CTT Report Hub
3.21K subscribers
7.91K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
09-11-2022

Cisco Talos Intelligence Blog. Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns

https://blog.talosintelligence.com/ipfs-abuse

Threats:
Agent_tesla
Upx_tool
Hannabi_grabber
Beacon

Industry:
Financial

Geo:
Turkish

IOCs:
Url: 1
Command: 4
Path: 7
File: 4
Registry: 2

Softs:
discord, curl, windows registry, chrome, mozilla firefox

Algorithms:
zip, base64

Languages:
python

Links:
https://github.com/Cisco-Talos/IOCs/tree/main/2022/11
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/malware\_hannabi\_file\_artifact.yml
#ParsedReport
10-11-2022

Distribution of Word File (External + RTF) Modified to Avoid Detection

https://asec.ahnlab.com/en/41472

Threats:
Lokibot_stealer
Agent_tesla
Trojan/win.generic.c5290118
Trojan/win.msil.r510204
Malware/mdp.download.m1881

Geo:
Korea

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
File: 1
Coin: 1
Hash: 3
Url: 11

Softs:
microsoft office
#ParsedReport
10-11-2022

ASEC Weekly Malware Statistics (October 31st, 2022 November 6th, 2022)

https://asec.ahnlab.com/en/41650

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Smokeloader
Cloudeye
Formbook
Remcos_rat
Nanocore_rat
Amadey
Lockbit

Geo:
Korea

IOCs:
Domain: 9
Email: 1
File: 15
Url: 10

Softs:
discord, telegram, nsis installer, task scheduler

Languages:
visual_basic, php
#ParsedReport
10-11-2022

PNG Steganography Hides Backdoor. Conclusion

https://decoded.avast.io/martinchlumecky/png-steganography/?utm_source=rss&utm_medium=rss&utm_campaign=png-steganography

Actors/Campaigns:
Worok (motivation: cyber_espionage)

Threats:
Dll_hijacking_technique
Dropboxcontrol
Proxyshell_vuln
Clrloader
Pngloader
Powheartbeat

Industry:
Government, Energy

Geo:
America, Mexico, Asia, Cambodia, Russia, Vietnam, Africa

IOCs:
File: 14
Path: 5
Command: 1
Hash: 4

Softs:
windows service, microsoft visual c++, internet explorer

Algorithms:
gzip, xor

Functions:
DropBoxControl

Win API:
WmiApSrv, LoadLibraryExW, CorBindToRuntimeEx

Languages:
jscript
#ParsedReport
10-11-2022

They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming

https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming

Actors/Campaigns:
Duke

Threats:
Mimikatz_tool

CVEs:
CVE-2022-30170 [Vulners]
Vulners: Score: Unknown, CVSS: 4.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, 1809, 21h1, -, 21h2, 20h2)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
have more...

IOCs:
File: 3
Path: 1

Softs:
active directory, component object model

Languages:
python

Links:
https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0038/MNDT-2022-0038.md
#ParsedReport
10-11-2022

Hack the Real Box: APT41s New Subgroup Earth Longzhi

https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html

Actors/Campaigns:
Axiom (motivation: cyber_criminal)
Earth_baku

Threats:
Cobalt_strike
Symaticloader
Process_injection_technique
Htran
Bigpipeloader
Outloader
Croxloader
Multipipeloader
Printnightmare_vuln
Mimikatz_tool
Lsadump_tool
Dcsync_technique

Industry:
Aerospace, Healthcare, Government, Financial

Geo:
China, Taiwan, Malaysia, Ukraine, Pakistan, Thailand, Indonesia, Asia, Chinese

CVEs:
CVE-2019-16098 [Vulners]
Vulners: Score: 7.2, CVSS: 5.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Unavailable
Soft:
- msi afterburner (4.6.2.15658)

IOCs:
File: 12
Hash: 1

Algorithms:
base64, xor

Win API:
UpdateProcThreadAttribute, RtlDecompressBuffer, OpenProcess, PsSetCreateProcessNotifyRoutine, IoCreateDriver

Languages:
python

Platforms:
x64

Links:
https://github.com/itm4n/PrintSpoofer
https://github.com/HiwinCN/HTran
#ParsedReport
11-11-2022

HackHound IRC Bot Being Distributed via Webhards

https://asec.ahnlab.com/en/41806

Threats:
Njrat_rat
Udprat
Passview_tool
Hawkeye_keylogger
Condis_technique
Torhammer_technique
Trojan/win.korat.c5290614
Deathransom
Infostealer/win.agent.c5290619
Bladabindi
Ircbot
Trojan/win.agent.c5290070
Trojan/win.generic.r452668
Malware/mdp.behavior.m1693

