{"id":402,"date":"2023-02-14T01:04:08","date_gmt":"2023-02-14T01:04:08","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=402"},"modified":"2023-02-14T01:04:08","modified_gmt":"2023-02-14T01:04:08","slug":"new-campaign-red-appaloosa-targeting-mexico-and-distributing-a-banking-trojan","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2023\/02\/14\/new-campaign-red-appaloosa-targeting-mexico-and-distributing-a-banking-trojan\/","title":{"rendered":"New campaign Red Appaloosa targeting Mexico and distributing a banking trojan"},"content":{"rendered":"<h1><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-418 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/Logo-red-appaloosa.jpg\" alt=\"Logo Red Appaloosa\" width=\"600\" height=\"264\" \/><\/h1>\n<h1>Overview<\/h1>\n<p>The following report provides TTPs and IoCs used in a malware campaign targeting Mexico distributing a banking trojan, which SCILabs named <em>Red Appaloosa<\/em> based on its different characteristics. These new indicators were obtained from security monitoring and threat hunting in the region during the first week of January 2023.<\/p>\n<p>The propagation method of this threat is mainly done through phishing emails trying to impersonate different institutions and using pretexts such as invoices, and payment receipts, among others.<\/p>\n<p>In this campaign, SCILabs recovered a PDF file attempting to impersonate the Mexican electricity utilities C<em>omision<\/em><em> Federal de Electricidad <\/em>(CFE) using a payment receipt as a pretext. The importance of this update is the fact that this malware campaign continues using the TTPs characteristic of other threats, such as <em>URSA\/Mispadu<\/em> (banking trojan), <em>Grandoreiro<\/em> (banking trojan), and <em>Banload<\/em> (dropper).<\/p>\n<p>The main objective of this threat is to steal banking information from multiple financial institutions of customers located in Mexico, the USA, and Portugal, including Banco Azteca, CaixaBank, Banco de Portugal, Banco Efisa, Banco Inmobiliario Mexicano, Banco Bancrea, Banco Finterra, Banco De Confianza, Banco Autofin, Banco Actinver, Scotiabank, Activobank, Orange Bank, American Express Bank, and Intercam Banco, however, based on the monitoring of the region, there is a possibility that shortly, they may attempt to steal information from financial institutions with a presence in other countries, both in LATAM and other countries in the world.<\/p>\n<p>Considering that the campaign is apparently in an experimental phase and is under development, the objective of this document is to present all the information available so far to allow organizations to identify and recognize in a preventive way the behavior of this banking trojan, as well as its TTPs and IoCs, to avoid becoming a victim of this threat.<\/p>\n<p>It is important to mention that SCILabs will continue to track this threat, and this report will use information already known in a general way only to provide context on the new findings.<\/p>\n<h1><a name=\"_Toc80194999\"><\/a>How could it affect an organization?<\/h1>\n<p>The main objective of <em>Red Appaloosa<\/em> is to steal banking information from multiple financial institutions of all types of users, including employees of organizations, so if an attack is successful inside an organization, it could compromise the confidentiality, availability, and integrity of the company&#8217;s information because the extracted data can be leaked or sold on the black market or the Dark Web, which could cause economic and confidence losses for the victim companies.<\/p>\n<h1><a name=\"_Toc80195000\"><\/a>Analysis<\/h1>\n<h4>Threat context<\/h4>\n<p>SCILabs observed <em>Red Appaloosa <\/em>during the monitoring and threat hunting in the region during the first week of January 2023; in addition, SCILabs have monitored this threat since November 2022.<\/p>\n<p>Although in this campaign, SCILabs was not able to recover the email that triggered the infection, in other campaigns it was observed that the distribution begins through phishing emails containing URLs and\/or PDF or HTML files attached, with various pretexts, related to the payment of invoices, the validity of rights, digital tax receipts, and payment receipts, among others. After observing the impersonated organization (CFE), the SCILabs team was able to determine with a high level of confidence that this campaign is targeting Mexico.<\/p>\n<p>The objective of the PDF recovered by SCILabs is to redirect the victim to a website to download a compressed file in ZIP format containing a greater than 300MB EXE. Upon execution, a CAPTCHA validation is displayed on the screen, and once resolved, the following stages of the malware, described later in this report, begin.<\/p>\n<p>Finally, it tries to communicate with the C2 server and waits for the user to log in to certain bank&#8217;s portal to steal their banking information.<\/p>\n<h4>Technical Summary<\/h4>\n<p>The PDF file recovered by SCILabs with the name &#8220;<strong>CFE_PENDIENTES_Factura1593365.pdf<\/strong>&#8221; pretends to impersonate the CFE by duplicating one of its receipts in a blurred form and with the caption &#8220;<em>Ver Factura Completa<\/em>&#8220;. The image has a hyperlink inside, which, unlike the one reported by SCILabs in December, does not use URL shorteners or QR generators. Clicking on any part of the alleged receipt initiates downloading a compressed file in ZIP format.