CTT Report Hub
3.21K subscribers
7.89K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
11-11-2022

HackHound IRC Bot Being Distributed via Webhards

https://asec.ahnlab.com/en/41806

Threats:
Njrat_rat
Udprat
Passview_tool
Hawkeye_keylogger
Condis_technique
Torhammer_technique
Trojan/win.korat.c5290614
Deathransom
Infostealer/win.agent.c5290619
Bladabindi
Ircbot
Trojan/win.agent.c5290070
Trojan/win.generic.r452668
Malware/mdp.behavior.m1693

Geo:
Korean

IOCs:
File: 3
Path: 2
Hash: 19
Domain: 6
Url: 1

Softs:
chrome, discord

Languages:
golang

Platforms:
x64
#ParsedReport
11-11-2022

#ShortAndMalicious: StrelaStealer aims for mail credentials. Execution via polyglot

https://medium.com/@DCSO_CyTec/shortandmalicious-strelastealer-aims-for-mail-credentials-a4c3e78c8abc

Threats:
Strela_stealer
Dll_sideloading_technique

Geo:
Moscow, Russian, Spanish

TTPs:
Tactics: 1
Technics: 6

IOCs:
File: 6
Path: 2
Hash: 13
IP: 1
Url: 1

Algorithms:
xor

Win API:
CryptUnprotectData

Links:
https://github.com/DCSO/Blog\_CyTec/blob/main/2022\_11\_\_short\_and\_malicious\_strela\_stealer/misp.event.json
#ParsedReport
11-11-2022

A Muddy, Advanced Persistent Teacher

https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/muddy-advanced-persistent-teacher.html

Actors/Campaigns:
Muddywater
Oilrig

Threats:
Zerologon_vuln

Industry:
Government, Financial, Education

Geo:
Iran, Israeli, Irans, Tehran, Iranian

CVEs:
CVE-2020-0688 [Vulners]
Vulners: Score: 9.0, CVSS: 3.3,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016, 2010)

CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...

IOCs:
File: 1
#ParsedReport
11-11-2022

New updated IceXLoader claims thousands of victims around the world

https://minerva-labs.com/blog/new-updated-icexloader-claims-thousands-of-victims-around-the-world

Threats:
Icexloader
Process_hollowing_technique
Nimbda_loader
Bazarnimrod
Process_injection_technique

Geo:
Chinese

TTPs:

IOCs:
Path: 8
Registry: 2
File: 4
Command: 2
Hash: 4
Url: 1

Softs:
net framework, windows defender

Win API:
AmsiScanBuffer

Languages:
javascript
#ParsedReport
11-11-2022

Lookout Discovers Long-running Surveillance Campaigns Targeting Uyghurs

https://resources2.lookout.com/blog/uyghur-surveillance-campaign-badbazaar-moonshine

Actors/Campaigns:
Mirage
Nickel
Pitty_tiger
Emissary_panda
Earth_empusa

Threats:
Moonshine
Bahamut
Bazarbackdoor
Bazaar
Aitm_technique
Cmstar
Enfal
Doubleagent
Goldeneagle
Pluginphantom
Actionspy

Industry:
Telco, Government

Geo:
Asia, Afghanistan, Tibetan, Russia, Chinese, Turkey, Chinas, China

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 12
Hash: 1
Domain: 4
Email: 1
IP: 2

Softs:
android, telegram, wechat

Algorithms:
xor, gzip, aes, base64

Platforms:
apple

Links:
https://github.com/Tencent/wcdb
#ParsedReport
11-11-2022

-\| APT MacOS. According to the characteristics of the sample behavior, C2, and open source intelligence, the organization behind the attack is "Sea Lotus" APT.

https://mp.weixin.qq.com/s/2tdgA5mhTL-0Xew_xsWwpg

Actors/Campaigns:
Oceanlotus

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 5
Url: 2
Hash: 8
IP: 1

Softs:
macos

Algorithms:
aes-256

Languages:
perl

Platforms:
apple
#ParsedReport
14-11-2022

BumbleBee Zeros in on Meterpreter

https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter

Threats:
Bumblebee
Meterpreter_tool
Cobalt_strike
Beacon
Uac_bypass_technique
Zerologon_vuln
Adfind_tool
Nltest_tool
Dumplsass_tool
Passthehash_technique
Process_injection_technique
Powersploit

