Introduction
Donot group, also known as APT-Q-38 within QiAnXin, is believed to have a government background in a South Asian country. This group mainly conducts network espionage activities against government agencies, defense military departments, and important figures in the business field. Victims include China, Pakistan, Sri Lanka, and other South Asian countries.
During the daily threat hunting process, the RedDrip Team of QiAnXin Threat Intelligence Center discovered that Donot's attack activities have maintained a high frequency since the end of last year, and this trend has continued until this year. At the end of January this year, we also captured attack samples [1] by this group using documents related to the Kashmir region as bait.
After combing through the recent Donot samples we captured, we found that the group 's main attack process still maintains its usual style, but attackers are also trying different malicious code implantation methods and changing the code details of attack components. Therefore, this article will provide a brief summary of Donot's recent attack techniques.
The Donot group often executes shellcode to download subsequent DLL components by carrying macros in documents. These DLLs can further download malicious components such as Trojan plugin managers and Trojan plugins. In attack samples using documents related to the Kashmir region as bait, attackers deliver downloader DLL components directly through self-extracting RAR archives. Additionally, in some attack campaigns, the Donot group also uses EXE components, which are released directly from compressed packages through macro documents, to download subsequent components.
DLL Component Implantation Methods
Macro Documents
Some of the file information for the macro document samples used by Donot are shown in the following table.
- | - | - | - | - |
---|---|---|---|---|
MD5 | Size | File Name | VT Upload Time | File Creation Time |
06adbb4ba31a52cc5c9258bf6d99812c | 144384 bytes | REQUIREMENT LIST OF SPARES.xls | 2022-11-30 12:04:38 UTC | 2021-08-09 13:30:37 UTC |
d98e2d7c8e91a9d8e87abe744f6d43f9 | 602624 bytes | Monthly Action Plan.xls | 2022-12-22 10:42:28 UTC | 2021-08-09 13:30:37 UTC |
c839d8a01c97407526b3407022823c8a | 603136 bytes | 2023-01-24 05:10:11 UTC | 2021-08-09 13:30:37 UTC | |
1c4fb7c41e7928bfb74784d910522771 | 91781 bytes | PMDU Report 8-2-23.doc | 2023-02-13 08:59:03 UTC | 2021-03-30 12:06:00 UTC |
e1d235c95a7c06b1203048972cf179fa | 69296 bytes | Cyber Security Instructions.doc | 2023-02-28 05:22:09 UTC | 2021-03-30 12:06:00 UTC |
6de75b200652eefa4a6a3bb84da7f798 | 603136 bytes | TRAINING NOMINATION.xls | 2023-03-02 04:09:53 UTC | 2021-08-09 13:30:37 UTC |
0ec8911f9764ea7b254ea19cd171535e | 87870 bytes | 2023-03-03 10:01:33 UTC | 2021-03-30 12:06:00 UTC |
From the above, it is seen that the xls and docx class documents have the same creation time respectively, indicating that these attack samples may be generated based on the same original documents.
(1) VBA
Take the above sample (MD5: d98e2d7c8e91a9d8e87abe744f6d43f9) as an example for analysis
VBA code uses a mixed case name generated with the letters ijl to obfuscate variable and function names. NtAllocateVirtualMemory is called to allocate memory. The encoded shellcode is decoded using the WideCharToMultiByte function according to the character encoding used in the document, and then the EnumUILanguages function is called to execute the shellcode. The specific shellcode executed depends on the system architecture.
(2) Shellcode
In the case of the 64-bit version of the shellcode, self-decryption is performed by taking the byte inverse and then XOR.
APIs are imported using hash, and XOR with 0xBAADC0D3 is performed during import.
The URLDownloadToCacheFileA function of the urlmon.dll module is called to download the payload, with the following URLs:
http://orangevisitorss\.buzz/QcM8y7FsH12BUbxY/XNJxFhZdMSJzq1tRyF47ZXLIdqNGRqiHQQHL6DJIjl2IoxUA.png
The downloaded payload is loaded into memory in the same way as reading a file. The decryption operation is also performed by taking the byte inverse and then XOR, and the first byte of the decrypted data is checked for verification. If the verification passes, the decrypted data is executed.
