Update Analysis_29-09-2019.md

This commit is contained in:
StrangerealIntel 2019-10-01 10:21:27 +02:00 committed by GitHub
parent d432be8e86
commit 7774d0686d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,4 +1,4 @@
# Analysis about campaign of unknown phishing group (29-09-2019)
# Analysis about campaign of unknown phishing groups (29-09-2019)
## Table of Contents
* [Malware analysis](#Malware-analysis)
* [Indicators Of Compromise (IOC)](#IOC)
@ -165,6 +165,10 @@
* [TNT Collection Request BH7 297745.js](https://app.any.run/tasks/62990e45-e920-48b0-a3b3-9ce2e83f99dc)
* [BANK DETAILS CONFIRMATION_PDF.js](https://app.any.run/tasks/ec7c360a-5cd0-4cfc-b123-2f43fda77423)
* [vvvv.js](https://app.any.run/tasks/26647b54-0c71-4461-adee-765e926ab5fc)
###### Code JS backdoor
* [layer2_Bank.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_Bank.js)
* [layer2_TnT.js](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Unknown/Unknown%20phishing%20group/code/layer2_TnT.js)
###### Documents: <a name="Documents"></a>
* [Houdini Worm Transformed in New Phishing Attack - June 2019](https://cofense.com/houdini-worm-transformed-new-phishing-attack/)
* [Houdinis Magic Reappearance - October 2016](https://unit42.paloaltonetworks.com/unit42-houdinis-magic-reappearance/)