Update Analysis_29-09-2019.md
This commit is contained in:
parent
f9503a3b9c
commit
8810f2bd28
@ -12,8 +12,16 @@
|
|||||||
|
|
||||||
## Malware analysis <a name="Malware-analysis"></a>
|
## Malware analysis <a name="Malware-analysis"></a>
|
||||||
### Initial vector <a name="Initial-vector"></a>
|
### Initial vector <a name="Initial-vector"></a>
|
||||||
###### The initial vector
|
###### The initial vector is a spear phishing who usurp the brand TNT to incite the victim to download and execute the payload.
|
||||||
![alt text](link "")
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/mail.png "")
|
||||||
|
###### On the JS payload, an array "tankew" is edited by a replace characters of the first layer of obfucation and execute the JS backdoor by an eval call.
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/TNT%20layer%201.png "")
|
||||||
|
###### The first action perform on the system is to self extract in APPDATA folder as js file and run as another instance.
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/persistence_pay.png "")
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Unknown/Unknown%20phishing%20group/Images/TNT/persistence.png "")
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
###### Liste des commands :
|
###### Liste des commands :
|
||||||
|Command|Description|
|
|Command|Description|
|
||||||
|:-------------:| :------------- |
|
|:-------------:| :------------- |
|
||||||
|
Loading…
Reference in New Issue
Block a user