ExecuteMalware

2021-04-16 BazarCall IOCs

Apr 16th, 2021
17,334
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.80 KB | None | 0 0
  1. THREAT IDENTIFICATION: BAZARCALL / BAZARLOADER
  2.  
  3. SENDER EMAILS
  4.  
  5. SUBJECTS
  6. 0413759791590. All set to go for a premium plan?
  7. 041505627734. Are you all set to prolong your premium plan?
  8.  
  9. LURE PHONE NUMBER
  10. +1 816 307 4271
  11.  
  12. MALDOC LANDING PAGE URLS
  13. https://ebookreading.us
  14. https://ebookstoread.us
  15. https://ebooktoread.us
  16. https://readebook.us
  17. https://readebooks.us
  18.  
  19. MALDOC DOWNLOAD URLS
  20. https://ebookreading.us/request.php
  21. https://ebookstoread.us/request.php
  22. https://ebooktoread.us/request.php
  23. https://readebook.us/request.php
  24. https://readebooks.us/request.php
  25.  
  26. MALDOC (XLSB) FILE HASHES
  27. 0b0a9695edb12b43c48bb564c6ca819d
  28. 0b98070db10ad43a4175ecebc163fe48
  29. 650080b98d356865a62d29411a33c742
  30. 88a8f60bc630f5967daa6835d76fd12c
  31. b2456eab6fd76b5c5f4b50aace21cc2b
  32. df8af4e4742c4cda12b3e93847fb6bfa
  33. ed50d662465daf24f8d738912dce6bdc
  34.  
  35. DROPPED CAMPOLOADER FILES
  36. Morning attempt
  37. ---------------
  38. 496258.doh
  39. 3e7d049a6c2b5fc2433efc26fbf7247e
  40.  
  41. 496258.xslb
  42. d4e23f09747b47be2f9540f4499c4085
  43.  
  44. 496258.dof
  45. d4e23f09747b47be2f9540f4499c4085
  46.  
  47. Afternoon attempt:
  48. ------------------
  49. 496258.xslb
  50. f7e72deaacfad01ce83511f7a0573d42
  51.  
  52. 496258.dof
  53. f7e72deaacfad01ce83511f7a0573d42
  54.  
  55. 496258.doh
  56. 95855134f3999425d0614e14e11ac0f8
  57.  
  58. BAZARLOADER PAYLOAD DOWNLOAD URLS
  59. https://keep2.xyz/campo/jl/jl7
  60. https://keep2.xyz/uploads/files/mraz.exe
  61.  
  62. BAZARLOADER PAYLOAD FILE HASH
  63. aklhg.exe (renamed from mraz.exe)
  64. 9454f2737270b5990173d234b98895a5
  65.  
  66. ADDITONAL TRAFFIC
  67. I saw traffic from mraz.exe to:
  68. https://52.26.179.239
  69.  
  70. I saw traffic from cmd.exe to:
  71. https://3.101.152.145
  72.  
  73. SUPPORTING EVIDENCE
  74. https://urlhaus.abuse.ch/browse.php?search=9454f2737270b5990173d234b98895a5
  75. https://www.virustotal.com/gui/file/4dc24a8bc92ce652fe90d90cfa7e1a9b4758955c79789daae6db825cbd1950a8/detection
Advertisement
Add Comment
Please, Sign In to add comment