Analysis file.7z (MD5: A9A66A3B12E85D74D71D5F9677CD3601) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Analysis lnvoice-1445766252.pdf.js (MD5: 258B1E8DE4924787FB4032649A9ACD49) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Analysis lnvoice_1373246817.pdf (MD5: CAC599EFFEC2E9547357835415855BFF) No threats detected - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Analysis lnvoice-1578246817.js (MD5: 6C184AF6956751FD1F4861A06936F775) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Fresh #hagga -> #origin logger:

https://app.any.run/tasks/b8a24849-de53-42de-9624-f40a217fe626

https://app.any.run/tasks/5ab5802c-a63a-4709-a213-115260f30b1b

via http:// abodiopdate. blogspot. com/////////////////////////////////////////////////////////////atom.xml

Analysis lnvoice#20336 .vbs (MD5: 8280D77F1FE4F3AD7E067180F6CF1AD9) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Some fresh #hagga via:

http://adoblupdate[.blogspot.com///////////////////////////////////////////////////////////////////atom.xml

https://app.any.run/tasks/ef1a941b-9495-40ff-ad46-914e22f30236

#origin #logger

Analysis lnvoice#50449~Pdf.vbs (MD5: 76CB444A99DDAB3E56B9677094B65EF9) Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Pretty sure this is a #hagga vbs:

https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs

New post about #APT-C-36 #Hagga covering a detailed view of the infection of the last campaigns. From #NjRAT to #LimeRAT deployment.

https://lab52.io/blog/apt-c-36-from-njrat-to-apt-c-36/

APT-C-36: from NjRAT to LimeRAT

Couple of months #Aggah / #Hagga threat actor was low-key.
While it is back now, a string in last stage script might explain the absence, ( maybe a heartbreak ?)

Leads to Xworm !

https://bazaar.abuse.ch/sample/836cd1dbb96268f267f46c20dec7ea50909184f8d163f418b95a3eee1271dcb4/

#Malware #Cybersecurity #Infosec

MalwareBazaar | Checking your browser