The first thing to do with the obtained second-stage shellcode is to self-decrypt by XORing the bytes, and then importing the relevant APIs. Wow64DisableWow64FsRedirection is called to disable file system redirection. GetLocalTime is used to obtain the system time. If the current time is greater than the hard-coded date, the shellcode ends its operation. As shown in the figure below, the hard-coded date is 0x7e70214, which can be decomposed into 0x07e7-0x02-0x14, and converted to decimal is 2023-02-20.
Each antivirus driver file is checked in turn to see if it exists in the "C:\Windows\System32\drivers" directory. If a certain antivirus driver exists, the value of the corresponding flag variable is determined based on whether the current date is greater than the corresponding built-in time data: if it is not later than the time data, it is assigned a value of 1, otherwise it is assigned a value of 2.
- | - |
---|---|
Name of antivirus driver file | Related vendor |
gzflt.sys | Bitdefender |
klif.sys | Kaspersky |
ehdrv.sys | ESET |
aswsp.sys | Avast |
bsfs.sys | Quick Heal |
360AvFlt.sys | 360 |
If there is no antivirus software, URLDownloadToFileA is called to download the follow-up payload, which is saved as the Unincored.dll file in the current user's temp directory, i.e. "%tmp%\Unincored.dll". The URL for the follow-up is:
http://orangevisitorss.buzz/QcM8y7FsH12BUbxY/XNJxFhZdMSJzq1tRyF47ZXLIdqNGRqiHQQHL6DJIjl2IoxUA.mp4
Open the download file and modify the first 4 bytes to "4D 5A 90 00" in order to fix the PE file header. Load the DLL with LoadLibraryA and obtain the address of the specified exported function (tripoliro) with GetProcAddress, and then call the exported function.
In the presence of anti-virus software, if the corresponding flag variable is 2, the shellcode will be terminated by executing the int3 interrupt or other instructions to trigger an interrupt or exception. If the flag variable is 1, the execution of the shellcode corresponding to some anti-virus software is consistent with that when there is no anti-virus software; however, when other anti-virus software is present, current shellcode will load bcrypt.dll and copy the subsequent shellcode into the memory mapped by bcrypt.dll for execution.
The 32-bit version of the shellcode launched by macro code is basically the same as the 64-bit version, but the URLs for downloading subsequent shellcode and DLL payloads are different.
- | - |
---|---|
Follow-up payload type | URL |
Shellcode | http://orangevisitorss.buzz/QcM8y7FsH12BUbxY/XNJxFhZdMSJzq1tRyF47ZXLIdqNGRqiHQQHL6DJIjl2IoxUA.ico |
DLL | http://orangevisitorss.buzz/QcM8y7FsH12BUbxY/XNJxFhZdMSJzq1tRyF47ZXLIdqNGRqiHQQHL6DJIjl2IoxUA.mp3 |
The SFX File
The basic information of the SFX file is as follows:
- | - |
---|---|
File name | Kashmir Solidarity Day Material .exe |
MD5 | 4eaa63dd65fc699260306c743b46303b |
File type | WinRAR SFX |
File size | 1684242 bytes |
The self-extracting file is disguised with a folder icon. After running, it is released in the temp directory. The export function of the DLL component is executed through rundll32.exe, and the folder "Kashmir" containing the compressed PDF bait document is opened.
DLL component analysis
The DLL component used by the Donot group is mostly the classic three-step process of "downloader-plugin manager-plugin", but there are also cases where the DLL component first implanted is a plugin downloader.
The Three Steps of DLL
Taking the DLL component attack process implanted by the SFX sample as an example for analysis.
(1) Downloader
The DLL information used by the downloader is as follows:
- | - |
---|---|
File name | dn2272iosUp.dll |
MD5 | 07a3c19bc67c5f44c888ce75d4147ecf |
File type | pe32 dll |
File size | 296960 bytes |
Compilation time | 2023-01-10 14:16:06 UTC |
The downloader DLL generally has two exported functions: one exported function starts another exported function by setting a scheduled task, while the other exported function reports the collected host information to the C2 server, downloads and executes the DLL component as a plugin manager.
The SFX file calls the export function StTskloipy of dn2272iosUp.dll. This function writes the current DLL file path encrypted by AES into "C:\Users[user]\AppData\Local\windin.txt". If this DLL does not exist in the temp directory of the current user, it will be copied to the temp directory. Then, another exported function, SDtuiopnhukm, is called by setting a scheduled task through the COM interface.
