Background
Since April 2018, an APT group (Blind Eagle, APT-C-36) suspected coming from South America carried out continuous targeted attacks against Colombian government institutions as well as important corporations in financial sector, petroleum industry, professional manufacturing, etc.
Till this moment, QiAnXin Threat Intelligence Center captured 29 bait documents, 62 Trojan samples and multiple related malicious domains in total. Attackers are targeting Windows platform and aiming at government institutions as well as big companies in Colombia.
The first sample being captured was in April 2018 and since that we observed a lot more related ones. Attackers like to use spear-fishing email with password protected RAR attachment to avoid being detected by the email gateway. Decryption password is provided in the mail body and inside the attachment it is a MHTML macro based document with the .doc suffix. Its purpose is to implant Imminent backdoor and gain a foothold into the target network which may make the follow up lateral movement easier to implement.
After analyzing the last modified time of the encrypted documents, character set (locale) of the MHTML files, author names used by attackers, as well as elements like geopolitics in APT attacks, QiAnXin Threat Intelligence Center suspect attackers come from South America and are in the UTC -4 time zone (or adjacent ones).
Target and Victim Analysis
After performing investigations on the classified victims, we find the attacker targets big companies and government agencies in Colombia. The purpose is to implant Imminent backdoor to gain a foothold into the target network which may make the follow up lateral movement easier to implement. Based upon victims’ backgrounds, the attacker is focusing on strategic-level intelligence and may also have motivations to steal business intelligence and intellectual properties.
Spoofed Source and Industry Distribution
Based on the statistics of the attack information collected by QiAnXin Threat Intelligence Center, the attacker disguised as Colombian national institutions to attack government agencies, financial institutions, large domestic companies and multinational corporation branches in Colombia.
Spoofed Source | Target |
Colombian National Civil Registry | INCI (Colombian National Institute for the Blind) |
National Directorate of Taxes and Customs | Ecopetrol (Colombian Petroleum Co.) Hocol (Subsidiary of Ecopetrol) Wheel manufacturer in Colombia (IMSA) Byington Colombia |
National Administrative Department of Statistics | Logistics company in Colombia (Almaviva) |
Colombian National Cyber Police | Bank in Colombia (Banco de Occidente) |
Office of the Attorney General | ATH Columbia Division Bank in Colombia (Banco de Occidente) |
Colombia Migration | Sun Chemical Columbia Branch |
Some malicious domains used by the attacker also masquerade as Colombian government websites. For example, “diangovcomuiscia.com” looks like the official one “muiscia.dian.gov.co” that belongs to the National Directorate of Taxes and Customs.
The attacker also forged the company information in the Imminent RAT:
Company Information in RAT | Company Description |
Abbott Laboratories | A healthcare company based in the United States |
Chevron | A multinational energy company in the United States |
Energizer Holdings Inc. | American battery manufacturer |
Progressive Corporation | Auto insurance provider in America |
Simon Property Group Inc | A commercial real estate company in America |
Sports Authority Inc | A sports goods retailer in the United States |
Strongeagle, Lda. | A company related to law suit in Portugal |
Affected Targets
After monitoring and correlating the APT attack, QiAnXin Threat Intelligence Center discovered multiple related emails to attack Colombian government agencies, financial institutions and large enterprises. Based upon the above work, we collected the following spear-fishing emails, bait documents and the corresponding victims.
Ecopetrol
- Information and Related Email of the Attacked Corporation
Ecopetrol, also known as Colombian Petroleum Co. (www.ecopetrol.com.co), is the largest and primary petroleum company in Colombia.
Targeted Email Attack Against Ecopetrol
- Related Bait Document
The document was disguised as originating from the National Directorate of Taxes and Customs (www.dian.gov.co):
Dian Embargo Bancario # 609776.doc
Hocol Petroleum Limited
- Information and Related Email of the Attacked Corporation
Hocol was founded in 1956. It is a subsidiary of Ecopetrol and offers hydrocarbon exploration and production services.