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-405\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_1.png\" alt=\"PDF file with an alleged CFE receipt\" width=\"596\" height=\"408\" \/><\/p>\n<p style=\"text-align: center\">Figure 1 \u2013 PDF file with an alleged CFE receipt<\/p>\n<p>The compressed file contains an executable file, and a second compressed file contains a Firefox installer, in which no malicious behavior has been observed, and its functionality in the infection chain has not been determined.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-406\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_2.png\" alt=\"Compressed file content\" width=\"912\" height=\"135\" \/><\/p>\n<p style=\"text-align: center\">Figure 2 \u2013 Compressed file content<\/p>\n<p>When executing the file named &#8220;A72351623012034.exe&#8221; a CAPTCHA validator is displayed, which seeks to evade sandbox security solutions by forcing human interaction to continue with the malware execution. It is important to note that this window cannot be closed if the CAPTCHA is not resolved or is resolved incorrectly.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-407\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_3.png\" alt=\"CAPTCHA validator used by the malware\" width=\"615\" height=\"328\" \/><\/p>\n<p style=\"text-align: center\">Figure 3 \u2013 CAPTCHA validator used by the malware<\/p>\n<p>After the validation of the CAPTCHA, it starts downloading a MPEG format file named jama22bg; although it looks like a video, this artifact is a compressed file, which contains two directories, an installer and three DLLs (one of them malicious and over 500MB).<\/p>\n<p>To decode this supposed video, the malware uses the VideoLan software. The final archive is password protected, and SCILabs has not yet been able to determine the password.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-408\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_4.png\" alt=\"Content of the supposed video\" width=\"757\" height=\"145\" \/><\/p>\n<p style=\"text-align: center\">Figure 4 \u2013 Content of the supposed video<\/p>\n<p>The malware automatically unzips this artifact and moves the contents to the <em>C:\\Users\\&lt;user&gt;\\&lt;random characters&gt;<\/em> directory, then runs the &#8220;install.exe&#8221; file and attempts to impersonate the NotePad++ text editor.<\/p>\n<p>The following files are located inside the final directory:<\/p>\n<ul>\n<li><strong>Cursors:<\/strong> A directory that contains six files with CUR extension, which have not yet been observed being used by the malware so that they could be distractions for the security researchers.<\/li>\n<li><strong>Plugins:<\/strong> Empty directory that is only used if NotePad++ is not installed on the victim&#8217;s machine. Otherwise, it remains empty during the infection chain.<\/li>\n<li><strong>Borlndmmdll:<\/strong> Legitimate DLL that has not been observed to have any malicious behavior.<\/li>\n<li><strong>BraveCrashHandler gduuplZ33.exe:<\/strong> Malicious executable, which tries to impersonate NotePad++, since it is digitally signed by NotePad++, making it difficult to categorize it as malicious.<\/li>\n<li><strong>Dbghelp.dll: <\/strong>Malicious DLL that is over 400MB in size which allows it to evade certain security solutions that only allow the analysis of artifacts smaller than 100MB.<\/li>\n<li><strong>SciLexer.dll:<\/strong> Legitimate DLL that has not been observed to have any malicious behavior.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-409\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_5.png\" alt=\"Contents of the directory where the malware is installed\" width=\"750\" height=\"206\" \/><\/p>\n<p style=\"text-align: center\">Figure 5 \u2013 Contents of the directory where the malware is installed<\/p>\n<p>An important point to highlight, which could be used as an indicator of attack, is that if NotePad++ is previously installed on the victim&#8217;s machine, it becomes unusable after the execution of the malware; however, if NotePad++ is not installed, the malware executes without modifying any previously installed component on the victim&#8217;s machine. The attacker is probably using NotePad++ to implement <a href=\"https:\/\/medium.com\/@threathuntingteam\/notepad-and-unsigned-dlls-a5cdcfb86749\">DLL hijacking<\/a> techniques; this technique allows to achieve persistence and execution of arbitrary code. The malicious code is executed every time the user tries to open the compromised software.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-410\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_6.png\" alt=\"Digital signature of the malicious artifact\" width=\"583\" height=\"231\" \/><\/p>\n<p style=\"text-align: center\">Figure 6 \u2013 Digital signature of the malicious artifact<\/p>\n<p>This threat creates persistence by creating an execution key in the Windows registry <strong><em>Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>.<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-411\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_7.png\" alt=\"Persistence generated\" width=\"769\" height=\"105\" \/><\/p>\n<p style=\"text-align: center\">Figure 7 \u2013 Persistence generated<\/p>\n<p>Finally, it attempts to communicate with the C2 server and begins to wait for the user to log in to their bank\u2019s portal to steal banking information from one of the following listed banks:<\/p>\n<ul>\n<li>Banco Azteca<\/li>\n<li>CaixaBank<\/li>\n<li>Banco de Portugal<\/li>\n<li>Banco Efisa<\/li>\n<li>Banco Inmobiliario Mexicano<\/li>\n<li>Banco Bancrea<\/li>\n<li>Banco Finterra<\/li>\n<li>Banco De Confianza<\/li>\n<li>Banco Autofin<\/li>\n<li>Banco Actinver<\/li>\n<li>Scotiabank<\/li>\n<li>Activobank<\/li>\n<li>Orange Bank<\/li>\n<li>American Express Bank<\/li>\n<li>Intercam Banco<\/li>\n<\/ul>\n<p>The process listens for strings that have the following format https:\/\/www.google.com\/search, and that include any of the banks listed.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-412\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_8.png\" alt=\"Records of the process waiting for one of the listed banks\" width=\"745\" height=\"322\" \/><\/p>\n<p style=\"text-align: center\">Figure 8 \u2013 Records of the process waiting for one of the listed banks<\/p>\n<h1>Attack Flow<\/h1>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-413\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/figura_9_eng.png\" alt=\"Attack flow of Red Appaloosa\" width=\"1066\" height=\"457\" \/><\/p>\n<p style=\"text-align: center\">Figure 9 \u2013 Attack flow<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h1>TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/h1>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-414\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/02\/tabla_1.png\" alt=\"TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework\" width=\"982\" height=\"507\" \/><\/p>\n<p style=\"text-align: center\">Table 1 &#8211; TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/p>\n<h1>Assessment<\/h1>\n<p>The danger of this threat is that this banking trojan is taking the &#8220;best and most effective&#8221; TTPs from other threats affecting LATAM and using them in its infection chain to have a higher success rate in its attacks because the campaign is designed to delay researchers&#8217; analysis, evade security solutions (which can only analyze artifacts smaller than 100MB), evade security solutions that automatically run samples to determine whether or not they are malicious, and evade security solutions that only track the creation of malicious processes but do not track legitimate processes that could load a malicious DLL into memory.<\/p>\n<p>SCILabs has observed a rapid evolution in its TTPs, changing its infrastructure quickly and adding steps to its infection chain, and we observed that the group behind this threat has been using fewer files in the final stage of the malware.<\/p>\n<p>By analyzing the origin of the banks obtained during the different campaigns found, SCILabs has the hypothesis that this threat will continue to be present during 2023, and it could spread to other countries in Latin America and the world.<\/p>\n<p>Finally, SCILabs will continue to track this threat to keep organizations and users updated on changes in their TTPs, new IoCs, or relevant information that could be vital to avoid becoming a victim of this campaign.<\/p>\n<p>SCILabs recommends that organizations conduct constant awareness campaigns about the social engineering techniques used by cybercriminals to distribute this type of banking trojans, as well as the entry vectors identified by SCILabs through continuous monitoring of the region. The following suggestions are recommended:<\/p>\n<ul>\n<li>Avoid opening emails from unknown senders, avoid or restrict the downloading of files and\/or programs from unknown or non-legitimate links.<\/li>\n<li>Avoid and\/or restrict the download and installation of non-legitimate software or software from unofficial sites.<\/li>\n<li>Block the indicators of compromise present in this document.<\/li>\n<li>Perform threat hunting looking for directories named with random letters or characters in C:\\Users\\.<\/li>\n<li>Scan for suspicious registry keys created in Software\\Microsoft\\Windows\\CurrentVersion\\Run.<\/li>\n<li>Constantly monitor the systems and perform threat hunting activities to identify large executable files or DLLs (greater than 100 MB) in directories with names similar to C:\\USERS\\[USER]\\[RANDOM CHARACTERS], C:\\ProgramData, C:\\Users\\Public or %APPDATA% to detect possible infections of this banking Trojan.<\/li>\n<li>Monitor if the Notepad++.exe process is running in the background without the end user using the application.<\/li>\n<li>It is advisable to offer security awareness training to your employees.<\/li>\n<\/ul>\n<h1>IOC<\/h1>\n<h4>Obtained during analysis<\/h4>\n<p><strong>Hash SHA-256<\/strong><\/p>\n<p>29347E1F1D7ABEB6BB4E3D23851020B410E4614BD27A3D074AF64E47F5651188<\/p>\n<p>BA3EAB3C379D4F04B00F3D0C2D5CE281A9F5C2FF4CA5FF1C323D5552B001D373<\/p>\n<p>C335ADB8E995FE7FF19B80B9E5FF30C07B0C8605C3839D7E90F259626FA77941<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Domains<\/strong><\/p>\n<p>MERCADAODORJ[.]COM<\/p>\n<p>MEX[.]FACTURAPAGO[.]SHOP<\/p>\n<p>&nbsp;<\/p>\n<p><strong>URLs<\/strong><\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS.PHP<\/p>\n<p>HXXPS[:]\/\/APPLICATIONFILESTORAGEMX[.]BLOB[.]CORE[.]WINDOWS[.]NET\/APPSTORAGEMX\/PAGO_REF_C432844614[.]ZIP<\/p>\n<p>HXXPS[:]\/\/A[.]NEL[.]CLOUDFLARE[.]COM\/REPORT\/V3?S=NDV6TYGEEKBXA7N44WMYKYY85%2BQLLXHBVE15AFXSXUDBTWTYXVCUGMVGQ3WAO5USYHKXOUC7XB7AAPVB6PAKEJO4RGL8D9BFB42WTYDNRTRSYINWWWFQTNHA5U0PTCA957N8<\/p>\n<p>HXXPS[:]\/\/A[.]NEL[.]CLOUDFLARE[.]COM\/REPORT\/V3?S=YQNRMOPJZVSLQFYB%2BY8UENO6LTRHSDDFEKNDIIO%2FMEWSZTLIAPQTYREBG0%2F6UZO2LX4AZ%2B1NTJCVQMULUALUWOTS4CSPSABT7NMSSLIU8MELYRCMH7KTDO6TEZQHLONPNYOS<\/p>\n<p>HXXP:\/\/MEX[.]FACTURAPAGO[.]SHOP\/JAMA22BG[.]MPEG<\/p>\n<p>HXXP[:]\/\/MERCADAODORJ[.]COM[:]80<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Subdomains<\/strong><\/p>\n<p>APPLICATIONFILESTORAGEMX[.]BLOB[.]CORE[.]WINDOWS[.]NET<\/p>\n<h4>Obtained