Stef Rand · @techieStef
137 followers · 9 posts · Server infosec.exchange

All y'all know phishing season is year round, and financial/business themed phishes are always popular. Tax season makes them even more popular (if that's possible) and more likely to be effective.

Here at RC we've seen dropping using tax-themed phishing emails, so we put out a mid-month insight on it & included some spiffy guidance on how to protect against malicious script execution for any threat, not just GuLoader

redcanary.com/blog/tax-season-

Proofpoint had a nice birdsite thread on this last week as well, here's a link to their observations

twitter.com/threatinsight/stat

#GuLoader #remcos

Last updated 3 years ago

bencrypted@localhost:~$| · @bencrypted
172 followers · 66 posts · Server infosec.exchange

Activity from threat actors exploiting tax-related services is keeping at a steady stream. Last week, observed a infection hitting a public accounting firm.

⬇️Sample (encrypted): hxxps://www.dropbox[.]com/s/dl/jtz566dm5lu2c3j/SARAHKNAPP_USRETURN[.]zip
➡️Shortcut (.lnk) file is executed from%APPDATA%\local\temp\ following extraction

➡️wscript executes a dropped VBS script, and invokes a WebRequest to hxxp://0xC2[.]11808979/fresh/fordl.vbs & hxxp://0xC2[.]11808979/fresh/info.pdf. These hex encoded URIs resolve to hxxp://194.180.48[.]211/fresh/fordl.vbs and hxxp://194.180.48[.]211/fresh/info.pdf respectively.

forl.vbs performs the following:

  • Registry modification ➡ HKEY_CURRENT_USER\Unikumernes\Naturs\Spndkraft57
  • Injected into ieinstal.exe
  • Connects to URI ➡️ hxxp://194.180.48[.]211/fresh/bENSeAN192.psd to gather next stage payload, decode, & inject into legitimate process ieinstal.exe
  • Injected payload is malware

#sophos #GuLoader #remcos #threatintel

Last updated 3 years ago

bencrypted@localhost:~$| · @bencrypted
172 followers · 66 posts · Server infosec.exchange

Activity from threat actors exploiting tax-related services is keeping at a steady stream. Last week, observed a infection hitting a public accounting firm.

⬇️Sample (encrypted): hxxps://www.dropbox[.]com/s/dl/jtz566dm5lu2c3j/SARAHKNAPP_USRETURN[.]zip
➡️Shortcut (.lnk) file is executed from%APPDATA%\local\temp\ following extraction

➡️wscript executes a dropped VBS script, and invokes a WebRequest to hxxp://0xC2[.]11808979/fresh/fordl.vbs & hxxp://0xC2[.]11808979/fresh/info.pdf. These hex encoded URIs resolve to hxxp://194.180.48[.]211/fresh/fordl.vbs and hxxp://194.180.48[.]211/fresh/info.pdf respectively.

forl.vbs performs the following:

  • Registry modification ➡ HKEY_CURRENT_USER\Unikumernes\Naturs\Spndkraft57Injected into ieinstal.exe
  • Connects to URI ➡️ hxxp://194.180.48[.]211/fresh/bENSeAN192.psd to gather next stage payload, decode, & inject into legitimate process ieinstal.exe
  • Injected payload is malware#threatintel

#sophos #GuLoader #remcos

Last updated 3 years ago

bencrypted@localhost:~$| · @bencrypted
172 followers · 66 posts · Server infosec.exchange

Activity from threat actors exploiting tax-related services is keeping at a steady stream. Last week, observed a infection hitting a public accounting firm.

