Skip to content

Commit

Permalink
Add files via upload
Browse files Browse the repository at this point in the history
  • Loading branch information
brad-duncan authored Jan 29, 2024
1 parent 5fc7aec commit d2d52bf
Show file tree
Hide file tree
Showing 15 changed files with 1,340 additions and 0 deletions.
112 changes: 112 additions & 0 deletions 2021-09-29-IOCs-for-TA551-BazarLoader-with-Cobalt-Strike.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
2021-09-29 (WEDNESDAY) - TA551 (SHATHAK) BAZARLOADER WITH COBALT STRIKE

REFERENCE:

-

CHAIN OF EVENTS:

- malspam --> password-protected zip attachment --> extracted Word doc --> enable macros --> installer DLL for BazarLoader --> post-infection activity --> Cobalt Strike as follow-up malware

NOTES:

- These Word docs use English language templates, but the file names are Italian.
- In our example, Cobalt Strike appeared approximately 12 to 13 hours after the initial BazarLoader infection.

15 EXAMPLES OF TA551 WORD DOCS WITH MACROS:

- 04e26a429675b08dce30bebc6dc3277a4dc4242c25002840b0b92114c00d5911 comando-09.21.doc
- 0d8679cdd59a906f58a4e4ec7ef8d673b7360cd9e12d284281a239876fe17c58 Materiale-09.29.2021.doc
- 2a554cc97d7d2a57f7bdd2d75f359ea60df1d9c0c12b3b5d786a1733336adacf particolari-09.21.doc
- 2e4086e704bc6de9ab0687f4cd94b0a76fd61ca521dd22fcb29a5ee9a5f84391 documento ufficiale 09.21.doc
- 3449185c5e01edf45abdd3c46bf032e503aa9fc3910b728bccac19b110b3da8b Istruire 09.21.doc
- 65cf4ba4799d821c60657b12ea21d6c6ccbfdd9c5e9a84582867a6b5982bdb7d domanda-09.29.2021.doc
- 6ea3e4daddad527a3d56a80f0a767295f84e95c54cef5653dada78aeb547de01 fatti.09.21.doc
- 76980a9aa1f0b8e4090f4e4996ba7d46ad2e7ba3686d92be4d0d85ae48a94a08 ingresso-09.21.doc
- 833ef6da205622cc7239cb3c4bb8cd734d892edb24d49347b8adf98cb76fbe6f ordinare-09.21.doc
- 8cc2d9417231758b5eb259b7cd0b51e30969ad363548a8d6990489af59a91592 diffidare_09.21.doc
- 8d9a5a1713cf71f93f7a79045d329f690233df1273e2eba1e9f0dc6dae28411a diretto_09.21.doc
- 9ca640878f2e57f0e303707eea9e0c0c3f14f269cf454907e4ae1dff53a16a2a legiferare-09.21.doc
- b2d063f0c51c08853ea374567c2eceda86deb65796653a8be24a23cd90ac612e caricare,09.29.2021.doc
- bfc70d95721b0f54dadbde2f845c9c7ff4cb39c51d7961f536f1c489ca4dd7ae caricare_09.29.2021.doc
- ce3d54ae221510e31f2bcfe9f85ce98f7a4872b1c6a090ebe47e17a036694b49 Istruire-09.21.doc

AT LEAST 6 DOMAINS HOSTING THE INSTALLER DLL:

- 194.62.42[.]208 - chavezuniqueg[.]com
- 194.62.42[.]234 - officecleaning2018b[.]com
- 194.62.42[.]235 - exposetaxi2011b[.]com
- 194.62.42[.]238 - coachstorage2020b[.]com
- 194.62.42[.]238 - sampsonlunarg[.]com
- 194.62.42[.]239 - berrydeliverys[.]com

EXAMPLES OF URLS FOR INSTALLER DLL:

- hxxp://chavezuniqueg[.]com/bmdff/kIB5cdKOsfTsGvmvZ/V/bcFnIh/75632/esKeMcrysdSzRdoJ4pQ1HwyTQMok5TG/51252/lilu2?sid=4vcP4eyoNNPxt2YQPjsp3rg