In addition to directly calling the COM interface, the Donot group has also used the method of releasing and executing bat files in other downloader DLLs to set scheduled tasks. The released bat file runs the schtasks command and deletes the bat file after completion.
The other exported function SDtuiopnhukm of downloader dn2272iosUp.dll first creates a mutex "olgui1Pigg" to ensure single instance operation, and creates the "C:\Users[user]\AppData\Local\Nsget" directory. It collects software information installed on the local machine through the registry.
It obtains the current username, computer name, and CPU identifier information through the cpuid instruction, and combines these three to form a victim ID. The victim ID is concatenated with the collected software information and ending identifier "|||S4", and the resulting string is encrypted with AES and encoded with Base64. The encrypted data is sent to the C2 server as the "batac" parameter of a POST request. The URL for sending information back is as follows:
https://briefdeal.buzz/Treolekomana/recopereta
If the C2 server responds, it requests to download the subsequent component WingMndre.dll. The name of the victim ID and the subsequent component are concatenated, encrypted, and sent as the "data" parameter of a POST request. The URL for downloading the subsequent DLL is as follows:
https://briefdeal.buzz/Likorecasta/mikachar
If the download is successful, WingMndre.dll is saved in the Nsget directory created earlier. The windin.txt file released by the export function StTskloipy is deleted, and a scheduled task is set to call the export function “StConectert” of WingMndre.dll. Because this scheduled task has the same name as the one set when the export function SDtuiopnhukm ("OneDriveUpdaton"), the original task's execution content is effectively modified.
A Uwn.txt file is released in the Nsget directory, its content is AES-encrypted victim ID. Then, the following formatted string is called through CreateProcessW to delete the current DLL file on the disk.
cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "%s"
(2) Plugin Manager
The subsequent component WingMndre.dll functions works as a plugin manager, with the following basic information.
- | - |
---|---|
File name | WingMndre.dll |
MD5 | d7e123fe7fb8a5f56ec9d89f7787340d |
File type | pe32 dll |
File size | 343040 bytes |
Compilation time | 2023-01-24 06:42:57 UTC |
The main part of the function sub_100112D0 called by the export function StConectert is a while loop. At the beginning of each iteration, it sends the victim ID as a beacon message to the C2 server. The victim ID is obtained from the file Uwn.txt under the Nsget directory, which is regenerated if the file does not exist. It is noteworthy that the AES key and IV used by the plugin manager to decrypt the content of Uwn.txt are the same as those used by the downloader component, while a different set of AES key and IV is used to encrypt the victim ID when sending the beacon message. The URL for sending the beacon message is:
https://repidyard.buzz/Romexicarto/terokanama
If a response message is received from the C2 server, the next step is executed; otherwise, it sleeps for 30 seconds and proceeds to the next iteration.
The response message is separated by "|" and each part represents a specific operation for a plugin component (including the plugin manager itself). A captured response message is shown below:
CKyLongD.dll>287744>0>Kystub>0|SSrtuioUpd.dll>270848>7>Stbingo>0|FoThreeDut.dll>363520>0>StNgtop>0|RRRvso.dll>164872>0>wavervs>0|WingMndre.dll>343040>40>StConectert|
The format is similar to Donot's previous attack activity [2], but this time the response message is not saved as a disk file but is processed directly in memory. Each part separated by "|" is parsed and distributed to the function sub_1000FCA0 for further processing. The specific information in each part is separated by ">" and the meanings of the first four elements are as follows:
- | - | - |
---|---|---|
Number | Meaning | Description |
1 | Component name | |
2 | Component size | Verified when downloading the corresponding component |
3 | Command code | Specific operation for the component |
4 | Export function | The exported function called when running the component |
The downloaded plugin components are saved in the directory "C:\Users[user]\AppData\Local\Nsget\Updates". The URLs for subsequent components are as follows:
https://repidyard.buzz/xoexapolicreate/ertyprmekabiops
The command code is converted from a string to an integer using stoi and then dispatched.