Targeted Email Attack Against Hocol
- Related Bait Document
The attacker pretends to come from the National Directorate of Taxes and Customs:
estado de cuenta.doc
Logistics Company (Almaviva)
- Information and Related Email of the Attacked Corporation
Almaviva is a Colombian logistics company, it optimizes the supply chain through the safe management of processes and tools to ensure the efficiency of logistics operations.
Targeted Email Attack Against Almaviva
- Related Bait Document
The attacker masquerades as the National Administrative Department of Statistics to launch the attack.
listado de funcionarios autorizados para censo nacional 2018.doc
Financial Institution (Banco Agrario)
- Information and Related Email of the Attacked Institution
The Banco Agrario is a Colombian state financial institution founded in 1999 to provide banking services in the rural sectors.
Targeted Email Attack Against Banco Agrario
- Related Bait Document
The bait document was spoofed from the Colombian National Cyber Police (caivirtual.policia.gov.co):
Reporte fraude desde su dirrecion ip.doc
Wheel Manufacturer (IMSA)
- Information and Related Email of the Attacked Corporation
IMSA is a Colombian company and a leader in wheels.
Targeted Email Attack Against IMSA
- Related Bait Document
The mail was disguised from the National Directorate of Taxes and Customs.
Dian Embargo Bancario # 609776.doc
Bank in Colombia (Banco de Occidente)
- Information and Related Email of the Attacked Bank
Banco de Occidente is one of the largest Colombian banks. It is part of the Grupo Aval conglomerate of financial services in Colombia.
Targeted Email Attack Against Banco de Occidente
- Related Bait Document
The bait document was spoofed from the Office of the Attorney General (www.fiscalia.gov.co):
Citacion Fiscalia general de la Nacion Proceso 305351T.doc
ATH Columbia Division
- Information and Related Email of the Attacked Corporation
ATH is a multinational financial institution with a branch in Colombia.
Targeted Email Attack Against ATH Columbia Branch
- Related Bait Document
The attacker pretends to come from the Office of the Attorney General (www.fiscalia.gov.co):
Fiscalia proceso 305351T.doc
Sun Chemical Columbia Branch
- Information and Related Email of the Attacked Corporation
Sun Chemical is a multinational chemical company focusing on inks, paint, etc. It also has a branch in Colombia.
Targeted Email Attack Against Sun Chemical Columbia Branch
- Related Bait Document
The bait document was spoofed from the Colombia Migration (www.migracioncolombia.gov.co):
Proceso Pendiente Migracion Colombia.doc
Byington Colombia
- Information and Related Email of the Attacked Corporation
Byington Colombia provides business credit management and information solutions. Its business credit information services include business and credit information, commercial collection, and marketing services.
Targeted Email Attack Against Byington
- Related Bait Document
The document was disguised as originating from the National Directorate of Taxes and Customs:
estado de cuenta.doc
Technical Details
QiAnXin Threat Intelligence Center conducted a detailed analysis of the attack process based on the common attack techniques used by the APT group.
The Latest Attack
On February 14, 2019, QiAnXin Threat Intelligence Center monitored attacks by the APT group again. The corresponding mail was not found by using the recently captured bait document (MD5:0c97d7f6a1835a3fe64c1c625ea109ed). However, after investigation we found another similar bait document (MD5: 3de286896c8eb68a21a6dcf7dae8ec97) and related target attack mail (MD5: f2d5cb747110b43558140c700dbf0e5e). The mail was disguised from the Colombian National Civil Registry and attacked the Colombian National Institute for the Blind.
Recently captured bait document, disguised from the Colombian National Civil Registry (MD5: 0c97d7f6a1835a3fe64c1c625ea109ed)
Email attacking the Colombian National Institute for the Blind
Spoofed Source and Detection Bypass
When attacking different targets, attackers carefully consider how to spoof the source of the message to make it look more credible. For example, by masquerading the National Civil Registry to attack the Institute for the Blind, pretending to be the Tax and Customs Administration to attack companies with international trade, disguising as the judiciary and immigration authorities against banks and multinational corporation branches located in Colombia.