- hxxp://berrydeliverys[.]com/bmdff/L4M7BiOSmEgyoAcnw5g38CvO28wl/rUDzPcv/lilu5?46TmDE=a5vuzJ9&ref=xlAx8G8SVf9Nn7&cid=U1gBHO0O5XHzbG&ref=HQ1idua2YsJPcBEizg&liZ4d3=4qlX7GxMibthcGuXVn&3ZE7GKY3=mL1m3RY4xB&2PhKgT3n=DHbioGf21Y&page=30yKSog2VpKz9EIG1dndwHsw7bb&user=glY2V1E5S&page=lGTX2QSrbaeAv2rud

- hxxp://berrydeliverys[.]com/bmdff/T1mXvaIPBUI0o4l/04dryQVE4akqnY0vPK46hs7V4zec1/lilu4?time=owtmxppUXIG1C5Z1

- hxxp://coachstorage2020b[.]com/bmdff/23346/vqxXu3SSIJfHFwSgi3vT5oktZ94ju/94785/MGGEkupJF6LiTJChA5jbRoGXhm4/97370/uvHMGZZiDZQcNDrm/x59HkgMNxcvUnKiBAfB0nzpHr/18546/3916/NRf0U8duGAHPdpxY5l6opCc3LVdrgvXvt3MJvPx5Wvz1/lilu7?user=WZj3bKezdhMz7QO0v&time=snfxAiP5X6g&cid=UAlKCY2wIAn43mV5&ref=OkSAYs2nKcfMTT0RCofeD2sZ9&time=VDaw8M5YvsRchuqLaeiLmx&CJdZ7EJTC=oBjCaJVPynGau7&=2Z3qLtNQmY1Iqc5&id=P8SeA7VYdpQj3&time=Wj5cem6GLAlERsUj

- hxxp://exposetaxi2011b[.]com/bmdff/J5dJHdBeMU6BjCM2al/EwAwD8purFOqW/36005/44935/16901/QPCpFqx3ez051kem0kWeDEmwTRcze6FfDVvSzsUk/26679/lilu4?q=PtKChouRatBKf4y&3jpgJmR9=El56FXiYmitVdrRNb1aX&Be=gUX1DhZbMsFNPDPRky&ref=qvEEXdO9oMiuq&search=hnzBGBO4R4dKv7hKRAYFDQLA&B6OwYj99=ONUGGWGsxkMDsa2b3b&search=z0M44RgdUiZnM

- hxxp://officecleaning2018b[.]com/bmdff/I6PD/OPDey638Vr4pfkMfmHMoD292TivVuZVgg21LyVRFdD2FAB/vQlnkM90SqGDwc1s67MbWC24TGoOjMXC1RieoqwQfpdcWjuv/UuGb/WB8PpOB7VLCXPVgzZ/EIhkrSU/65989/wvmpeISJDubxjzEjoa61qZS8xgQCjHj/xa5ItIv2KPbo3QzSDAD5bpR7WaczCc9wrlEz7WbOR/QppHKYr78gks5vSFcqsdzdT4NDxIXRf6FE/lilu1?=GuydBWq&=d5&0SO=p1v8uK0nR&AChiJl2=h8fpdBD

- hxxp://officecleaning2018b[.]com/bmdff/p7ynhRpou9wrJllCfhQvKiverfim3sF0ONCJqAzF/xnBpYZ5EQ3kICHvsgvmdfy5QxtrGCjCzr/lilu2?ref=JOnIYMuAxr250wlG&sid=lzk9wlZQd&FRQpurg6Er=fZNTzQ0Nh4135ZjK&q=tqR7lSY4VjbalWjo9uIctbfzUJd&search=vnVMqfddQyYn&user=v1QNhYgxXN&fOw=mTMK0mgsq5Vokn&time=6bNXBdYCIjJDMVceF3W7G84wHaba2

- hxxp://sampsonlunarg[.]com/bmdff/NYp6E8NZ/69bMxpjXQ8sjdaCtoQevz1i1u1f6mH5lTo/kXJbmJ0tdz1iCNfKNfErriJrNMplz1cgYT2MKIpZ5/uJ67nSRTegX496/J7114vbdL03HTQtr4INSnQQ1oYZiei4/xpIgURh79MRasZs1zRvJHd0W/pHmgFDP9hOcUcQaSUPXT/lilu7?page=1upXSR0bnx&ref=80hJKlk0X3lOQl97&7pB04C9kle=6Od13N23n8GqPcBf&ref=7ojE6tyeOxSXlN8NiYFfJhjf

