CTT Report Hub
3.21K subscribers
7.91K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
09-11-2022

The Case of Cloud9 Chrome Botnet

https://www.zimperium.com/blog/the-case-of-cloud9-chrome-botnet

Actors/Campaigns:
Keksec

Threats:
Cloud9_botnet

Industry:
Energy

CVEs:
CVE-2016-7200 [Vulners]
Vulners: Score: 7.6, CVSS: 6.9,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft edge (*)

CVE-2019-11708 [Vulners]
Vulners: Score: 10.0, CVSS: 4.2,
Vulners: Exploitation: True
X-Force: Risk: 6.3
X-Force: Patch: Official fix
Soft:
- mozilla firefox esr (<60.7.2)
- mozilla firefox (<67.0.4)
- mozilla thunderbird (<60.7.2)

CVE-2016-0189 [Vulners]
Vulners: Score: 7.6, CVSS: 6.7,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft jscript (5.8)
- microsoft vbscript (5.8, 5.7)

CVE-2019-9810 [Vulners]
Vulners: Score: 6.8, CVSS: 3.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- mozilla firefox (<66.0.1)
- mozilla firefox esr (<60.6.1)
- mozilla thunderbird (<60.6.1)
- redhat enterprise linux (8.0)
- redhat enterprise linux eus (8.1, 8.2, 8.4)
have more...
CVE-2014-6332 [Vulners]
Vulners: Score: 9.3, CVSS: 6.5,
Vulners: Exploitation: True
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows 7 (-)
- microsoft windows vista (-)
- microsoft windows rt (-)
- microsoft windows rt 8.1 (-)
have more...

IOCs:
File: 7
IP: 2
Hash: 6

Softs:
chrome, google chrome, internet explorer

Languages:
javascript
#ParsedReport
09-11-2022

Get a demo. The resurgence of the raccoon: Steps of a Raccoon Stealer v2 Infection (Part 2)

https://darktrace.com/blog/the-resurgence-of-the-raccoon-steps-of-a-raccoon-stealer-v2-infection-part-2

Threats:
Raccoon_stealer
Cryptbot_stealer

Geo:
Russia, Italy, Russian, Netherlands

IOCs:
Domain: 7
File: 11

Softs:
telegram, discord

Algorithms:
rc4
#ParsedReport
09-11-2022

Get a demo. The last of its kind: Analysis of a Raccoon Stealer v1 infection (Part 1)

https://darktrace.com/blog/the-last-of-its-kind-analysis-of-a-raccoon-stealer-v1-infection-part-1

Threats:
Raccoon_stealer
Dead_drop_technique

Industry:
Financial

IOCs:
Domain: 5
IP: 2
Hash: 4
File: 1

Softs:
telegram, discord

Algorithms:
base64, gzip, rc4, zip
#ParsedReport
09-11-2022

Cisco Talos Intelligence Blog. Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns

https://blog.talosintelligence.com/ipfs-abuse

Threats:
Agent_tesla
Upx_tool
Hannabi_grabber
Beacon

Industry:
Financial

Geo:
Turkish

IOCs:
Url: 1
Command: 4
Path: 7
File: 4
Registry: 2

Softs:
discord, curl, windows registry, chrome, mozilla firefox

Algorithms:
zip, base64

Languages:
python

Links:
https://github.com/Cisco-Talos/IOCs/tree/main/2022/11
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/malware\_hannabi\_file\_artifact.yml
#ParsedReport
10-11-2022

Distribution of Word File (External + RTF) Modified to Avoid Detection

https://asec.ahnlab.com/en/41472

Threats:
Lokibot_stealer
Agent_tesla
Trojan/win.generic.c5290118
Trojan/win.msil.r510204
Malware/mdp.download.m1881

Geo:
Korea

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
File: 1
Coin: 1
Hash: 3
Url: 11

Softs:
microsoft office
#ParsedReport
10-11-2022

ASEC Weekly Malware Statistics (October 31st, 2022 November 6th, 2022)

https://asec.ahnlab.com/en/41650

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Smokeloader
Cloudeye
Formbook
Remcos_rat
Nanocore_rat
Amadey
Lockbit

Geo:
Korea

IOCs:
Domain: 9
Email: 1
File: 15
Url: 10

Softs:
discord, telegram, nsis installer, task scheduler

Languages:
visual_basic, php
#ParsedReport
10-11-2022

PNG Steganography Hides Backdoor. Conclusion

https://decoded.avast.io/martinchlumecky/png-steganography/?utm_source=rss&utm_medium=rss&utm_campaign=png-steganography

Actors/Campaigns:
Worok (motivation: cyber_espionage)

Threats:
Dll_hijacking_technique
Dropboxcontrol
Proxyshell_vuln
Clrloader
Pngloader
Powheartbeat

Industry:
Government, Energy

Geo:
America, Mexico, Asia, Cambodia, Russia, Vietnam, Africa

IOCs:
File: 14
Path: 5
Command: 1
Hash: 4

Softs:
windows service, microsoft visual c++, internet explorer

Algorithms:
gzip, xor

Functions:
DropBoxControl

Win API:
WmiApSrv, LoadLibraryExW, CorBindToRuntimeEx

Languages:
jscript
#ParsedReport
10-11-2022

They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming

https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming

Actors/Campaigns:
Duke

Threats:
Mimikatz_tool

CVEs:
CVE-2022-30170 [Vulners]
Vulners: Score: Unknown, CVSS: 4.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, 1809, 21h1, -, 21h2, 20h2)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
have more...

