CTT Report Hub
3.21K subscribers
7.89K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
28-11-2022

Attacker Uses a Popular TikTok Challenge to Lure Users Into Installing Malicious Package. TikToks Invisible Challenge

https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package

Threats:
Starjacking_technique

IOCs:
File: 1
Url: 9

Softs:
tiktok, discord

Languages:
python

Links:
https://web.archive.org/web/20221120230346/https:/github.com/trending/python?since=daily
https://github.com/420World69/Nitro-generator
https://github.com/420World69/Tiktok-Unfilter-Api
#ParsedReport
29-11-2022

RansomBoggs: New ransomware targeting Ukraine

https://www.welivesecurity.com/2022/11/28/ransomboggs-new-ransomware-ukraine

Actors/Campaigns:
Sandworm

Threats:
Ransomboggs
Filecoder
Crashoverride
Killdisk
Arguepatch_loader
Prestige_ransomware
Hermeticwiper
Isaacwiper
Eternal_petya
Havoc

Industry:
Logistic, Energy

Geo:
Ukraines, Ukrainian, Ukraine, Russia, Poland

IOCs:
File: 2

Softs:
net framework

Algorithms:
aes-256, aes, cbc
#ParsedReport
29-11-2022

How IoT Botnets Evade Detection and Analysis Part 2

https://www.nozominetworks.com/blog/how-iot-botnets-evade-detection-and-analysis-part-2

Threats:
Upx_tool
Kaiten
Tsunami_botnet
Mirai

Industry:
Iot

IOCs:
Hash: 3

Softs:
qemu, crontab

Languages:
python

Platforms:
arm, x86, mips

YARA: Found

Links:
https://github.com/nozominetworks/upx-recovery-tool
#ParsedReport
29-11-2022

Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia

https://www.mandiant.com/resources/blog/china-nexus-espionage-southeast-asia

Actors/Campaigns:
Unc4191 (motivation: cyber_espionage)

Threats:
Mistcloak
Darkdew
Bluehaze
Ncat_tool
Nmap_tool
Netcat_tool
Dll_sideloading_technique

Geo:
Usa, China, Asia, Chinas, Philippines, Chinese

TTPs:

IOCs:
File: 11
Path: 15
Hash: 8
Registry: 2
Domain: 2
Command: 1

Softs:
windows explorer, chromium

YARA: Found
#ParsedReport
29-11-2022

Doing time with the YIPPHB dropper. Key takeaways

https://www.elastic.co/security-labs/doing-time-with-the-yipphb-dropper

Threats:
Yipphb_dropper
Seth_locker
Remcos_rat
Njrat_rat
Cyberchef_tool
Limerat_rat
Asyncrat_rat

TTPs:
Tactics: 6
Technics: 0

IOCs:
Hash: 3
Url: 6
Domain: 1
File: 7

Softs:
discord, curl, kibana

Algorithms:
base64, zip

Languages:
visual_basic

Platforms:
x86

Links:
https://github.com/VirusTotal/vt-cli
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/execution\_suspicious\_powershell\_execution.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_process\_execution\_with\_unusual\_file\_extension.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/persistence\_script\_file\_written\_to\_startup\_folder.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/command\_and\_control\_connection\_to\_dynamic\_dns\_provider\_by\_an\_unsigned\_binary.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/execution\_suspicious\_powershell\_execution\_via\_windows\_scripts.toml
https://github.com/pmelson/bsidesaugusta\_2022/blob/main/unk.yara
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/command\_and\_control\_connection\_to\_webservice\_by\_a\_signed\_binary\_proxy.toml
https://github.com/elastic/securitylabs-thrunting-tools
https://github.com/NYAN-x-CAT/njRAT-0.7d-Stub-CSharp/blob/master/njRAT%20C%23%20Stub/Program.cs
#ParsedReport
30-11-2022

Redline Stealer being Distributed via Fake Express VPN Sites

https://blog.cyble.com/2022/11/30/redline-stealer-being-distributed-via-fake-express-vpn-sites

Threats:
Redline_stealer
Process_injection_technique
Vidar_stealer
Record_breaker_stealer
Beacon

Geo:
Georgia, Australia, India, Singapore, Dubai

TTPs:
Tactics: 7
Technics: 16

IOCs:
Domain: 6
Url: 2
File: 4
Hash: 1

Softs:
discord

Algorithms:
zip

Languages:
javascript
#ParsedReport
30-11-2022

LockBit 3.0 Black attacks and leaks reveal wormable capabilities and tooling

https://news.sophos.com/en-us/2022/11/30/lockbit-3-0-black-attacks-and-leaks-reveal-wormable-capabilities-and-tooling

Actors/Campaigns:
Blackmatter

Threats:
Lockbit
Cyberchef_tool
Backstab_tool
Cobalt_strike
Revil
Bloodystealer
Avremover_tool
Gmer_tool
Netscan_tool
Mimikatz_tool
Neshta

Geo:
Georgia

IOCs:
Coin: 1
File: 4
Hash: 26

Softs:
psexec, process explorer, windows defender

Algorithms:
xor

Win API:
NtSetInformationThread, NetShareEnum

Links:
https://github.com/sophoslabs/IoCs/blob/master/Ransomware-Lockbit3-IOCs.csv
https://github.com/Yaxser/Backstab
https://github.com/hegusung/netscan
#ParsedReport
01-12-2022

ZetaNile: Open source software trojans from North Korea. Indicators

https://blog.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea

Actors/Campaigns:
Lazarus

Threats:
Zetanile
Putty_tool
Tightvnc_tool
Dll_hijacking_technique

Industry:
Energy

Geo:
Korean, Korea, Japanese

TTPs:
Tactics: 1
Technics: 0

IOCs:
IP: 1
Url: 2
Command: 3
Path: 2
File: 4
Hash: 8

Softs:
sumatra pdf

Algorithms:
aes, base64

Languages:
php

Platforms:
x64
#ParsedReport
01-12-2022

Back in Black... Basta. Key Points

https://www.zscaler.com/blogs/security-research/back-black-basta

Threats:
Blackbasta
Conti
Advobfuscator_tool

Industry:
Financial

IOCs:
Hash: 5
File: 4
Command: 1

Algorithms:
ecc, hmac, chacha20, xchacha20, xor

Links:
https://github.com/threatlabz/ransomware\_notes/blob/main/blackbasta/blackbasta3.txt
https://github.com/threatlabz/iocs/tree/main/blackbasta
#ParsedReport
01-12-2022

APT-C-55 Kimsuky.

https://mp.weixin.qq.com/s/OaECtSaeClPzFHslN_WamA

Actors/Campaigns:
Kimsuky

Threats:
Babyshark
Fake-trusteer

Industry:
Education, Government

Geo:
Korean

IOCs:
Hash: 27
Url: 18
File: 24
Domain: 1
Command: 1
Path: 2

Softs:
curl, chrome

Languages:
php, visual_basic
#ParsedReport
01-12-2022

Lazarus. Job search trap: Lazarus organization analyzes the recruitment information of Japanese Risui Bank and other recruitment information as a bait analysis analysis

https://mp.weixin.qq.com/s/nnLqUBPX8xZ3hCr5u-iSjQ

Actors/Campaigns:
Lazarus

Threats:
Adfind_tool

Industry:
Energy, Financial, Government

Geo:
Japanese, Bangladesh, Asia, Korea

TTPs:
Tactics: 1
Technics: 1

IOCs:
File: 27
Hash: 14

Softs:
sophos anti-virus, windows defender, curl, android

Algorithms:
rc4

Win API:
LoadlibraryW

Win Services:
klnagent