CTT Report Hub
3.21K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
07-11-2022

Ransomware Spotlight: BlackCat

https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-blackcat

Actors/Campaigns:
Blackcat
Darkside
Blackmatter

Threats:
Blackcat
Blackbasta
Blackbyte
Lockbit
Conti
Ransomexx
Exmatter_tool
Eamfo
Adfind_tool
Adrecon
Process_hacker_tool
Mimikatz_tool
Megasync_tool
Teamviewer_tool

Industry:
Energy, Ics, E-commerce, Financial

Geo:
Pacific, Australia

CVEs:
CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26857 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2010, 2013, 2019, 2016, 2019, 2016)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26858 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)


TTPs:
Tactics: 8
Technics: 21

IOCs:
File: 14

Softs:
psexec, winscp, esxi, dbsnmp, encsvc, onenote, powerpnt, thebat, wordpad, msexchange, have more...

Algorithms:
7zip

Win API:
NetShareEnum

Win Services:
VeeamNFSSvc, VeeamTransportSvc, VeeamDeploymentSvc, WSBExchange, PDVFSService, BackupExecVSSProvider, BackupExecAgentAccelerator, BackupExecAgentBrowser, BackupExecDiveciMediaService, BackupExecJobEngine, have more...

Languages:
rust

Platforms:
intel

Links:
https://github.com/ParrotSec/mimikatz
#ParsedReport
07-11-2022

BlueFox Stealer: a newcomer designed for traffers teams

https://blog.sekoia.io/bluefox-information-stealer-traffer-maas

Threats:
Bluefox_stealer
Traffer
Raccoon_stealer
Erbium_stealer
Redline_stealer
Vidar_stealer
Aurora
Lumma_stealer
Mars_stealer
Smokeloader
Privateloader
Mixloader

Industry:
E-commerce, Financial

Geo:
Russian

TTPs:
Tactics: 7
Technics: 17

IOCs:
Command: 1
File: 1
Hash: 11

Softs:
telegram, omium, edg, google chrome, microsoft edge, windows registry, (chromium, chrome, opera, tronlink, binancechain, have more...

Platforms:
x86

YARA: Found

Links:
https://github.com/SEKOIA-IO/Community/tree/main/IOCs/bluefox
#ParsedReport
07-11-2022

Get a demo. Inside the Yanluowang Leak: Organization, Members, and Tactics

https://darktrace.com/blog/inside-the-yanluowang-leak-organization-members-and-tactics

Actors/Campaigns:
Evil_corp
Wizard_spider

Threats:
Yanluowang
Fivehands
Credential_harvesting_technique
Saint_tool
Payloadbin
Conti
Revil
Checkmate
Babuk
Rook
Pandora

Industry:
Financial

Geo:
Ukrainian, Chinese, Ukraine, Russian

IOCs:
File: 1
#ParsedReport
07-11-2022

Massive Phishing Campaigns Target India Banks Clients

https://www.trendmicro.com/en_us/research/22/k/massive-phishing-campaigns-target-india-banks-clients.html

Threats:
Drinik
Fakereward
Axbanker
Icrat
Icspy

Industry:
Financial

Geo:
Indian, India

IOCs:
Hash: 54
IP: 3
Url: 1
File: 2

Softs:
android

Functions:
and
#ParsedReport
07-11-2022

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

https://www.sentinelone.com/labs/socgholish-diversifies-and-expands-its-malware-staging-infrastructure-to-counter-defenders

Actors/Campaigns:
Evil_corp

Threats:
Socgholish_loader
Cobalt_strike
Netsupportmanager_rat
Wastedlocker

Geo:
Netherlands, France

IOCs:
Url: 2
Domain: 1

Algorithms:
base64

Languages:
javascript
#ParsedReport
08-11-2022

LockBit 3.0 Being Distributed via Amadey Bot

https://asec.ahnlab.com/en/41450

Actors/Campaigns:
Ta505

Threats:
Amadey
Lockbit
Gandcrab
Flawedammyy
Clop
Smokeloader
Trojan/lnk.runner
Malware/win.generic.r531852
Delf
Ransom/mdp.decoy.m1171
Ransom/mdp.event.m1875
Ransom/mdp.behavior.m1946

Geo:
Korea, Korean

IOCs:
File: 8
Path: 7
Command: 2
Coin: 1
Hash: 8
Url: 7

Softs:
task scheduler
#ParsedReport
08-11-2022

Blue Team Debriefing STEEP#MAVERICK Edition

https://www.securonix.com/blog/blue-team-debriefing-steepmaverick-edition

Actors/Campaigns:
Steep_maverick

Algorithms:
zip

Links:
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md
#ParsedReport
08-11-2022