Geo:
Korean

IOCs:
File: 3
Path: 2
Hash: 19
Domain: 6
Url: 1

Softs:
chrome, discord

Languages:
golang

Platforms:
x64
#ParsedReport
11-11-2022

#ShortAndMalicious: StrelaStealer aims for mail credentials. Execution via polyglot

https://medium.com/@DCSO_CyTec/shortandmalicious-strelastealer-aims-for-mail-credentials-a4c3e78c8abc

Threats:
Strela_stealer
Dll_sideloading_technique

Geo:
Moscow, Russian, Spanish

TTPs:
Tactics: 1
Technics: 6

IOCs:
File: 6
Path: 2
Hash: 13
IP: 1
Url: 1

Algorithms:
xor

Win API:
CryptUnprotectData

Links:
https://github.com/DCSO/Blog\_CyTec/blob/main/2022\_11\_\_short\_and\_malicious\_strela\_stealer/misp.event.json
#ParsedReport
11-11-2022

A Muddy, Advanced Persistent Teacher

https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/muddy-advanced-persistent-teacher.html

Actors/Campaigns:
Muddywater
Oilrig

Threats:
Zerologon_vuln

Industry:
Government, Financial, Education

Geo:
Iran, Israeli, Irans, Tehran, Iranian

CVEs:
CVE-2020-0688 [Vulners]
Vulners: Score: 9.0, CVSS: 3.3,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016, 2010)

CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...

IOCs:
File: 1
#ParsedReport
11-11-2022

New updated IceXLoader claims thousands of victims around the world

https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world

Threats:
Icexloader
Process_hollowing_technique
Nimbda_loader
Bazarnimrod
Process_injection_technique

Geo:
Chinese

TTPs:

IOCs:
Path: 8
Registry: 2
File: 4
Command: 2
Hash: 4
Url: 1

Softs:
net framework, windows defender

Win API:
AmsiScanBuffer

Languages:
javascript
#ParsedReport
11-11-2022

Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs

https://resources2.lookout.com/blog/uyghur-surveillance-campaign-badbazaar-moonshine

Actors/Campaigns:
Mirage
Nickel
Pitty_tiger
Emissary_panda
Earth_empusa

Threats:
Moonshine
Bahamut
Bazarbackdoor
Bazaar
Aitm_technique
Cmstar
Enfal
Doubleagent
Goldeneagle
Pluginphantom
Actionspy

Industry:
Telco, Government

Geo:
Asia, Afghanistan, Tibetan, Russia, Chinese, Turkey, Chinas, China

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 12
Hash: 1
Domain: 4
Email: 1
IP: 2

Softs:
android, telegram, wechat

Algorithms:
xor, gzip, aes, base64

Platforms:
apple

Links:
https://github.com/Tencent/wcdb
#ParsedReport
11-11-2022

-\| APT MacOS. According to the characteristics of the sample behavior, C2, and open source intelligence, the organization behind the attack is "Sea Lotus" APT.

https://mp.weixin.qq.com/s/2tdgA5mhTL-0Xew_xsWwpg

Actors/Campaigns:
Oceanlotus

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 5
Url: 2
Hash: 8
IP: 1

Softs:
macos

Algorithms:
aes-256

Languages:
perl

Platforms:
apple
#ParsedReport
14-11-2022

BumbleBee Zeros in on Meterpreter

https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter

Threats:
Bumblebee
Meterpreter_tool
Cobalt_strike
Beacon
Uac_bypass_technique
Zerologon_vuln
Adfind_tool
Nltest_tool
Dumplsass_tool
Passthehash_technique
Process_injection_technique
Powersploit

TTPs:
Tactics: 9
Technics: 24

IOCs:
File: 20
Command: 4
Path: 16
IP: 4
Domain: 3
Hash: 13
Email: 1

Softs:
sysinternals, winlogon

Algorithms:
zip

Functions:
OpenSSL

Win API:
NtAllocateVirtualMemoryRemoteApiCall

Platforms:
x86, x64

YARA: Found
SIGMA: Found

Links:
https://github.com/iagox86/metasploit-framework-webexec/blob/master/documentation/modules/exploit/windows/local/bypassuac\_sluihijack.md
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/bypassuac\_sluihijack.rb