奇安信威胁情报中心
Common Information
Type Value
UUID c4712b5a-1d2d-4365-848f-5e1eb7ce860f
Fingerprint bd77af52367abc7a
Analysis status DONE
Considered CTI value 2
Text language
Published Oct. 31, 2019, midnight
Added to db Jan. 16, 2023, 3:50 p.m.
Last updated Nov. 17, 2024, 6:30 p.m.
Headline UNKNOWN
Title 奇安信威胁情报中心
Detected Hints/Tags/Attributes 15/1/97
Attributes
Details Type #Events CTI Value
Details Domain 1
cloud.unite.un.org.docs-verify.com
Details Domain 1
www.ms0ffice.guest-mailclouds.com
Details Domain 1
datasectioninfo.com
Details Domain 707
google.com
Details Domain 1
microsoft.ccivde.com
Details Domain 1
mail-hostfile.com
Details Domain 1
oversea-cnki.net
Details Domain 1
blue.chinfoset.com
Details Domain 1
lion.waitnetwork.net
Details Domain 1
service-hq.com
Details Domain 1
netease.smartsystem36.com
Details Domain 1
www.morning-place.com
Details Domain 1
helpdesk-mailservice.com
Details Domain 1
netease.mail-drivecenter.com
Details Domain 208
mp.weixin.qq.com
Details Email 1
该漏洞由laginimaineb@google.com
Details File 49
nuxt.js
Details File 2
org.doc
Details File 1
20191031.pdf
Details File 1
start00.html
Details File 4
exp.html
Details File 1
exp2.html
Details File 1
d.jpg
Details File 2
e.jpg
Details File 1
下载带360a.exe
Details File 1
访问同目录下的start00.html
Details File 1
如果存在可利用的浏览器则会执行exp.html
Details File 1
判断浏览器版本和系统版本后执行exp2.html
Details File 1
np-mswmp.dll
Details File 1
在播放1.wmv
Details File 1
然后dll执行起来后会执行360a.exe
Details File 1
分别位于exp1.html
Details File 1
和exp2.html
Details File 1
其中exp1.html
Details File 1
360a.exe
Details File 1
释放svctask.exe
Details File 1
和sndvolsso.dll
Details File 2
sndvolsso.dll
Details File 1
uac起svctask.exe
Details File 1
svctask.exe
Details File 1
side-loading加载np-mswmp.dll
Details File 1
修改了正常的np-mswmp.dll
Details File 1
并运行起来360a.exe
Details File 1
主要功能为解密释放loader程序sndvolsso.dll
Details File 1
和远控主程序svctask.exe
Details File 1
uac技术通过ifileoperation的方式将sndvolsso.dll
Details File 1
实现explorer.exe
Details File 1
uac的方法运行svctask.exe
Details File 1
doil.php
Details File 1
把5个插件通过远程线程注入到进程名为svctask.exe
Details File 1
pear.dll
Details File 1
mango.dll
Details File 1
melon.dll
Details File 1
peach.dll
Details File 1
durain.dll
Details File 1
lemon.dll
Details File 2
map.php
Details File 1
daily.php
Details File 1
flight.php
Details File 1
net下载apple.exe
Details File 1
虎木槿利用该漏洞调用wscript执行v.vbs
Details File 2
filelocatorproportable.exe
Details File 1
释放恶意的sfantibot.exe
Details File 1
sfantibot.exe
Details File 1
edrtl.php
Details File 1
vmcret.exe
Details File 2
mscowlib.dll
Details File 1
360chkcloud.exe
Details md5 1
580da4e63c9e617573831127df6e02fe
Details md5 1
8962b07c12f1e8d1a0cff81b94e21538
Details md5 1
e356e764bc0f2d2807314dae322889de
Details md5 1
2c5f443b2af64be2c35ebbbc56f61ff0
Details md5 1
0e59d990a6cd93c999481c802ff83c3d
Details md5 1
2205e0119c825b8b5086e648957edf79
Details md5 1
5b63114850a148dc74cce50a36778880
Details md5 1
0782a0d6313fbb19a61d1fdc59234812
Details md5 1
29f84b0c138f0a8c3b1f6c9a43911984
Details md5 1
d2ea8a53e5db1b1d78bdc08d66bc1cf6
Details md5 1
c296fc1c0d181c2e39f4fd5a8bceb70b
Details md5 1
87b65abafbd51bbd30a5eae624401912
Details md5 1
63b80446ff4cefa9db70f6cdffaa6a05
Details md5 1
aef737cc72ac492ae54cf916cd60b7c1
Details md5 1
2353c6bc28050fc95ceca63ef608bca8
Details md5 1
fe39b7713f040e839f54edc42af7b63a
Details IPv4 1
190.2.147.128
Details IPv4 1
194.88.107.34
Details IPv4 1
193.9.113.180
Details IPv4 1
88.150.227.110
Details IPv4 1
141.255.160.250
Details IPv4 1
62.112.8.79
Details Url 1
https://www\.google\.com/url?q=http://\{domain\}/index\.php?addr=xxx&rc=xxx&source=gmail&ust=xxx&usg=xxx
Details Url 1
http://dict\.xxxxx\.com/appapi/redirect?module=compose\.composemodule&ampamp;redirecturl=http://oversea\-cnki\[\.\]net/ccps/20191031\.pdf
Details Url 1
http://datasectioninfo.com/ccps/20191031.pdf
Details Url 1
http://190.2.147.128/sangfor/cloud/edrtl.php
Details Url 1
http://62.112.8.79/images/png/p
Details Url 1
http://190.2.147.128/360-cloud/chk
Details Url 1
https://mp.weixin.qq.com/s/bizr4gamnqmrdomw1uppnw