Aggah: How to run a botnet without renting a Server (for more than a year) - Yoroi
Common Information
Type Value
UUID 8d0e4634-0cd0-4405-9ede-d0c4dc4c0eee
Fingerprint 2fc58836bdafc7c3
Analysis status DONE
Considered CTI value -2
Text language
Published Jan. 27, 2020, 7:09 p.m.
Added to db Sept. 26, 2022, 9:30 a.m.
Last updated Nov. 17, 2024, 6:55 p.m.
Headline Aggah: How to run a botnet without renting a Server (for more than a year)
Title Aggah: How to run a botnet without renting a Server (for more than a year) - Yoroi
Detected Hints/Tags/Attributes 66/4/31
Attributes
Details Type #Events CTI Value
Details Domain 358
pastebin.com
Details Domain 2
ixsi.run
Details Domain 2
nci.run
Details Domain 707
google.com
Details Domain 1
mvn.run
Details Domain 45
paste.ee
Details Domain 1
i9i9.run
Details Domain 1
aste.ee
Details Domain 7
fuckav.ru
Details File 1
ll.reg
Details File 10
'calc.exe
Details File 82
fre.php
Details File 47
cmstp.exe
Details sha256 1
77bbd615bc5b34ce007a82a7f365426fc1091ed7eeca3b3888d35b8242288184
Details sha256 1
b8f6cad3723d1dd2219d02f930e5cda776c124387f19f3decd867495ce614eb7
Details sha256 1
d0b5b98de820272474d86f1d8bfb9feef08eff95ea0f2968a13ab97ab1ab5b09
Details sha256 1
5081ca4672184aaa9e4afa22aec015b79038fcca7d7f8c0650727c541c3d884b
Details sha256 1
c76ad03fbc8f465dc0db25fe3fe127f8124623f52693120d54087090acc2ef3e
Details sha256 1
dc4a0f6a8ca0192b99a909ec577d2146c891cfdfb28afaa3a2dd6f6d25344cb7
Details sha256 1
fd95e72fe145f78a013dc1fbf4fe626d7801de50021f036556d32eec6a116e87
Details sha256 1
33beb97e701f4d4fac36dc11bbe3eb5fc372a232586bcea3df1d7903dfe69f25
Details sha256 1
0a6c875978b37eaed5af710e584c55c01f07ee01070486980152d63300650aab
Details IPv4 4
107.175.150.73
Details Url 1
https://paste.ee/r/zhs3s')|iex;[byte[]]$f=[microsoft.visualbasic.interaction
Details Url 1
https://paste.ee/r/fk9yh').replace('*','0x')|iex;[vroombrooomkrooom]::kekedoyouloveme('calc.exe
Details Url 1
http[://107.175.150.73/~giftioz/.cttr/fre.php
Details Windows Registry Key 1
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Pastemm
Details Yara rule 1
rule YAKKA3_Campaign_Jan_20_PPA_Macro {
	meta:
		description = "Yara Rule for Yakka3 campaign macro PPA document"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-01-23"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = { 1A 88 63 8D A9 78 43 FF }
		$a2 = { 0D 1B 43 00 1B 44 00 FB 30 1C 33 }
		$s1 = "Shell"
	condition:
		all of them
}
Details Yara rule 1
rule YAKKA3_Campaign_Jan_20_Injector_Module {
	meta:
		description = "Yara Rule for Yakka3 campaign Injector module"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-01-23"
		tlp = "white"
		category = "informational"
	strings:
		$s1 = "vroombrooomkrooom"
		$s2 = "kekedoyouloveme"
		$s3 = "WriteProcessMemory"
		$a1 = { 00 ED 08 8C 05 31 00 ED 08 43 }
	condition:
		uint16(0) == 0x5A4D and all of them
}
Details Yara rule 1
rule YAKKA3_Campaign_Jan_20_CMSTP_Bypass {
	meta:
		description = "Yara Rule for Yakka3 campaign CMSTP Bypass"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-01-23"
		tlp = "white"
		category = "informational"
	strings:
		$s1 = "cmstp.exe" ascii wide
		$s2 = "CurrentVersion" ascii wide
		$s3 = "INF" ascii wide
		$a1 = { 0A 06 8E 69 2D 06 7E 18 }
	condition:
		uint16(0) == 0x5A4D and all of them
}
Details Yara rule 1
rule YAKKA3_Campaign_Jan_20_LokiBOT_Payload {
	meta:
		description = "Yara Rule for Yakka3 campaign Loki bot Payload"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-01-23"
		tlp = "white"
		category = "informational"
	strings:
		$s1 = "Fuckav.ru" ascii wide
		$s2 = "SOFTWARE" wide
	condition:
		uint16(0) == 0x5A4D and $s1 and #s2 > 10
}