2020-12-03 - TA551 (SHATHAK) WORD DOCS WITH ITALIAN TEMPLATE SEND GOZI/ISFB (URSNIF) WITH PUSHDO

NOTICE:

ASSOCIATED FILES

 

IMAGES


Shown above:  One of the items of malspam from TA551 on 2020-12-03.

 


Shown above:  Screenshot from the extracted Word doc.

 


Shown above:  HTTP request for the installer DLL for Ursnif.

 


Shown above:  Notifications that popped up during the infection.

 


Shown above:  Traffic from an infection filtered in Wireshark (request for followup Pushdo malware marked with arrow).

 


Shown above:  Some some of the Pushdo traffic (also includes the HTTP POST requests from previous image.

 


Shown above:  HTTP request that resulted in another follow-up malware EXE on my infected host.

 


Shown above:  Registry updates caused by Ursnif.

 


Shown above:  Follow-up malware on an infected host.

 


Shown above:  Example of registry updates caused by Pushdo.

 


Shown above:  Registry updates that keep Ursnif and Pushdo persistent after a reboot.

 

Click here to return to the main page.