9 EXAMPLES OF HTA FILES DROPPED BY WORD MACROS:

- 2089b44b21295e8958cc001895dbd674ea87fa7b0a0767f29536b5f7ef8df4f5 accessPopEarth...hTa
- 96d5aaa8342c344fdae21fe8fc414bed055f075435129e9e81d77667be7bb946 aprilAccessWindows...hTa
- 32aeab29881aa242f3c97993885b6bb3741dc0b76dc4225bef57f7a51024912a cleanAccess...hTa
- db4873797a66f0447e1377545adfef2e73a05e4af08b4c90c497369e8ad50b98 excelWindows...hTa
- 679fedfd5d7732c072fec8379295b9ae3d22fd60c3a4ea36fc6541b240afb633 officeWord...hTa
- a13055962c1b5965c82da9ebc57613ba58c3347041113d1fc0b65d7f223d91a9 popMicrosoft...hTa
- 7b7f759c73fe89abd555dfa49b7955dabced6963f389f17a214b6e453523d82a rapAccess...hTa
- e9f9e78b90e16f1686f8ab3bfcd124c33f86d6f20bc8d62a7b5ef7863775ef10 rapExcelRap...hTa
- 8626838de9f60b2f3879a4e7354a2749c552e6a92cba369cd5edbdaeada34efd windowsWord...hTa

LOCATIONS OF THE HTA FILES:

- [same directory as the Word doc]

9 EXAMPLES OF BAZARLOADER DLL FILES RETRIEVED BY THE ABOVE HTA FILES:

- 61589d22ba47b11612e71f58463f664716f6b41fb76933e5b7e6294896b10e19 accessPopEarth.jpg
- 59f6920572e085331b13de8e0adc15c0cba87d0872af0daa6f64969febcfa425 aprilAccessWindows.jpg
- ffcae86616e45340bcfb91cef686cfdb9822ee2dfb4cd8ee55eb10d91e4b1c53 cleanAccess.jpg
- b130b5a05f3b7fc08245c558bfcfb71dcf17e913c969f63abe98a6b19f534863 excelWindows.jpg
- 8f2bc90f938a2f43f48e0a77073ef7a617b3479fd2c68f4a7dd4a7bfdaf08afe officeWord.jpg
- ca3b52301bf6981165a5b7844f10ee68b958d936d7d27ae33c5d8ec46d9eaa88 popMicrosoft.jpg
- b3f2720d3f280811007fd10a16f641b757ebeadf8e59b5973d9284973a565630 rapAccess.jpg
- 4c32529e9beef00fe01fd839b3f9e1eeceb541f36c5e5e23da8b62a06b817d16 rapExcelRap.jpg
- 2d21fd417bdbbe0fd3ce5b3e49649f9f1049d01c6532a906b314f2dbead18a3d windowsWord.jpg

LOCATION FOR THE INSTALLER DLL FILES:

- C:\Users\Public\

DLL RUN METHOD:

- regsvr32.exe [filename]

BAZAR C2 TRAFFIC:

- hxxps://164.90.226[.]27/feed/news/actual/last
- hxxps://164.90.226[.]23/feed/news/actual/last

FOLLOW-UP MALWARE: COBALT STRIKE

- SHA256 hash: a40b710413dea51189032d6337e397f8f65ce87abe4afadfae528739662e916d
- File size: 391,168 bytes
- File location: C:\Users\[username]\AppData\Local\Temp\DEC6.dll
- File description: Cobalt Strike sent as follow-up malware from BazarLoader infection
- Run method: rundll32.exe [filename],#1

COBALT STRIKE TRAFFIC:

- 144.202.101[.]37 port 443 - hxxps://fully1[.]com/__utm.gif
114 changes: 114 additions & 0 deletions 2021-10-07-IOCs-for-Qakbot-obama111-and-Cobalt-Strike.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
2021-10-07 (THURSDAY) - QAKBOT (QBOT) OBAMA111 INFECTION WITH COBALT STRIKE

REFERENCE:

- https://twitter.com/Unit42_Intel/status/1446584963885936642

INFECTION CHAIN:

- malspam --> attached zip archive --> extracted Excel file --> enable macros --> Initial Qakbot DLL --> Qakbot post-infection activity (continuous) --> Cobalt Strike --> ANGRYPUPPY/BloodHound reconnaissance activity

NOTES:

- A password-protected zip archive with the malware/artifacts for this infection is available at:

https://github.com/pan-unit42/tweets/blob/master/2021-10-07-Qakbot-obama111-and-Cobalt-Strike-malware-and-artifacts.zip