during analysis<\/h4>\n<p><strong>Hash SHA-256<\/strong><\/p>\n<p>29347E1F1D7ABEB6BB4E3D23851020B410E4614BD27A3D074AF64E47F5651188<\/p>\n<p>BA3EAB3C379D4F04B00F3D0C2D5CE281A9F5C2FF4CA5FF1C323D5552B001D373<\/p>\n<p>C335ADB8E995FE7FF19B80B9E5FF30C07B0C8605C3839D7E90F259626FA77941<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Domains<\/strong><\/p>\n<p>MERCADAODORJ[.]COM<\/p>\n<p>MEX[.]FACTURAPAGO[.]SHOP<\/p>\n<p>&nbsp;<\/p>\n<p><strong>URLs<\/strong><\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS.PHP<\/p>\n<p>HXXPS[:]\/\/APPLICATIONFILESTORAGEMX[.]BLOB[.]CORE[.]WINDOWS[.]NET\/APPSTORAGEMX\/PAGO_REF_C432844614[.]ZIP<\/p>\n<p>HXXPS[:]\/\/A[.]NEL[.]CLOUDFLARE[.]COM\/REPORT\/V3?S=NDV6TYGEEKBXA7N44WMYKYY85%2BQLLXHBVE15AFXSXUDBTWTYXVCUGMVGQ3WAO5USYHKXOUC7XB7AAPVB6PAKEJO4RGL8D9BFB42WTYDNRTRSYINWWWFQTNHA5U0PTCA957N8<\/p>\n<p>HXXPS[:]\/\/A[.]NEL[.]CLOUDFLARE[.]COM\/REPORT\/V3?S=YQNRMOPJZVSLQFYB%2BY8UENO6LTRHSDDFEKNDIIO%2FMEWSZTLIAPQTYREBG0%2F6UZO2LX4AZ%2B1NTJCVQMULUALUWOTS4CSPSABT7NMSSLIU8MELYRCMH7KTDO6TEZQHLONPNYOS<\/p>\n<p>HXXP:\/\/MEX[.]FACTURAPAGO[.]SHOP\/JAMA22BG[.]MPEG<\/p>\n<p>HXXP[:]\/\/MERCADAODORJ[.]COM[:]80<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Subdomains<\/strong><\/p>\n<p>APPLICATIONFILESTORAGEMX[.]BLOB[.]CORE[.]WINDOWS[.]NET<\/p>\n<p>&nbsp;<\/p>\n<h4>Obtained from retrohunt processes<\/h4>\n<p><strong>Hash SHA-256<\/strong><\/p>\n<p>A159306C35D36BE5838164AB994E8539BD16105FCE9971469E9422BB95D8BA4B<\/p>\n<p>257509134B49AD4ED4F18B93E97F8A5CF8E27E1FF3E32595B4CBBFA7DABD23EA<\/p>\n<p>9D814CF55B7C317A918E208722EC7A7AA64F10092518D9FF9A6B8F2EC882F369<\/p>\n<p>CD1797A3299C3433C1FB67EE7288C2D9B07CD6F7E3EA8A1217121479588B269D<\/p>\n<p>EC818EA64BC515664AAA73B639277EA4BBF66417E4935C06AC23BDB02E640119<\/p>\n<p>29347E1F1D7ABEB6BB4E3D23851020B410E4614BD27A3D074AF64E47F5651188<\/p>\n<p>9E738F90C14BE77587D1A4035BD6F0B213726A138944EB67C86CF71B9149AF7A<\/p>\n<p>E8E5D10D6FF77CAFE37ABC806C2F53BD1895B6DBFDD517CD0E00BC0FD2940924<\/p>\n<p>89C9F07AAAD1773F2E2432634C04F118CD1E57A1639A2234B9A03B53FC813D81<\/p>\n<p>43315AB9B55A08A7787FE03FA0B129D9BBDF2E5BC4CC0661861BAC03F1310C5F<\/p>\n<p>9D1F91DB7C27EBE637093788438A33714A4594E6789A312C9FFE269122218E79<\/p>\n<p>2C2697F11FA554742B62EE9FE3C8AAB3C9AC31823161BD4BCC8A410161D6B734<\/p>\n<p>79F5849A1C7B1A6118FB1ACA86A6446853159081DB03C88E0F117D5B463BB01D<\/p>\n<p>7DDE1E742B1D1A9A9884FAB019B0C6D5A8AAD597FB914E7103BDDA227639B20A<\/p>\n<p>80C5FFDC066C55DA1F29B5FF7A5555C358C4AACAF5BF13CC8AAF37B49A0AC307<\/p>\n<p>9FDC2A8611A8FC66D6F1D96EEEA2D6E84859C7CD9C4C58F4A3FC03F7466A41FA<\/p>\n<p>E530766D1C59FAF5BB3EC0BCC755AE97B4E9D4972C850D0CF93490372C58A38B<\/p>\n<p>A3F76DC191B9FA368B20F83A46A1C5C8BCE6227C2B0DEC929F69EB0D0BEB24D6<\/p>\n<p>0549C1FF0EB7B7F66128EA02FB7F7ECA82D74EA77F08A93932CAF4AB66426019<\/p>\n<p>09A63F3066A8FCA724939B186C48246A473027E8846A3184203C4AC521D9BF56<\/p>\n<p>0A8819C35AA185E2695AEDF01FC7C8B1A997FB6ED556D481D5F4988D781FA2B1<\/p>\n<p>118E4FC96581312F627539E90CB4FBBCAC40AB36EBC6BDFDE883B685FBF74039<\/p>\n<p>1326882E04B4059CF316313CFE76667631973BFE1A5A74A22C0D0285EAE78420<\/p>\n<p>150D21475EB176E938DC4B33E3196514D76E4C5A2E34625B2D38E8984DD3F533<\/p>\n<p>1BC0B1A3E8C1547969E1CF59D20C9CEE8AECE9DFE1B19247E513FA4B889A08E1<\/p>\n<p>21E3B21C5A63D906C22CE233B52F2CE61259C7258065CA662B709C614580A8ED<\/p>\n<p>2308008290B2E5A59734E4C41649F624E73097556E2BC64181B85BBD7DC74978<\/p>\n<p>25C6A148B54DF7E072AA45C282025C9F7DC024097D5A864CEB260D73BBCCF041<\/p>\n<p>2742927E776412D2A002D8392237D8E09584F728CEE32F32872A9B375C4D1633<\/p>\n<p>32661DD7F837B7381C64DEC348212293B49571CC6B243E77FFFDFE43C4A72969<\/p>\n<p>3CF372C2248BB025E108022DAAD59A3055BB4D2AB645BB0CECB03334F46BB097<\/p>\n<p>4E3A1A71BC4FEDD85EDE0CA9AD87B6B36E9E3EB373CA4436DB395CA7C8399BB1<\/p>\n<p>4E6893FBE18D5BCAA0DAD2F76F4F05BD2A2AFFE3CAB08794A36FF898BCB6424D<\/p>\n<p>55364BCD6999E99AD45D41A0988E1354E60ADD4CC0CDB4ADC83D236C6A9C7348<\/p>\n<p>56A97F834B4A74E1876696D06B0520DC1F35AA43BB8A8930967BDBA9DFE7F96E<\/p>\n<p>627E9959C29E98B9AF31434981A6E98CEC24733953B4839ED76B0181A652294B<\/p>\n<p>6E8A407A07348EC0CA7855D2AEEA017647A11E88202995767BFF34448297ED74<\/p>\n<p>70BB9B5DB04307C00132943AE425C99E32618E72EAC4CB85D7C716C61612AD41<\/p>\n<p>715A5092C5D8607E898F5B1DA79DB1706DEB20A27E61F0D4EF2BE77134DA5B8E<\/p>\n<p>7651CCD7190113EBD2D236AC8B41C372AE09CB803617D174A4733D1D085D1610<\/p>\n<p>76B8469DB9B2F958954FCD2863EF1E8633F50BCBC0B0C00165282AD4F8AE826F<\/p>\n<p>7843658143C80D4148B09F9C71EA8001277E11EC78866FEB298E0D2D1E42B92A<\/p>\n<p>8923498A7AE41471F2EC87293E5474D474DE0225E629A1407176716786A74B40<\/p>\n<p>990A3BFC25F935CA485BD442BFC27EA06174B409E75729903F4E9CA3B320728B<\/p>\n<p>9A3A9B0D93A50C0F1E7589CA82FD8BED40356AEE95266B74A72D74ECB801CF66<\/p>\n<p>9BF948EE126D5D68DF3FBF82C416F58C07C5F0296C800CF902EEC53F650FB0FE<\/p>\n<p>9EFC7FD313E2F4D189C266E3D375B4C5C8150290EC2D531E1F7E3BD1E876D045<\/p>\n<p>A9C314FBE09F14D4C00A98A422D92E35B4346F30FCD8AE7AB4A1B0AFE66E9E96<\/p>\n<p>B5ECC47A73B4F751EDF0738C33CCEC20AC91BFC63C099A949EABE002A34EAD93<\/p>\n<p>B9F29D95AFC647E992AF74D807820D88AD525D14E8AE741F1121BB808F0E624A<\/p>\n<p>C92BCE899EF68EE4162456C87959CDAA2FD07F28AB3D37BD6D4F5755A8872229<\/p>\n<p>D3DE331A99CADA7AD030ACDEB321D96600CCF36913A99BE45184D102B9DF2902<\/p>\n<p>D49F18291611DD7B304F3F1AB19634BED3110EE61905B80F20969BABE77398F8<\/p>\n<p>D4A8B93B16F