2020-12-03 - TA551 (Shathak) Word docs with Italian template send Ursnif (Gozi/ISFB) with Pushdo
2020-12-04 12:43:00 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:167 收藏

2020-12-03 - TA551 (SHATHAK) WORD DOCS WITH ITALIAN TEMPLATE SEND URSNIF WITH PUSHDO

ASSOCIATED FILES

NOTES:

  • All zip archives on this site are password-protected with the standard password.  If you don't know it, see the "about" page of this website.

IMAGES


Shown above:  One of the items of malspam from TA551 on 2020-12-03.


Shown above:  Screenshot from the extracted Word doc.


Shown above:  HTTP request for the installer DLL for Ursnif.


Shown above:  Notifications that popped up during the infection.


Shown above:  Traffic from an infection filtered in Wireshark (request for followup Pushdo malware marked with arrow).


Shown above:  Some some of the Pushdo traffic (also includes the HTTP POST requests from previous image.


Shown above:  HTTP request that resulted in another follow-up malware EXE on my infected host.


Shown above:  Registry updates caused by Ursnif.


Shown above:  Follow-up malware on an infected host.


Shown above:  Example of registry updates caused by Pushdo.


Shown above:  Registry updates that keep Ursnif and Pushdo persistent after a reboot.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2020/12/03/index2.html
如有侵权请联系:admin#unsafe.sh