- | - | - |
---|---|---|
Command code | Function | Description |
0 | Disable | DLLChange a variable value related to the plugin, wait for its running state to change, and then unload the plugin DLL. |
7 | Start | Check whether the corresponding plugin exists under the Updates directory. If not, download it from the C2 server, load the plugin DLL, and call the specified export function. |
-5 (0xFFFFFFFB) | Delete | First perform the plugin disable operation, and then delete the DLL file from the Updates directory. |
-3 (0xFFFFFFFD) | Update | First perform the plugin delete operation, and then perform the plugin start operation (the plugin will be downloaded from the C2 server during start-up because it does not exist). |
41 (0x29) | Update the plugin manager | Save the new plugin manager to the Updates directory, release alex.bat, update through setting scheduled tasks, and set the loop exit flag. |
Others | None |
When updating the plugin manager, the released alex.bat is also under the Updates directory, and its content is as follows. This bat script copies the new plugin manager to the parentl directory of Updates, i.e. Nsget, deletes the original file, and deletes the scheduled task named "Windows".
Copy C:\Users\[user]\AppData\Local\Nsget\Updates\[插件名称] C:\Users\[user]\AppData\Local\Nsget
del "C:\Users\[user]\AppData\Local\Nsget\Updates\[插件名称]"
schtasks /delete /tn Windows /f
Next, set up a scheduled task named "Windows" to execute the released alex.bat.
Then set up another scheduled task named "WindowsMainHawk" to execute the export function StConectert of the new plugin manager.
After the old plugin manager exits the while loop, just like the downloader DLL, it will perform a self-deletion operation. Function sub_1000A960 calls CreateProcessA to execute the following formatted string command.
cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "%s"
(3) Plugin
We captured a plugin named SSrtuioUpd.dll from WingMndre.dll, with the following basic information.
- | - |
---|---|
File name | SSrtuioUpd.dll |
MD5 | 20c581284cccadd8b6193c2e1c84a900 |
File type | pe32 dll |
File size | 270848 bytes |
Compilation time | 2023-01-23 14:04:33 UTC |
The function of this plugin is taking screenshot and uploading, and the main logic is implemented in function sub_10006D10, with the main code as follows.
Taking screenshot is accomplished by simulating the press of the printscreen key. The captured screen image is saved in the created directory "C:\Users[user]\AppData\Local\Nsget\srt", named with a generated GUID. The screen capture data is first saved directly to the disk with the jpg extension, and then encrypted to obtain a file with the same name but with upr extension. The original jpg file is then deleted.
Then the upr file data in the srt directory is transmitted back to the C2 server, with the following URL for transmission:
https://salcomp.buzz/Terolekaremos/romeosata
Lightweight Plugin Downloader
During the sample association process, we discovered a simpler plugin downloader DLL component, which is implanted by macro documents and shellcode. The sample information is as follows.
- | - | - |
---|---|---|
MD5 | File type | Compilation time |
5e464d04b35a83d28c4e26c06eec28f5 | pe32 dll | 2022-11-22 13:39:46 UTC |
9946df6c429b83009535dca8d1a5d321 | pe64 dll | 2022-11-22 13:43:00 UTC |
The functions of the above two samples are consistent, so we will use the 32-bit version as an example to illustrate. The export function Rfvgyrty copies the sample itself to the created directory "C:\Users[user]\AppData\Local\Logo" with the name difg02rf.dll. A scheduled task is created to call another exported function of the copied DLL, rgbrgbbgr.
The other exported function rgbrgbbgr will sequentially check whether the three plugins Kyingert.dll, tr2201dcv.dll, and SSrtfgad.dll exist in the plugin storage directory "C:\ProgramData\Winstom\Dnt". If they do not exist, they will be downloaded from the C2 server, and then the St function of the plugin DLL is called to start the plugin. The URL to obtain the plugins is as follows:
https://grapehister.buzz/DoPstRgh512nexcvv.php
The functions of the three plugins are as follows:
- | - |
---|---|
Name | Function |
Kyingert.dll | Record keystroke and upload |
tr2201dcv.dll | Collect information about files with specific extensions in the Desktop, Documents, Downloads directories of the current user and send them back, including .doc, .xls, .ppt, .pdf, .rtf, etc. |
SSrtfgad.dll | Take screenshot and upload |
The URLs for the three plugins to return information are the same, as follows:
https://orangeholister.buzz/kolexretriya78ertdcxmega895200.php
Process of EXE Component Attack
Donot also uses the EXE component as a downloader to obtain the follow-up components in the attack activity. The information of related samples that have recently appeared is as follows.
