CTT Report Hub
3.22K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
03-11-2022

New Laplas Clipper Distributed via SmokeLoader. Conclusion

https://blog.cyble.com/2022/11/02/new-laplas-clipper-distributed-by-smokeloader

Threats:
Laplas_clipper
Smokeloader
Raccoon_stealer
Recordbreaker_stealer
Systembc
Tron
Vmprotect_tool
Process_injection_technique
Dll_sideloading_technique

Industry:
Financial

Geo:
Georgia, Dubai, Australia, Singapore, Netherlands, India, Italy

TTPs:
Tactics: 6
Technics: 17

IOCs:
Url: 6
Hash: 183
File: 3
Command: 2

Softs:
zcash, task scheduler, telegram

Functions:
GetRegEx, SetOnline, GetAddress, SendRequest
#ParsedReport
03-11-2022

Family Tree: Related DLL-Sideloading Cases Bear Strange Fruit

https://news.sophos.com/en-us/2022/11/03/family-tree-related-dll-sideloading-cases-bear-strange-fruit

Actors/Campaigns:
Red_delta
Luminousmoth

Threats:
Dll_sideloading_technique
Revil
Cobalt_strike
Metasploit_tool
Netcat_tool
Uac_bypass_technique
Plugx_rat
Shadowpad
Process_hollowing_technique
Trochilus_rat
Tofsee
Netsky
Gh0st_rat
Solarmarker
Trickbot

Industry:
Government

Geo:
Chinese, China, Asia

TTPs:

IOCs:
IP: 10
File: 57
Path: 65
Command: 2
Hash: 30
Registry: 9

Softs:
windows search, "curl, chromium

Functions:
sendSAS, API

Win API:
GetTickCount

Links:
https://gist.github.com/dezhub/c0fee68d1e06657a45ec39365362fca7
https://github.com/sophoslabs/IoCs
https://gist.github.com/api0cradle/d4aaef39db0d845627d819b2b6b30512
https://github.com/m0n0ph1/malware-1/blob/master/Trochilus/bin/Bin/vtcp.dll
#rstcloud

+ 4 online-sandbox в источниках IOC

- Хэши самого загруженного файла + хэши вредоносов, которые он дропает.
- Если разобран конфиг вредоноса, забираем оттуда C2 и прочие сетевые ресурсы.
#rstcloud
Как-то так... (срез по всем источникам)
#ParsedReport
04-11-2022

. Analysis of typical mining family series Outlaw (dead) mining zombie network

https://www.antiy.cn/research/notice&report/research_report/20221103.html

Threats:
Hezb
Kthmimu
Perlbot
Shellshock_vuln
Haiduc_tool
Drupalgeddon_vuln
Xhide_tool
Xmrig_miner
Ethminer
Upx_tool

Industry:
Financial, Iot, Government, Education, Energy

Geo:
Romanian, Romania, Chinese

CVEs:
CVE-2018-7600 [Vulners]
Vulners: Score: 7.5, CVSS: 7.4,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- drupal (le7.57, <8.3.9, <8.4.6, <8.5.1)
- debian debian linux (9.0, 8.0, 7.0)

CVE-2014-7169 [Vulners]
Vulners: Score: 10.0, CVSS: 4.6,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- gnu bash (1.14.0, 1.14.1, 2.0, 2.01, 2.05, 3.0, 4.1, 4.2, 1.14.2, 1.14.3, 2.01.1, 2.02, 3.0.16, 3.1, 4.3, 1.14.4, 1.14.5, 2.02.1, 2.03, 2.04, 3.2, 3.2.48, 1.14.6, 1.14.7, 2.05, 2.05, 4.0, 4.0)

CVE-2017-1000117 [Vulners]
Vulners: Score: 6.8, CVSS: 3.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- git-scm git (2.11.0, 2.9.0, 2.9.0, 2.8.0, 2.11.0, 2.8.0, 2.9.0, 2.9.1, 2.11.0, 2.11.1, 2.13.1, 2.13.2, le2.7.5, 2.10.0, 2.10.0, 2.10.0, 2.13.0, 2.12.0, 2.11.0, 2.8.2, 2.8.3, 2.10.0, 2.10.1, 2.12.1, 2.12.2, 2.14.0, 2.13.0, 2.12.0, 2.12.0, 2.11.0, 2.9.0, 2.8.0, 2.8.4, 2.8.5, 2.10.2, 2.10.3, 2.12.3, 2.13.0, 2.8.0, 2.14.0, 2.14.0, 2.13.0, 2.8.0, 2.8.1, 2.9.2, 2.9.3, 2.9.4, 2.11.2, 2.12.0, 2.13.3, 2.13.4)


TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 18
IP: 60
Coin: 4
Url: 100
Email: 4
Domain: 6
Hash: 48

