ISC diary: @malware_traffic reviews .url files and used for () infection i5c.us/d29578

#webdav #icedid #Bokbot

Last updated 1 year ago

Brad · @malware_traffic
2320 followers · 122 posts · Server infosec.exchange

Originally posted at: twitter.com/Unit42_Intel/statu

2023-02-13 (Monday) - Fake Microsoft Teams page on microsofteamsus[.]top pushing (). Page established on Thursday, 2023-02-09, likely set up for the same type of seen recently using Google Ads. IoCs available at github.com/pan-unit42/tweets/b

Sanitized/carved of the infection traffic, along with the associated malware/artifacts are now available at malware-traffic-analysis.net/2

#icedid #Bokbot #malvertising #pcap

Last updated 1 year ago

Brad · @malware_traffic
2320 followers · 122 posts · Server infosec.exchange

Originally posted at: twitter.com/Unit42_Intel/statu

2023-02-08 (Wednesday) As follow-up to an () infection, I saw a stager hosted at hxxp://167.172.154[.]189/b360802.dll with follow-up Cobalt Strike C2 on 79.132.128[.]191:443 using thefirstupd[.]com as its domain.

IoCs available at github.com/pan-unit42/tweets/b

#icedid #Bokbot #cobaltstrike

Last updated 2 years ago

Brad · @malware_traffic
2220 followers · 106 posts · Server infosec.exchange

2023-01-24 (Tuesday): Fake LibreOffice page leads to ()

GOOGLE AD:

- googleadservices.com/pagead/ac

REDIRECT:

- 188.127.239[.]132 - lirbeoflice[.]space

FAKE LIBREOFFICE PAGE:

- 46.173.218[.]229 - hxxps://libre-offlce[.]top/download/download-libreoffice/?gclid=EAIaIQobChMItt7lo9bg_AIV_m1vBB2iaQUWEAAYASAAEgKLG_D_BwE

ZIP DOWNLOAD:

- hxxps://firebasestorage.googleapis[.]com/v0/b/confident-totem-371713.appspot.com/o/GvccFO6nyT%2FSetup_Win_24-01-2023_17-01-52.zip?alt=media&token=8a605e3d-094d-40ad-9889-4638aacf6357

DOWNLOADED FILE:

- bazaar.abuse.ch/sample/ba0743d
- tria.ge/230124-v1b7saed6z
- Campaign: 3324185820
- C2: druidfenixis[.]com

ICEDID INSTALLER RETRIEVES GZIP BINARY:

- 45.61.138[.]171 port 80 - druidfenixis[.]com - GET / HTTP/1.1

ICEDID C2:

- 94.232.46[.]210 port 443 - iskopila[.]com - HTTPS traffic
- 94.232.46[.]210 port 443 - plenertakts[.]com - HTTPS traffic

#icedid #Bokbot

Last updated 2 years ago

Brad · @malware_traffic
2176 followers · 96 posts · Server infosec.exchange

Posted at: twitter.com/malware_traffic/st

2023-01-16 (Monday): An () infection I did thanks to @pr0xylife
sharing a PDF on Malware Bazaar. This one has traffic with activity, and there's too! The was too good -not- to share! Have a peek at: malware-traffic-analysis.net/2

#icedid #Bokbot #backconnect #vnc #cobaltstrike #pcap

Last updated 2 years ago

Brad · @malware_traffic
2176 followers · 96 posts · Server infosec.exchange

Posted at twitter.com/malware_traffic/st

2023-01-18 (Wednesday): Blog post with sanitized/carved files, malware samples, and IOCs from the Google ads --> fake LibreOffice site --> () infection I had earlier that led to . Have a look-see at: malware-traffic-analysis.net/2

#pcap #icedid #Bokbot #cobaltstrike

Last updated 2 years ago

Brad · @malware_traffic
2176 followers · 96 posts · Server infosec.exchange

2023-01-18 (Wednesday): seen from () infection.

Stager hosted at hxxp://64.227.8[.]75/111.exe

Cobalt Strike C2 server at 80.77.25[.]65:443 using jumptoupd[.]com as the domain. Looks like this C2 server may have been set up earlier today.

#cobaltstrike #icedid #Bokbot

Last updated 2 years ago

Myrtus · @Myrtus
619 followers · 100 posts · Server infosec.exchange

campaigns keep coming, I keep documenting 😤 campaign for the day. They took my message and actually changed things, thanks! gist.github.com/myrtus0x0/05cb

#icedid #Bokbot

Last updated 2 years ago

Brad · @malware_traffic
2141 followers · 93 posts · Server infosec.exchange

2023-01-18 (Wednesday) - Google ad --> fake Libre Office page --> ()

Fake Libre Office page at wvv-llbreofflce[.]top

Downloaded zip: bazaar.abuse.ch/sample/7fa1fbd

Extracted EXE, deflated to a reasonable file size: bazaar.abuse.ch/sample/7fa1fbd

I'm working on compiling the data and will post as I get it organized.

#icedid #Bokbot

Last updated 2 years ago

Brad · @malware_traffic
2102 followers · 86 posts · Server infosec.exchange

2023-01-12 (Thursday) - Tweet I authored for @Unit42_Intel on Twitter: twitter.com/Unit42_Intel/statu

() infection led to using fepopeguc[.]com on 185.173.34[.]36:443 for its C2 traffic.