CHAOS Ransomware YASHMA Wreaking Havoc

https://labs.k7computing.com/index.php/chaos-ransomware-yashma-wreaking-havoc

Threats:
Chaos
Yashma
Havoc

Industry:
Financial

Geo:
Azerbaijani, Turkish, India

IOCs:
Registry: 1
File: 2
Hash: 1

Softs:
telegram

Functions:
forbiddencountry, registryvalue, Value, sleep, stopbackupservices
#ParsedReport
08-11-2022

Pro-Russian hacktivists targeting adversaries with Killnet ransomware

https://blog.cyble.com/2022/11/08/pro-russian-hacktivists-targeting-adversaries-with-killnet-ransomware

Actors/Campaigns:
Killnet (motivation: hacktivism)

Threats:
Chaos
Tsunami_botnet
Beacon

Industry:
Financial

Geo:
Georgia, Singapore, Dubai, Ukraine, India, Russia, Australia, Russian

TTPs:
Tactics: 3
Technics: 3

IOCs:
Coin: 1
Path: 1
File: 1
IP: 1
Hash: 1

Softs:
telegram
#ParsedReport
08-11-2022

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework. Introduction

https://www.trendmicro.com/en_us/research/22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html

Threats:
Deimosc2_tool
Cobalt_strike
Brc4_tool
Sliver_tool
Aresc2_tool
Poshc2_tool
Trevorc2_tool
Metasploit_tool
Phpsploit
Merlin_tool
Screengrab
Minidump_tool
Lsadump_tool
Ntdsdump
Nmap_tool

IOCs:
Domain: 1
File: 2
IP: 43

Softs:
debian, macos, android, ubuntu

Algorithms:
rsa-2048, aes

Links:
https://github.com/unixpickle/gobfuscate
https://github.com/trendmicro/research/blob/main/deimosc2/deimosc2\_iocs.csv
https://github.com/DeimosC2/DeimosC2/commit/4d4e3160219cfaffd1572eb6aa68470007c76fc1
https://github.com/trendmicro/research/tree/main/deimosc2
#ParsedReport
08-11-2022

Massive YouTube Campaign Targeting Over 100 Applications to Deliver Info Stealer

https://blog.cyble.com/2022/11/08/massive-youtube-campaign-targeting-over-100-applications-to-deliver-info-stealer

Threats:
Pennywise
Redline_stealer
Vidar_stealer
Record_breaker_stealer
Sapphire
Avemaria_rat
Redrum
Raccoon_stealer
Beacon
Process_injection_technique
Process_hollowing_technique

Industry:
Entertainment, E-commerce, Financial

Geo:
Singapore, Australia, Dubai, Georgia, India

TTPs:
Tactics: 7
Technics: 14

IOCs:
Url: 9
IP: 1
Hash: 4

Softs:
autocad, adobe illustrator, photoshop

Languages:
rust
#technique

Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence.

https://github.com/mazen160/shennina
#ParsedReport
09-11-2022

Emotet returns Targeting Users Worldwide. Conclusion

https://blog.cyble.com/2022/11/09/emotet-returns-targeting-users-worldwide

Threats:
Emotet
Icedid
Bumblebee
Trickbot
Qakbot

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai

TTPs:
Tactics: 7
Technics: 12

IOCs:
Url: 8
IP: 20
Path: 2
File: 2
Hash: 5

Softs:
microsoft office, task scheduler

Algorithms:
zip
#ParsedReport
09-11-2022

BlackCat Ransomware: Tactics and Techniques From a Targeted Attack

https://www.netskope.com/blog/blackcat-ransomware-tactics-and-techniques-from-a-targeted-attack

Actors/Campaigns:
Blackcat
Darkside
Blackmatter
Fin12
Dev-0504

Threats:
Blackcat
Ryuk
Conti
Revil
Exmatter_tool
Teamviewer_tool
Wevtutil_tool
Redline_stealer
Lockbit

Industry:
Ics, Government

Geo:
Asia, Africa, Americas

TTPs:
Tactics: 11
Technics: 15

IOCs:
Command: 6
Path: 5
File: 13

Softs:
psexec, esxi, onenote, thebat, wordpad, discord

Algorithms:
aes, chacha20, aes-128, zip

Win API:
Sleep

Win Services:
agntsvc, dbeng50, dbsnmp, encsvc, infopath, isqlplussvc, mydesktopqos, mydesktopservice, ocautoupds, ocomm, have more...

Languages:
rust

Platforms:
x86, intel

Links:
https://github.com/mkaring/ConfuserEx
https://github.com/f0wl/blackCatConf