An analysis of Janeleiro is available as a blogpost on WeLiveSecurity.
SHA-1 malware | Description | ESET Detection Name |
---|---|---|
|
MSI file |
MSIL/TrojanDownloader.Agent.FSC |
|
Console.exe loader |
MSIL/TrojanDownloader.Agent.FSC |
|
MSIL/Kryptik.TBD |
|
|
LoadDllMSI.dll loader |
MSIL/TrojanDownloader.Agent.FSC |
|
System.Logins.Initial.dll |
MSIL/Agent.TIX |
|
||
|
System.Modules.Initial.dll |
MSIL/Agent.TIX |
|
MSIL/Janeleiro.A |
|
|
SHA-1 malware | Description | ESET Detection Name |
---|---|---|
|
Main Trojan Loader |
MSIL/Agent.AAI |
|
MSIL/Janeleiro.A |
|
|
||
|
Main Trojan |
MSIL/Agent.AAI |
SHA-1 malware | Description | ESET Detection Name |
---|---|---|
|
MSI file |
MSIL/Janeleiro.A |
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
Main Trojan |
|
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
SHA-1 malware | Description | ESET Detection Name |
---|---|---|
|
MSI file |
MSIL/Janeleiro.A |
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
Main Trojan |
|
|
||
|
||
|
||
|
||
|
||
|
In the following <NNNNNNNNNNN>
is a random number between 10000000000 and 90000000000.
https://recuperaglobaldanfeonline.eastus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNNN> https://protocolo-faturamento-servico.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://acessoriapremierfantasiafaturas.eastus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN>
https://portalrotulosfechamento.eastus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://servicosemitidosglobalnfe.southcentralus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://emissaocomprovanteatrasado.eastus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN>
https://emitidasfaturasfevereiro.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://dinamicoscontratosvencidos.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://arquivosemitidoscomsucesso.eastus.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://fatura-digital-arquiv-lo.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://nota-eletronica-servicos.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN> https://eletronicadanfe.brazilsouth.cloudapp.azure[.]com/nfedown.php?dw=<NNNNNNNNNN>
These are the IP addresses of the C&C servers where Janeleiro connects to report, receive commands and send data:
52.204.58[.]11 35.174.60[.]172
These are the tracking URLs where Janeleiro sends information about the compromised system during installation:
http://tasoofile.us-east-1.elasticbeanstalk[.]com/count http://slkvemnemim.us-east-1.elasticbeanstalk[.]com/count http://checa-env.cf3tefmhmr.eu-north-1.elasticbeanstalk[.]com/cnt/
These are the URLs used by System.Logins.dll
to exfiltrate the
harvested data:
http://comunicador.duckdns[.]org/catalista/emails/checkuser.php http://comunicador.duckdns[.]org/catalista/lixo/index.php
IP addresses associated with the domain:
178.79.178[.]203 138.197.101[.]4