CTT Report Hub
3.22K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
04-11-2022

. Analysis of typical mining family series Outlaw (dead) mining zombie network

https://www.antiy.cn/research/notice&report/research_report/20221103.html

Threats:
Hezb
Kthmimu
Perlbot
Shellshock_vuln
Haiduc_tool
Drupalgeddon_vuln
Xhide_tool
Xmrig_miner
Ethminer
Upx_tool

Industry:
Financial, Iot, Government, Education, Energy

Geo:
Romanian, Romania, Chinese

CVEs:
CVE-2018-7600 [Vulners]
Vulners: Score: 7.5, CVSS: 7.4,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- drupal (le7.57, <8.3.9, <8.4.6, <8.5.1)
- debian debian linux (9.0, 8.0, 7.0)

CVE-2014-7169 [Vulners]
Vulners: Score: 10.0, CVSS: 4.6,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- gnu bash (1.14.0, 1.14.1, 2.0, 2.01, 2.05, 3.0, 4.1, 4.2, 1.14.2, 1.14.3, 2.01.1, 2.02, 3.0.16, 3.1, 4.3, 1.14.4, 1.14.5, 2.02.1, 2.03, 2.04, 3.2, 3.2.48, 1.14.6, 1.14.7, 2.05, 2.05, 4.0, 4.0)

CVE-2017-1000117 [Vulners]
Vulners: Score: 6.8, CVSS: 3.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- git-scm git (2.11.0, 2.9.0, 2.9.0, 2.8.0, 2.11.0, 2.8.0, 2.9.0, 2.9.1, 2.11.0, 2.11.1, 2.13.1, 2.13.2, le2.7.5, 2.10.0, 2.10.0, 2.10.0, 2.13.0, 2.12.0, 2.11.0, 2.8.2, 2.8.3, 2.10.0, 2.10.1, 2.12.1, 2.12.2, 2.14.0, 2.13.0, 2.12.0, 2.12.0, 2.11.0, 2.9.0, 2.8.0, 2.8.4, 2.8.5, 2.10.2, 2.10.3, 2.12.3, 2.13.0, 2.8.0, 2.14.0, 2.14.0, 2.13.0, 2.8.0, 2.8.1, 2.9.2, 2.9.3, 2.9.4, 2.11.2, 2.12.0, 2.13.3, 2.13.4)


TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 18
IP: 60
Coin: 4
Url: 100
Email: 4
Domain: 6
Hash: 48

Algorithms:
base64

Languages:
perl, php

Platforms:
intel
#ParsedReport
07-11-2022

Ransomware Spotlight: BlackCat

https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat

Actors/Campaigns:
Blackcat
Darkside
Blackmatter

Threats:
Blackcat
Blackbasta
Blackbyte
Lockbit
Conti
Ransomexx
Exmatter_tool
Eamfo
Adfind_tool
Adrecon
Process_hacker_tool
Mimikatz_tool
Megasync_tool
Teamviewer_tool

Industry:
Energy, Ics, E-commerce, Financial

Geo:
Pacific, Australia

CVEs:
CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26857 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2010, 2013, 2019, 2016, 2019, 2016)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26858 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)


TTPs:
Tactics: 8
Technics: 21

IOCs:
File: 14

Softs:
psexec, winscp, esxi, dbsnmp, encsvc, onenote, powerpnt, thebat, wordpad, msexchange, have more...

Algorithms:
7zip

Win API:
NetShareEnum

Win Services:
VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc, WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, have more...

Languages:
rust

Platforms:
intel

Links:
https://github.com/ParrotSec/mimikatz
#ParsedReport
07-11-2022

BlueFox Stealer: a newcomer designed for traffers teams

https://blog.sekoia.io/bluefox-information-stealer-traffer-maas

Threats:
Bluefox_stealer
Traffer
Raccoon_stealer
Erbium_stealer
Redline_stealer
Vidar_stealer
Aurora
Lumma_stealer
Mars_stealer
Smokeloader
Privateloader
Mixloader

Industry:
E-commerce, Financial

Geo:
Russian

TTPs:
Tactics: 7
Technics: 17

IOCs:
Command: 1
File: 1
Hash: 11

Softs:
telegram, omium, edg, google chrome, microsoft edge, windows registry, (chromium, chrome, opera, tronlink, binancechain, have more...

Platforms:
x86

YARA: Found

Links:
https://github.com/SEKOIA-IO/Community/tree/main/IOCs/bluefox
#ParsedReport
07-11-2022

Get a demo. Inside the Yanluowang Leak: Organization, Members, and Tactics

https://darktrace.com/blog/inside-the-yanluowang-leak-organization-members-and-tactics

Actors/Campaigns:
Evil_corp
Wizard_spider

Threats:
Yanluowang
Fivehands
Credential_harvesting_technique
Saint_tool
Payloadbin
Conti
Revil
Checkmate
Babuk
Rook
Pandora

Industry:
Financial

Geo:
Ukrainian, Chinese, Ukraine, Russian

IOCs:
File: 1
#ParsedReport
07-11-2022

Massive Phishing Campaigns Target India Banks Clients

https://www.trendmicro.com/en_us/research/22/k/massive-phishing-campaigns-target-india-banks-clients.html