- Password for the above zip archive is: infected

- obama111 is a designator for this particular Qakbot distribution infrastructure, where 111 is a one-up serialization for the specific day.
- The Cobalt Strike binary was run from memory (maybe process hollowing) so there was nothing on disk.
- Reconnaissance information gained from ANGRYPUPPY/BloodHound was temporarily saved to the C:\Users\Public directory and quickly deleted.
- ANGRYPUPPY is a tool for the Cobalt Strike framework designed to automatically parse and execute BloodHound.
- BloodHound is an AD relationship mapping and visualization tool
- More information about ANGRYPUPPY/BloodHound is at: https://www.networksgroup.com/blog/angrypuppy-bloodhound-attack-path-execution-for-cobalt-strike-2
- The Windows user account for this infected host was andre.montgomery

CONTENTS OF TODAY'S MALWARE/ARTIFACTS ZIP ARCHIVE:

- 2021-10-07-Windows-registry-update-for-Qakbot.txt
- 2021-10-07-initial-binary-for-Cobalt-Strike-from-185.106.96.158.bin
- Users/Public/NzlhOTIxYmQtNTEyZi1jYzliLTYwNTMtMzU4MzEyNGY2NGU0.bin
- Users/Public/20211007183502_BloodHound.zip
- Users/andre.montgomery/Downloads/AMLRPT_1094753610.zip
- Users/andre.montgomery/Downloads/AMLRPT_1094753610.xls
- Users/andre.montgomery/Celod.wac
- Users/andre.montgomery/AppData/Roaming/Microsoft/Bbbetedog/u/
- Users/andre.montgomery/AppData/Roaming/Microsoft/Bbbetedog/naqhixfsvwhmw.dll
- Users/andre.montgomery/AppData/Roaming/Microsoft/Bbbetedog/yxrrsq.oee
- Users/andre.montgomery/AppData/Roaming/Microsoft/Bbbetedog/mewynjy.dll
- Users/andre.montgomery/AppData/Roaming/Microsoft/Bbbetedog/sylkusyn.luq

INITIAL MALWARE:

- SHA256 hash: c4dfafbe698285e5f95e0e75a5bcda4642e9f6fcf826df51c90957a49cd2a4d1
- File size: 90,943 bytes
- File name: AMLRPT_1094753610.zip
- File description: Zip archive, attachement from malspam

- SHA256 hash: 73f9a63b139bf560cbbec05febf73cebbf4ca9051e0c8e14d9d45098e138c34a
- File size: 137,216 bytes
- File name: AMLRPT_1094753610.xls
- File description: Extracted from the above zip archive, Excel file with macros for Qakbot obama111

TRAFFIC FOR QAKBOT OBAMA111 DLL:

- hxxp://190.14.37[.]238/44476.7629744213.dat --> C:\Users\[username]\Celod.wac
- hxxp://5.196.247[.]5/44476.7629744213.dat --> C:\Users\[username]\Celod.wac1
- hxxp://94.140.115[.]118/44476.7629744213.dat --> C:\Users\[username]\Celod.wac2

- NOTE: This infection could only retrieve the first DLL for Celod.wac

QAKBOT OBAMA111 DLL:

- SHA256 hash: 41af67ae35a6f1aa2361e3e35ed02c78f6995067359a94c417488304f2744a63
- File size: 844,800 bytes
- File location: hxxp://190.14.37[.]238/44476.7629744213.dat
- File location: C:\Users\[username]\Celod.wac
- Run method: regsvr32.exe -silent [filename]

ENCODED BINARY USED FOR COBALT STRIKE:

- SHA256 hash: 3ec118323b5c34ed63d56b7969a1cb2c605922459210c174eb58a6cc19a863ea
- File size: 210,002 bytes
- File location: hxxp://185.106.96[.]158/spfooh/cacerts.crl
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 OPR/78.0.4093.147
- Binary can be retrieved using the following cURL command with the above file location and user-agent

QAKBOT OBAMA111 DLL FILES SAVED TO DISK AFTER INFECTED HOST WAS SHUT DOWN:

- SHA256 hash: 061dfb6a251e536f700a295239652dafab34aee5e5145320d1d57e3fca5e5d52
- File size: 620,032 bytes
- File location: C:\Users\[username]\AppData\Roaming\Microsoft\[random letters]\[random letters].dll
- Run method: regsvr32.exe -silent [filename]