94EF346AFCB3CB3CF14BF53B20D6CD6F94047CF45E877684A4ABD<\/p>\n<p>D7642B55C29D2C019C70B2B7C0DD4D30BD3E50D1673B3DDA3D3B8241E2560347<\/p>\n<p>D79C72E1599B4D3838D3D1D2C862B2071024787B3BCA43B94C4BD22AF059C499<\/p>\n<p>D7CA7FA79D98DD37054E576ACFB170CE6EE6A211D53BAB5E8B51D70CD506C073<\/p>\n<p>DAD8DD850C88725A3BD5B9E14E1416E641D23799F1A9679806F24230C52E2F45<\/p>\n<p>DC43288AFA0C32D7E8A023EAEDDBA67F952735054E181F5311092FB903501186<\/p>\n<p>E4FA8D9ADCA0BB32E128127EFB30F2575B4E30C065493812FE174E43A50B1BDD<\/p>\n<p>ED7EF14058D99E738CC078F44DD0C9A545C3FFEF9E4C1B496F60169FCA57DCF0<\/p>\n<p>EFC14055117633A34851CC7C891515D4F5970E72A01D9DE750D6034CBD6D2A7B<\/p>\n<p>F20D9D16FFDEEEFD5BBC546CDB1976C83159E117A89CD9BCC413BE58E0024215<\/p>\n<p>FDEDC55731F936A808EBE1D81A42C732681E47C8C34EB6B97E6849E27814D6E6<\/p>\n<p>FEDE719B831EB7160431F255E759EA1DFD6259D7E993735B97506A87D07728B0<\/p>\n<p>06BBF545F815C8B0330075DF90B55266E133559E1DAEC60E7B63443D98957F5B<\/p>\n<p>100B321C3EB6B895E69F23471D51BEC4F99F18C0F61ABB29DDCED7A866C09726<\/p>\n<p>15BE38594321321ED8A97E193733E9C1C217CD48E637B430BDB5CC4CEFFCB9CA<\/p>\n<p>3CAC6E74DBD797F25585D206D93551467CAD2934AF18C345764316D78D2EE537<\/p>\n<p>7BE825573DD86B4E93D0954B33B5D89BD23B521D7E41A1426685CA4A983AA504<\/p>\n<p>9DDF84BA82CD4C62F0AB8D9F44E80F8F7484E94BE065B684D0BEEE236ADB4A6B<\/p>\n<p>B13326C87C6ADB0B1D1CC43D592637963C07A1DF01F91B1908E8C612CE7F6984<\/p>\n<p>CE2ACB7829AA15F325A0293C580846AF0BE8A68D5522A12B5ED92437007D53EE<\/p>\n<p>DF36F4718861FBDF8A5860CD2C121CCC04AFE9D8937611A9432C1A86795C483F<\/p>\n<p>E4B206C38909250FAED4A09C6EFEC81553F232519AE2A2F2D2AA16920D3900B1<\/p>\n<p>E69D91A78C2E334F0972DC515FBB90E3F44CD5B06FFC9A87CEDB443C157E2FB4<\/p>\n<p>F26D161443C991D8F77835B8DD1E9C3C3750E39FCCCDB19BCFFF32FF432D5833<\/p>\n<p>F402C14EE49A08BE08F5826BB5BC43D4D20C78C30F6720CFA52C029152E3601C<\/p>\n<p>FACB3B3FDFC6CC411C410A7A78D9318D264A25FA62733BC2DC35DF899303B905<\/p>\n<p>FD81964795C8DCCD02DE0A5FBB07FEED54214E04B1E6EDDB1ACBC8330A9FA042<\/p>\n<p>1683A0019D1C49BC1A60049B8BD6A4DB6C108745639AB8033300AD796DA8C2CC<\/p>\n<p>E2301C42C6D054A86CB247765124AEB443DDA738A893C56A2CAD461A63EC3A30<\/p>\n<p>3F225E7AAABB1EB8AF1AC41489BFDC0F637AB75CFCB0F285C6D7783B235E6BEE<\/p>\n<p>44471D9D0A04EA71D1002AE5659010BCB79679BEDA423D24EE185D14BCBC70CF<\/p>\n<p>AB8DB2CD01A7EFBF28EE07B0F98259E2DE3637A3364727F8466B4A91BF7C2C30<\/p>\n<p>328BDC9EDDE08130CBBD04200A3C4E581AD400D68728BD8698CFC7868865C074<\/p>\n<p>87254DDF2FAA8ABECEE4C4B8985771A6A858632532868AC5032C0E8FFFDEA51A<\/p>\n<p>2C971916D134DE95D6614DAD17F3A1F81FEAF8311011D213732EE5992854950F<\/p>\n<p>622EE447BF1F5C6087EFE261D17B8378BDE8967BF0E677CA1164602C67396B3B<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Subdomains<\/strong><\/p>\n<p>CERTIFICATED[.]EMPRESASCFDI-PERSONAS[.]SHOP<\/p>\n<p>CFDI[.]SMART2NOPAGOS[.]SHOP<\/p>\n<p>EMPRESARIALMX[.]SHOP<\/p>\n<p>EXECULTIVO[.]MONEYGOLDX[.]SHOP<\/p>\n<p>FACTGEFORCEX[.]SHOP<\/p>\n<p>FACTURACION[.]SGSCOMMANAGER[.]SHOP<\/p>\n<p>FACTURAS[.]MARKETING4GRP[.]SHOP<\/p>\n<p>GERENCIA[.]MULTISISTEMPAGOSMX[.]SHOP<\/p>\n<p>L[.]EAD[.]ME<\/p>\n<p>MANAGER[.]INVESTHARBOURSESSION[.]SHOP<\/p>\n<p>MEX[.]FACTURACOMPROBANTE[.]SHOP<\/p>\n<p>MEX[.]FACTURACOMPR[.]SHOP<\/p>\n<p>MEX[.]MASSATEST[.]SHOP<\/p>\n<p>MEX[.]TENESNET[.]SHOP<\/p>\n<p>MULTI[.]MULTISESSIONLTDA[.]SHOP<\/p>\n<p>MX-CORREEOSUPORT[.]SHOP<\/p>\n<p>MX[.]EMPRESA020[.]SHOP<\/p>\n<p>MX[.]EMPRESARIAL1MX[.]SHOP<\/p>\n<p>MX[.]EMPRESARIALLLMX[.]SHOP<\/p>\n<p>MX[.]EMPRESARIALLMXX[.]SHOP<\/p>\n<p>MX[.]EMPRESARIALL[.]SHOP<\/p>\n<p>MX[.]EMPRESARIALMX03[.]SHOP<\/p>\n<p>MX[.]EMPRESARIALMX04[.]SHOP<\/p>\n<p>MX[.]EMPRESARIARMX030[.]SHOP<\/p>\n<p>MX[.]EMPRESARIIALMX[.]SHOP<\/p>\n<p>MX-ITUNES[.]SHOP<\/p>\n<p>MX[.]MEXEMPRESSARIAL[.]SHOP<\/p>\n<p>MX[.]MXEMPRESAA[.]SHOP<\/p>\n<p>MX[.]NEGOCIOAPPS[.]SHOP<\/p>\n<p>MX[.]NEGOCIOMX2[.]SHOP<\/p>\n<p>MX[.]NEGOCIOMX3[.]SHOP<\/p>\n<p>MX[.]NEGOCIOMX4[.]SHOP<\/p>\n<p>MX[.]NEGOCIOMX[.]SHOP<\/p>\n<p>MXX[.]DIRETORGERALXX[.]SHOP<\/p>\n<p>NEGOCIOMX3[.]SHOP<\/p>\n<p>PAGO[.]SGSCOMMANAGER[.]SHOP<\/p>\n<p>PAGOS[.]MULTISESSIONLTDA[.]SHOP<\/p>\n<p>PORTAL[.]ADIMCOPAGOS[.]SHOP<\/p>\n<p>PORTAL[.]ROSENPARKPRIVATEPAGOS[.]SHOP<\/p>\n<p>PROMOCIONES[.]ROSENPARKPRIVATEPAGOS[.]SHOP<\/p>\n<p>Q-R[.]TO<\/p>\n<p>RECIBO[.]MBUSSINESSCFDI[.]SHOP<\/p>\n<p>RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET<\/p>\n<p>SAC1[.]FAFORCE[.]SHOP<\/p>\n<p>SAC2[.]FACTGERFORCE[.]SHOP<\/p>\n<p>SAC3[.]FACTGIFORCE[.]SHOP<\/p>\n<p>SAC4[.]FACTGEFORCEX[.]SHOP<\/p>\n<p>SSL[.]ADIMCOPAGOS[.]SHOP<\/p>\n<p>SSL[.]MARKETING4GRP[.]SHOP<\/p>\n<p>SSL[.]MULTISESSIONLTDA[.]SHOP<\/p>\n<p>SSL[.]WESTNEX[.]SHOP<\/p>\n<p>STORAGERECIBOSPAGOS0712[.]BLOB[.]CORE[.]WINDOWS[.]NET<\/p>\n<p>WWW1[.]COMPROBANTEMX[.]SHOP<\/p>\n<p>WWW1[.]EMPRESA020[.]SHOP<\/p>\n<p>WWW1[.]EMPRESARIALLMXX[.]SHOP<\/p>\n<p>WWW1[.]EMPRESARIALL[.]SHOP<\/p>\n<p>WWW1[.]EMPRESARIALMXX[.]SHOP<\/p>\n<p>WWW1[.]FACTURAMX[.]SHOP<\/p>\n<p>WWW1[.]MEXEMPRESARIIAL[.]SHOP<\/p>\n<p>WWW1[.]MEXFACTURA[.]SHOP<\/p>\n<p>WWW1[.]MXEMPREESA[.]SHOP<\/p>\n<p>WWW1[.]MXEMPRESAR[.]SHOP<\/p>\n<p>WWW1[.]MXEMPRESSARIIAL[.]SHOP<\/p>\n<p>WWW1[.]MXFACTURA[.]SHOP<\/p>\n<p>WWW1[.]NEGOCIOMX2[.]SHOP<\/p>\n<p>WWW1[.]NEGOCIOMX3[.]SHOP<\/p>\n<p>WWW2[.]BOGFAC[.]SHOP<\/p>\n<p>WWW2[.]BOGJAM[.]SHOP<\/p>\n<p>WWW2[.]EMPRESARIALMX15[.]SHOP<\/p>\n<p>WWW2[.]JAMNET[.]SHOP<\/p>\n<p>WWWS1[.]MBUSSINESSCFDI[.]SHOP<\/p>\n<p>WWWS[.]EYEWATCHDESIGN[.]SHOP<\/p>\n<p>WWWS[.]SMART2NOPAGOS[.]SHOP<\/p>\n<p>&nbsp;<\/p>\n<p><strong>URLs<\/strong><\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/COMPROBANTE_PAGO\