-
三个感染链导致在域 elfinindia[.]com 上托管相同的有效负载。 -
感染链如下所示,其中一个存档文件包含一个分别伪装成 DOCX、PNG 和 PDF 的恶意快捷方式 (LNK) 文件。LNK 文件触发 MSHTA 在此域上执行远程 HTA 文件。
图 1 – 感染过程
IOC
Archive
05eb7152bc79936bea431a4d8c97fb7b
Personal.zip
4c926c0081f7d2bf6fc718e1969b05be
Performa’s feedback.zip
db49c75c40951617c4025678eb0abe90
Asigma dated 22 May 23.zip
LNK
1afc64e248b3e6e675fa31d516f0ee63
pessonal pic.png.lnk
49f3f2e28b9e284b4898fafa452322c0
Performa’s feedback.docx.lnk
becbf20da475d21e2eba3b1fe48148eb
Asigma dated 22 May 23 .pdf.lnk
HTA
FCD0CD0E8F9E837CE40846457815CFC9
xml.hta
BEC31F7EDC2032CF1B25EB19AAE23032
d.hta (Chain-1)
C808F7C2C8B88C92ABF095F10AFAE803
d.hta (Chain-2)
4559EF3F2D05AA31F017C02ABBE46FCB
d.hta (Chain-3)
F20267EC56D865008BA073DB494DB05E
Auto_tcp.hta
4F8D22C965DFB1A6A19B8DB202A24717
Auto_tcp.hta
DLL
86D4046E17D7191F7198D506F06B7854
preBotHta.dll (Stage-1)
28B35C143CF63CA2939FB62229D31D71
preBotHta.dll (Stage-2) (New RAT)
582C0913E00C0D95B5541F4F79F6EDD5
preBotHta.dll (Stage-3)
8f670928bc503b6db60fb8f12e22916e
DUser.dll (Action RAT)
13D4E8754FEF340CF3CF4F5A68AC9CDD
DUser.dll (Action RAT)
5D5B1AFF4CBE03602DF102DF8262F565
DUser.dll (Action RAT)
BAT
D95A685F12B39484D64C58EB9867E751
test.bat
BDA677D18E98D141BAB6C7BABD5ABD2B
test.bat
Others
5580052F2109E9A56A77A83587D7D6E2
d.txt
E5D3F3D0F26A9596DA76D7F2463E611B
h.txt
Domain
Hosted Malicious files
IP
:
8080
:
9813
:
9467
:
9467
C2
URL
hxxps
:
//elfinindia[.]com/wp-includes/files/
hxxps
:
//elfinindia[.]com/wp-includes/files/pictures/personal/Personal.zip
hxxps
:
//elfinindia[.]com/wp-includes/files/pictures/man/d.hta
hxxps
:
//elfinindia[.]com/wp-includes/files/man/d.hta
hxxps
:
//elfinindia[.]com/wp-includes/files/fa/d.hta
hxxps
:
//elfinindia[.]com/wp-includes/files/oth/hl/h.txt
hxxps
:
//elfinindia[.]com/wp-includes/files/oth/dl/d.txt
hxxps
:
//elfinindia[.]com/wp-includes/files/oth/av/
PDB
E
:
PackersCyberLinkLatest SourceMultithread Protocol Architectureside projectsFirst StageHTTP Arsenal MainClinetappReleaseapp.pdb
EXE
(Legitimate)
9B726550E4C82BBEB045150E75FEE720
cdrzip.exe / cridviz.exe
Decoy
Files
C5C2D8EB9F359E33C4F487F0D938C90C
Invitation Performa vis a vis feedback.docx
2461F858671CBFFDF9088FA7E955F400
myPic.jpeg
D77C15419409B315AC4E1CFAF9A02C87
2696 – 22 May 23.pdf
原文始发于微信公众号(Ots安全):【威胁情报】双重行动、三重感染和新 RAT:SideCopy 持续瞄准印度国防
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论