Posts

Showing posts from November, 2019

New Pyrogenic JAR-Based Malware Campaign - Indicators of Compromise

Image
A new JAR-based phishing campaign has been seen delivered to Australian companies with the intent of credential stealing Office 365 account passwords as well as passwords stored in the browser. This campaign appears to have first occurred late September 2019 - November 2019. Initial Infection This campaign is delivered via a phishing email to corporate account users with an image of a PDF file which contains an embedded hyperlink If a user clicks on the image of the PDF they are taken to the first C2 domain - in this instance it was to https://caygionghocviennongnghiep1.com/FRA.html which resulted in a download of the malicious JAR file 'BankPaymAdviceVend_LLCRep.jar' to the downloads folder: User interaction is then required in order to execute the malware. Once execution occurs, the following process chain occurs where javaw.exe is spawned. The javaw.exe process is stopped in memory and two DLLs are dropped into the AppData/Local/TEMP folder, loaded and then de