0/b/files-d6e6c.appspot.com/o/download-3dk3nvbv4ju3n.html?alt=media&token=0471b204-69d8-4a6c-914a-31a622163a92&l=157298857286671654
  18. I believe that you intentionally violated my rights under 17 U.S.C.
  19. Section 101 et seq. and could possibly be liable for statutory damages
  20. of up to $120,000 as set-forth in Sec. 504 (c) (2) of the Digital
  21. millennium copyright act (DMCA) therein. This letter is official
  22. notice. I demand the removal of the infringing materials described
  23. above. Please take note as a service provider, the DMCA demands you,
  24. to remove and/or terminate access to the infringing materials upon
  25. receipt of this letter. In case you don't cease the use of the
  26. previously mentioned infringing content a legal action will likely be
  27. initiated against you. I do have a strong belief that use of the
  28. copyrighted materials mentioned above as presumably infringing is not
  29. permitted by the copyright owner, its agent, or the legislation. I
  30. declare, under penalty of perjury, that the information in this
  31. message is correct and that I am the copyright proprietor or am
  32. authorized to act on behalf of the owner of an exclusive and legal
  33. right that is presumably violated. Regards, Donna Arnold 07/30/2021
  34.  
  35. MALDOC DOWNLOAD URLS
  36. https://firebasestorage.googleapis.com/v0/b/files-d6e6c.appspot.com/o/download-3dk3nvbv4ju3n.html?alt=media&token=0471b204-69d8-4a6c-914a-31a622163a92&l=157298857286671654
  37.  
  38. MALDOC FILE NAMES
  39. Stolen Images Evidence.zip
  40. 2200c6bfbc4489effc47106b99f070f5
  41.  
  42. MALDOC FILE HASHES
  43. Stolen Images Evidence.js
  44. 989573ea161dfc6b6a9246c4811a0207
  45.  
  46. BAZARLOADER PAYLOAD DOWNLOAD URLS
  47. http://moigoran.space/222g100/index.php
  48. http://moigoran.space/222g100/main.php
  49.  
  50. BAZARLOADER PAYLOAD FILE HASHES
  51. (They're both .dll files)
  52. JGkFDlBp.dat
  53. cef50486fe3ecb76d2f85c711fa58d62
  54.  
  55. Another run, it was this:
  56. ScCfJb.dat
  57. fb4b64bc12dd252a80eb28706bd33596
  58.  
  59. BAZARLOADER C2
  60. https://18.237.101.6/insect/bee
  61. https://18.144.168.38/insect/bee
  62.  
  63. PDB PATH FOUND IN MEMORY
  64. (from lsass.exe process)
  65. D:\projects\source\repos\7\bd7 v2\Bin\x64\Release_nologs\bd7_x64_release_nologs.pdb
  66.  
  67.  
Advertisement
Add Comment
Please, Sign In to add comment