Threats:
Drinik
Fakereward
Axbanker
Icrat
Icspy

Industry:
Financial

Geo:
Indian, India

IOCs:
Hash: 54
IP: 3
Url: 1
File: 2

Softs:
android

Functions:
and
#ParsedReport
07-11-2022

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

https://www.sentinelone.com/labs/socgholish-diversifies-and-expands-its-malware-staging-infrastructure-to-counter-defenders

Actors/Campaigns:
Evil_corp

Threats:
Socgholish_loader
Cobalt_strike
Netsupportmanager_rat
Wastedlocker

Geo:
Netherlands, France

IOCs:
Url: 2
Domain: 1

Algorithms:
base64

Languages:
javascript
#ParsedReport
08-11-2022

LockBit 3.0 Being Distributed via Amadey Bot

https://asec.ahnlab.com/en/41450

Actors/Campaigns:
Ta505

Threats:
Amadey
Lockbit
Gandcrab
Flawedammyy
Clop
Smokeloader
Trojan/lnk.runner
Malware/win.generic.r531852
Delf
Ransom/mdp.decoy.m1171
Ransom/mdp.event.m1875
Ransom/mdp.behavior.m1946

Geo:
Korea, Korean

IOCs:
File: 8
Path: 7
Command: 2
Coin: 1
Hash: 8
Url: 7

Softs:
task scheduler
#ParsedReport
08-11-2022

Blue Team Debriefing STEEP#MAVERICK Edition

https://www.securonix.com/blog/blue-team-debriefing-steepmaverick-edition

Actors/Campaigns:
Steep_maverick

Algorithms:
zip

Links:
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md
#ParsedReport
08-11-2022

CHAOS Ransomware YASHMA Wreaking Havoc

https://labs.k7computing.com/index.php/chaos-ransomware-yashma-wreaking-havoc

Threats:
Chaos
Yashma
Havoc

Industry:
Financial

Geo:
Azerbaijani, Turkish, India

IOCs:
Registry: 1
File: 2
Hash: 1

Softs:
telegram

Functions:
forbiddencountry, registryvalue, Value, sleep, stopbackupservices
#ParsedReport
08-11-2022

Pro-Russian hacktivists targeting adversaries with Killnet ransomware

https://blog.cyble.com/2022/11/08/pro-russian-hacktivists-targeting-adversaries-with-killnet-ransomware

Actors/Campaigns:
Killnet (motivation: hacktivism)

Threats:
Chaos
Tsunami_botnet
Beacon

Industry:
Financial

Geo:
Georgia, Singapore, Dubai, Ukraine, India, Russia, Australia, Russian

TTPs:
Tactics: 3
Technics: 3

IOCs:
Coin: 1
Path: 1
File: 1
IP: 1
Hash: 1

Softs:
telegram
#ParsedReport
08-11-2022

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework. Introduction

https://www.trendmicro.com/en_us/research/22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html

Threats:
Deimosc2_tool
Cobalt_strike
Brc4_tool
Sliver_tool
Aresc2_tool
Poshc2_tool
Trevorc2_tool
Metasploit_tool
Phpsploit
Merlin_tool
Screengrab
Minidump_tool
Lsadump_tool
Ntdsdump
Nmap_tool

IOCs:
Domain: 1
File: 2
IP: 43

Softs:
debian, macos, android, ubuntu

Algorithms:
rsa-2048, aes

Links:
https://github.com/unixpickle/gobfuscate
https://github.com/trendmicro/research/blob/main/deimosc2/deimosc2\_iocs.csv
https://github.com/DeimosC2/DeimosC2/commit/4d4e3160219cfaffd1572eb6aa68470007c76fc1
https://github.com/trendmicro/research/tree/main/deimosc2
#ParsedReport
08-11-2022

Massive YouTube Campaign Targeting Over 100 Applications to Deliver Info Stealer

https://blog.cyble.com/2022/11/08/massive-youtube-campaign-targeting-over-100-applications-to-deliver-info-stealer

Threats:
Pennywise
Redline_stealer
Vidar_stealer
Record_breaker_stealer
Sapphire
Avemaria_rat
Redrum
Raccoon_stealer
Beacon
Process_injection_technique
Process_hollowing_technique

Industry:
Entertainment, E-commerce, Financial

Geo:
Singapore, Australia, Dubai, Georgia, India

TTPs:
Tactics: 7
Technics: 14

IOCs:
Url: 9
IP: 1
Hash: 4

Softs:
autocad, adobe illustrator, photoshop

Languages:
rust
#technique

Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence.

https://github.com/mazen160/shennina
#ParsedReport
09-11-2022

Emotet returns Targeting Users Worldwide. Conclusion

https://blog.cyble.com/2022/11/09/emotet-returns-targeting-users-worldwide

Threats:
Emotet
Icedid
Bumblebee
Trickbot
Qakbot

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai

TTPs:
Tactics: 7
Technics: 12

IOCs:
Url: 8
IP: 20
Path: 2
File: 2
Hash: 5

Softs:
microsoft office, task scheduler

Algorithms:
zip