CTT Report Hub
3.21K subscribers
7.88K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
22-11-2022

Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice

https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice

Threats:
Nighthawk_tool
Brc4_tool
Cobalt_strike
Sliver_tool
Reflectiveloader

IOCs:
File: 3
Coin: 1

Algorithms:
gzip, aes

Functions:
CreateQueueTimer

Win API:
LoadLibraryW, RtlQueueWorkItem, LoadLibrary, LsaQueryInformationPolicy, GetUserNameA, GetComputerNameA, NtSetContextThread, LoadLibraryExW, WriteProcessMemory, NtProtectVirtualMemory, have more...

Languages:
python

Links:
https://github.com/BishopFox/sliver/tree/6c02971b54831884d30407b632a379947dd289ad
https://github.com/ionescu007/HookingNirvana/blob/master/Esoteric%20Hooks.pdf
#ParsedReport
23-11-2022

Surge of Fake FIFA World Cup Streaming Sites Targets Virtual Fans

https://www.zscaler.com/blogs/security-research/surge-fake-fifa-world-cup-streaming-sites-targets-virtual-fans

Threats:
Solarmarker

Industry:
Aerospace, E-commerce, Financial

Geo:
Africa, Tokyo, Qatar

IOCs:
Domain: 29
Hash: 10

Softs:
windows installer

Languages:
php, javascript
#ParsedReport
23-11-2022

Bahamut cybermercenary group targets Android users with fake VPN apps

https://www.welivesecurity.com/2022/11/23/bahamut-cybermercenary-group-targets-android-users-fake-vpn-apps

Actors/Campaigns:
Aridviper

Threats:
Bahamut

Geo:
Ukraine, Singapore, Asia

TTPs:
Tactics: 7
Technics: 9

IOCs:
Domain: 2
File: 8
Hash: 10
IP: 1

Softs:
android, telegram, securevpn, softvpn, securechat, wechat

YARA: Found
#ParsedReport
23-11-2022

THREAT ALERT:Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies. THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies

https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies

Threats:
Blackbasta
Qakbot
Cobalt_strike
Netstat_tool
Bumblebee
Rubeus_tool
Credential_harvesting_technique

Industry:
Government, Financial

Geo:
Australia, Canada

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 30
Path: 6
Command: 7
Domain: 4
Url: 1
IP: 32
Hash: 3

Softs:
active directory domain services, active directory, windows explorer

Functions:
SetVolume

Languages:
javascript

Platforms:
x86
👍1
#ParsedReport
24-11-2022

WannaRen Returns as Life Ransomware, Targets India. Analysis

https://www.trendmicro.com/en_us/research/22/k/wannaren-returns-as-life-ransomware--targets-india.html

Actors/Campaigns:
Equation

Threats:
Wannaren
Ryuk
Maze
Dll_sideloading_technique
Lockbit
Wannacry
Eternalblue_vuln
Shadow_brokers_tool
Asyncrat_rat

Geo:
Taiwan, Chinese, China, India

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 13
Hash: 7
Path: 1

Softs:
microsoft word
#ParsedReport
24-11-2022

Introduction. Static Analysis

https://www.0ffset.net/reverse-engineering/analysing-snake-ransomware

Actors/Campaigns:
Dream_job

Threats:
Snake_ransomware
Gobfuscate_tool

IOCs:
Hash: 1
File: 19
IP: 1
Path: 1
Email: 1
Command: 1

Softs:
windows firewall, bootnxt

Algorithms:
xor, aes, rsa-2048

Functions:
LazyDLL, OpenService, DeleteInstance, WriteAt

Win API:
CoInitializeEx, CoInitializeSecurity, CoCreateInstance, OpenProcess, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, OpenSCManagerA, OpenServiceW, have more...

Languages:
python, golang

Links:
https://github.com/unixpickle/gobfuscate
#ParsedReport
25-11-2022

Koxic Ransomware Being Distributed in Korea

https://asec.ahnlab.com/en/42343

Threats:
Koxic
Revil
Upx_tool
Deathransom
Trojan/win.generic.c4963639
Ransom/mdp.delete.m2117
Malware/mdp.behavior.m2771
Ransom/mdp.decoy.m4475

Geo:
Korea

IOCs:
File: 15
Registry: 4
Command: 3
Hash: 3

Softs:
mysql

Algorithms:
cbc, aes

Functions:
CreateFileMappingW

Win API:
SeBackupPrivilege, SeRestorePrivilege, SeManageVolumePrivilege, SeTakeOwnershipPrivilege, MoveFileExW, reateFileMappingW, ViewOfFile

Win Services:
SQLWriter, MSSQLServerOLAPService, MSSQLSERVER, MSSQL$SQLEXPRESS, ReportServer

