ÐÂÐÍÀÕË÷²¡¶¾VIBOROT°²È«¹«¸æ

°ä²¼¹¦·ò 2018-09-28

¼¼Êõϸ½Ú


VIBOROTÀÕË÷²¡¶¾ÓÚ2018Äê9ÔÂÖÐÑ®³õ´Î·¢ÏÖ £¬±»¸Ã²¡¶¾¼ÓÃܺóµÄÎļþÀ©´óÃûΪ.enc¡£Í¨¹ý¶ÈÎö¸Ã²¡¶¾ £¬ÎÒÃÇ·¢ÏÔìäÊ×ÏÈͨ¹ý²é³­×¢²á±í¼üÖµ(ÍÆËã»úGUIDºÍ²úÆ·ÃÜÔ¿)À´È·ÈÏÊÇ·ñ±ØÒª¼ÓÃܱ»Ï°È¾ÏµÍ³ÖеÄÎļþ¡£

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¡¾VIBOROTͨ¹ý²éÎÊ×¢²á±íÀ´ÅжÏÊÇ·ñ´æÔÚÌØ¶¨×¢²á±í¼üÖµ¡¿


ÈôÊDZ»Ï°È¾ÏµÍ³ÖдæÔÚÌØ¶¨µÄ×¢²á±í¼üÖµ £¬¸ÃÀÕË÷²¡¶¾²»½öͨ¹ýËæ»úÊý¼ÓÃÜÌìÉúÆ÷ÌìÉú¼ÓÃܺͽâÃÜÃÜÔ¿ £¬ÓÃÀ´¼ÓÃÜϵͳÖеÄÎļþ¡£»¹»á½«ÍøÂçµÄÊܺ¦ÕßÐÅϢͨ¹ýPOST·¢Ë͵½C&C·þÎñÆ÷ £¬ÆäÍøÂçÈçÏÂÐÅÏ¢:
ÍÆËã»úGUID
ÍÆËã»úÃû
Óû§Ãû
VIBOROTÀÕË÷²¡¶¾¼ÓÃÜÈçÏÂÀ©´óÃûÎļþ:

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¡¾VIBOROT¼ÓÃÜÄ£¿é´úÂë½ØÍ¼¡¿


VIBOROTÀÕË÷²¡¶¾»¹ÓµÓмüÅ̼ͼְÄÜ £¬Æä»á½«¼Í¼µÄÐÅÏ¢·¢Ë͸øC&C·þÎñÆ÷ £¬Ò»µ©Ïνӳɹ¦ £¬Æä»¹»áÏÂÔØ¶ñÒâµÄ¶þ½øÔìÎļþ £¬²¢Í¨¹ýPowerShellÖ´ÐÐËü¡£


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¡¾VIBOROT¼üÅ̼ͼְÄÜ´úÂë½ØÍ¼¡¿


VIBOROTÀÕË÷²¡¶¾Ê¹Óñ»Ï°È¾»úеµÄMicrosoft Outlook×Ô¶¯Ïò±»º¦ÕßµÄͨѶ¼·¢ËÍÀ¬»øÓʼþ £¬Æä¸½¼þΪVIBOROTÀÕË÷²¡¶¾»òÕßÊÇ´ÓC&C·þÎñÆ÷ÏÂÔØµÄ¶ñÒâÎļþ¡£

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¡¾VIBOROTʹÓÃMicrosoft Outlook·¢ËÍÀ¬»øÓʼþ´úÂë½ØÍ¼¡¿


ϰȾ¸ÃÀÕË÷²¡¶¾ºó £¬Æä×ÀÃæÍ¼Ö½Ôì³ÉÈçÏÂÀÕË÷ÐÅÏ¢£º

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¡¾VIBOROTÀÕË÷ÐÅÏ¢½ØÍ¼¡¿


·À±¸²½Öè


1.²»Öصã»÷ÆðÔ´²»Ã÷µÄÓʼþÒÔ¼°¸½¼þ£»
2.²»Öصã»÷ÓʼþÖеĿÉÒÉÁ´½Ó£»
3.ʵʱÉý¼¶ÏµÍ³ £¬´òÕûϵͳ²¹¶¡£»
4.¾¡Á¿¹Ø¹Ø²»ÓÃÒªµÄÎļþ¹²ÏíȨÏ޺Ͳ»ÓÃÒªµÄ¶Ë¿Ú£»

5.Çë°ÑÎȱ¸·Ý³ÁÒªÎĵµ¡£±¸·ÝµÄ×î¼Ñ×ö·¨ÊDzÉÈ¡3-2-1¹æ¶¨ £¬¼´ÖÁÉÙ×öÈý¸ö¸±±¾ £¬ÓÃÁ½ÖÖ·ÖÆçÌåʽ±£Áô £¬²¢½«¸±±¾·ÅÔÚÒìµØ´æ´¢¡£


IOCs


Hash detected as RANSOM_VIBOROT.THIAHAH (SHA256):    
911b25a4d99e65ff920ba0e2ef387653b45789ef4693ef36d95f14c9777a568b
Related malicious URLs:
hxxps://viro(.)mleydier(.)fr
hxxps://viro(.)mleydier(.)fr/noauth/order/
hxxps://viro(.)mleydier(.)fr/noauth/keys/
hxxps://viro(.)mleydier(.)fr/noauth/attachment/

hxxps://viro(.)mleydier(.)fr/noauth/attachment/


²Î¿¼Á´½Ó


https://blog.trendmicro.com/trendlabs-security-intelligence/virobot-ransomware-with-botnet-capability-breaks-through/