A forum for reverse engineering, OS internals and malware analysis 

Forum for completed malware requests.
 #27775  by 275751198
 Thu Jan 28, 2016 12:02 pm
My friends help me to find some sample .Thanks to 驭龙 and 轩夏
https://www.fireeye.com/blog/threat-res ... hreat.html

The spear phishing emails contained three attachments in total, each of which exploited an older vulnerability in Microsoft Office (CVE-2012-0158):
MD5 b9208a5b0504cb2283b1144fc455eaaa
Filename 使命公民運動 我們的異象.doc
MD5 ec19ed7cddf92984906325da59f75351
Filename 新聞稿及公佈.doc
MD5 6495b384748188188d09e9d5a0c401a4
Filename (代發)[采訪通知]港大校友關注組遞信行動.doc
MD5 d76261ba3b624933a6ebb5dd73758db4
Filename time.exe
This backdoor, known as LOWBALL, uses the legitimate Dropbox cloud-storage
service to act as the CnC server. It uses the Dropbox API with a hardcoded bearer access token and has the ability to download, upload, and execute files. The communication occurs via HTTPS over port 443.
After execution, the malware will use the Dropbox API to make an HTTP GET request using HTTPS over TCP port 443 for the files:
MD5 d76261ba3b624933a6ebb5dd73758db4
Filename WmiApCom
MD5 79b68cdd0044edd4fbf8067b22878644
Filename WmiApCom.bat

password infected
(79.19 KiB) Downloaded 63 times
(3.45 KiB) Downloaded 54 times