The attacker also carefully constructs the content of the message to appear originating from the forged institution and relating to the target. The following picture shows the translation of the corresponding mail disguised as originating from the judiciary of Colombia to attack the ATH Colombia branch.
The email attachment is encrypted and stored in the compressed package, and a decryption password is provided in the mail body to bypass the security detection of the email gateway.
Decryption password provided in the email
After analyzing the mail, we found that the attacker used approaches such as proxy and VPN to hide its IP address when sending emails. So the sender’s real IP has not yet been obtained, only to figure out that these messages are sent through IDCs in Florida, USA. Some related IP addresses are as follows:
128.90.106.22
128.90.107.21
128.90.107.189
128.90.107.236
128.90.108.126
128.90.114.5
128.90.115.28
128.90.115.179
The Bait Document
All of the bait documents are MHTML ones with malicious macro embedded and the .doc suffix to bypass detection. Below is an example of bait document captured by QiAnXin Threat Intelligence Center in February 2019:
File Name | Registraduria Nacional - Notificacion cancelacion cedula de ciudadania.doc |
MD5 | 0c97d7f6a1835a3fe64c1c625ea109ed |
Forged Source | The Colombian National Civil Registry |
MHTML macro based document with the .doc suffix
The document is disguised from the Colombian National Civil Registry and uses Spanish to prompt the victim to enable the macro code in order to execute the subsequent payload.
When the macro code gets executed, it calls the Document_Open function automatically.
Function Document_Open first calls the Main function to download binary data from hxxp://diangovcomuiscia.com/media/a.jpg and save as %AppData%\1.exe (MD5: ef9f19525e7862fb71175c0bbfe74247).
Then calls the fcL4qOb4 function to set the scheduled task and disguise as the one used by Google:
Author | Google Inc |
Description (after translation) | This task stops the Google Telemetry Agent, that examines and uploads information about the use and errors of Google solutions when a user logs in to the system. |
Task Action | Launch %AppData%\1.exe |
Task Definition | GoogleUpdate |
The relevant code is shown below:
Payload(Imminent)
File Name | 1.exe |
MD5 | ef9f19525e7862fb71175c0bbfe74247 |
Compiler | .NET |
The backdoor payload (1.exe) get dropped out is in C# with obfuscation:
After deobfuscation you can see “Imminent Monitor” string which may indicate it is related to Imminent Monitor RAT:
When get executed, it first extracts resource named as "application" and decrypt to a legitimate lzma.dll library:
Then extract resource named as "_7z", and decompress it with lzma.dll to get the Imminent Monitor RAT (MD5: 4fd291e3319eb3433d91ee24cc39102e).
