ÐÂÐÍÀÕË÷²¡¶¾VIBOROT°²È«¹«¸æ

°ä²¼¹¦·ò 2018-09-28

¼¼Êõϸ½Ú


VIBOROTÀÕË÷²¡¶¾ÓÚ2018Äê9ÔÂÖÐÑ®³õ´Î·¢ÏÖ£¬±»¸Ã²¡¶¾¼ÓÃܺóµÄÎļþÀ©´óÃûΪ.enc¡£Í¨¹ý¶ÈÎö¸Ã²¡¶¾£¬ÎÒÃÇ·¢ÏÔìäÊ×ÏÈͨ¹ý²é³­×¢²á±í¼üÖµ(ÍÆËã»úGUIDºÍ²úÆ·ÃÜÔ¿)À´È·ÈÏÊÇ·ñ±ØÒª¼ÓÃܱ»Ï°È¾ÏµÍ³ÖеÄÎļþ¡£

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¡¾VIBOROTͨ¹ý²éÎÊ×¢²á±íÀ´ÅжÏÊÇ·ñ´æÔÚÌØ¶¨×¢²á±í¼üÖµ¡¿


ÈôÊDZ»Ï°È¾ÏµÍ³ÖдæÔÚÌØ¶¨µÄ×¢²á±í¼üÖµ£¬¸ÃÀÕË÷²¡¶¾²»½öͨ¹ýËæ»úÊý¼ÓÃÜÌìÉúÆ÷ÌìÉú¼ÓÃܺͽâÃÜÃÜÔ¿£¬ÓÃÀ´¼ÓÃÜϵͳÖеÄÎļþ¡ £»¹»á½«ÍøÂçµÄÊܺ¦ÕßÐÅϢͨ¹ýPOST·¢Ë͵½C&C·þÎñÆ÷£¬ÆäÍøÂçÈçÏÂÐÅÏ¢:
ÍÆËã»úGUID
ÍÆËã»úÃû
Óû§Ãû
VIBOROTÀÕË÷²¡¶¾¼ÓÃÜÈçÏÂÀ©´óÃûÎļþ:

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¡¾VIBOROT¼ÓÃÜÄ £¿é´úÂë½ØÍ¼¡¿


VIBOROTÀÕË÷²¡¶¾»¹ÓµÓмüÅ̼ͼְÄÜ£¬Æä»á½«¼Í¼µÄÐÅÏ¢·¢Ë͸øC&C·þÎñÆ÷£¬Ò»µ©Ïνӳɹ¦£¬Æä»¹»áÏÂÔØ¶ñÒâµÄ¶þ½øÔìÎļþ£¬²¢Í¨¹ýPowerShellÖ´ÐÐËü¡£


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¡¾VIBOROT¼üÅ̼ͼְÄÜ´úÂë½ØÍ¼¡¿


VIBOROTÀÕË÷²¡¶¾Ê¹Óñ»Ï°È¾»úеµÄMicrosoft Outlook×Ô¶¯Ïò±»º¦ÕßµÄͨѶ¼·¢ËÍÀ¬»øÓʼþ£¬Æä¸½¼þΪVIBOROTÀÕË÷²¡¶¾»òÕßÊÇ´ÓC&C·þÎñÆ÷ÏÂÔØµÄ¶ñÒâÎļþ¡£

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¡¾VIBOROTʹÓÃMicrosoft Outlook·¢ËÍÀ¬»øÓʼþ´úÂë½ØÍ¼¡¿


ϰȾ¸ÃÀÕË÷²¡¶¾ºó£¬Æä×ÀÃæÍ¼Ö½Ôì³ÉÈçÏÂÀÕË÷ÐÅÏ¢£º

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¡¾VIBOROTÀÕË÷ÐÅÏ¢½ØÍ¼¡¿


·À±¸²½Öè


1.²»Öصã»÷ÆðÔ´²»Ã÷µÄÓʼþÒÔ¼°¸½¼þ £»
2.²»Öصã»÷ÓʼþÖеĿÉÒÉÁ´½Ó £»
3.ʵʱÉý¼¶ÏµÍ³£¬´òÕûϵͳ²¹¶¡ £»
4.¾¡Á¿¹Ø¹Ø²»ÓÃÒªµÄÎļþ¹²ÏíȨÏ޺Ͳ»ÓÃÒªµÄ¶Ë¿Ú £»

5.Çë°ÑÎȱ¸·Ý³ÁÒªÎĵµ¡£±¸·ÝµÄ×î¼Ñ×ö·¨ÊDzÉÈ¡3-2-1¹æ¶¨£¬¼´ÖÁÉÙ×öÈý¸ö¸±±¾£¬ÓÃÁ½ÖÖ·ÖÆçÌåʽ±£Áô£¬²¢½«¸±±¾·ÅÔÚÒìµØ´æ´¢¡£


IOCs


Hash detected as RANSOM_VIBOROT.THIAHAH (SHA256):    
911b25a4d99e65ff920ba0e2ef387653b45789ef4693ef36d95f14c9777a568b
Related malicious URLs:
hxxps://viro(.)mleydier(.)fr
hxxps://viro(.)mleydier(.)fr/noauth/order/
hxxps://viro(.)mleydier(.)fr/noauth/keys/
hxxps://viro(.)mleydier(.)fr/noauth/attachment/

hxxps://viro(.)mleydier(.)fr/noauth/attachment/


²Î¿¼Á´½Ó


https://blog.trendmicro.com/trendlabs-security-intelligence/virobot-ransomware-with-botnet-capability-breaks-through/