Platforms:
intel
#ParsedReport
25-11-2022

ASEC Weekly Malware Statistics (November 14th, 2022 November 20th, 2022)

https://asec.ahnlab.com/en/42757

Threats:
Beamwinhttp_loader
Garbage_cleaner
Redline_stealer
Agent_tesla
Amadey
Smokeloader
Lockbit
Cloudeye
Formbook
Remcos_rat
Nanocore_rat

Industry:
Financial

Geo:
Korea

IOCs:
Url: 20
Email: 6
File: 14

Softs:
discord, nsis installer

Languages:
visual_basic
#ParsedReport
25-11-2022

Punisher Ransomware Spreading Through Fake COVID Site

https://blog.cyble.com/2022/11/25/punisher-ransomware-spreading-through-fake-covid-site

Threats:
Punisher
Timestomp_technique

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai, Chile

TTPs:
Tactics: 7
Technics: 10

IOCs:
Domain: 1
File: 3
Url: 3
Path: 1
Hash: 2

Algorithms:
aes-128, base64

Functions:
MakeConnection, GeneratePassword, RNGCryptoServiceProvider, GetBytes

Win API:
Sleep

Languages:
javascript
#ParsedReport
25-11-2022

Yanluowang Ransomware Leaks Analysis: Organization, Collaboration with HelloKitty, Babuk and Conti

https://www.trellix.com/en-us/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html

Actors/Campaigns:
Evil_corp

Threats:
Yanluowang
Hellokitty
Babuk
Conti
Killanas_actor
Xander2727_actor
Sailormorgan32_actor
Guki_actor
Gykko_actor
Matanbuchus
Wazawaka_actor
Payloadbin
Lockbit

Industry:
Entertainment, Financial

Geo:
Chinese, Ukrainian, Russian, Ukraine

IOCs:
Domain: 1
File: 1

Platforms:
intel
#ParsedReport
25-11-2022

APT-C-09. 1. Analysis of attack activities

https://mp.weixin.qq.com/s/LOZTOz4Lo6cOpeD4mMC29g

Actors/Campaigns:
Dropping_elephant

Threats:
Badnews_rat
Dll_sideloading_technique

Industry:
Healthcare, Government

Geo:
Pakistan

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 6
Hash: 3
Registry: 1

Algorithms:
base64, aes-128-cbc, aes-256-cbc, aes, rc4

Functions:
CreateFilea

Languages:
php
#ParsedReport
28-11-2022

Emotet Strikes Again Lnk File Leads to Domain Wide Ransomware

https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware

Threats:
Emotet
Cobalt_strike
Anydesk_tool
Quantum_locker
Adfind_tool
Nltest_tool
Beacon
Process_injection_technique
Zerologon_vuln
Mimikatz_tool
Powertool_tool
Process_hacker_tool
Cridex

TTPs:
Tactics: 12
Technics: 24

IOCs:
File: 21
Command: 2
Url: 7
Path: 15
IP: 33
Domain: 10
Email: 1
Hash: 7

Softs:
active directory, virtualbox, winlogon

Algorithms:
base64

Win API:
CreateThread, CreateRemoteThread, RtlCreateUserThread, Sleep

YARA: Found
SIGMA: Found

Links:
https://github.com/SigmaHQ/sigma/blob/3a2079b02bcb1a2653ba9b5a5f56fd8b14a59820/rules/windows/builtin/system/win\_system\_possible\_zerologon\_exploitation\_using\_wellknown\_tools.yml
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_susp\_wmic\_execution.yml
https://github.com/amidaware/tacticalrmm
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_nltest\_recon.yml
https://github.com/SigmaHQ/sigma/blob/74e2d1bd3cec8fa72ba06cf4eef8e58fb5e0e237/rules/windows/process\_creation/proc\_creation\_win\_susp\_process\_hacker.yml
https://github.com/SigmaHQ/sigma/blob/8b749fb1260b92b9170e4e69fa1bd2f34e94d766/rules/windows/builtin/system/win\_system\_anydesk\_service\_installation.yml
https://github.com/DISREL/Conti-Leaked-Playbook-TTPs/blob/main/Conti-Leaked-Playbook-TTPs.pdf
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process\_creation/proc\_creation\_win\_embed\_exe\_lnk.yml
https://github.com/SigmaHQ/sigma/blob/08651822714c977d40d3c126c20ba4033d6836d3/rules/windows/registry/registry\_set/registry\_set\_asep\_reg\_keys\_modification\_currentversion.yml
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process\_creation/proc\_creation\_win\_susp\_rclone\_execution.yml
https://github.com/NVISOsecurity/sigma-public/blob/master/rules/windows/process\_creation/win\_susp\_recon\_activity.yml
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_susp\_powershell\_cmd\_patterns.yml
https://github.com/SigmaHQ/sigma/blob/a3eed2b760abddfd62014fcf9ae81f435b216473/rules/windows/process\_access/proc\_access\_win\_lsass\_memdump.yml