Advertisement
VRad

#remcos_131123

Nov 13th, 2023 (edited)
732
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.20 KB | None | 0 0
  1. #IOC #OptiData #VR #remcos #rat #mic #keylog #scr
  2.  
  3. https://pastebin.com/tbRpiGG5
  4.  
  5. previous_contact:
  6. 06/02/23 https://pastebin.com/kjv5E8Au
  7. 12/07/21 https://pastebin.com/ZYZarB9L
  8. 15/07/19 https://pastebin.com/ZxG6eRWM
  9.  
  10. FAQ:
  11. https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
  12.  
  13.  
  14. attack_vector
  15. --------------
  16. email > att1 .RAR > att2 .RAR > att3 .RAR (pwd) > .EXE > \ProgramData\davinci\sql.exe > C2
  17.  
  18.  
  19. # # # # # # # #
  20. email_headers
  21. # # # # # # # #
  22. Return-Path: <info@davincigroup.online>
  23. Received: from davincigroup.online (unknown [45.10.245.245])
  24. From: Головне Оперативне Управління СБУ України <info@davincigroup.online>
  25. Subject: запит ГОУ СБУ України № 90575 /СБ-23
  26. Date: Sun, 12 Nov 2023 15:53:30 -0800
  27. Message-Id: <E1r2KGg-000IpF-JZ@mail.davincigroup.online>
  28.  
  29. # # # # # # # #
  30. files
  31. # # # # # # # #
  32.  
  33. SHA-256 4bd8ec1e82fdea9d8d24f1e7a133d409aa941e13fcc7b6ce1889bed3b7a0afbc
  34. File name 1_Електронна вимога СБУ України.rar [ RAR archive data, v5 ]
  35. File size 944.55 KB (967216 bytes)
  36.  
  37. SHA-256 2ce640749819e27d457827eede4d14abbf65981cd716ef25d9489b7eeba314d2
  38. File name 2_Електронна вимога СБУ України.rar [ RAR archive data, v5 ]
  39. File size 944.11 KB (966764 bytes)
  40.  
  41. SHA-256 6a6f71cf5cfeb8698987aa3e826b19ef05be3f0112c46d79b366feb914340335
  42. File name 3_Вимога СБУ 543 від 13.11.2023.pdf.rar [ RAR archive data, v5 ] passwordprotected
  43. File size 943.59 KB (966238 bytes)
  44.  
  45. SHA-256 a4d5382438138f679073396bca73dc4f6bc39420966944f4fea8a9ab4087d004
  46. File name 4_Вимога СБУ 543 від 13.11.2023.pdf.exe [ PE32 executable (GUI)] Admin privileges UAC!
  47. File size 996.00 KB (1019904 bytes)
  48.  
  49.  
  50. # # # # # # # #
  51. activity
  52. # # # # # # # #
  53.  
  54. PL_SCR email_attach
  55.  
  56.  
  57. C2 111.90.147.133:8080
  58. 111.90.147.133:80
  59.  
  60.  
  61. netwrk
  62. --------------
  63. 111.90.147.133 8080 TCP 49817 → 8080 [SYN]
  64. 178.237.33.50 geoplugin.net 80 HTTP GET /json.gp HTTP/1.1
  65.  
  66. comp
  67. --------------
  68. sql.exe 3784 111.90.147.133 8080 ESTABLISHED
  69. sql.exe 3784 111.90.147.133 8080 ESTABLISHED
  70. sql.exe 3784 178.237.33.50 80 CLOSE_WAIT
  71. sql.exe 3784 111.90.147.133 8080 ESTABLISHED
  72.  
  73. proc
  74. --------------
  75. [user]
  76. C:\Users\operator\Desktop\4_Вимога СБУ 543 від 13.11.2023.pdf.exe
  77.  
  78. [admin]
  79. C:\Users\operator\Desktop\4_Вимога СБУ 543 від 13.11.2023.pdf.exe
  80. C:\Users\operator\Desktop\4_Вимога СБУ 543 від 13.11.2023.pdf.exe yzn?+IOH1Wh$eN_kAK-3^M!(YD>iJxUT@jt*#&%EbfCdvrP9m0Q7FlgL)uaSwB=qZV52pX84ocRs
  81. C:\ProgramData\davinci\sql.exe
  82. C:\ProgramData\davinci\sql.exe yzn?+IOH1Wh$eN_kAK-3^M!(YD>iJxUT@jt*#&%EbfCdvrP9m0Q7FlgL)uaSwB=qZV52pX84ocRs
  83. C:\ProgramData\davinci\sql.exe /stext "C:\Users\support\AppData\Local\Temp\pwlelfknnexzjzwfrxydshge"
  84. C:\ProgramData\davinci\sql.exe /stext "C:\Users\support\AppData\Local\Temp\srzwlxvgbmpelfkjbhkwvuavbrd"
  85. C:\ProgramData\davinci\sql.exe /stext "C:\Users\support\AppData\Local\Temp\ctehmqgipuhrntynssxygyvecfmkge"
  86.  
  87. persist
  88. --------------
  89. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 08.11.2023 14:01
  90. hts-UVISQY Java Platform SE binary Oracle Corporation c:\programdata\davinci\sql.exe 12.11.2023 18:15
  91.  
  92. drop
  93. --------------
  94. C:\ProgramData\davinci\sql.exe
  95. C:\Users\support\AppData\Local\Temp\bhvD830.tmp
  96. C:\Users\support\AppData\Local\Temp\pwlelfknnexzjzwfrxydshge
  97. C:\Users\support\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0SLSNRRL\json[1].json
  98.  
  99. # # # # # # # #
  100. VT & Intezer
  101. # # # # # # # #
  102. https://www.virustotal.com/gui/file/4bd8ec1e82fdea9d8d24f1e7a133d409aa941e13fcc7b6ce1889bed3b7a0afbc/details
  103. https://www.virustotal.com/gui/file/2ce640749819e27d457827eede4d14abbf65981cd716ef25d9489b7eeba314d2/details
  104. https://www.virustotal.com/gui/file/6a6f71cf5cfeb8698987aa3e826b19ef05be3f0112c46d79b366feb914340335/details
  105. https://www.virustotal.com/gui/file/a4d5382438138f679073396bca73dc4f6bc39420966944f4fea8a9ab4087d004/details
  106. https://analyze.intezer.com/analyses/072c005b-aa88-4b21-8a41-dca487703f97
  107.  
  108. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement