otx.alienvault.com
Open in
urlscan Pro
13.224.193.107
Public Scan
URL:
https://otx.alienvault.com/pulse/6144852424a73a80ade66aa3?scan=1&utm_userid=swimlanecyou&utm_medium=inproduct&utm_source=ot...
Submission: On September 17 via api from US — Scanned from DE
Submission: On September 17 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form _ngcontent-qgp-c132="" novalidate="" class="login ng-untouched ng-pristine ng-invalid" id="welcomeLoginForm-pulse-detail" __bizdiag="-695151727" __biza="WJ__">
<div _ngcontent-qgp-c132="" class="form-group"><label _ngcontent-qgp-c132="" for="id_login">Username</label><input _ngcontent-qgp-c132="" container="body" formcontrolname="login" id="id_login" name="login" placement="right" type="text"
class="form-control input-alienvault ng-untouched ng-pristine ng-invalid"><!----></div>
<div _ngcontent-qgp-c132="" class="form-group"><label _ngcontent-qgp-c132="" for="id_password">Password</label><input _ngcontent-qgp-c132="" container="body" formcontrolname="password" id="id_password" name="password" placement="right"
type="password" class="form-control input-alienvault ng-untouched ng-pristine ng-invalid"><!----></div><button _ngcontent-qgp-c132="" id="loginBtn" type="submit" class="btn btn-att disabled" disabled=""> Log in
<i _ngcontent-qgp-c132="" aria-hidden="true" class="fa fa-chevron-right smaller"></i></button>
<div _ngcontent-qgp-c132="" class="remember-checkbox"><label _ngcontent-qgp-c132=""><input _ngcontent-qgp-c132="" id="id_remember" name="remember" type="checkbox"> REMEMBER ME</label></div>
</form>
Text Content
× * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (158036) Suggest Edit Clone Embed Download Report Spam SNAKES ON A DOMAIN: AN ANALYSIS OF A PYTHON MALWARE LOADER * Created 32 minutes ago by AlienVault * Public * TLP: White Huntress recently investigated a suspicious link file persisting in a user’s startup folder. The file was named “sysmon.lnk” and looked a bit fishy. After some quick initial investigation, we found that the link was executing a malicious Python script that was used to inject a remote access Trojan (RAT) onto the system. Along the way, Huntress encountered a total of six consecutive payloads and some new offensive tooling which we found pretty interesting. Towards the end, Huntress also experimented with some custom scripts for de-obfuscating data and extracting configuration from the final RAT, resulting in some juicy indicators of compromise (IOCs) with 0 detections on VirusTotal (as of June 2021). Reference: https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader Tags: python, powershell, cobalt strike, RAT, Ursu Malware Families: Cobalt Strike - S0154 , Trojan:MSIL/Ursu Att&ck IDs: T1055 - Process Injection , T1127 - Trusted Developer Utilities Proxy Execution , T1547 - Boot or Logon Autostart Execution , T1140 - Deobfuscate/Decode Files or Information , T1102 - Web Service , T1056 - Input Capture , T1105 - Ingress Tool Transfer , T1059 - Command and Scripting Interpreter , T1566 - Phishing , T1027 - Obfuscated Files or Information , T1055.012 - Process Hollowing , T1573 - Encrypted Channel , T1562 - Impair Defenses , T1497 - Virtualization/Sandbox Evasion Endpoint Security Scan your endpoints for IOCs from this Pulse! Learn more * Indicators of Compromise (12) * Related Pulses (4) * Comments (0) * History (0) FileHash-MD5 (1)Domain (3)FileHash-SHA1 (1)FileHash-SHA256 (7) TYPES OF INDICATORS Show 10 25 50 100 entries Search: type indicator Role title Added Active related Pulses domainwindowsupdatecdn.cnSep 17, 2021, 12:08:05 PM3 domainhuugbbvuay4.cnSep 17, 2021, 12:08:05 PM3 domaingjghvga7ffgb.xyzSep 17, 2021, 12:08:05 PM5 FileHash-SHA256dd1fa3398a9cb727677501fd740d47e03f982621101cc7e6ab8dac457dca9125Sep 17, 2021, 12:08:05 PM3 FileHash-SHA2569b775dfc58b5f82645a3c3165294d51c18f82ec1b19ac8a41bb320bee92484edSep 17, 2021, 12:08:05 PM3 FileHash-SHA2564591eda045e3587a714bb11062eb258f82ee6f0637e6aa4d90f2d0b447a48ef7Sep 17, 2021, 12:08:05 PM3 FileHash-SHA2564417298524182564aed69261b6c556bdce1e5b812edc8a2addfc21998447d3c6Sep 17, 2021, 12:08:05 PM3 FileHash-SHA2563e442cda613415aedf80b8a1cfa4181bf4b85c548c043b88334e4067dd6600a6Sep 17, 2021, 12:08:05 PM3 FileHash-SHA2562ccadfc32db49e67e80089f30c81f91dfff4b20b8fc61714df9e2348542007fdSep 17, 2021, 12:08:05 PM3 FileHash-SHA256169f5dbcd664c0b4fd65233e553ff605b30e974b6b16c90a1fb03404f1b01980Sep 17, 2021, 12:08:05 PM3 SHOWING 1 TO 10 OF 12 ENTRIES 1 2 Next COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2021 AlienVault, Inc. * Legal * Status Login to Initiate Scan × * Sign Up * Log In or Username Password Log in REMEMBER ME Recover Your Password | Resend Verification Email