Advertisement
VRad

#adwind_050819

Aug 7th, 2019
1,021
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.34 KB | None | 0 0
  1. #IOC #OptiData #VR #macro #adwind
  2.  
  3. https://pastebin.com/v2kfP17r
  4.  
  5. previous_contact:
  6. n/a
  7.  
  8. FAQ:
  9. https://radetskiy.wordpress.com/2018/05/11/ioc_adwind_100518/
  10.  
  11. attack_vector
  12. --------------
  13. email attach .DOC > macro > GET jar
  14.  
  15. email_headers
  16. --------------
  17. Received: from lrwdd2.directrouter.com (lrwdd2.directrouter.com [206.123.119.186])
  18. Date: Mon, 05 Aug 2019 04:22:00 -0500
  19. Subject: Fwd: Purchasing Oder
  20. User-Agent: Roundcube Webmail/1.3.8
  21.  
  22. files
  23. --------------
  24. SHA-256 ec845d4c57715e83a80467cfce273e3c54c89aca5229e3f2476057e234c1c0bd
  25. File name PO JAR.doc
  26. File size 508 KB (520192 bytes)
  27.  
  28. SHA-256 a104db76b0b3b8387674918217806325a9db2cf0951e9ec9f88ff6a80d9585b7
  29. File name umucry.jar
  30. File size 652.17 KB (667818 bytes)
  31.  
  32. activity
  33. **************
  34.  
  35. PL_SCR
  36. h11ps\kcexports{.} me/umucry.jar
  37.  
  38. C2
  39. 67.207.93.17
  40. 192.169.69.25
  41.  
  42. netwrk
  43. --------------
  44. [ssl]
  45. 167.71.13.65 kcexports{.} me Client Hello
  46.  
  47. comp
  48. --------------
  49. WINWORD.EXE 172 TCP localhost 49217 162.255.119.195 443 SYN_SENT
  50. WINWORD.EXE 172 TCP localhost 49218 167.71.13.65 443 ESTABLISHED
  51. wscript.exe 2212 TCP localhost 49219 67.207.93.17 7744 SYN_SENT
  52. java.exe 2204 TCP localhost 49222 localhost 7777 SYN_SENT
  53. javaw.exe 1724 TCP localhost 49221 185.244.31.111 7788 SYN_SENT
  54. wscript.exe 2212 TCP localhost 49219 67.207.93.17 7744 SYN_SENT
  55. javaw.exe 1724 TCP localhost 49240 192.169.69.25 7788 SYN_SENT
  56. wscript.exe 2212 TCP localhost 49230 67.207.93.17 7744 SYN_SENT
  57.  
  58.  
  59. proc
  60. --------------
  61. "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" /n /dde
  62. "C:\Program Files\Java\jre1.8.0_131\bin\javaw.exe" -jar "C:\tmp\nloa9qbv.jar"
  63. wscript C:\Users\operator\ddmwgktkuz.js
  64. "C:\Windows\System32\WScript.exe" "C:\Users\operator\AppData\Roaming\CgvxwvYwsG.js"
  65. "C:\Program Files\Java\jre1.8.0_131\bin\javaw.exe" -jar "C:\Users\operator\AppData\Roaming\sutnspffgo.txt"
  66. "C:\Program Files\Java\jre1.8.0_131\bin\java.exe" -jar C:\tmp\_0.66710452046253931060377835662046911.class
  67. C:\Windows\system32\xcopy.exe xcopy "C:\Program Files\Java\jre1.8.0_131" "C:\Users\operator\AppData\Roaming\Oracle\" /e
  68. C:\Windows\system32\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "ULnOQSoPZLF N" /t REG_EXPAND_SZ /d "\"C:\Users\operator\AppData\Roaming\Oracle\bin\javaw.exe\" -jar \"C:\Users\operator\KODhCgcEnMlN\tHIhwWDFSUNOB.eiZoGwJ\"" /f
  69. C:\Windows\system32\attrib.exe attrib +h "C:\Users\operator\KODhCgcEnMlN\*.*"
  70. C:\Windows\system32\attrib.exe attrib +h "C:\Users\operator\KODhCgcEnMlN"
  71. C:\Users\operator\AppData\Roaming\Oracle\bin\javaw.exe -jar C:\Users\operator\KODhCgcEnMlN\tHIhwWDFSUNOB.eiZoGwJ
  72. C:\Windows\system32\icacls.exe icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage\a2160c77c17b5611.timestamp /grant "everyone":(OI)(CI)M
  73. C:\Users\operator\AppData\Roaming\Oracle\bin\java.exe -jar C:\tmp\_0.53037232544445945746878749339271613.class
  74. . . .
  75.  
  76. persist
  77. --------------
  78. @HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 05.08.2019 18:06
  79.  
  80. CgvxwvYwsG c:\users\operator\appdata\roaming\cgvxwvywsg.js 05.08.2019 18:06
  81. wscript.exe //B "C:\Users\operator\AppData\Roaming\CgvxwvYwsG.js"
  82.  
  83. ULnOQSoPZLF N Java(TM) Platform SE binary Oracle Corporation c:\users\operator\appdata\roaming\oracle\bin\javaw.exe 15.03.2017 11:32
  84. "C:\Users\operator\AppData\Roaming\Oracle\bin\javaw.exe" -jar "C:\Users\operator\KODhCgcEnMlN\tHIhwWDFSUNOB.eiZoGwJ"
  85.  
  86. @C:\Users\operator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 05.08.2019 18:06
  87.  
  88. CgvxwvYwsG.js c:\users\operator\appdata\roaming\microsoft\windows\start menu\programs\startup\cgvxwvywsg.js 05.08.2019 18:06
  89.  
  90. drop
  91. --------------
  92. %temp%\nloa9qbv.jar [umucry[1].jar]
  93. C:\Users\operator\AppData\Roaming\CgvxwvYwsG.js
  94. C:\Users\operator\AppData\Roaming\sutnspffgo.txt
  95. C:\Users\operator\AppData\Roaming\Oracle\bin
  96.  
  97. C:\Users\operator\fUTkALeaTxM
  98. C:\Users\operator\KODhCgcEnMlN\tHIhwWDFSUNOB.eiZoGwJ [jar]
  99. C:\Users\operator\ddmwgktkuz.js
  100.  
  101. C:\Users\operator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CgvxwvYwsG.js
  102.  
  103. # # #
  104. https://www.virustotal.com/gui/file/ec845d4c57715e83a80467cfce273e3c54c89aca5229e3f2476057e234c1c0bd/details
  105. https://www.virustotal.com/gui/file/a104db76b0b3b8387674918217806325a9db2cf0951e9ec9f88ff6a80d9585b7/details
  106.  
  107. VR
  108.  
  109. @
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement