-
Notifications
You must be signed in to change notification settings - Fork 0
/
lojax.adoc.IoC
executable file
·116 lines (72 loc) · 1.84 KB
/
lojax.adoc.IoC
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
== LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
=== ReWriter_read.exe
*ESET detection name*
- Win32/SPIFlash.A
*SHA-1*
- `ea728abe26bac161e110970051e1561fd51db93b`
=== ReWriter_binary.exe
*ESET detection name*
- Win32/SPIFlash.A
*SHA-1*
- `cc217342373967d1916cb20eca5ccb29caaf7c1b`
=== SecDxe
*ESET detection name*
- EFI/LoJax.A
*SHA-1*
- `f2be778971ad9df2082a266bd04ab657bd287413`
=== info_efi.exe
*ESET detection name*
- Win32/Agent.ZXZ
*SHA-1*
- `4b9e71615b37aea1eaeb5b1cfa0eee048118ff72`
=== autoche.exe
*ESET detection name*
- Win32/LoJax.A
*SHA-1*
- `700d7e763f59e706b4f05c69911319690f85432e`
=== Small agent EXE
*ESET detection names*
- Win32/Agent.ZQE
- Win32/Agent.ZTU
*SHA-1*
- `1771e435ba25f9cdfa77168899490d87681f2029`
- `ddaa06a4021baf980a08caea899f2904609410b9`
- `10d571d66d3ab7b9ddf6a850cb9b8e38b07623c0`
- `2529f6eda28d54490119d2123d22da56783c704f`
- `e923ac79046ffa06f67d3f4c567e84a82dd7ff1b`
- `8e138eecea8e9937a83bffe100d842d6381b6bb1`
- `ef860dca7d7c928b68c4218007fb9069c6e654e9`
- `e8f07caafb23eff83020406c21645d8ed0005ca6`
- `09d2e2c26247a4a908952fee36b56b360561984f`
- `f90ccf57e75923812c2c1da9f56166b36d1482be`
*C&C server domain names*
- `secao.org`
- `ikmtrust.com`
- `sysanalyticweb.com`
- `lxwo.org`
- `jflynci.com`
- `remotepx.net`
- `rdsnets.com`
- `rpcnetconnect.com`
- `webstp.com`
- `elaxo.org`
*C&C server IP addresses*
- `185.77.129.106`
- `185.144.82.239`
- `93.113.131.103`
- `185.86.149.54`
- `185.86.151.104`
- `103.41.177.43`
- `185.86.148.184`
- `185.94.191.65`
- `86.106.131.54`
=== Small agent DLL
In this section, we list only the DLL for which we never obtained the corresponding EXE
*ESET detection name*
- Win32/Agent.ZQE
*SHA-1*
- `397d97e278110a48bd2cb11bb5632b99a9100dbd`
*C&C server domain names*
- `elaxo.org`
*C&C server IP addresses*
- `86.106.131.54`