- | - | - |
---|---|---|
MD5 | File name | VT upload time |
171c011571f94ea2f5c928bdf5d560dc | OUTSTANDING PAYMENTS.xls | 2023-01-19 11:30:41 UTC |
79cff3bc3cbe51e1b3fecd131b949930 | New SOPs Consular Services.xls | 2023-02-10 09:26:12 UTC |
dcac3a03c0c58b90cd4cbcc814d12847 | Visit Details.xls | 2023-02-24 09:26:00 UTC |
VBA
The VBA code in Macro Document 1 (MD5: 171c011571f94ea2f5c928bdf5d560dc) is heavily annotated. After organizing the code, it can be seen that the sample first releases pkhfg.bat, which is used to create three scheduled tasks to prepare for the execution of subsequent components.
Then, it calls the gtru_fdtr function to release the dfer.cab file.
Next, it releases the tbreah.bat file, which is responsible for extracting the downloader component dfer.exe from the dfer.cab file. This bat file is executed through the "fghru" scheduled task created above and deletes the task after execution.
The VBA code in Macro Documents 2 and 3 is similar. Therefore, Macro Document 2 (MD5: 79cff3bc3cbe51e1b3fecd131b949930) is used as an example to illustrate. Unlike the sample mentioned above, the execution timing of the macro code has changed from "Open" to "BeforeClose."
Scheduled tasks are created directly by calling the Schedule.Service interface, and no longer by releasing bat files.
After releasing the compressed file djkd.zip, it is directly decompressed the zip file in the code, and the decompressed file is renamed to the name mnvc.exe set in the scheduled task earlier. It is speculated that the attacker is trying to evade anti-virus software's scanning of the decompressed file by changing the file extension in this way.
EXE Downloader
The code of the three EXE components released by the macro documents is basically the same, with simple functionality. Their role is to download two subsequent components from C2 and control the order of downloading components through a global variable with an initial value of 1. The bat file corresponds to the file path set by the VBA code above for setting up scheduled tasks. The main code is shown below.
The information about the EXE components involved in the above macro documents is organized as follows.
- | - |
---|---|
Macro file MD5 | 171c011571f94ea2f5c928bdf5d560dc |
Downloader MD5 | a84d7a5b8831d7494ee20b939e37e56f |
Download URL 1 | https://blogs.firelive.pics/pooireoairoeeae/yuytetyur3544uyraif (Save file as C:\\Users\\Public\\Music\\aco) |
Download URL 2 | https://blogs.firelive.pics/yureyuryquyey/dskjrhekjjkdhjrae (Save file as C:\\Users\\Public\\Music\\aco.bat) |
- | - |
---|---|
Macro file MD5 | 79cff3bc3cbe51e1b3fecd131b949930 |
Downloader MD5 | 3b730afd4ed953a9031a3facf111a64e |
Download URL 1 | https://records.libutires.info/loproiaoroaspdrjro/reoriaweoprdpoi (Save file as C:\\Users\\Public\\Videos\\nota) |
Download URL 2 | https://records.libutires.info/yryerewuaoirjljrq/bcalkrhwejkarje (Save file as C:\\Users\\Public\\Videos\\nota.bat) |
- | - |
---|---|
Macro file MD5 | dcac3a03c0c58b90cd4cbcc814d12847 |
Downloader MD5 | cf646416025a84c5ef25b99dc999da9d |
Download URL 1 | https://forum.winidowtech.info/jkdegqgegcqegog/hfogrcgegdhpgdgeq (Save file as C:\\Users\\Public\\Videos\\nota) |
Download URL 2 | https://forum.winidowtech.info/jilmvldfhqohcqhog/ntbahoghbhcghqo (Save file as C:\\Users\\Public\\Videos\\nota.bat) |
Unfortunately, we did not obtain the subsequent attack samples of the above attack. The EXE component attack activity is consistent with the Donot activity disclosed by other security vendors [3]. Since last year Donot implanted malware using the method of releasing compressed packages through macro documents and has been using EXE components in this implantation process since at least September 2022.