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/COMPROBANTE_SPEI\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/FACTURA\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/FACTURA_COMPROBANTE\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/FACTURA_PAGO\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/PAGO_COMPROBANTE\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/PAGO_RECIBO\/<\/p>\n<p>HXXP[:]\/\/24[.]152[.]38[.]151\/RECIBO_PAGO\/<\/p>\n<p>HXXP[:]\/\/CERTIFICATED[.]EMPRESASCFDI-PERSONAS[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?APPLICATIONS<\/p>\n<p>HXXP[:]\/\/CFDI[.]SMART2NOPAGOS[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP<\/p>\n<p>HXXP[:]\/\/EMPRESARIALMX[.]SHOP\/COMPROBANTE_SPEI\/<\/p>\n<p>HXXP[:]\/\/EXECULTIVO[.]MONEYGOLDX[.]SHOP\/FACTURA\/DASSSASHYTSRFWEWDW4DVSSF351W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/FACTGEFORCEX[.]SHOP\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/FACTURACION[.]SGSCOMMANAGER[.]SHOP\/APP_DOCS_CD20185205\/DOCS_FICHERO05502022[.]PHP<\/p>\n<p>HXXP[:]\/\/FACTURAS[.]MARKETING4GRP[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP?PORTALCFDI15201477<\/p>\n<p>HXXP[:]\/\/FACTURAS[.]MARKETING4GRP[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP?PORTALFACTURA1588933<\/p>\n<p>HXXP[:]\/\/GERENCIA[.]MULTISISTEMPAGOSMX[.]SHOP\/GERENCIABR02\/YBNZKVJ[.]PHP<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BANAMEXAPPS15278<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDCRRR<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDOAFK<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDPAOF<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQ5P9<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQ6IF<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQ6MM<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQ7YY<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQ7Z0<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQOB8<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQOC1<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDQXFG<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDROOO<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDRYNG<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDRYNN<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDRZOR<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDWZ6B<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/BDZHVF<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/CFDIFACTURAAPPS<\/p>\n<p>HXXP[:]\/\/L[.]EAD[.]ME\/MXSATGOX158233<\/p>\n<p>HXXP[:]\/\/MANAGER[.]INVESTHARBOURSESSION[.]SHOP\/DOCS_RECIBOS_EMISSION\/APPSMANAGER[.]PHP?APPSCFDIPAGOSMX-2022-001<\/p>\n<p>HXXP[:]\/\/MANAGER[.]INVESTHARBOURSESSION[.]SHOP\/DOCS_RECIBOS_EMISSION\/APPSMANAGER[.]PHP?APPSDOCSMX<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPROBANTE[.]SHOP\/JMBACK[.]BMP<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/7777777777\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/COMPROBANTE_FACTURA\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/FACTURA\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/FACTURA_COMPROBANTE\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/PAGO_FACTURA\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/GCDUKKLCIKNRSBJWONSTQPNDFERVKYFSMBNFYFQWFYBFKHTYJBDTRFW[.]PHP<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/GCDUKKLCIKNRSBJWONSTQPNDFERVKYFSMBNFYFQWFYBFKHTYJBDTRFW[.]PHP<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/GCDUKKLCIKNRSBJWONSTQPNDFERWKYFSMBNFYFQWFYBFFKHTYJBDTRFW[.]PHP<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/BANAMEXSEGURO[.]JPG<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/CITIBANAMEX[.]JPG<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/COMPUTADOR[.]JPG<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/CONTATO[.]JPG<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/ENDERE<\/p>\n<p>HXXP[:]\/\/MEX[.]FACTURACOMPR[.]SHOP\/RECIBO_FACTURA\/IMAGEM\/ENDERE%C3%A7O[.]JPG<\/p>\n<p>HXXP[:]\/\/MEX[.]MASSATEST[.]SHOP\/JM3VIEW[.]AVI<\/p>\n<p>HXXP[:]\/\/MEX[.]TENESNET[.]SHOP\/JAMANEW2[.]PNG<\/p>\n<p>HXXP[:]\/\/MULTI[.]MULTISESSIONLTDA[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?PAGOS-DOCUMENT<\/p>\n<p>HXXP[:]\/\/MX-CORREEOSUPORT[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESA020[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESA020[.]SHOP\/GJNEW[.]DRIV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESA020[.]SHOP\/KGRIN2023[.]CERT<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESA020[.]SHOP\/KGRIN23JM[.]CERT<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIAL1MX[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLLMX[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLLMX[.]SHOP\/JM2VER[.]DVR<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLLMX[.]SHOP\/JM2WIN[.]DRV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLLMX[.]SHOP\/JMAA2V[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLMXX[.]SHOP\/GJNEW[.]DRIV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLMXX[.]SHOP\/GJNEW[.]DRIV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLMXX[.]SHOP\/KGRIN2023[.]CERT<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALLMXX[.]SHOP\/KGRIN23JM[.]CERT<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALL[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALL[.]SHOP\/JAMA3V[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALL[.]SHOP\/JM3WWV[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALL[.]SHOP\/JM3WWVW[