TTPs:
Tactics: 9
Technics: 24

IOCs:
File: 20
Command: 4
Path: 16
IP: 4
Domain: 3
Hash: 13
Email: 1

Softs:
sysinternals, winlogon

Algorithms:
zip

Functions:
OpenSSL

Win API:
NtAllocateVirtualMemoryRemoteApiCall

Platforms:
x86, x64

YARA: Found
SIGMA: Found

Links:
https://github.com/iagox86/metasploit-framework-webexec/blob/master/documentation/modules/exploit/windows/local/bypassuac\_sluihijack.md
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/bypassuac\_sluihijack.rb
#ParsedReport
14-11-2022

Koxic. KOXIC ransomware domestic distribution

https://asec.ahnlab.com/ko/41837

Threats:
Koxic
Revil
Upx_tool
Ransomware/win.koxiccrypt.r533926
Deathransom
Trojan/win.generic.c4963639
Ransom/mdp.delete.m2117
Malware/mdp.behavior.m2771
Ransom/mdp.decoy.m4475

Geo:
Korea

IOCs:
File: 31
Registry: 4
Command: 3
Hash: 3

Softs:
mysql

Algorithms:
aes, cbc

Functions:
CreateFileMappingW

Win API:
SeBackupPrivilege, SeRestorePrivilege, SeManageVolumePrivilege, SeTakeOwnershipPrivilege, MoveFileExW, reateFileMappingW, ViewOfFile

Win Services:
SQLWriter, MSSQLServerOLAPService, MSSQLSERVER, MSSQL$SQLEXPRESS, ReportServer

Platforms:
intel
#ParsedReport
14-11-2022

Kitten.gif: Meet the Sabbath Ransomware Affiliate Program, Again

https://www.mandiant.com/resources/blog/sabbath-ransomware-affiliate

Actors/Campaigns:
Unc2190 (motivation: information_theft)

Threats:
Cobalt_strike
Beacon
Rollcoast
Themida_tool
Redrum
Process_injection_technique

Industry:
Government, Financial, Education, Healthcare

Geo:
Armenia, Germany, Slovakia, Russian, Belarus, Kyrgyzstan, Ukraine, Kenya, Africa, Ukrainian, India, Malta, Indonesian, Malaysia, Albania, Azerbaijan, Croatia, Canada, Belarusian, Latvia, Norway, Pakistan, Macedonia, Uzbekistan, Iran, Thailand, Kazakhstan, Estonia, Tajikistan, Turkey, Vietnam, Indonesia, Georgia, Azerbaijani, Turkish, Turkmenistan, Lithuania, Russia, Slovenia, Sweden, Vietnamese

TTPs:
Tactics: 7
Technics: 17

IOCs:
File: 1
Url: 2
IP: 6
Hash: 20

Algorithms:
aes

Languages:
java

Platforms:
x64

YARA: Found
#ParsedReport
14-11-2022

XDSpy APT. XDSPY APT organization recently analyzed the attack activity of the Russian Ministry of Defense

https://mp.weixin.qq.com/s/cW2Evf6Nqb3fhQ7ntnKHsA

Threats:
Xdspy

Industry:
Government

Geo:
Belarusian, Russian

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 1
Path: 2
Hash: 14
Url: 7

Softs:
internet explorer

Algorithms:
rc4, base64

Functions:
InternetExplorer

Win API:
WaitForSingleObject

Platforms:
x86
#ParsedReport
14-11-2022

Sysdig TRT uncovers massive cryptomining operation leveraging GitHub Actions

https://sysdig.com/blog/massive-cryptomining-operation-github-actions

Actors/Campaigns:
Purpleurchin
Oceanlotus (motivation: cyber_espionage)
Teamtnt

Threats:
Xmrig_miner
Onyx

Industry:
Financial

TTPs:
Tactics: 2
Technics: 0

IOCs:
Coin: 2
File: 4
IP: 6
Hash: 1

Softs:
docker, ubuntu, curl, "docker, mysql

Functions:
OpenVPN

Languages:
python, php

Links:
https://github.com/newtondev/no-dev-fee-stratum-proxy
https://github.com/jordansissel/xdotool
https://github.com/pricing
#ParsedReport
14-11-2022

Typhon Reborn With New Capabilities

https://unit42.paloaltonetworks.com/typhon-reborn-stealer

Threats:
Typhon_reborn
Typhon_stealer

IOCs:
File: 4
Hash: 2

Softs:
telegram, google chrome, microsoft edge, chrome, coin98

Functions:
MeltSelf
#ParsedReport
15-11-2022

DTrack activity targeting Europe and Latin America

https://securelist.com/dtrack-targeting-europe-latin-america/107798

Actors/Campaigns:
Lazarus (motivation: financially_motivated)

Threats:
Dtrack_rat
Process_hollowing_technique

Industry:
Telco, Education, Chemical, Financial

Geo:
Switzerland, Italy, Brazil, Turkey, Mexico, America, India, Germany

IOCs:
File: 1
Domain: 4
Hash: 2

Algorithms:
rc4
#ParsedReport
15-11-2022

ASEC (20221107 \~ 20221113). ASEC Weekly Malware Statistics (20221107 \~ 20221113)

https://asec.ahnlab.com/ko/41981

Actors/Campaigns:
Ta505

Threats:
Emotet
Qakbot
Trickbot
Agent_tesla
Azorult
Smokeloader
Smokerloader
Amadey
Lockbit
Gandcrab
Clop
Cloudeye
Postealer
Formbook
Remcos_rat
Nanocore_rat

Industry:
Financial, Transport

Geo:
Korea

IOCs:
File: 23
Url: 8
Email: 5
Domain: 7

Softs:
discord, nsis installer

Algorithms:
zip

Languages:
visual_basic
#ParsedReport
15-11-2022

Exploring Modifications in New Mirai Botnet Clones

https://www.nozominetworks.com/blog/exploring-modifications-in-new-mirai-botnet-clones

Threats:
Mirai
Bashlite
Darknexus_botnet

Industry:
Iot

CVEs:
CVE-2017-17215 [Vulners]
Vulners: Score: 6.5, CVSS: 6.1,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Unavailable
Soft:
- huawei hg532 firmware (-)


Algorithms:
xor

Links:
http://1.%09https/github.com/jgamblin/Mirai-Source-Code/blob/master/mirai/bot/table.c#L16
#ParsedReport
15-11-2022

Phishing Campaign Targeting Indonesian BRI Bank Using SMS Stealer

https://blog.cyble.com/2022/11/15/phishing-campaign-targeting-indonesian-bri-bank-using-sms-stealer

Threats:
Sms_stealer
Smseye_stealer

Industry:
Financial

Geo:
Dubai, Georgia, Singapore, Australia, Indonesian, Indonesia, India

TTPs:
Tactics: 6
Technics: 7

IOCs:
Url: 15
Hash: 4
File: 1

Softs:
android, telegram

Languages:
php, kotlin

Links:
https://github.com/AbyssalArmy/SmsEye
#ParsedReport
15-11-2022

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

https://symantec-enterprise-blogs.security.com/threat-intelligence/espionage-asia-governments-cert-authority

Actors/Campaigns:
Dragonfish (motivation: information_theft, cyber_espionage)

Threats:
Hannotog
Sagerunex
Adfind_tool
Nbtscan_tool
Stowaway_tool
Cobalt_strike

Industry:
Government

Geo:
Asia, Asian

IOCs:
File: 5
Command: 2
Hash: 23

Softs:
active directory

Algorithms:
xor, aes-256-cbc, zip, rc4

Win API:
WinHttpGetIEProxyConfigForCurrentUser