Core Component
MD5 | 4fd291e3319eb3433d91ee24cc39102e |
- Static Analysis
It is a variant of Imminent Monitor RAT while obfuscated by ConfuserEx and Eazfuscator.NET:
After partially removing the obfuscation, it can be seen that the backdoor supports below functions:
ID | Function |
bDfBqxDCINCfwSAfMnZwspLefnc | Host management |
ChatPacket | User support |
cokLfFnjBwgKtzdTpdXSgQIPacR | Registry management |
CommandPromptPacket | Remote shell |
ConnectionSocketPacket | Network transmission channel management |
ExecutePacket | Upload, download, and execute PE files |
FastTransferPacket | Fast transmission |
FilePacket | File management |
FileThumbnailGallery | Support file thumbnail library |
KeyLoggerPacket | Keylogger |
MalwareRemovalPacket | Malicious function management |
MessageBoxPacket | Chat message |
MicrophonePacket | Microphone chat |
MouseActionPacket | Mouse action |
MouseButtonPacket | Mouse button action |
NetworkStatPacket | Host network management |
PacketHeader | Packet header information |
PasswordRecoveryPacket | Browser password recovery |
PluginPacket | Plugin management |
ProcessPacket | Process management |
ProxyPacket | Proxy management |
RDPPacket | Remote desktop |
RegistryPacket | Registry operation |
RemoteDesktopPacket | Mark remote desktop package |
ScriptPacket | Execute script (html, vbs and batch) |
SpecialFolderPacket | Windows special folder |
StartupPacket | Startup operation |
TcpConnectionPacket | TCP refresh and shutdown |
ThumbnailPacket | Thumbnail related |
TransferHeader | Connection operation |
WebcamPacket | Webcam related |
WindowPacket | Window operations (refresh, maximize, minimize, etc.) |
It is consistent with the descriptions provided on the official website:
- Dynamic Debugging
The core component will check whether it is located in the %temp%\[appname] directory, otherwise it copies itself to %temp%\[appname]\[appname] and set the file attribute to hidden.
Then launch the copied file:
Finally delete the original file and exit the process:
When the copied file gets executed, it creates the Imminent directory in the %AppData% directory to save the encrypted log, network information and system information. The file will be uploaded to C2 when related command is received.
C2: mentes.publicvm.com:4050
TTPs (Tactics, Techniques, and Procedures)
QiAnXin Threat Intelligence Center summarized TTPs of the APT group as follows:
Attack Target | Colombian government agencies, large domestic corporations, and Colombian branches of multinational corporations |
Earliest Activity | April 2018 |
Risk | Remote control of computer device and data exfiltration |
Attack Approach | |
Initial Payload | MHTML macro based document with the .doc suffix |
Malicious Code | Imminent Backdoor |
Communication | Dynamic domain name |
Anti-detection capability | Medium |
Affected Platform | Windows |
Attack Tactics | 1.Compromise website in Spanish or register privacy-protected domain to store payload for delivery; 2.Spear-fishing email with password protected attachment and MHTML macro based document to bypass detection; 3.Disguised as national agencies in Colombia to attack Colombia’s government, financial institutions, large domestic companies or Colombian branches of multinational corporations; 4.Commercial Trojan Imminent is used to remotely control the target; |
Attribution
After analyzing the last modified time of the encrypted documents, character set (locale) of the MHTML files, as well as elements like geopolitics in APT attacks, QiAnXin Threat Intelligence Center suspect attackers are in the UTC -4 time zone (or adjacent ones).
The Reliable Last Modified Time
Since RAR will save the modified time of the file, the time of the document obtained after decryption is very reliable. Take password protected RAR archive (Registraduria Nacional del Estado Civil -Proceso inicado.rar) as an example, the time after decryption is the same as the left one located in the MHTML meta data (the last modified time on the right side needs to be reduced by 8 hours since we are in the UTC +8 time zone).
By comparing each last modified time of the RAR archive with the one located in the meta data, we have confidence to say that the time is not spoofed. So it makes sense to perform related statistics of all the bait documents captured.
Statistics of the Last Modified Time
All of the last modified time from the captured bait documents are shown in the table below:
UTC+00 |
00:32 |
01:15 |
01:15 |
01:17 |
01:35 |
01:59 |
02:57 |
03:28 |
04:40 |
04:55 |
05:17 |
12:27 |
12:49 |
12:50 |
13:38 |
13:42 |
13:49 |
14:21 |
14:22 |
15:19 |
15:26 |
15:30 |
15:56 |
17:22 |
17:58 |
18:31 |
20:53 |
21:31 |
23:30 |
From the above we could see that the time never distributed between 05:30 and 12:30, which supposed to be sleep hours. Combining with the fact that most of the activities are between 13:00 and 2:00, we suspect attackers are in the UTC -4 time zone (or adjacent ones).
