ASSOCIATED FILES
NOTES:

Shown above: One of the items of malspam from TA551 on 2020-12-03.

Shown above: Screenshot from the extracted Word doc.

Shown above: HTTP request for the installer DLL for Ursnif.

Shown above: Notifications that popped up during the infection.

Shown above: Traffic from an infection filtered in Wireshark (request for followup Pushdo malware marked with arrow).

Shown above: Some some of the Pushdo traffic (also includes the HTTP POST requests from previous image.

Shown above: HTTP request that resulted in another follow-up malware EXE on my infected host.

Shown above: Registry updates caused by Ursnif.

Shown above: Follow-up malware on an infected host.

Shown above: Example of registry updates caused by Pushdo.

Shown above: Registry updates that keep Ursnif and Pushdo persistent after a reboot.
Click here to return to the main page.