CTT Report Hub
3.21K subscribers
7.89K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
22-11-2022

Part 1: SocGholish, a very real threat from a very fake update

https://www.proofpoint.com/us/blog/threat-insight/part-1-socgholish-very-real-threat-very-fake-update

Actors/Campaigns:
Ta569 (motivation: financially_motivated)
Evil_corp
Silverfish

Threats:
Socgholish_loader
Wastedlocker
Lockbit

Geo:
Spain, Poland, Iran, Italy, Germany, France

IOCs:
File: 1

Functions:
WMI

Languages:
javascript
#ParsedReport
22-11-2022

Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice

https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice

Threats:
Nighthawk_tool
Brc4_tool
Cobalt_strike
Sliver_tool
Reflectiveloader

IOCs:
File: 3
Coin: 1

Algorithms:
gzip, aes

Functions:
CreateQueueTimer

Win API:
LoadLibraryW, RtlQueueWorkItem, LoadLibrary, LsaQueryInformationPolicy, GetUserNameA, GetComputerNameA, NtSetContextThread, LoadLibraryExW, WriteProcessMemory, NtProtectVirtualMemory, have more...

Languages:
python

Links:
https://github.com/BishopFox/sliver/tree/6c02971b54831884d30407b632a379947dd289ad
https://github.com/ionescu007/HookingNirvana/blob/master/Esoteric%20Hooks.pdf
#ParsedReport
23-11-2022

Surge of Fake FIFA World Cup Streaming Sites Targets Virtual Fans

https://www.zscaler.com/blogs/security-research/surge-fake-fifa-world-cup-streaming-sites-targets-virtual-fans

Threats:
Solarmarker

Industry:
Aerospace, E-commerce, Financial

Geo:
Africa, Tokyo, Qatar

IOCs:
Domain: 29
Hash: 10

Softs:
windows installer

Languages:
php, javascript
#ParsedReport
23-11-2022

Bahamut cybermercenary group targets Android users with fake VPN apps

https://www.welivesecurity.com/2022/11/23/bahamut-cybermercenary-group-targets-android-users-fake-vpn-apps

Actors/Campaigns:
Aridviper

Threats:
Bahamut

Geo:
Ukraine, Singapore, Asia

TTPs:
Tactics: 7
Technics: 9

IOCs:
Domain: 2
File: 8
Hash: 10
IP: 1

Softs:
android, telegram, securevpn, softvpn, securechat, wechat

YARA: Found
#ParsedReport
23-11-2022

THREAT ALERT:Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies. THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies

https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies

Threats:
Blackbasta
Qakbot
Cobalt_strike
Netstat_tool
Bumblebee
Rubeus_tool
Credential_harvesting_technique

Industry:
Government, Financial

Geo:
Australia, Canada

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 30
Path: 6
Command: 7
Domain: 4
Url: 1
IP: 32
Hash: 3

Softs:
active directory domain services, active directory, windows explorer

Functions:
SetVolume

Languages:
javascript

Platforms:
x86
👍1
#ParsedReport
24-11-2022

WannaRen Returns as Life Ransomware, Targets India. Analysis

https://www.trendmicro.com/en_us/research/22/k/wannaren-returns-as-life-ransomware--targets-india.html

Actors/Campaigns:
Equation

Threats:
Wannaren
Ryuk
Maze
Dll_sideloading_technique
Lockbit
Wannacry
Eternalblue_vuln
Shadow_brokers_tool
Asyncrat_rat

Geo:
Taiwan, Chinese, China, India

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 13
Hash: 7
Path: 1

Softs:
microsoft word
#ParsedReport
24-11-2022

Introduction. Static Analysis

https://www.0ffset.net/reverse-engineering/analysing-snake-ransomware

Actors/Campaigns:
Dream_job

Threats:
Snake_ransomware
Gobfuscate_tool

IOCs:
Hash: 1
File: 19
IP: 1
Path: 1
Email: 1
Command: 1

Softs:
windows firewall, bootnxt

Algorithms:
xor, aes, rsa-2048

Functions:
LazyDLL, OpenService, DeleteInstance, WriteAt

Win API:
CoInitializeEx, CoInitializeSecurity, CoCreateInstance, OpenProcess, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, OpenSCManagerA, OpenServiceW, have more...

Languages:
python, golang

Links:
https://github.com/unixpickle/gobfuscate
#ParsedReport
25-11-2022

Koxic Ransomware Being Distributed in Korea

https://asec.ahnlab.com/en/42343

Threats:
Koxic
Revil
Upx_tool
Deathransom
Trojan/win.generic.c4963639
Ransom/mdp.delete.m2117
Malware/mdp.behavior.m2771
Ransom/mdp.decoy.m4475

Geo:
Korea

IOCs:
File: 15
Registry: 4
Command: 3
Hash: 3

Softs:
mysql

Algorithms:
cbc, aes

Functions:
CreateFileMappingW

Win API:
SeBackupPrivilege, SeRestorePrivilege, SeManageVolumePrivilege, SeTakeOwnershipPrivilege, MoveFileExW, reateFileMappingW, ViewOfFile

Win Services:
SQLWriter, MSSQLServerOLAPService, MSSQLSERVER, MSSQL$SQLEXPRESS, ReportServer

Platforms:
intel
#ParsedReport
25-11-2022

ASEC Weekly Malware Statistics (November 14th, 2022 November 20th, 2022)

https://asec.ahnlab.com/en/42757

Threats:
Beamwinhttp_loader
Garbage_cleaner
Redline_stealer
Agent_tesla
Amadey
Smokeloader
Lockbit
Cloudeye
Formbook
Remcos_rat
Nanocore_rat

Industry:
Financial

Geo:
Korea

IOCs:
Url: 20
Email: 6
File: 14

Softs:
discord, nsis installer

Languages:
visual_basic
#ParsedReport
25-11-2022

Punisher Ransomware Spreading Through Fake COVID Site

https://blog.cyble.com/2022/11/25/punisher-ransomware-spreading-through-fake-covid-site

Threats:
Punisher
Timestomp_technique

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai, Chile

TTPs:
Tactics: 7
Technics: 10

IOCs:
Domain: 1
File: 3
Url: 3
Path: 1
Hash: 2

Algorithms:
aes-128, base64

Functions:
MakeConnection, GeneratePassword, RNGCryptoServiceProvider, GetBytes

Win API:
Sleep

Languages:
javascript
#ParsedReport
25-11-2022

Yanluowang Ransomware Leaks Analysis: Organization, Collaboration with HelloKitty, Babuk and Conti

https://www.trellix.com/en-us/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html

Actors/Campaigns:
Evil_corp

Threats:
Yanluowang
Hellokitty
Babuk
Conti
Killanas_actor
Xander2727_actor
Sailormorgan32_actor
Guki_actor
Gykko_actor
Matanbuchus
Wazawaka_actor
Payloadbin
Lockbit

Industry:
Entertainment, Financial

Geo:
Chinese, Ukrainian, Russian, Ukraine

IOCs:
Domain: 1
File: 1

Platforms:
intel
#ParsedReport
25-11-2022

APT-C-09. 1. Analysis of attack activities

https://mp.weixin.qq.com/s/LOZTOz4Lo6cOpeD4mMC29g

Actors/Campaigns:
Dropping_elephant

Threats:
Badnews_rat
Dll_sideloading_technique

Industry:
Healthcare, Government

Geo:
Pakistan

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 6
Hash: 3
Registry: 1

Algorithms:
base64, aes-128-cbc, aes-256-cbc, aes, rc4

Functions:
CreateFilea

Languages:
php