String Encryption
Donot frequently uses various encryption methods to encrypt critical strings in PE-based attack components. In addition to simple addition or subtraction of fixed numerical values and single 01 transformations, we found that DLL components that have recently appeared often use double 01 transformations and custom multi-layer encryption to hide critical strings. Besides, attackers use two encryption methods to process different strings sometimes.
01 Transformation
In this type of encryption method, the ASCII code of the string is converted into binary and exists in the sample in the form of a 01 string. If this conversion is only performed once, it is a single 01 transformation. In the Donot sample that appeared at the end of 2022, double 01 transformations began to appear. The 01 string obtained after one round of transformation is transformed in the same way again, which means that each character of the original string needs to be represented by a 01 string with a length of 64 characters.
Customized Multi-layer Encryption
In samples that use this type of encryption method, when restoring the original string, the decrypted data is decoded in base64 and decrypted in AES. Then, the decrypted data is processed in the following order: (1) subtracting 1 byte by byte, (2) swapping the positions of every two adjacent bytes, and (3) reversing the string.
Summary
Overall, the attack techniques of the Donot group are relatively fixed, and a commonly used tactics in their attack chain is linking sequential components with scheduled tasks. However, the group is also expanding its attack process, with more diverse methods of implanting malicious components and using various types of components.
Although there have been no reports of related attacks affecting domestic users, QiAnXin's RedDrip Team would like to remind all users not to open links of unknown origin shared on social media, click on unknown email attachments, run unknown files with exaggerated titles, or install apps from non-official sources. It is also important to regularly back up important files and update software patches.
If there is a need to install an app of unknown origin, it can be first analyzed through QiAnXin Threat Intelligence Center's deep analysis platform (https://sandbox.ti.qianxin.com/sandbox/page). Currently, the deep analysis platform supports the analysis of various file formats, including those for Windows and Android platforms.
Currently, all QiAnXin products based on threat intelligence data from QiAnXin Threat Intelligence Center, including TIP, Tianqing, Tianyan Advanced Threat Detection System, QiAnXin NGSOC, and QiAnXin Situational Awareness, have supported precise detection of such attacks.
IOCs
MD5
(Macro files)
06adbb4ba31a52cc5c9258bf6d99812c
d98e2d7c8e91a9d8e87abe744f6d43f9
c839d8a01c97407526b3407022823c8a
1c4fb7c41e7928bfb74784d910522771
e1d235c95a7c06b1203048972cf179fa
6de75b200652eefa4a6a3bb84da7f798
0ec8911f9764ea7b254ea19cd171535e
171c011571f94ea2f5c928bdf5d560dc
79cff3bc3cbe51e1b3fecd131b949930
dcac3a03c0c58b90cd4cbcc814d12847
(DLL)
e46cd1c4b32355cad39b41ef3b66b659
c231254ced08ca556bf35e587469628f
5557b32672ee9ad6be20395d447a3e52
3feb4de4375dcc3ffb4144e2fc61dd94
4c0dadc4b6938dcc9ca8951d34cb2a09