Algorithms:
base64

Languages:
perl, php

Platforms:
intel
#ParsedReport
07-11-2022

Ransomware Spotlight: BlackCat

https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat

Actors/Campaigns:
Blackcat
Darkside
Blackmatter

Threats:
Blackcat
Blackbasta
Blackbyte
Lockbit
Conti
Ransomexx
Exmatter_tool
Eamfo
Adfind_tool
Adrecon
Process_hacker_tool
Mimikatz_tool
Megasync_tool
Teamviewer_tool

Industry:
Energy, Ics, E-commerce, Financial

Geo:
Pacific, Australia

CVEs:
CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26857 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2010, 2013, 2019, 2016, 2019, 2016)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26858 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)


TTPs:
Tactics: 8
Technics: 21

IOCs:
File: 14

Softs:
psexec, winscp, esxi, dbsnmp, encsvc, onenote, powerpnt, thebat, wordpad, msexchange, have more...

Algorithms:
7zip

Win API:
NetShareEnum

Win Services:
VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc, WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, have more...

Languages:
rust

Platforms:
intel

Links:
https://github.com/ParrotSec/mimikatz
#ParsedReport
07-11-2022

BlueFox Stealer: a newcomer designed for traffers teams

https://blog.sekoia.io/bluefox-information-stealer-traffer-maas

Threats:
Bluefox_stealer
Traffer
Raccoon_stealer
Erbium_stealer
Redline_stealer
Vidar_stealer
Aurora
Lumma_stealer
Mars_stealer
Smokeloader
Privateloader
Mixloader

Industry:
E-commerce, Financial

Geo:
Russian

TTPs:
Tactics: 7
Technics: 17

IOCs:
Command: 1
File: 1
Hash: 11

Softs:
telegram, omium, edg, google chrome, microsoft edge, windows registry, (chromium, chrome, opera, tronlink, binancechain, have more...

Platforms:
x86

YARA: Found

Links:
https://github.com/SEKOIA-IO/Community/tree/main/IOCs/bluefox
#ParsedReport
07-11-2022

Get a demo. Inside the Yanluowang Leak: Organization, Members, and Tactics

https://darktrace.com/blog/inside-the-yanluowang-leak-organization-members-and-tactics

Actors/Campaigns:
Evil_corp
Wizard_spider

Threats:
Yanluowang
Fivehands
Credential_harvesting_technique
Saint_tool
Payloadbin
Conti
Revil
Checkmate
Babuk
Rook
Pandora

Industry:
Financial

Geo:
Ukrainian, Chinese, Ukraine, Russian

IOCs:
File: 1
#ParsedReport
07-11-2022

Massive Phishing Campaigns Target India Banks Clients

https://www.trendmicro.com/en_us/research/22/k/massive-phishing-campaigns-target-india-banks-clients.html

Threats:
Drinik
Fakereward
Axbanker
Icrat
Icspy

Industry:
Financial

Geo:
Indian, India

IOCs:
Hash: 54
IP: 3
Url: 1
File: 2

Softs:
android

Functions:
and
#ParsedReport
07-11-2022

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

https://www.sentinelone.com/labs/socgholish-diversifies-and-expands-its-malware-staging-infrastructure-to-counter-defenders

Actors/Campaigns:
Evil_corp

Threats:
Socgholish_loader
Cobalt_strike
Netsupportmanager_rat
Wastedlocker

Geo:
Netherlands, France

IOCs:
Url: 2
Domain: 1

Algorithms:
base64

Languages:
javascript
#ParsedReport
08-11-2022

LockBit 3.0 Being Distributed via Amadey Bot

https://asec.ahnlab.com/en/41450

Actors/Campaigns:
Ta505

Threats:
Amadey
Lockbit
Gandcrab
Flawedammyy
Clop
Smokeloader
Trojan/lnk.runner
Malware/win.generic.r531852
Delf
Ransom/mdp.decoy.m1171
Ransom/mdp.event.m1875
Ransom/mdp.behavior.m1946

Geo:
Korea, Korean

IOCs:
File: 8
Path: 7
Command: 2
Coin: 1
Hash: 8
Url: 7

Softs:
task scheduler
#ParsedReport
08-11-2022

Blue Team Debriefing STEEP#MAVERICK Edition

https://www.securonix.com/blog/blue-team-debriefing-steepmaverick-edition

Actors/Campaigns:
Steep_maverick

Algorithms:
zip

Links:
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md
#ParsedReport
08-11-2022

CHAOS Ransomware YASHMA Wreaking Havoc

https://labs.k7computing.com/index.php/chaos-ransomware-yashma-wreaking-havoc

Threats:
Chaos
Yashma
Havoc

Industry:
Financial

Geo:
Azerbaijani, Turkish, India

IOCs:
Registry: 1
File: 2
Hash: 1

Softs:
telegram

Functions:
forbiddencountry, registryvalue, Value, sleep, stopbackupservices