diff --git a/Pakistan/APT/Gorgon/23-08-19/Malware analysis 25-08-19.md b/Pakistan/APT/Gorgon/23-08-19/Malware analysis 25-08-19.md new file mode 100644 index 0000000..387f4f9 --- /dev/null +++ b/Pakistan/APT/Gorgon/23-08-19/Malware analysis 25-08-19.md @@ -0,0 +1,50 @@ +# Malware analysis on Gorgon APT campaign (23-08-19) +## Table of Contents +* [Malware analysis](#Malware-analysis) + + [Initial vector](#Initial-vector) + + [First stage](#First) + + [Second stage](#Second) + + [Cyber kill chain](#Cyber-kill-chain) +* [Cyber Threat Intel](#Cyber-Threat-Intel) +* [IOC](#IOC) +* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK) +* [Links](#Links) + + [Original Tweet](#Original-Tweet) + + [Link Anyrun](#Links-Anyrun) + + [Ref previous analysis](#Documents) + +## Malware-analysis +### Initial vector +###### Use a document with a macro as initial vector. On the code of the macro, some functions with differents names are used with the same code inside for obfuscate and make more harder the analysis. +![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Pakistan/APT/Gorgon/23-08-19/Images/Macro/Samefunctions.PNG "") +###### Use in more at the function, strReverse for reverse the data. Finally, combine it and execute it with a Shell request. +![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Pakistan/APT/Gorgon/23-08-19/Images/Macro/macroCode.png "") +###### This use mshta command for download and execute the external content. The bitly URL go on the pastebin share and is the first stage. +### First stage + +## References MITRE ATT&CK Matrix +###### List of all the references with MITRE ATT&CK Matrix + +|Enterprise tactics|Technics used|Ref URL| +| :---------------: |:-------------| :------------- | +||| +||| +||| +||| +## Indicators Of Compromise (IOC) + +###### List of all the Indicators Of Compromise (IOC) +| Indicator | Description| +| ------------- |:-------------| +||| +||IP C2| +|http[:]//|URL request| +||Domain C2| + +###### This can be exported as JSON format [Export in JSON]() + +## Links + +* Original tweet: https://twitter.com/Rmy_Reserve/status/1164405054746460161 +* Anyrun Link: [IMG76329797.xls](https://app.any.run/tasks/3cff3642-1d54-4a66-8f0d-256f0065479b) +* Docs : [Gorgon analysis by Unit42](https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/)