diff --git a/Unknown/Unknown phishing group/Analysis_29-09-2019.md b/Unknown/Unknown phishing group/Analysis_29-09-2019.md index 11910b8..847c960 100644 --- a/Unknown/Unknown phishing group/Analysis_29-09-2019.md +++ b/Unknown/Unknown phishing group/Analysis_29-09-2019.md @@ -1,4 +1,4 @@ -# Analysis about campaign of unknown phishing group (29-09-2019) +# Analysis about campaign of unknown phishing groups (29-09-2019) ## Table of Contents * [Malware analysis](#Malware-analysis) * [Indicators Of Compromise (IOC)](#IOC) @@ -165,6 +165,10 @@ * [TNT Collection Request BH7 297745.js](https://app.any.run/tasks/62990e45-e920-48b0-a3b3-9ce2e83f99dc) * [BANK DETAILS CONFIRMATION_PDF.js](https://app.any.run/tasks/ec7c360a-5cd0-4cfc-b123-2f43fda77423) * [vvvv.js](https://app.any.run/tasks/26647b54-0c71-4461-adee-765e926ab5fc) +###### Code JS backdoor +* [layer2_Bank.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_Bank.js) +* [layer2_TnT.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_TnT.js) + ###### Documents: * [Houdini Worm Transformed in New Phishing Attack - June 2019](https://cofense.com/houdini-worm-transformed-new-phishing-attack/) * [Houdini’s Magic Reappearance - October 2016](https://unit42.paloaltonetworks.com/unit42-houdinis-magic-reappearance/)