CTT Report Hub
3.21K subscribers
7.89K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
25-11-2022

Koxic Ransomware Being Distributed in Korea

https://asec.ahnlab.com/en/42343

Threats:
Koxic
Revil
Upx_tool
Deathransom
Trojan/win.generic.c4963639
Ransom/mdp.delete.m2117
Malware/mdp.behavior.m2771
Ransom/mdp.decoy.m4475

Geo:
Korea

IOCs:
File: 15
Registry: 4
Command: 3
Hash: 3

Softs:
mysql

Algorithms:
cbc, aes

Functions:
CreateFileMappingW

Win API:
SeBackupPrivilege, SeRestorePrivilege, SeManageVolumePrivilege, SeTakeOwnershipPrivilege, MoveFileExW, reateFileMappingW, ViewOfFile

Win Services:
SQLWriter, MSSQLServerOLAPService, MSSQLSERVER, MSSQL$SQLEXPRESS, ReportServer

Platforms:
intel
#ParsedReport
25-11-2022

ASEC Weekly Malware Statistics (November 14th, 2022 November 20th, 2022)

https://asec.ahnlab.com/en/42757

Threats:
Beamwinhttp_loader
Garbage_cleaner
Redline_stealer
Agent_tesla
Amadey
Smokeloader
Lockbit
Cloudeye
Formbook
Remcos_rat
Nanocore_rat

Industry:
Financial

Geo:
Korea

IOCs:
Url: 20
Email: 6
File: 14

Softs:
discord, nsis installer

Languages:
visual_basic
#ParsedReport
25-11-2022

Punisher Ransomware Spreading Through Fake COVID Site

https://blog.cyble.com/2022/11/25/punisher-ransomware-spreading-through-fake-covid-site

Threats:
Punisher
Timestomp_technique

Industry:
Financial

Geo:
India, Australia, Singapore, Georgia, Dubai, Chile

TTPs:
Tactics: 7
Technics: 10

IOCs:
Domain: 1
File: 3
Url: 3
Path: 1
Hash: 2

Algorithms:
aes-128, base64

Functions:
MakeConnection, GeneratePassword, RNGCryptoServiceProvider, GetBytes

Win API:
Sleep

Languages:
javascript
#ParsedReport
25-11-2022

Yanluowang Ransomware Leaks Analysis: Organization, Collaboration with HelloKitty, Babuk and Conti

https://www.trellix.com/en-us/about/newsroom/stories/research/yanluowang-ransomware-leaks-analysis.html

Actors/Campaigns:
Evil_corp

Threats:
Yanluowang
Hellokitty
Babuk
Conti
Killanas_actor
Xander2727_actor
Sailormorgan32_actor
Guki_actor
Gykko_actor
Matanbuchus
Wazawaka_actor
Payloadbin
Lockbit

Industry:
Entertainment, Financial

Geo:
Chinese, Ukrainian, Russian, Ukraine

IOCs:
Domain: 1
File: 1

Platforms:
intel
#ParsedReport
25-11-2022

APT-C-09. 1. Analysis of attack activities

https://mp.weixin.qq.com/s/LOZTOz4Lo6cOpeD4mMC29g

Actors/Campaigns:
Dropping_elephant

Threats:
Badnews_rat
Dll_sideloading_technique

Industry:
Healthcare, Government

Geo:
Pakistan

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 6
Hash: 3
Registry: 1

Algorithms:
base64, aes-128-cbc, aes-256-cbc, aes, rc4

Functions:
CreateFilea

Languages:
php
#ParsedReport
28-11-2022

Emotet Strikes Again Lnk File Leads to Domain Wide Ransomware

https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware

Threats:
Emotet
Cobalt_strike
Anydesk_tool
Quantum_locker
Adfind_tool
Nltest_tool
Beacon
Process_injection_technique
Zerologon_vuln
Mimikatz_tool
Powertool_tool
Process_hacker_tool
Cridex

TTPs:
Tactics: 12
Technics: 24

IOCs:
File: 21
Command: 2
Url: 7
Path: 15
IP: 33
Domain: 10
Email: 1
Hash: 7

Softs:
active directory, virtualbox, winlogon

Algorithms:
base64

Win API:
CreateThread, CreateRemoteThread, RtlCreateUserThread, Sleep

YARA: Found
SIGMA: Found

Links:
https://github.com/SigmaHQ/sigma/blob/3a2079b02bcb1a2653ba9b5a5f56fd8b14a59820/rules/windows/builtin/system/win\_system\_possible\_zerologon\_exploitation\_using\_wellknown\_tools.yml
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_susp\_wmic\_execution.yml
https://github.com/amidaware/tacticalrmm
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_nltest\_recon.yml
https://github.com/SigmaHQ/sigma/blob/74e2d1bd3cec8fa72ba06cf4eef8e58fb5e0e237/rules/windows/process\_creation/proc\_creation\_win\_susp\_process\_hacker.yml
https://github.com/SigmaHQ/sigma/blob/8b749fb1260b92b9170e4e69fa1bd2f34e94d766/rules/windows/builtin/system/win\_system\_anydesk\_service\_installation.yml
https://github.com/DISREL/Conti-Leaked-Playbook-TTPs/blob/main/Conti-Leaked-Playbook-TTPs.pdf
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process\_creation/proc\_creation\_win\_embed\_exe\_lnk.yml
https://github.com/SigmaHQ/sigma/blob/08651822714c977d40d3c126c20ba4033d6836d3/rules/windows/registry/registry\_set/registry\_set\_asep\_reg\_keys\_modification\_currentversion.yml
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process\_creation/proc\_creation\_win\_susp\_rclone\_execution.yml
https://github.com/NVISOsecurity/sigma-public/blob/master/rules/windows/process\_creation/win\_susp\_recon\_activity.yml
https://github.com/SigmaHQ/sigma/blob/1f8e37351e7c5d89ce7808391edaef34bd8db6c0/rules/windows/process\_creation/proc\_creation\_win\_susp\_powershell\_cmd\_patterns.yml
https://github.com/SigmaHQ/sigma/blob/a3eed2b760abddfd62014fcf9ae81f435b216473/rules/windows/process\_access/proc\_access\_win\_lsass\_memdump.yml
#ParsedReport
28-11-2022

Attacker Uses a Popular TikTok Challenge to Lure Users Into Installing Malicious Package. TikToks Invisible Challenge

https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package

Threats:
Starjacking_technique

IOCs:
File: 1
Url: 9

Softs:
tiktok, discord

Languages:
python

Links:
https://web.archive.org/web/20221120230346/https:/github.com/trending/python?since=daily
https://github.com/420World69/Nitro-generator
https://github.com/420World69/Tiktok-Unfilter-Api
#ParsedReport
29-11-2022

RansomBoggs: New ransomware targeting Ukraine

https://www.welivesecurity.com/2022/11/28/ransomboggs-new-ransomware-ukraine

Actors/Campaigns:
Sandworm

Threats:
Ransomboggs
Filecoder
Crashoverride
Killdisk
Arguepatch_loader
Prestige_ransomware
Hermeticwiper
Isaacwiper
Eternal_petya
Havoc

Industry:
Logistic, Energy

Geo:
Ukraines, Ukrainian, Ukraine, Russia, Poland

IOCs:
File: 2

Softs:
net framework

Algorithms:
aes-256, aes, cbc
#ParsedReport
29-11-2022

How IoT Botnets Evade Detection and Analysis Part 2

https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis-part-2

Threats:
Upx_tool
Kaiten
Tsunami_botnet
Mirai

Industry:
Iot

IOCs:
Hash: 3

Softs:
qemu, crontab

Languages:
python

Platforms:
arm, x86, mips

YARA: Found

Links:
https://github.com/nozominetworks/upx-recovery-tool
#ParsedReport
29-11-2022

Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia

https://www.mandiant.com/resources/blog/china-nexus-espionage-southeast-asia

Actors/Campaigns:
Unc4191 (motivation: cyber_espionage)

Threats:
Mistcloak
Darkdew
Bluehaze
Ncat_tool
Nmap_tool
Netcat_tool
Dll_sideloading_technique

Geo:
Usa, China, Asia, Chinas, Philippines, Chinese

TTPs:

IOCs:
File: 11
Path: 15
Hash: 8
Registry: 2
Domain: 2
Command: 1

Softs:
windows explorer, chromium

YARA: Found
#ParsedReport
29-11-2022

Doing time with the YIPPHB dropper. Key takeaways

https://www.elastic.co/security-labs/doing-time-with-the-yipphb-dropper

Threats:
Yipphb_dropper
Seth_locker
Remcos_rat
Njrat_rat
Cyberchef_tool
Limerat_rat
Asyncrat_rat

TTPs:
Tactics: 6
Technics: 0

IOCs:
Hash: 3
Url: 6
Domain: 1
File: 7

Softs:
discord, curl, kibana

Algorithms:
base64, zip

Languages:
visual_basic

Platforms:
x86

Links:
https://github.com/VirusTotal/vt-cli
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/execution\_suspicious\_powershell\_execution.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_process\_execution\_with\_unusual\_file\_extension.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/persistence\_script\_file\_written\_to\_startup\_folder.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/command\_and\_control\_connection\_to\_dynamic\_dns\_provider\_by\_an\_unsigned\_binary.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/execution\_suspicious\_powershell\_execution\_via\_windows\_scripts.toml
https://github.com/pmelson/bsidesaugusta\_2022/blob/main/unk.yara
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/command\_and\_control\_connection\_to\_webservice\_by\_a\_signed\_binary\_proxy.toml
https://github.com/elastic/securitylabs-thrunting-tools
https://github.com/NYAN-x-CAT/njRAT-0.7d-Stub-CSharp/blob/master/njRAT%20C%23%20Stub/Program.cs