Update Analysis_29-09-2019.md
This commit is contained in:
parent
f9503a3b9c
commit
8810f2bd28
@ -12,8 +12,16 @@
|
||||
|
||||
## Malware analysis <a name="Malware-analysis"></a>
|
||||
### Initial vector <a name="Initial-vector"></a>
|
||||
###### The initial vector
|
||||
![alt text](link "")
|
||||
###### The initial vector is a spear phishing who usurp the brand TNT to incite the victim to download and execute the payload.
|
||||
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/mail.png "")
|
||||
###### On the JS payload, an array "tankew" is edited by a replace characters of the first layer of obfucation and execute the JS backdoor by an eval call.
|
||||
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/TNT%20layer%201.png "")
|
||||
###### The first action perform on the system is to self extract in APPDATA folder as js file and run as another instance.
|
||||
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/persistence_pay.png "")
|
||||
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/persistence.png "")
|
||||
|
||||
|
||||
|
||||
###### Liste des commands :
|
||||
|Command|Description|
|
||||
|:-------------:| :------------- |
|
||||
|
Loading…
Reference in New Issue
Block a user