IOCs:
File: 3
Path: 1

Softs:
active directory, component object model

Languages:
python

Links:
https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0038/MNDT-2022-0038.md
#ParsedReport
10-11-2022

Hack the Real Box: APT41s New Subgroup Earth Longzhi

https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html

Actors/Campaigns:
Axiom (motivation: cyber_criminal)
Earth_baku

Threats:
Cobalt_strike
Symaticloader
Process_injection_technique
Htran
Bigpipeloader
Outloader
Croxloader
Multipipeloader
Printnightmare_vuln
Mimikatz_tool
Lsadump_tool
Dcsync_technique

Industry:
Aerospace, Healthcare, Government, Financial

Geo:
China, Taiwan, Malaysia, Ukraine, Pakistan, Thailand, Indonesia, Asia, Chinese

CVEs:
CVE-2019-16098 [Vulners]
Vulners: Score: 7.2, CVSS: 5.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Unavailable
Soft:
- msi afterburner (4.6.2.15658)

IOCs:
File: 12
Hash: 1

Algorithms:
base64, xor

Win API:
UpdateProcThreadAttribute, RtlDecompressBuffer, OpenProcess, PsSetCreateProcessNotifyRoutine, IoCreateDriver

Languages:
python

Platforms:
x64

Links:
https://github.com/itm4n/PrintSpoofer
https://github.com/HiwinCN/HTran
#ParsedReport
11-11-2022

HackHound IRC Bot Being Distributed via Webhards

https://asec.ahnlab.com/en/41806

Threats:
Njrat_rat
Udprat
Passview_tool
Hawkeye_keylogger
Condis_technique
Torhammer_technique
Trojan/win.korat.c5290614
Deathransom
Infostealer/win.agent.c5290619
Bladabindi
Ircbot
Trojan/win.agent.c5290070
Trojan/win.generic.r452668
Malware/mdp.behavior.m1693

Geo:
Korean

IOCs:
File: 3
Path: 2
Hash: 19
Domain: 6
Url: 1

Softs:
chrome, discord

Languages:
golang

Platforms:
x64
#ParsedReport
11-11-2022

#ShortAndMalicious: StrelaStealer aims for mail credentials. Execution via polyglot

https://medium.com/@DCSO_CyTec/shortandmalicious-strelastealer-aims-for-mail-credentials-a4c3e78c8abc

Threats:
Strela_stealer
Dll_sideloading_technique

Geo:
Moscow, Russian, Spanish

TTPs:
Tactics: 1
Technics: 6

IOCs:
File: 6
Path: 2
Hash: 13
IP: 1
Url: 1

Algorithms:
xor

Win API:
CryptUnprotectData

Links:
https://github.com/DCSO/Blog\_CyTec/blob/main/2022\_11\_\_short\_and\_malicious\_strela\_stealer/misp.event.json
#ParsedReport
11-11-2022

A Muddy, Advanced Persistent Teacher

https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/muddy-advanced-persistent-teacher.html

Actors/Campaigns:
Muddywater
Oilrig

Threats:
Zerologon_vuln

Industry:
Government, Financial, Education

Geo:
Iran, Israeli, Irans, Tehran, Iranian

CVEs:
CVE-2020-0688 [Vulners]
Vulners: Score: 9.0, CVSS: 3.3,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016, 2010)

CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...

IOCs:
File: 1
#ParsedReport
11-11-2022

New updated IceXLoader claims thousands of victims around the world

https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world

Threats:
Icexloader
Process_hollowing_technique
Nimbda_loader
Bazarnimrod
Process_injection_technique

Geo:
Chinese

TTPs:

IOCs:
Path: 8
Registry: 2
File: 4
Command: 2
Hash: 4
Url: 1

Softs:
net framework, windows defender

Win API:
AmsiScanBuffer

Languages:
javascript
#ParsedReport
11-11-2022

Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs

https://resources2.lookout.com/blog/uyghur-surveillance-campaign-badbazaar-moonshine

Actors/Campaigns:
Mirage
Nickel
Pitty_tiger
Emissary_panda
Earth_empusa

Threats:
Moonshine
Bahamut
Bazarbackdoor
Bazaar
Aitm_technique
Cmstar
Enfal
Doubleagent
Goldeneagle
Pluginphantom
Actionspy

Industry:
Telco, Government

Geo:
Asia, Afghanistan, Tibetan, Russia, Chinese, Turkey, Chinas, China

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 12
Hash: 1
Domain: 4
Email: 1
IP: 2

Softs:
android, telegram, wechat

Algorithms:
xor, gzip, aes, base64

Platforms:
apple

Links:
https://github.com/Tencent/wcdb