CTT Report Hub
3.21K subscribers
7.91K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#technique

Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence.

https://github.com/mazen160/shennina
#ParsedReport
09-11-2022

Emotet returns Targeting Users Worldwide. Conclusion

https://blog.cyble.com/2022/11/09/emotet-returns-targeting-users-worldwide

Threats:
Emotet
Icedid
Bumblebee
Trickbot
Qakbot

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai

TTPs:
Tactics: 7
Technics: 12

IOCs:
Url: 8
IP: 20
Path: 2
File: 2
Hash: 5

Softs:
microsoft office, task scheduler

Algorithms:
zip
#ParsedReport
09-11-2022

BlackCat Ransomware: Tactics and Techniques From a Targeted Attack

https://www.netskope.com/blog/blackcat-ransomware-tactics-and-techniques-from-a-targeted-attack

Actors/Campaigns:
Blackcat
Darkside
Blackmatter
Fin12
Dev-0504

Threats:
Blackcat
Ryuk
Conti
Revil
Exmatter_tool
Teamviewer_tool
Wevtutil_tool
Redline_stealer
Lockbit

Industry:
Ics, Government

Geo:
Asia, Africa, Americas

TTPs:
Tactics: 11
Technics: 15

IOCs:
Command: 6
Path: 5
File: 13

Softs:
psexec, esxi, onenote, thebat, wordpad, discord

Algorithms:
aes, chacha20, aes-128, zip

Win API:
Sleep

Win Services:
agntsvc, dbeng50, dbsnmp, encsvc, infopath, isqlplussvc, mydesktopqos, mydesktopservice, ocautoupds, ocomm, have more...

Languages:
rust

Platforms:
x86, intel

Links:
https://github.com/mkaring/ConfuserEx
https://github.com/f0wl/blackCatConf
#ParsedReport
09-11-2022

Amadey Bot: Ransomware Affiliates Spreading LockBit By Phishing Email

https://www.secureblink.com/threat-research/amadey-bot-ransomware-affiliates-spreading-lock-bit-by-phishing-email

Actors/Campaigns:
Ta505

Threats:
Amadey
Lockbit
Gandcrab
Clop
Flawedammyy
Smokeloader
Trojan/lnk.runner
Malware/win.generic.r531852
Delf
Ransom/mdp.decoy.m1171
Ransom/mdp.event.m1875
Ransom/mdp.behavior.m1946

Industry:
E-commerce

Geo:
Korea, Korean

IOCs:
File: 9
Path: 7
Command: 2
Coin: 1
Hash: 8
Url: 7

Softs:
task scheduler
#ParsedReport
09-11-2022

Sanctioned deals: the Irano-Russian connection under Ankara's supervision. Analysis of the NPPD leak

https://blog.cluster25.duskrise.com/2022/11/07/irano-russian-connection-nppd-leak

Actors/Campaigns:
Black_reward (motivation: hacktivism)
Irgc (motivation: hacktivism)
Carbanak

Threats:
Dharma
Mimikatz_tool
Phorpiex
Adwind_rat
Formbook
Suppobox
Narilam
Kuluoz

Industry:
Government, Petroleum, Financial, Nuclear_power, Transport, Energy, Logistic

Geo:
Russian, India, Azerbaijan, Russia, Asia, Iran, Turkish, Iranian, Turkey, Ankara, Tehran, Teheran, Ukrainian, Moscow

IOCs:
Hash: 19

Softs:
windows registry, ms sql

Languages:
autoit, php, java

Platforms:
intel
#ParsedReport
09-11-2022

. Vajrayana organization uses false social chat software to start fishing attacks on Pakistani military personnel

https://mp.weixin.qq.com/s/103MfZHdQ9lWlM6rSLfqcA

Actors/Campaigns:
Apt37

Threats:
Hyperssl
Ahmyth_rat

Industry:
Government, Healthcare

Geo:
Pakistan, India, Chinese, Pakistani, Asian, Nepal

IOCs:
File: 10

Softs:
android
#ParsedReport
09-11-2022

The Case of Cloud9 Chrome Botnet

https://www.zimperium.com/blog/the-case-of-cloud9-chrome-botnet

Actors/Campaigns:
Keksec

Threats:
Cloud9_botnet

Industry:
Energy

CVEs:
CVE-2016-7200 [Vulners]
Vulners: Score: 7.6, CVSS: 6.9,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft edge (*)

CVE-2019-11708 [Vulners]
Vulners: Score: 10.0, CVSS: 4.2,
Vulners: Exploitation: True
X-Force: Risk: 6.3
X-Force: Patch: Official fix
Soft:
- mozilla firefox esr (<60.7.2)
- mozilla firefox (<67.0.4)
- mozilla thunderbird (<60.7.2)

CVE-2016-0189 [Vulners]
Vulners: Score: 7.6, CVSS: 6.7,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft jscript (5.8)
- microsoft vbscript (5.8, 5.7)

CVE-2019-9810 [Vulners]
Vulners: Score: 6.8, CVSS: 3.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- mozilla firefox (<66.0.1)
- mozilla firefox esr (<60.6.1)
- mozilla thunderbird (<60.6.1)
- redhat enterprise linux (8.0)
- redhat enterprise linux eus (8.1, 8.2, 8.4)
have more...
CVE-2014-6332 [Vulners]
Vulners: Score: 9.3, CVSS: 6.5,
Vulners: Exploitation: True
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows 7 (-)
- microsoft windows vista (-)
- microsoft windows rt (-)
- microsoft windows rt 8.1 (-)
have more...