PE Timestamp
We also performed statistics of timestamps in the dumped PE samples and figure out they are not far from the one in the bait documents:
Last Modified Time of Bait Document | Timestamp in PE Dump |
2019/2/11 17:58 | 2019/2/14 3:28 |
2018/12/3 15:30 | 2018/12/3 23:26 |
2018/11/26 18:31 | 2018/10/17 22:29 |
2018/11/15 12:49 | 2018/10/17 22:29 |
2018/11/8 14:21 | 2018/10/17 22:29 |
2018/10/26 13:49 | 2018/10/17 22:29 |
2018/10/22 17:22 | 2018/10/17 22:29 |
2018/10/12 15:56 | 2018/10/17 22:29 |
2018/10/4 5:17 | |
2018/9/13 13:42 | 2018/8/27 22:08 |
2018/9/9 0:32 | |
2018/9/2 20:53 | 2018/8/27 22:08 |
2018/8/27 15:19 | 2018/8/27 22:08 |
2018/8/6 1:35 | 2018/8/1 11:25 |
2018/8/1 2:57 | 2018/8/1 11:25 |
2018/7/31 1:59 | 2018/8/1 11:25 |
2018/7/30 1:17 | 2018/8/1 11:25 |
2018/7/26 3:28 | 2018/8/27 22:08 |
2018/7/10 4:55 | 2018/7/11 11:47 |
2018/6/19 21:31 | |
2018/6/14 1:15 | |
2018/6/14 1:15 | |
2018/5/29 13:38 | |
2018/5/18 14:22 | 2018/5/22 20:11 |
2018/4/28 12:27 | 2018/5/22 20:11 |
2018/4/25 23:30 | 2018/5/22 20:11 |
2018/4/24 12:50 | |
2018/4/17 15:26 | 2018/5/22 20:11 |
2018/4/6 4:40 |
Language and Charset
We also perform statistics on the language and charset of the bait documents (MHTML) and find they are created on Western European language environment (Spanish, etc.).
Charset:windows-1252
Some of the author information are also Spanish.
Centro de Servicios Judiciales
Attacker Profile
Based on the time zone of the attacker, the language being used, and the geopolitical factors of the APT attack, we come up with following findings:
-
The time zone (UTC -4) is related to countries in South America.
-
Most of the countries in South America use Spanish (except Brazil), which matches the attacker’s locale and user names in the bait documents.
-
APT attack could probably be carried out by neighboring countries.
-
The background of the victims and the duration of the attack indicate the attacker keeps concerned with strategic-level intelligence for a long time.
Above all, QiAnXin Threat Intelligence Center suspect the APT group probably comes from South American countries with government support.
IOC
Bait Document MD5s | File Name |
0c97d7f6a1835a3fe64c1c625ea109ed | Registraduria Nacional - Notificacion cancelacion cedula de ciudadania.doc |
16d3f85f03c72337338875a437f017b4 | estado de cuenta.doc |
27a9ca89aaa7cef1ccb12ddefa7350af | 455be8a4210b84f0e93dd96f7a0eec4ef9816d47c11e28cf7104647330a03f6d.bin |
3a255e93b193ce654a5b1c05178f7e3b | estado de cuenta.doc |
3be90f2bb307ce1f57d5285dee6b15bc | Reporte Datacredito.doc |
3de286896c8eb68a21a6dcf7dae8ec97 | egistraduria Nacional del Estado Civil -Proceso inicado.doc |
