From 7774d0686d1fc86f36177a28217585dd62fa357e Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Tue, 1 Oct 2019 10:21:27 +0200 Subject: [PATCH] Update Analysis_29-09-2019.md --- Unknown/Unknown phishing group/Analysis_29-09-2019.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/Unknown/Unknown phishing group/Analysis_29-09-2019.md b/Unknown/Unknown phishing group/Analysis_29-09-2019.md index 11910b8..847c960 100644 --- a/Unknown/Unknown phishing group/Analysis_29-09-2019.md +++ b/Unknown/Unknown phishing group/Analysis_29-09-2019.md @@ -1,4 +1,4 @@ -# Analysis about campaign of unknown phishing group (29-09-2019) +# Analysis about campaign of unknown phishing groups (29-09-2019) ## Table of Contents * [Malware analysis](#Malware-analysis) * [Indicators Of Compromise (IOC)](#IOC) @@ -165,6 +165,10 @@ * [TNT Collection Request BH7 297745.js](https://app.any.run/tasks/62990e45-e920-48b0-a3b3-9ce2e83f99dc) * [BANK DETAILS CONFIRMATION_PDF.js](https://app.any.run/tasks/ec7c360a-5cd0-4cfc-b123-2f43fda77423) * [vvvv.js](https://app.any.run/tasks/26647b54-0c71-4461-adee-765e926ab5fc) +###### Code JS backdoor +* [layer2_Bank.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_Bank.js) +* [layer2_TnT.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_TnT.js) + ###### Documents: * [Houdini Worm Transformed in New Phishing Attack - June 2019](https://cofense.com/houdini-worm-transformed-new-phishing-attack/) * [Houdini’s Magic Reappearance - October 2016](https://unit42.paloaltonetworks.com/unit42-houdinis-magic-reappearance/)