⬇️Sample (encrypted): hxxps://www.dropbox[.]com/s/dl/jtz566dm5lu2c3j/SARAHKNAPP_USRETURN[.]zip
➡️Shortcut (.lnk) file is executed from%APPDATA%\local\temp\ following extraction

➡️wscript executes a dropped VBS script, and invokes a WebRequest to hxxp://0xC2[.]11808979/fresh/fordl.vbs & hxxp://0xC2[.]11808979/fresh/info.pdf. These hex encoded URIs resolve to hxxp://194.180.48[.]211/fresh/fordl.vbs and hxxp://194.180.48[.]211/fresh/info.pdf respectively.

forl.vbs performs the following:

  • Registry modification ➡️HKEY_CURRENT_USER\Unikumernes\Naturs\Spndkraft57
  • Injected into ieinstal.exe
    • Connects to URI ➡️ hxxp://194.180.48[.]211/fresh/bENSeAN192.psd to gather next stage payload, decode, & inject into legitimate process ieinstal.exe
  • Injected payload is malware

#sophos #GuLoader #remcos #threatintel

Last updated 3 years ago

Today in our section on "uncoventional delivery": archives! 📦
ARJ (Archived by Robert Jung) has been around since the MS-DOS days and is occasionally used to deliver e.g. , or

You can recognize ARJ archives by their Magic: 60 EA
Extraction can be handled with 7zip for example.
For more information on the file format check out Ange Albertini's excellent graphic representation: twitter.com/angealbertini/stat

As an example we dug up a sample from last year where the delivery chain looked like this: ARJ --> RAR --> EXE
To fool the victims into opening the next file they used the common tick, e.g. .pdf.exe

IoC for those playing along at home:
162.0.223[.]13
kbfvzoboss[.]bid
alphastand[.]trade
alphastand[.]win
alphastand[.]top
➡️/alien/fre.php

PO_Payment for invoice[...].eml.arj
d0c8824d1e19ca1af0b88a477fa4cad6

SHIPPING_DL-PL-EXPRESS_EXPORT.PDF.exe
88bdf4f8fe035276da984c370e4cda2c

#malware #arj #agenttesla #formbook #GuLoader #lokibot #doubleextension #infosec #cybersecurity #blueteam

Last updated 3 years ago

Brad · @malware_traffic
2067 followers · 81 posts · Server infosec.exchange

2023-01-05 (Thursday) - malspam pushing

email --> attached .iso image --> extracted .exe --> guloader-style traffic --> Agent Tesla email data exfitration

Email available at: app.any.run/tasks/e906d78f-156

ISO available at: app.any.run/tasks/f66ff4ba-a97

Analysis of EXE available at: tria.ge/230105-28w1gsdf29

This is a -style EXE that loads an XOR-encoded binary from hxxp://savory.com[.]bd/sav/Ztvfo.png every time the infected host is logged in or rebooted.

Analysis of decoded DLL from savory.com[.]bd available at: tria.ge/230105-3xms4shc6s

#agenttesla #GuLoader

Last updated 3 years ago

Scripter ☑️ · @scripter
120 followers · 490 posts · Server social.tchncs.de

GuLoader Malware Utilizing New Techniques to Evade Security Software
thehackernews.com/2022/12/gulo

#GuLoader #malware #cybercrime

Last updated 3 years ago

Jonathan D. Abolins · @JonAbolins
18 followers · 132 posts · Server infosec.exchange

implements new evasion techniques. Checks to see if it’s running in a VM. Article from @securityaffairs securityaffairs.com/140028/cyb

#GuLoader

Last updated 3 years ago

securityaffairs · @securityaffairs
236 followers · 139 posts · Server infosec.exchange
securityaffairs · @securityaffairs
229 followers · 137 posts · Server infosec.exchange
Tarnkappe.info · @tarnkappeinfo
1531 followers · 3788 posts · Server social.tchncs.de
CIRCL (Twitter feed) · @circl
117 followers · 607 posts · Server mastodon.opencloud.lu

Malspam hitting mailboxes in Germany , distributing ->

GuLoader payload:

bazaar.abuse.ch/sample/98c39c4 …

AZORult payload URL:

urlhaus.abuse.ch/url/366085/ 

AZORult C2:

http://infosales.duckdns\.org/index.phppic.twitter.com/AC8wbTgMNV

#AZORult #GuLoader

Last updated 6 years ago