A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #28770  by xors
 Sat Jun 25, 2016 10:18 am
From hxxp://213.186.33.4/3n72h
Attachments
Password:infected
(144.23 KiB) Downloaded 83 times
 #28776  by xors
 Tue Jun 28, 2016 12:52 pm
From hxxp://staffsolut.nichost.ru/jwz8i9
Attachments
password:infected
(178.28 KiB) Downloaded 84 times
 #28798  by xors
 Sat Jul 02, 2016 9:52 am
From hxxp:techproconsult.com/m2q3u
Attachments
password:infected
(178.23 KiB) Downloaded 79 times
 #28809  by xors
 Mon Jul 04, 2016 1:25 pm
Not sure if they changed anything but i found the following sample on hybrid analysis.

https://www.hybrid-analysis.com/sample/ ... mentId=100

The unpacking process and the execution of the malware is not the same ( compared to the latest campaigns, Also it doesn't need any arguments to run).

https://malwr.com/analysis/MGZkYTg0OTI4 ... NjNjMwNTY/ (the unpacked)
Attachments
password:infected
(282.42 KiB) Downloaded 78 times
 #28810  by Antelox
 Mon Jul 04, 2016 3:12 pm
xors wrote:Not sure if they changed anything but i found the following sample on hybrid analysis.

https://www.hybrid-analysis.com/sample/ ... mentId=100

The unpacking process and the execution of the malware is not the same ( compared to the latest campaigns, Also it doesn't need any arguments to run).

https://malwr.com/analysis/MGZkYTg0OTI4 ... NjNjMwNTY/ (the unpacked)
Yep it's different, hollowing process there. BTW should be Locky affid=3, maybe for this.

BR,

Antelox
 #28816  by xors
 Tue Jul 05, 2016 9:12 pm
From hxxp://209.222.76.36/98uhnvcx4x

The packed file looks different compared to the previous one. However, the unpacking process remains the same.
Attachments
password:infected
(237.37 KiB) Downloaded 80 times
 #28830  by tim
 Thu Jul 07, 2016 1:12 pm
This uses the ".zepto" extension instead of ".locky". Im not saying this isnt locky as bindiff shows it has a significant amount of similarities. Looking back over my data i havent seen the .locky version since the 27th of June. Anyway here is the config which is stored exactly the same way:
Code: Select all
{
    "delay": 42,
    "installPersistence": false,
    "fakeSvchost": false,
    "seed": 9577,
    "campaignId": 3,
    "urlPath": "/upload/_dispatch.php",
    "ignoreRussian": true,
    "ips": [
        "51.255.172.55",
        "146.120.110.130"
    ]
}
 #28843  by xors
 Fri Jul 08, 2016 11:25 am
From hxxp://122.147.183.55/87yg5fd5
Attachments
password:infected
(267.03 KiB) Downloaded 78 times
 #28855  by xors
 Sun Jul 10, 2016 10:12 pm
In the attachment
Attachments
password:infected
(280.89 KiB) Downloaded 76 times
  • 1
  • 4
  • 5
  • 6
  • 7
  • 8
  • 15