Report settimanale delle campagne italiane di malspam a cura del C.R.A.M. di TG Soft. Di seguito i dettagli delle campagne diffuse in modo massivo nella settimana appena trascorsa dal 02 novembre 2019 al 08 novembre 2019: Ursnif, Emotet, Remcos, HawkEye, PWStealer, LokiBot, Adwind |
INDICE==> 04 novembre 2019 => HawkEye, Emotet, Ursnif==> 05 novembre 2019 => Emotet, Remcos ==> 06 novembre 2019 => Emotet - PWStealer ==> 07 novembre 2019 => Emotet - LokiBot - PWStealer - Ursnif ==> 08 novembre 2019 => Emotet - PWStealer - Adwind - LokiBot ==> Consulta le campagne del mese di Ottobre |
Elenco di spedizione_00000233473.exe
MD5: cb13b75a754e6cb60f99333e9eb2ed82
Dimensione: 2028544 Bytes
VirIT: Trojan.Win32.Genus.BUL
IOC:
cb13b75a754e6cb60f99333e9eb2ed82
DATI_2019_T_6127051.doc
MD5: e8bac745a415fd03c5bde25c362b2251
Dimensione: 166383 Bytes
VirIT: W97M.Downloader.BUL
termscalar.exe
MD5: 5ff32c3abffdd9d17b7a9b41aad9a93d
Dimensione: 340006 Bytes
VirIT: Trojan.Win32.Emotet.BUO
IOC:
e8bac745a415fd03c5bde25c362b2251
5ff32c3abffdd9d17b7a9b41aad9a93d
p://76.69.29[.]42
51.254.218[.]210
239.255.255[.]250
Ft_0022000358_001_008970.xls
MD5: 9fd28d08497495bacf1959240ca67a4f
Dimensione: 6400 Bytes
VirIT: X97M.Downloader.HV
IOC:
9fd28d08497495bacf1959240ca67a4f
info_11_07.doc
MD5: 67623a86d3daa99ae7b2d8e893c2b57c
Dimensione: 100155 Bytes
VirIT: W97M.Downloader.BUR
953.exe
MD5: 4af0359319f4fbb7f5e2573f12d4b4f5
Dimensione: 309248 Bytes
VirIT: Trojan.Win32.Ursnif.BUR
IOC:
67623a86d3daa99ae7b2d8e893c2b57c
4af0359319f4fbb7f5e2573f12d4b4f5
83.166.240[.]86
216.58.206[.]46
216.58.206[.]68
152.199.19[.]161
93.184.220[.]29
t6kamillemoshe[.]com
194.87.144[.]66
137.117.243[.]30
93.184.220[.]29
SPEDIZIONE UPS_pdf.exe
MD5: b796ccb5c71056003b1a1f97a7fa53d3
Dimensione: 581632 Bytes
VirIT: Trojan.Win32.Genus.BUT
IOC:
b796ccb5c71056003b1a1f97a7fa53d3
Invoice11-08-2019-PDF.jar
MD5: 3c371193b871e17000e6172d2dffdc1a
Dimensione: 511448
VirIT: Trojan.Java.Adwind.BUU
Retrive557713677600779021.vbs
MD5: a32c109297ed1ca155598cd295c26611
Dimensione: 281
VirIT: Trojan.VBS.Agent.AU
0.00277072144636125733599132884258641873.class
MD5: 781fb531354d6f291f1ccab48da6d39f
Dimensione: 247088 Bytes
VirIT: Trojan.Java.Agent.IKB
p://jbond[.]sytes[.]net
SWIFT.exe
MD5: 3d99134fadbad1a390264c02088c40fa
Dimensione: 1138688 Bytes
VirIT: Trojan.Win32.Genus.BUU
The necessary cookies help make the website usable by enabling basic functions such as page navigation. The website cannot function properly without these cookies.
Cookie necessary to make certain specific contents usable such as: access to protected areas of the site, sending requests or subscribing to newsletters. The specific features of these sections will not be usable without this cookie.