Malware Execution Method Using DNS TXT Record - ASEC BLOG
Common Information
Type Value
UUID 2898e87b-c791-4cd7-a021-c7b60a731bb9
Fingerprint a4862dc789f48484
Analysis status DONE
Considered CTI value 2
Text language
Published June 30, 2023, 8 a.m.
Added to db June 30, 2023, 2 a.m.
Last updated Nov. 17, 2024, 6:55 p.m.
Headline Malware Execution Method Using DNS TXT Record
Title Malware Execution Method Using DNS TXT Record - ASEC BLOG
Detected Hints/Tags/Attributes 39/2/24
Source URLs
RSS Feed
Attributes
Details Type #Events CTI Value
Details Domain 2
abena-dk.cam
Details Domain 2
calc.abena-dk.cam
Details Domain 2
blessed.abena-dk.cam
Details Domain 2
methew.abena-dk.cam
Details Domain 78
bitbucket.org
Details File 312
calc.exe
Details File 2
methewpayload.js
Details File 3
meth.js
Details File 376
wscript.exe
Details File 4
injector.c4
Details File 2
blessed_payload.js
Details File 2
test_payload.vbs
Details File 2
rumpe_js.txt
Details md5 2
f6b8a4c6ed15a1a17896797ce3fe2440
Details md5 2
4a647e9baffe95acb9e2ec989b23808b
Details md5 3
2a59f2a51b96d9364e10182a063d9bec
Details Url 2
http://abena-dk.cam
Details Url 2
http://calc.abena-dk.cam
Details Url 2
http://blessed.abena-dk.cam
Details Url 2
http://methew.abena-dk.cam
Details Url 2
https://bitbucket.org/mounmeinlylo/rikirollin/downloads/methewpayload.js
Details Url 2
https://bitbucket.org/mounmeinlylo/rikirollin/downloads/blessed_payload.js
Details Url 2
https://bitbucket.org/mounmeinlylo/rikirollin/downloads/test_payload.vbs
Details Url 2
https://firebasestorage.googleapis.com/v0/b/fir-8c14f.appspot.com/o/rumpe_js.txt?alt=media&token=0ebb3747