2017-04-28 - COREBOT INFECTION

NOTICE:

ASSOCIATED FILES:

  • 2017-04-28-Corebot-infection-traffic.pcap   (599,140 bytes)
  • 2017-04-28-UPS-themed-Corebot-malspam-100129-UTC.eml   (3,482 bytes)
  • 2017-04-28-UPS-themed-Corebot-malspam-100140-UTC.eml   (3,531 bytes)
  • H6902644376.js   (3,061 bytes)
  • H6902644376.rar   (1,298 bytes)
  • last.conf   (7,545 bytes)
  • rad7DAC6.tmp.exe   (366,434 bytes)

NOTES:


Shown above:  Screen shot of @mesa_matt's tweet.

 

EMAIL


Shown above:  Screen shot of the email.

 

EMAIL HEADERS:

 


Shown above:  Malicious attachment from the malspam is a RAR archive containing a .js downloader.

 

TRAFFIC


Shown above:  Traffic from the Corebot infection filtered in Wireshark.

 

ASSOCIATED TRAFFIC:

 


Shown above:  TCP stream of an HTTP request for a Windows executable for Corebot.

 


Shown above:  Certificate data from the Corebot C2 traffic.

 


Shown above:  IP address check by the infected Windows host.

 

FILE HASHES

EMAIL ATTACHMENT:

ARTIFACTS FROM THE INFECTED WINDOWS HOST:

WINDOWS REGISTRY UPDATE:

 

IMAGES


Shown above:  Some alerts on the traffic from the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion.

 


Shown above:  Alerts after reading the pcap with Snort 2.9.9.0 on Debian 7 using the Snort Subscriber ruleset.

 


Shown above:  Corebot malware persistent on the infected Windows host.

 


Shown above:  Configuration file for Corebot.

 

Click here to return to the main page.