text
stringlengths
4
429
goes
show
that
opening
attachment
exploited
vulnerability
caused
process
named
GoogleTray.exe
launch
connect
mail.hfmforum.com/microsoftupdate/getupdate/default.aspx
Related
Backdoor
Beaconing
Pattern
linking
domain
registration
information
from
some
C&Cs
observed,
were
able
determine
other
domains
used
this
malicious
actor/group.
specific
example
this
following
registration
information
observed
MSUpdater
Trojan
domain:
http://ilta.ebiz.uapps.net/ProductFiles/productfiles/782804/2011siems.pptx
2012
Zscaler
Inc.
Seculert
Ltd.
Rights
Reserved.
Figure
WHOIS
information
domains
This
contact
information
used
other
domains
that
have
some
open-
source
reports
usage,
example:
SISEAU.COM
VSSIGMA.COM
These
domains
have
open-
source
reports
tied
malware
samples
with
hashes:
3459BC37967480DEE405A5AC678B942D2
6631815D4AB2A586021C24E02E5CC4513
Communication
these
domains
also
observed
with
following
communication
path
pattern:
/search[RndNum1]?h1=[Num1]&h2=[Num2]&h3=[String1]&h4=[String2]
example:
/search521649?h1=51&h2=1&h3=N07630&h4=FKFDFDAHAEBAEPFLFK
number