d30631ba67a28a6e4ab0c4e9584e26c2
2abc60fa1e042612e723360ccd8220c6
3c6ad03f0ab284350d8b0d3d4cf22196
07a3c19bc67c5f44c888ce75d4147ecf
d7e123fe7fb8a5f56ec9d89f7787340d
20c581284cccadd8b6193c2e1c84a900
5e464d04b35a83d28c4e26c06eec28f5
9946df6c429b83009535dca8d1a5d321
ee24afbe471b5e63b06a759fa0eba0cc
7750cac1cab5e6fd9e5cadecbc3c51f6
0844b582c202dca08083d04d10bdf36e
(SFX)
4eaa63dd65fc699260306c743b46303b
(EXE)
a84d7a5b8831d7494ee20b939e37e56f
3b730afd4ed953a9031a3facf111a64e
cf646416025a84c5ef25b99dc999da9d
C2
one.localsurfer.buzz
orangevisitorss.buzz
morphylogz.buzz
crezdlack.buzz
crushter.info
monitoriing.buzz
m.seasurfer.buzz
bloggerboy.buzz
sky.ydnmovers.buzz
itygreyhound.buzz
balancelogs.buzz
mayosasa.buzz
goldliney.buzz
briefdeal.buzz
repidyard.buzz
salcomp.buzz
grapehister.buzz
orangeholister.buzz
blogs.firelive.pics
records.libutires.info
forum.winidowtech.info
URL
hxxp://one.localsurfer.buzz/jl60UwJBkaWEkCSS/MU3gLGSnHhfDHRnwhlILSB27KZaK2doaq8s9V5M2RIgpeaD8[.ico|.png|.mp3|.mp4]
hxxp://orangevisitorss.buzz/QcM8y7FsH12BUbxY/XNJxFhZdMSJzq1tRyF47ZXLIdqNGRqiHQQHL6DJIjl2IoxUA[.ico|.png|.mp3|.mp4]
hxxp://morphylogz.buzz/Ik3EIidq3fc2GGig/aFwrDmHIiBWh62kZPVb4bmV0waydPv0WtgqM0QTte5iAFzF0[.ico|.png|.mp3|.mp4]
hxxp://crezdlack.buzz/icsJOzJVtdTcGPB3/PT0w3akYLzLtd5AGs3PVEjMKJ1aO5xtfGvWbFmc4ubgXBvJO[.ico|.png|.mp3|.mp4]
hxxp://crushter.info/m4k1doWVqrvvbjsc/AOg9AQ2SVeHsiL61tkS53q02NnMToZuOb8s5yUe8jEcBxAs0[.ico|.png|.mp3|.mp4]
hxxp://monitoriing.buzz/3fHYKahOXhkVV3Uj/dqyWpAfXBcyQkTkzoamk25hn3cbTbeuhImfJO08uTOFCkhIa[.ico|.png|.mp3|.mp4]
hxxp://m.seasurfer.buzz/33lhGEeiVe57s8gY/nmEVLghL0B5dMtBiZMAgeIVniuP4bVFETWfsZqQ2jZ1bMJYd[.ico|.png|.mp3|.mp4]
hxxps://bloggerboy.buzz/zapterserty512wer/plekobakarester
hxxps://bloggerboy.buzz/zapterserty512wer/xcvderioneytr
hxxps://sky.ydnmovers.buzz/Kolpt523ytcserstrew/torel
hxxps://sky.ydnmovers.buzz/Kolpt523ytcserstrew/meoko/P/sa
hxxps://itygreyhound.buzz/Kolpt523ytcserstrew/torel
hxxps://itygreyhound.buzz/Kolpt523ytcserstrew/meoko/P/sa
hxxps://balancelogs.buzz/Kolpt523ytcserstrew/torel
hxxps://balancelogs.buzz/Kolpt523ytcserstrew/meoko/P/sa
hxxps://mayosasa.buzz/Testoresisty/kolimekatares
hxxps://mayosasa.buzz/Testoresisty/bekolopexar
hxxps://goldliney.buzz/Lomiapekaso/texadikkomanapel
hxxps://goldliney.buzz/Lomiapekaso/ertopikana
hxxps://briefdeal.buzz/Treolekomana/recopereta
hxxps://briefdeal.buzz/Likorecasta/mikachar
hxxps://repidyard.buzz/Romexicarto/terokanama
hxxps://repidyard.buzz/xoexapolicreate/ertyprmekabiops
hxxps://salcomp.buzz/Terolekaremos/romeosata
hxxps://grapehister.buzz/DoPstRgh512nexcvv.php
hxxps://orangeholister.buzz/kolexretriya78ertdcxmega895200.php
hxxps://blogs.firelive.pics/pooireoairoeeae/yuytetyur3544uyraif
hxxps://blogs.firelive.pics/yureyuryquyey/dskjrhekjjkdhjrae
hxxps://records.libutires.info/loproiaoroaspdrjro/reoriaweoprdpoi
hxxps://records.libutires.info/yryerewuaoirjljrq/bcalkrhwejkarje
hxxps://forum.winidowtech.info/jkdegqgegcqegog/hfogrcgegdhpgdgeq
hxxps://forum.winidowtech.info/jilmvldfhqohcqhog/ntbahoghbhcghqo
Reference Links
[1] https://twitter.com/RedDrip7/status/1619267505650036738
[2] https://ti.qianxin.com/blog/articles/Donot-uses-Google-Drive-to-distribute-malware/
[3] https://mp.weixin.qq.com/s/rslBGQgTL_jZD73AJqI05Q