Exactly the same variant, with 13 flooders, VT are:
https://www.virustotal.com/en/file/c101 ... 410055879/
https://www.virustotal.com/en/file/e275 ... 409011038/
Same variant as the previously posted, with the below panel:
If you see the dropped encrypted config in the default directory:
One more drop is in the /tmp contains the parent process ID to be killed.
https://www.virustotal.com/en/file/c101 ... 410055879/
https://www.virustotal.com/en/file/e275 ... 409011038/
Same variant as the previously posted, with the below panel:
If you see the dropped encrypted config in the default directory:
Code: Select all
That is exactly the data sent during initiation protocol to the CNC:00000000 41 00 00 00 00 f4 01 00 00 32 00 00 00 e8 03 00 |A........2......|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 01 |................|
00000020 02 00 00 00 01 00 00 00 4e 2e 25 45 4e 2e 25 45 |........N.%EN.%E|
00000030 4e 2e 25 45 4e 2e 25 45 4e 2e 25 45 ff ff 01 00 |N.%EN.%EN.%E....|
00000040 00 00 00 00 00 |.....|
00000045
One more drop is in the /tmp contains the parent process ID to be killed.
Code: Select all
CNC:
$ cat /tmp/gates.note
14018
Code: Select all
sa_family=AF_INET, sin_port=htons(15555), sin_addr=inet_addr("183.56.173.50")
IPv4 225523365 0t0 TCP MMD-BANGS-YOU-GOOD.malwaremustdie.org:36345->183.56.173.50:15555 (ESTABLISHED)
Location:
183.56.173.50||4134 | 183.0.0.0/10 | CHINANET | CN | CHINATELECOM.COM.CN | CHINANET GUANGDONG PROVINCE NETWORK
Attachments
7z,pwd:infected
(349.05 KiB) Downloaded 57 times
(349.05 KiB) Downloaded 57 times