SHA1:
- c0895d0123a92f56db2940df44042e102b77e47d
Description
Malicious VBScript application for Windows that acts as a backdoor.
Operating routine
Downloads and executes https://asobimo[.]link/ubr.txt (6d8716cddc3ca6c8558eb4f842d81638f00f01f8), which is a PowerShell script, that prepares the system for the installation of the Trojan.BtcMine.2742 miner.
Sends a POST request to http://microduck3.duckdns[.]org:408.
Receives the following commands in response:
Command | Description |
---|---|
exc | Launch script from [argument 1] |
Sc | Write [argument 1] to %TEMP%/[argument 2] and launch it in minimized window |
Rf | Write [argument 1] to %TEMP%/ [argument 2] and launch it in hidden window |
Ren | Overwrite the current version of the script with [argument 1] |
Up | Launch payload from server using wscript.exe |
Un | Launch a script from the server with arguments containing the full path to this script and file name |
Cl | Terminate backdoor |
Mitre Matrix
Stage | Tactic |
---|---|
Execution | Command and Scripting Interpreter (T1059) Visual Basic (T1059.005) |
Command and Control | Application Layer Protocol (T1071) Web Protocols (T1071.001) DNS (T1071.004) Data Obfuscation (T1001) Protocol or Service Impersonation (T1001.003) |