46665f9b602201f86eef6b39df618c4a | Orden de comparendo N\xc2\xb0 5098.doc |
476657db56e3199d9b56b580ea13ddc0 | Reporte Negativo como codeudor.doc |
4bbfc852774dd0a13ebe6541413160bb | listado de funcionarios autorizados para censo nacional 2018.doc |
51591a026b0962572605da4f8ecc7b1f | Orden de comparendo multa detallada.doc |
66f332ee6b6e6c63f4f94eed6fb32805 | Codigo Tarjeta Exito Regalo.doc |
688b7c8278aad4a0cc36b2af7960f32c | fotos.doc |
7fb75146bf6fba03df81bf933a7eb97d | Dian su deuda a la fecha.doc |
91cd02997b7a9b0db23f9f6377315333 | credito solicitado.doc |
9a9167abad9fcab18e02ef411922a7c3 | comparendo electronico.doc |
a91157a792de47d435df66cccd825b3f | C:\Users\kenneth.ubeda\Desktop\Migracion colombia proceso pendiente 509876.doc |
b4ab56d5feef2a35071cc70c40e03382 | Reporte fraude desde su dirrecion ip.doc |
b6691f01e6c270e6ff3bde0ad9d01fff | Dian Embargo Prima de Navidad.doc |
cbbd2b9a9dc854d9e58a15f350012cb6 | IMPORTANTE IMPORTANT.doc |
cf906422ad12fed1c64cf0a021e0f764 | Migracion colombia Proceso pendiente.doc - copia.nono.txt |
e3050e63631ccdf69322dc89bf715667 | Citacion Fiscalia general de la Nacion Proceso 305351T.doc |
ea5b820b061ff01c8da527033063a905 | Fiscalia proceso 305351T.doc |
eb2ea99918d39b90534db3986806bf0c | Proceso Pendiente Migracion Colombia (2).doc |
ecccdbb43f60c629ef034b1f401c7fee | Dian Embargo Bancario |
ee5531fb614697a70c38a9c8f6891ed6 | BoardingPass.doc |
fd436dc13e043122236915d7b03782a5 | text.doc |
bf95e540fd6e155a36b27ad04e7c8369 | Migracion colombia Proceso pendiente.mht |
ce589e5e6f09b603097f215b0fb3b738 | estado de cuenta.mht |
Payload MD5s |
0915566735968b4ea5f5dadbf7d585cc |
0a4c0d8994ab45e5e6968463333429e8 |
0e874e8859c3084f7df5fdfdce4cf5e2 |
1733079217ac6b8f1699b91abfb5d578 |
19d4a9aee1841e3aee35e115fe81b6ab |
1bc52faf563eeda4207272d8c57f27cb |
20c57c5efa39d963d3a1470c5b1e0b36 |
2d52f51831bb09c03ef6d4237df554f3 |
30ecfee4ae0ae72cf645c716bef840a0 |
3155a8d95873411cb8930b992c357ec4 |
3205464645148d393eac89d085b49afe |
352c40f10055b5c8c7e1e11a5d3d5034 |
42f6f0345d197c20aa749db1b65ee55e |
4354cb04d0ac36dab76606c326bcb187 |
43c58adee9cb4ef968bfc14816a4762b |
4daacd7f717e567e25afd46cbf0250c0 |
4e7251029eb4069ba4bf6605ee30a610 |
50064c54922a98dc1182c481e5af6dd4 |
519ece9d56d4475f0b1287c0d22ebfc2 |
53774d4cbd044b26ed09909c7f4d32b3 |
5be9be1914b4f420728a39fdb060415e |
5dee0ff120717a6123f1e9c05b5bdbc2 |
60daac2b50cb0a8bd86060d1c288cae2 |
6d1e586fbbb5e1f9fbcc31ff2fbe3c8c |
763fe5a0f9f4f90bdc0e563518469566 |
7a2d4c22005397950bcd4659dd8ec249 |
7b69e3aaba970c25b40fad29a564a0cf |
8518ad447419a4e30b7d19c62953ccaf |
8ec736a9a718877b32f113b4c917a97a |