- SHA256 hash: bac73f9ccebf93009a6037145a9c71a2e8b916956f6a7e6a4f4b53b4b50b7a00
- File size: 620,032 bytes
- File location: C:\Users\[username]\AppData\Roaming\Microsoft\[random letters]\[random letters].dll
- Run method: regsvr32.exe -silent [filename]

QAKBOT TRAFFIC:

- 206.47.134[.]234 port 2222 [attempted TCP connections]
- 197.90.137[.]161 port 61201 [attempted TCP connections]
- 181.84.114[.]46 port 443 [attempted TCP connections]
- 89.137.52[.]44 port 443 [attempted TCP connections]
- 76.25.142[.]196 port 443 - HTTPS traffic
- 37.252.0[.]102 port 443 - HTTPS traffic
- port 443 - www.openssl.org - HTTPS traffic [connectivity check, not inherently malicious]
- 23.111.114[.]52 port 65400 - TCP traffic
- port 443 - api.ipify.org - HTTPS traffic [IP address check, not inherently malicious]
- various IP addresses over various ports - email traffic

COBALT STRIKE TRAFFIC:

- NOTE: Cobalt Strike is spoofing the legitimate domain "ocsp.verisign.com" but using a malicious IP address at 185.106.96[.]158. That IP address is -not- related to ocsp.verisign.com, and this malicious traffic is -not- associated with VeriSign.

- DNS query for survmeter[.]live resolved to 185.106.96[.]158
- 185.106.96[.]158 port 80 - ocsp.verisign.com - GET /spfooh/cacerts.crl
- 185.106.96[.]158 port 80 - ocsp.verisign.com - GET /gscp.R/bibnhanmgppibmikaedapnnmhhfhpgeofaofbfnbdmkchjbjeapchkejfhegeeocidmcdeoalpljcneknihhcdgnlfhlhmcmlicjdhjhbcfdamcclgpnjdmchjhpikhfflloilphkdakhcdliajfkkpaejobknpmemmmcklidlhfamccmmhlcfdijoanipbgongikigocgjgfhomajacnlplhebffipeldkmlaaghflegfaagbjbnnkbklneaopd
- 185.106.96[.]158 port 80 - ocsp.verisign.com - POST /supprq/sa/dgdcdhdgdhdidadjde

COBALT STRIKE USER AGENT STRING:

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 OPR/78.0.4093.147
67 changes: 67 additions & 0 deletions 2021-10-18-IOCs-for-TR-based-Qakbot-with-Cobalt-Strike.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
2021-10-18 (MONDAY) - TR-DISTRIBUTION QAKBOT (QBOT) WITH COBALT STRIKE

REFERENCE:

- https://twitter.com/Unit42_Intel/status/1450535983146053639

NOTE:

- This Qakbot infection is attributed to the TR distribution network, as metadata in the malware is has a "TR" tag that names the infrastructure used to distribute the malware.

INFECTION CHAIN:

- email --> link --> downloaded zip archive --> extracted Excel file --> enable macros --> installer DLL for Qakbot --> Qakbot C2 --> Cobalt Strike activity

URLS FOR THE INITIAL ZIP ARCHIVE:

- hxxp://ing-play[.]com/vitaelibero/inventoreest-31247564
- hxxp://ing-play[.]com/vitaelibero/charts-3657249237.zip

URLS FOR THE INITIAL QAKBOT DLL FILES:

- hxxp://thanhanhotel[.]com/M7NvbognImhW/hnhkji.html
- hxxps://guardsociety[.]org/4TMUUI9u/hnhkji.html
- hxxp://bro.jerashfestival[.]jo/2kAlAJGc/hnhkji.html

QAKBOT C2:

- 103.143.8[.]71 port 443 - HTTPS traffic
- 37.252.0[.]102 port 443 - HTTPS traffic
- 23.111.114[.]52 port 65400 - TCP traffic

COBALT STRIKE C2:

- 213.227.154[.]159 port 443 - artysecuritybusinaudit[.]com - HTTPS traffic

ASSOCIATED MALWARE:

- SHA256 hash: 086e81e972597d576da5e7f43f12d5814c78acc5881e6bdc58e5659ee42c264f
- File size: 198,572 bytes
- File location: hxxp://ing-play[.]com/vitaelibero/charts-3657249237.zip
- File name: inventoreest-31247564.zip
- File description: Zip archive containing Excel file with macros for Qakbot

