More #hagga via booking . com #malspam pdf -> js -> #originlogger
https://app.any.run/tasks/6e0e4947-fd2e-4d97-855a-a3b4cc9d819b
More #hagga via booking . com #malspam pdf -> js -> #originlogger
https://app.any.run/tasks/6e0e4947-fd2e-4d97-855a-a3b4cc9d819b
Some fresh #hagga -> #originlogger via booking . com:
https://app.any.run/tasks/d7fe276d-82e2-421c-92c5-8b0e4a9a65e5
Some fresh #hagga -> #origin logger:
https://app.any.run/tasks/c80d9e95-cd8d-4b3c-ae9c-c0daac630a74
Fresh #hagga -> #origin logger:
https://app.any.run/tasks/b8a24849-de53-42de-9624-f40a217fe626
https://app.any.run/tasks/5ab5802c-a63a-4709-a213-115260f30b1b
via http:// abodiopdate. blogspot. com/////////////////////////////////////////////////////////////atom.xml
Some fresh #hagga via:
http://adoblupdate[.blogspot.com///////////////////////////////////////////////////////////////////atom.xml
https://app.any.run/tasks/ef1a941b-9495-40ff-ad46-914e22f30236
Pretty sure this is a #hagga vbs:
https:// bitbucket .org/mounmeinlylo/rikirollin/downloads/tomPayload.vbs
Couple of months #Aggah / #Hagga threat actor was low-key.
While it is back now, a string in last stage script might explain the absence, ( maybe a heartbreak ?)
Leads to Xworm !
https://bazaar.abuse.ch/sample/836cd1dbb96268f267f46c20dec7ea50909184f8d163f418b95a3eee1271dcb4/