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALMX03[.]SHOP\/JM2VER[.]DVR<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALMX03[.]SHOP\/JM2WIN[.]DRV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALMX03[.]SHOP\/JMAA2V[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIALMX04[.]SHOP\/CURURU[.]PUTA<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIARMX030[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIARMX030[.]SHOP\/JM2VER[.]DVR<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIARMX030[.]SHOP\/JM2WIN[.]DRV<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIARMX030[.]SHOP\/JMAA2V[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIARMX030[.]SHOP\/JMAA2V[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]EMPRESARIIALMX[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX-ITUNES[.]SHOP\/EXPIRE\/INDEX2[.]HTML<\/p>\n<p>HXXP[:]\/\/MX[.]MEXEMPRESSARIAL[.]SHOP\/MJ3PHP[.]MQL<\/p>\n<p>HXXP[:]\/\/MX[.]MEXEMPRESSARIAL[.]SHOP\/MJ3PHP[.]MQL<\/p>\n<p>HXXP[:]\/\/MX[.]MXEMPRESAA[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]MXEMPRESAA[.]SHOP\/MJ2CORE[.]WIN<\/p>\n<p>HXXP[:]\/\/MX[.]MXEMPRESAA[.]SHOP\/MJ2CORE[.]WIN<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOAPPS[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOMX2[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOMX2[.]SHOP\/FACTURAPAGO\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOMX3[.]SHOP\/JM3WWVW[.]CORE<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOMX4[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MX[.]NEGOCIOMX[.]SHOP\/MJ1WIN[.]CORE<\/p>\n<p>HXXP[:]\/\/MXX[.]DIRETORGERALXX[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/MXX[.]DIRETORGERALXX[.]SHOP\/FACTURA\/<\/p>\n<p>HXXP[:]\/\/MXX[.]DIRETORGERALXX[.]SHOP\/FACTURA\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/NEGOCIOMX3[.]SHOP\/FACTURA_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/PAGO[.]SGSCOMMANAGER[.]SHOP\/APP_DOCS_CD20185205\/DOCS_FICHERO05502022[.]PHP<\/p>\n<p>HXXP[:]\/\/PAGOS[.]MULTISESSIONLTDA[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?DOCUMENTS-PAGOS<\/p>\n<p>HXXP[:]\/\/PORTAL[.]ADIMCOPAGOS[.]SHOP\/NF-5034297\/NF5034297[.]PHP?BR152346<\/p>\n<p>HXXP[:]\/\/PORTAL[.]ROSENPARKPRIVATEPAGOS[.]SHOP\/RECIBO_EMISSIONS\/RECIBO_EMISION[.]PHP?DOCSRECIBOSMX1732<\/p>\n<p>HXXP[:]\/\/PORTAL[.]ROSENPARKPRIVATEPAGOS[.]SHOP\/RECIBO_EMISSIONS\/RECIBO_EMISION[.]PHP?PAGOSDOCSMX<\/p>\n<p>HXXP[:]\/\/PROMOCIONES[.]ROSENPARKPRIVATEPAGOS[.]SHOP\/RECIBO_EMISSIONS\/RECIBO_EMISION[.]PHP?PAGOSDOCSMX01<\/p>\n<p>HXXP[:]\/\/Q-R[.]TO\/BDYGW2\/<\/p>\n<p>HXXP[:]\/\/RECIBO[.]MBUSSINESSCFDI[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?DOCUMENTS-APPSMX<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/CMH9MHRGHJV99ATV3EPBTXMO_0K0NK3LZ9XXTQPVI84B4JQTJ1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/DOCS_J06MC512DJMXGO15SMX22_1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/DZLAPWQAVKP2NHM_5JMHDTLSBSUVF7BKJNMGVMZM6[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/FILEPII_428DEAC269C4D907881538D5D974B18890B7D825[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/J06MC512DJMXGO15SMX22_1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/J16MP250STXSDG02SM5[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/J22MC510DJMXGO15SMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/PAGOS_RECIBO_J12MC520DJMXGO18SMX2[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/PDF_ARCHIVO_09112022[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/PDF_ARCHIVO_MJMOSMOC8VSMSDK5JNMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO0111_20552MXJMLSPC2VSMSDK5JNMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO0811_20252MXGOJMWC2VSMSDK8JNMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO0811_20252MXGOJMWC2VSMSDK8JNMX2[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO1710_250SPJMLWIC9VJKR6JNMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO1710_250SPJMLWIC9VJKR6JNMX1[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO2110_2555MXJMLSPC2VSWK8JNMX2[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/RECIBO_PAGO2110_2555MXJMLSPC2VSWK8JNMX2[.]ZIP<\/p>\n<p>HXXP[:]\/\/RECIBOPAGOSMX2022[.]BLOB[.]CORE[.]WINDOWS[.]NET\/CONTAINERMX01\/YFCXASVFXZ2OSRHCO_7SHNP2NJUGKRBU3Y3[.]ZIP<\/p>\n<p>HXXP[:]\/\/SAC1[.]FAFORCE[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/SAC2[.]FACTGERFORCE[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/SAC3[.]FACTGIFORCE[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/SAC4[.]FACTGEFORCEX[.]SHOP\/<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?15234789MVCB45020155A787F5A_SERIE_IWAVZ_Y_FOLIO_1524863877[.]HTML<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?15996321475MNCVBGDHJUGH<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?15996321475MNCVBGDHJUGH<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP??4502010-4B6E-8F5E-8E1D0DD985_SERIE_IWAVZ_Y_FOLIO_158502022[.]HTML<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?BNVMXNJKUYT<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MBNGNJUI5293652MNVHJF<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MHGNJUYTMJNBVF11K1256399<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MHGNJUYTMJNBVFGHK1256399<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MNBGFHSJ1963251<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MXVCBNJMKIOLA<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?MXVCNMJBHN1523694CVBNJMKLLM<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP\\?MXVCNMJBHN1523694CVBNJMKLLM<