List of indicators available at github.com/pan-unit42/tweets/b

#icedid #Bokbot #cobaltstrike

Last updated 2 years ago

Myrtus · @Myrtus
611 followers · 99 posts · Server infosec.exchange

Start your year off right with some . quite a few C2 domains involved... maybe their new years resolution is to get a respectable amount of bots :) gist.github.com/myrtus0x0/e11b

#Bokbot #icedid

Last updated 2 years ago

Brad · @malware_traffic
1901 followers · 58 posts · Server infosec.exchange

Tweet I wrote for @unit42_intel on Twitter:

2022-12-20 (Tues) - () infection led to on 23.81.246[.]152:443 using xedefeg[.]com - IoCs available at: bit.ly/3HUXess

and malware available at malware-traffic-analysis.net/2

#icedid #Bokbot #cobaltstrike #pcap

Last updated 2 years ago

Brad · @malware_traffic
1958 followers · 65 posts · Server infosec.exchange

Tweet I wrote for @unit42_intel on Twitter (twitter.com/Unit42_Intel/statu):

2022-12-20 (Tues) - () infection led to on 23.81.246[.]152:443 using xedefeg[.]com - IoCs available at: bit.ly/3HUXess

and malware available at malware-traffic-analysis.net/2

#icedid #Bokbot #cobaltstrike #pcap

Last updated 2 years ago

Brad · @malware_traffic
1632 followers · 55 posts · Server infosec.exchange

2022-12-16 (Friday) - Demo I created on a Google ad for AnyDesk leading to () malware

Created with Camtasia. See some of my previous posts this past week about the whole Google ads leading to .

youtube.com/watch?v=WtNKYYWaX-

#icedid #Bokbot

Last updated 2 years ago

Brad · @malware_traffic
1633 followers · 55 posts · Server infosec.exchange

2022-12-16 (Friday) - More malicious Google ads today pushing ()... Just in time for the weekend!

#icedid #Bokbot

Last updated 2 years ago

Myrtus · @Myrtus
537 followers · 93 posts · Server infosec.exchange

For the mastodon peeps, campaign using SEO poisoning with libreoffice:

gist.github.com/myrtus0x0/65b6

#Bokbot #icedid

Last updated 2 years ago

Brad · @malware_traffic
1633 followers · 55 posts · Server infosec.exchange

2022-12-14 (Wednesday): Follow-up on: infosec.exchange/@th3_protoCOL

() infection in my lab environment from Google ad caused by SEO-poisoned search results.

This infection chain also abusing firebasestorage.googleapis.com to host zip file containing the malicious .msi installer for IcedID

Fake anydesk page: wwwanydesk[.]top - 45.8.229[.]109:443

Example of firebasestorage URL hosting zip-ed .msi file: hxxps://firebasestorage.googleapis[.]com//v0/b/plucky-command-370814.appspot.com/o/LB3dtWopII%2FSetup_Win_14-12-2022_19-07-19.zip?alt=media&token=c729eafe-6361-4127-b4ed-21fa97b109f8 (Note: it was still delivering a zip achrive as I wrote this post).

Binary for gzip file retrieved by IcedID installer: klepdrafooip[.]com on 143.198.92[.]88:80

IcedID post-infection C2:

- primsenetwolk[.]com - 94.140.114[.]40:443
- onyxinnov[.]lol - 94.140.114[.]40:443
- trashast[.]wiki - 158.255.211[.]126:443

Saw IcedID backchannel traffic with VNC activity on 51.195.169[.]87:8080

#icedid #Bokbot

Last updated 2 years ago

Brad · @malware_traffic
1411 followers · 43 posts · Server infosec.exchange

2022-12-08 (Thursday) - Here's a screenshot of the initial traffic from my () infection today. It's in an AD environment, and it gave me VNC traffic and 3 different infections.

Two of those Cobalt Strikes had EXEs saved to disk. I already posted one of those earlier.

The other Cobalt Strike EXE came from hxxp://70.36.107[.]56/downloads/1.exe

#icedid #Bokbot #cobaltstrike

Last updated 2 years ago

Myrtus · @Myrtus
413 followers · 55 posts · Server infosec.exchange

Figured might as well start sharing some intel here as well. had a campaign today that was pretty standard for them gist.github.com/myrtus0x0/c66f.

But what I wanna talk about is the IcedID that was dropped on . Emotet has returned and one of the most interesting developments I've seen from the botnet is it dropping a new variant of the IcedID loader.

The old IcedID loader (the one used in malspam campaigns) uses cookies to exfiltrate host information. This information is used to gatekeep the final IcedID bot. If the C2 doesn't like the data exfil'd the bot wont be delivered.

This new variant though, doesn't have any of that. It downloads an encrypted file which ends up being the IcedID bot. This makes sense because the new IcedID loader is only being distributed to already infected machines so there is a higher level of trust that the malware is going to a worthy target and not just some sandbox. When I first saw all this, I thought that was the end of the differences because as far as I could tell the IcedID bot was the same.

This turned out to incorrect. There is a difference in the commands that the IcedID bot actually receives compared to standard IcedID that is delivered through malspam. This Emotet delivered IcedID gets more default commands to exfil more information. I have yet to really dig in and see why they might be doing that, but hopefully soon I'll get some time.

#icedid #Bokbot #emotet

Last updated 2 years ago