IOCs:
File: 7
IP: 2
Hash: 6

Softs:
chrome, google chrome, internet explorer

Languages:
javascript
#ParsedReport
09-11-2022

Get a demo. The resurgence of the raccoon: Steps of a Raccoon Stealer v2 Infection (Part 2)

https://darktrace.com/blog/the-resurgence-of-the-raccoon-steps-of-a-raccoon-stealer-v2-infection-part-2

Threats:
Raccoon_stealer
Cryptbot_stealer

Geo:
Russia, Italy, Russian, Netherlands

IOCs:
Domain: 7
File: 11

Softs:
telegram, discord

Algorithms:
rc4
#ParsedReport
09-11-2022

Get a demo. The last of its kind: Analysis of a Raccoon Stealer v1 infection (Part 1)

https://darktrace.com/blog/the-last-of-its-kind-analysis-of-a-raccoon-stealer-v1-infection-part-1

Threats:
Raccoon_stealer
Dead_drop_technique

Industry:
Financial

IOCs:
Domain: 5
IP: 2
Hash: 4
File: 1

Softs:
telegram, discord

Algorithms:
base64, gzip, rc4, zip
#ParsedReport
09-11-2022

Cisco Talos Intelligence Blog. Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns

https://blog.talosintelligence.com/ipfs-abuse

Threats:
Agent_tesla
Upx_tool
Hannabi_grabber
Beacon

Industry:
Financial

Geo:
Turkish

IOCs:
Url: 1
Command: 4
Path: 7
File: 4
Registry: 2

Softs:
discord, curl, windows registry, chrome, mozilla firefox

Algorithms:
zip, base64

Languages:
python

Links:
https://github.com/Cisco-Talos/IOCs/tree/main/2022/11
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/malware\_hannabi\_file\_artifact.yml
#ParsedReport
10-11-2022

Distribution of Word File (External + RTF) Modified to Avoid Detection

https://asec.ahnlab.com/en/41472

Threats:
Lokibot_stealer
Agent_tesla
Trojan/win.generic.c5290118
Trojan/win.msil.r510204
Malware/mdp.download.m1881

Geo:
Korea

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
File: 1
Coin: 1
Hash: 3
Url: 11

Softs:
microsoft office
#ParsedReport
10-11-2022

ASEC Weekly Malware Statistics (October 31st, 2022 November 6th, 2022)

https://asec.ahnlab.com/en/41650

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Smokeloader
Cloudeye
Formbook
Remcos_rat
Nanocore_rat
Amadey
Lockbit

Geo:
Korea

IOCs:
Domain: 9
Email: 1
File: 15
Url: 10

Softs:
discord, telegram, nsis installer, task scheduler

Languages:
visual_basic, php
#ParsedReport
10-11-2022

PNG Steganography Hides Backdoor. Conclusion

https://decoded.avast.io/martinchlumecky/png-steganography/?utm_source=rss&utm_medium=rss&utm_campaign=png-steganography

Actors/Campaigns:
Worok (motivation: cyber_espionage)

Threats:
Dll_hijacking_technique
Dropboxcontrol
Proxyshell_vuln
Clrloader
Pngloader
Powheartbeat

Industry:
Government, Energy

Geo:
America, Mexico, Asia, Cambodia, Russia, Vietnam, Africa

IOCs:
File: 14
Path: 5
Command: 1
Hash: 4

Softs:
windows service, microsoft visual c++, internet explorer

Algorithms:
gzip, xor

Functions:
DropBoxControl

Win API:
WmiApSrv, LoadLibraryExW, CorBindToRuntimeEx

Languages:
jscript
#ParsedReport
10-11-2022

They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming

https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming

Actors/Campaigns:
Duke

Threats:
Mimikatz_tool

CVEs:
CVE-2022-30170 [Vulners]
Vulners: Score: Unknown, CVSS: 4.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, 1809, 21h1, -, 21h2, 20h2)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
have more...

IOCs:
File: 3
Path: 1

Softs:
active directory, component object model

Languages:
python

Links:
https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0038/MNDT-2022-0038.md
#ParsedReport
10-11-2022

Hack the Real Box: APT41s New Subgroup Earth Longzhi

https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html

Actors/Campaigns:
Axiom (motivation: cyber_criminal)
Earth_baku

Threats:
Cobalt_strike
Symaticloader
Process_injection_technique
Htran
Bigpipeloader
Outloader
Croxloader
Multipipeloader
Printnightmare_vuln
Mimikatz_tool
Lsadump_tool
Dcsync_technique

Industry:
Aerospace, Healthcare, Government, Financial

Geo:
China, Taiwan, Malaysia, Ukraine, Pakistan, Thailand, Indonesia, Asia, Chinese

CVEs:
CVE-2019-16098 [Vulners]
Vulners: Score: 7.2, CVSS: 5.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Unavailable
Soft:
- msi afterburner (4.6.2.15658)

IOCs:
File: 12
Hash: 1

Algorithms:
base64, xor

Win API:
UpdateProcThreadAttribute, RtlDecompressBuffer, OpenProcess, PsSetCreateProcessNotifyRoutine, IoCreateDriver

Languages:
python

Platforms:
x64

Links:
https://github.com/itm4n/PrintSpoofer
https://github.com/HiwinCN/HTran