abuse.ch :verified: · @abuse_ch
1232 followers · 54 posts · Server ioc.exchange

RAT dropped by Pay-Per-Install (PPI) campaign πŸ”₯

Payload URLs:
🌐 urlhaus.abuse.ch/url/2693412/
🌐 urlhaus.abuse.ch/url/2693420/

Botnet C2 domains:
πŸ“ž threatfox.abuse.ch/ioc/1143951
πŸ“ž threatfox.abuse.ch/ioc/1143952

Botnet C2 server hosted Vultr πŸ‡ΊπŸ‡Έ:
πŸ€– threatfox.abuse.ch/ioc/1143953

#netsupport #gcleaner

Last updated 1 year ago

mithrandir · @mithrandir
79 followers · 189 posts · Server defcon.social

Completed Part 3 of my personal series.

The article digs into the follow-up payloads delivered once the Update.js is executed on a victim machine.

Interestingly, I saw RAT and an unknown (to me) PowerShell C2 beacon be delivered together.

If anyone can shed more light on what the PowerShell may be, it would be much appreciated!

Big thanks to @rmceoin for help along the way.

rerednawyerg.github.io/posts/m

#socgholish #netsupport

Last updated 1 year ago

mithrandir · @mithrandir
75 followers · 180 posts · Server defcon.social

leads to RAT downloaded from --> http://wudugf[.]top/f23.svg

Credit to @rmceoin for the help getting the C2 to respond.

C2: *.nodes.gammalambdalambda.org

#socgholish #netsupport

Last updated 1 year ago

abuse.ch :verified: · @abuse_ch
564 followers · 35 posts · Server ioc.exchange

NetSupport RAT spreading through malspam πŸ“§πŸ”

JS > PS > ZIP > EXE

Payload delivery:
🌐 urlhaus.abuse.ch/host/eylulsif

Malicious JavaScript:
βš™οΈ bazaar.abuse.ch/sample/37da443

PowerShell script:
πŸ“„ bazaar.abuse.ch/sample/b0471a5

Dropped ZIP file:
πŸ—œοΈ bazaar.abuse.ch/sample/26cad4e

botnet C2:
balbalz1 .com:5222 (79.137.207.54 - AEZA GROUP πŸ‡·πŸ‡Ί)

#netsupport

Last updated 1 year ago