- SHA256 hash: 555d97f2052c8ab8e81698c87f3558506f81d20eeee0138cd2d2e5051a6268aa
- File size: 253,440 bytes
- File name: trend-1367022806.xls
- File description: Extracted from the above archive, Excel file with macros for Qakbot

- SHA256 hash: 511acd21f0b7ad5bf8297ad113bc5feb0a252940009e7f0588fe001a00520702
- File size: 807,518 bytes
- File location: hxxp://thanhanhotel[.]com/M7NvbognImhW/hnhkji.html
- File location: C:\Datop\test.test
- File description: Corrupt DLL file not fully downloaded, so not actually malicious

- SHA256 hash: d6b1d2ca4ea331f84bfeab5b0590c418a5f337e84a06344789530afeca1392c8
- File size: 1,583,011 bytes
- File location: hxxps://guardsociety[.]org/4TMUUI9u/hnhkji.html
- File location: C:\Datop\test1.test
- File description: Qakbot installer DLL file
- Run method: regsvr32.exe -s [filename]

- SHA256 hash: b6c7c10b2389872e1c16b8c398bb3192103ec858179ecb04c89ea93633173796
- File size: 1,583,047 bytes
- File location: hxxp://bro.jerashfestival[.]jo/2kAlAJGc/hnhkji.html
- File location: C:\Datop\test2.test
- File description: Qakbot installer DLL file
- Run method: regsvr32.exe -s [filename]
46 changes: 46 additions & 0 deletions 2021-11-03-IOCs-for-TA551-BazarLoader.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
2021-11-03 (WEDNESDAY) - TA551 (SHATHAK) BAZARLOADER INFECTION

REFERENCE:

- https://twitter.com/Unit42_Intel/status/1457839609174536196

CHAIN OF EVENTS:

- malspam --> password-protected zip attachment --> extracted Word doc --> enable macros --> BazarLoader DLL --> post-infection activity --> Cobalt Strike as follow-up malware

ASSOCIATED MALWARE:

- SHA256 hash: 981cdead74b028ee7fb081f369abfde84e1e2ab1cd54ddd3b602ec937651904d
- File size: 35,333 bytes
- File name: instrument indenture,11.03.2021.doc
- File description: TA551 Word document with macros for BazarLoader malware

- SHA256 hash: 212a0b6d8e9951707e35d84ca4d6c42523fb99102548c34b8d6b83ecb6083534
- File size: 3,366 bytes
- File location: C:\Users\Public\girlYou.hta
- File description: HTA file dropped by Word macros

- SHA256 hash: 0ee9d13ecc93f06d1f7a1a6ae5f352c67c3e2a3c6314d53e3ad400f1b29054a1
- File size: 442,495 bytes
- File location: C:\Users\Public\nextNextLike.jpg
- File description: Retrieved by .hta file, this is a DLL for BazarLoader
- Run method: regsvr32.exe [filename]

- SHA256 hash: 72ffe612b16ea8c81c1e1507b309c9452c894b4bdfc65971b7100085f41a45e9
- File size: 153,649 bytes
- File location: B899.dll
- File description: DLL for Cobalt Strike seen after the initial infection
- Run method: rundll32.exe [filename], hkyuFwDacGhvLOsGYdGaRF

HTTP URL HOSTING INSTALLER DLL:

- 45.95.11.201 port 80 - pulpfarmerd[.]com - GET /cbfsd/BlDFRsj1bsGvKdLIj/98697/7309/33451/Pg9zYLcfzirZtPtx1Pn64fLoWAIDvNPx4lclw/LaQAZSeiLYPCjjCble334/QdHhD0r/98/RDvuSh/zidem3?q=RYaTpLn2leLH6rxKG0pux1CME3RY&sid=UY8SVDRzRqZb&CWpJmycHi=iF0I26&sid=YGrkJjD4n&q=mbdtF5ziKWJczkstBlW0PBT7Ia&time=DEYO7nTt&q=EY7sl24iZtw7zTehznnCVwHt&q=G9FdCrnm6Z6yu HTTP/1.1

BAZAR C2:

- 87.120.37[.]231 port 443 - HTTPS traffic
- 31.13.195[.]145 port 443 - HTTPS traffic

COBALT STRIKE POST-INFECTION TRAFFIC:

- 192.34.109[.]19 port 1443 - introwebsites[.]com - HTTPS traffic
Loading

0 comments on commit d2d52bf

Please sign in to comment.