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?PORTALFACTURAMX1526399<\/p>\n<p>HXXP[:]\/\/SSL[.]ADIMCOPAGOS[.]SHOP\/DOCS_FICHEROS\/DOCSFICHEROS[.]PHP?PORTALFACTURAMX1526399?45020155A787F5A-5337-4B6E-8F5E-803E1D0DD985_SERIE_IWAVZ_Y_FOLIO_158502022[.]HTML<\/p>\n<p>HXXP[:]\/\/SSL[.]MARKETING4GRP[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP<\/p>\n<p>HXXP[:]\/\/SSL[.]MULTISESSIONLTDA[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP<\/p>\n<p>HXXP[:]\/\/SSL[.]MULTISESSIONLTDA[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?PAGOS-DOCUMENTS<\/p>\n<p>HXXP[:]\/\/SSL[.]WESTNEX[.]SHOP\/DOCS_RECIBOS_EMISSION\/APPSPAGOS[.]PHP<\/p>\n<p>HXXP[:]\/\/STORAGERECIBOSPAGOS0712[.]BLOB[.]CORE[.]WINDOWS[.]NET\/FICHEROSMX\/FACTURA_COMPROBANTE_28537577289461_79436744847[.]ZIP<\/p>\n<p>HXXP[:]\/\/STORAGERECIBOSPAGOS0712[.]BLOB[.]CORE[.]WINDOWS[.]NET\/FICHEROSMX\/PDF_ARCHIVO_DJTOMMOX8VSJMDS5JNMX4[.]ZIP<\/p>\n<p>HXXP[:]\/\/WWW1[.]COMPROBANTEMX[.]SHOP\/PAGO_FACTURA\/MZHVBFCLSDKHCHSFGI5DF54VSFDG518FSSZDF548DF357F86[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESA020[.]SHOP\/COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESARIALLMXX[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESARIALLMXX[.]SHOP\/PAGO_RECIBO\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESARIALLMXX[.]SHOP\/PAGO_RECIBO\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESARIALL[.]SHOP\/COMPROBANTE_PAGO\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]EMPRESARIALMXX[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]FACTURAMX[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MEXEMPRESARIIAL[.]SHOP\/FACTURA\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MEXFACTURA[.]SHOP\/SPEI_PAGO\/INDEX[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXEMPREESA[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXEMPRESAR[.]SHOP\/PAGO_COMPROBANTE\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXEMPRESAR[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXEMPRESAR[.]SHOP\/PAGO_COMPROBANTE\/INDEX[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXEMPRESSARIIAL[.]SHOP\/PAGO_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]MXFACTURA[.]SHOP\/COMPROBANTE_SPEI\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX2[.]SHOP\/FACTURA_PAGO<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX2[.]SHOP\/FACTURA_PAGO\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX2[.]SHOP\/FACTURA_PAGO\/DASSSASHYTSRFWEWDW4W4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREY[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/7777777777\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/COMPROBANTE_FACTURA\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/FACTURA\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/FACTURA_COMPROBANTE\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/FACTURA_COMPROBANTE\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/FACTURA\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/FACTURA\/DASSSASHYTSRFWEWDW4W432DCADSSSWE32DSFWYWYW67WJJEHNSBVCDFREYD[.]PHP<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/PAGO_FACTURA\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/PAGO_RECIBO\/<\/p>\n<p>HXXP[:]\/\/WWW1[.]NEGOCIOMX3[.]SHOP\/RECIBO_FACTURA\/<\/p>\n<p>HXXP[:]\/\/WWW2[.]BOGFAC[.]SHOP\/NEWMAGIC[.]CERT<\/p>\n<p>HXXP[:]\/\/WWW2[.]BOGJAM[.]SHOP\/CONTROLSTRICKV3[.]VBP<\/p>\n<p>HXXP[:]\/\/WWW2[.]EMPRESARIALMX15[.]SHOP\/JAMANEW2[.]PNG<\/p>\n<p>HXXP[:]\/\/WWW2[.]JAMNET[.]SHOP\/GAMERS2[.]MIC<\/p>\n<p>HXXP[:]\/\/WWW2[.]JAMNET[.]SHOP\/JAMANEW3[.]BMP<\/p>\n<p>HXXP[:]\/\/WWW2[.]JAMNET[.]SHOP\/JMBACK[.]BMP<\/p>\n<p>HXXP[:]\/\/WWWS1[.]MBUSSINESSCFDI[.]SHOP\/DOCS_RECIBOS\/APPSPAGOS[.]PHP?DOCUMENTS<\/p>\n<p>HXXP[:]\/\/WWWS[.]EYEWATCHDESIGN[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP<\/p>\n<p>HXXP[:]\/\/WWWS[.]SMART2NOPAGOS[.]SHOP\/DOCS_RECIBOS\/CFDIPAGOS[.]PHP<\/p>\n<p>&nbsp;<\/p>\n<h1>Observable IOC<\/h1>\n<p>Below are the IoCs obtained by SCILabs, which have a <strong>High<\/strong> level of confidence. The following files can be used legitimately as (o since) during the dynamic analysis no evidence of malicious behavior was found, however, they may be indicators of infection. In case of detection, it is recommended to alert and perform threat hunting to confirm or discard any possible infection.<\/p>\n<p><strong>Hash SHA-256<\/strong><\/p>\n<p>ADCE448F59D3A0B844ABF70BD775543135F3D391DD9658B0868566C50BADBE9F<\/p>\n<p>28225C5622637CDAED8342E14560E8DE7B53DD6BA145D973643FC4B5BDD67B75<\/p>\n<p>D7840EEA40A5A88AF824F24473E95D0227E69C4439D6EA791D50CB94BF0CFB2A<\/p>\n<p>B3CC3F8B65B37A807843E07C3848EBA3B86F6E2D0B67C6D7CB14E9660A881618<\/p>\n<p>13F860134473D00689EF3B73008505F444824A6AD58F0C3FD84741D084766B8E<\/p>\n<p>E698B70E15126295B7C573AAA72C000CF050487A491514E8797E5608AD6817F8<\/p>\n<p>60B9BE4867B547D57AFA8B1856FAB95A55F7C246FFD8578CEC811287F14912EC<\/p>\n<p>C0A68DD5BF81DA430F18E658AA83A4D7FA544F71B927438DA1C9424EEF6A156A<\/p>\n<p>3B98BC63B042047ECE450C86C89B2D54005690DBFC95B33C3BA028FECFE0EA8E<\/p>\n<p>18108C75EEC4CDE840614716C828C16912549BF18E0EDC610F15B0236B0512EA<\/p>\n<p>FB59C5F1B02CCB8DFD0CAD9F1DDE148D43F998D24C170FB25D3C8645E8333B8C<\/p>\n<p>C822D20ED712D55B207DBAF9027BD368AF10B70EE8C44A0D813969982AFA69A1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The following report provides TTPs and IoCs used in a malware campaign targeting Mexico distributing a banking trojan, which<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-402","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}