940d7a7b6f364fbcb95a3a77eb2f44b4 |
9b3250409072ce5b4e4bc467f29102d2 |
9db2ac3c28cb34ae54508fab90a0fde7 |
a1c29db682177b252d7298fed0c18ebe |
a3f0468657e66c72f67b7867b4c03b0f |
a7cc22a454d392a89b62d779f5b0c724 |
aaf04ac5d630081210a8199680dd2d4f |
ac1988382e3bcb734b60908efa80d3a5 |
ad2c940af4c10f43a4bdb6f88a447c85 |
afb80e29c0883fbff96de4f06d7c3aca |
b0ed1d7b16dcc5456b8cf2b5f76707d6 |
b3be31800a8fe329f7d73171dd9d8fe2 |
b5887fc368cc6c6f490b4a8a4d8cc469 |
b9d9083f182d696341a54a4f3a17271f |
c654ad00856161108b90c5d0f2afbda1 |
ccf912e3887cae5195d35437e92280c4 |
d0cd207ae63850be7d0f5f9bea798fda |
df91ac31038dda3824b7258c65009808 |
e2771285fe692ee131cbc072e1e9c85d |
e2f9aabb2e7969efd71694e749093c8b |
e3dad905cecdcf49aa503c001c82940d |
e4461c579fb394c41b431b1268aadf22 |
e770a4fbada35417fb5f021353c22d55 |
e7d8f836ddba549a5e94ad09086be126 |
e9e4ded00a733fdee91ee142436242f4 |
edef2170607979246d33753792967dcf |
ef9f19525e7862fb71175c0bbfe74247 |
f1e85e3876ddb88acd07e97c417191f4 |
f2776ed4189f9c85c66dd78a94c13ca2 |
f2d81d242785ee17e7af2725562e5eae |
f3d22437fae14bcd3918d00f17362aad |
f7eb9a41fb41fa7e5b992a75879c71e7 |
f90fcf64000e8d378eec8a3965cff10a |
Malicious Domain |
ceoempresarialsas.com |
ceosas.linkpc.net |
ceoseguros.com |
diangovcomuiscia.com |
ismaboli.com |
medicosco.publicvm.com |
mentes.publicvm.com |
Malicious URL |
http://ceoempresarialsas.com/js/d.jpg |
http://ceoseguros.com/css/c.jpg |
http://ceoseguros.com/css/d.jpg |
http://diangovcomuiscia.com/media/a.jpg |
http://dianmuiscaingreso.com/css/w.jpg |
http://dianportalcomco.com/bin/w.jpg |
http://ismaboli.com/dir/i.jpg |
http://ismaboli.com/js/i.jpg |
RAR Archive MD5s | Password |
592C9B2947CA31916167386EDD0A4936 | censonacionaldepoblacion2018307421e68dd993c4a8bb9e3d5e6c066946ro |
A355597A4DD13B3F882DB243D47D57EE | documentoadjuntodian876e68dd993c4a8bb9e3d5e6c066946deudaseptiembre |
77FEC4FA8E24D580C4A3E8E58C76A297 | procesofiscalia30535120180821e68dd993c4a8bb9e3d5e6c066946se |
0E6533DDE4D850BB7254A5F3B152A623 | migracioncolombia |
F486CDF5EF6A1992E6806B677A59B22A | credito |
FECB2BB53F4B51715BE5CC95CFB8546F | 421e68dd993c4a8bb9e3d5e6c066946r |
19487E0CBFDB687538C15E1E45F9B805 | centrociberneticoenviosipfraude876e68dd993c4a8bb9e3d5e6c066946octubre |
99B258E9E06158CFA17EE235A280773A | fiscaliadocumentos421e68dd993c4a8bb9e3d5e6c066946agosto |
B6E43837F79015FD0E05C4F4B2F30FA5 | 20180709registraduria421e68dd993c4a8bb9e3d5e6c066946r |
References
[1].https://cloudblogs.microsoft.com/microsoftsecure/2018/05/10/enhancing-office-365-advanced-threat-protection-with-detonation-based-heuristics-and-machine-learning/
[2].http://www.pwncode.club/2018/09/mhtml-macro-documents-targeting.html