ASSOCIATED FILES
NOTES:
Shown above: One of the items of malspam from TA551 on 2020-12-03.
Shown above: Screenshot from the extracted Word doc.
Shown above: HTTP request for the installer DLL for Ursnif.
Shown above: Notifications that popped up during the infection.
Shown above: Traffic from an infection filtered in Wireshark (request for followup Pushdo malware marked with arrow).
Shown above: Some some of the Pushdo traffic (also includes the HTTP POST requests from previous image.
Shown above: HTTP request that resulted in another follow-up malware EXE on my infected host.
Shown above: Registry updates caused by Ursnif.
Shown above: Follow-up malware on an infected host.
Shown above: Example of registry updates caused by Pushdo.
Shown above: Registry updates that keep Ursnif and Pushdo persistent after a reboot.
Click here to return to the main page.