CTT Report Hub
3.21K subscribers
7.91K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
01-12-2022

Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank

https://www.recordedfuture.com/suspected-iran-nexus-tag-56-uses-uae-forum-lure-for-credential-theft-against-us-think-tank

Actors/Campaigns:
Tag-56
Apt42
Phosphorus
Cleaver

Threats:
Typosquatting_technique

Industry:
Ngo, Government

Geo:
Emirates, Israel, Israeli, Iran, Iranian

TTPs:
Tactics: 1
Technics: 0

IOCs:
Domain: 13
IP: 5
File: 3
Url: 5
Hash: 1

Softs:
telegram

Languages:
javascript
#ParsedReport
01-12-2022

DuckLogs New Malware Strain Spotted In The Wild

https://blog.cyble.com/2022/12/01/ducklogs-new-malware-strain-spotted-in-the-wild

Threats:
Ducklogs
Process_hollowing_technique
Uac_bypass_technique
Process_injection_technique

Industry:
Financial

Geo:
Australia, India, Singapore, Dubai, Georgia

TTPs:
Tactics: 6
Technics: 14

IOCs:
File: 5
Command: 1
Path: 1
Domain: 5
Url: 16
IP: 1
Hash: 2

Softs:
windows defender

Algorithms:
base64

Functions:
Main, Bunifu_TextBox
#ParsedReport
01-12-2022

New details on commercial spyware vendor Variston

https://blog.google/threat-analysis-group/new-details-on-commercial-spyware-vendor-variston

Threats:
Heliconia_noise_tool

Industry:
Government

Geo:
Spain

CVEs:
CVE-2021-42298 [Vulners]
Vulners: Score: 9.3, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft malware protection engine (<1.1.18700.3)

CVE-2022-26485 [Vulners]
Vulners: Score: Unknown, CVSS: 1.5,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown


Softs:
chrome, microsoft defender, windows defender

Algorithms:
rc4

Functions:
hello

Win API:
VirtualAlloc, NdrServerCall2, WinExec

Languages:
javascript
#ParsedReport
01-12-2022

The Mystery of Metador \| Unpicking Mafaldas Anti-Analysis Techniques

https://www.sentinelone.com/labs/the-mystery-of-metador-unpicking-mafaldas-anti-analysis-techniques

Actors/Campaigns:
Metador

Threats:
Mafalda

Industry:
Education, Telco

Geo:
Africa

IOCs:
File: 1

Algorithms:
xor

Links:
https://github.com/mandiant/flare-emu
#ParsedReport
01-12-2022

Lucky Mouse: Incident Response to Detection Engineering. Introduction

https://blog.sekoia.io/lucky-mouse-incident-response-to-detection-engineering

Actors/Campaigns:
Emissary_panda

Threats:
Impacket_tool
Procdump_tool
Ntdsutil_tool
Chisel_tool
Conti

IOCs:
Command: 4
File: 8
Path: 2

Softs:
windows defender, sysinternals, chrome

Algorithms:
base64

Win API:
PsLoggedOn

Platforms:
x86

SIGMA: Found

Links:
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/non\_legit\_use\_eula\_parameter.yml
https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/builtin/windefend/win\_defender\_exclusions.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/impacket\_wmiexec.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/wmic\_process\_call\_create.yml
https://github.com/SigmaHQ/sigma-specification/
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/data\_compressed\_with\_rar\_with\_password.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/disable\_windows\_defender.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/powershell\_exchange\_snapin\_mailbox.yml
https://github.com/jpillora/chisel
https://github.com/NVISOsecurity/sigma-public/blob/master/rules/windows/process\_creation/win\_susp\_ntdsutil.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/procdump\_args.yml
https://github.com/SigmaHQ/sigma/blob/8b749fb1260b92b9170e4e69fa1bd2f34e94d766/rules/windows/builtin/application/win\_esent\_ntdsutil\_abuse.yml
https://github.com/SEKOIA-IO/Community/blob/main/sigma\_rules/host/socks\_tunneling\_tool.yml
#ParsedReport
01-12-2022

Whos swimming in South Korean waters? Meet ScarCrufts Dolphin

https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin

Actors/Campaigns:
Apt37 (motivation: cyber_espionage)

Threats:
Dolphin
Watering_hole_technique
Bluelight
Credential_stealing_technique
Process_injection_technique

Industry:
Government

Geo:
Korea, Asian, Korean, Ukraine

CVEs:
CVE-2020-1380 [Vulners]
Vulners: Score: 7.6, CVSS: 2.9,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft internet explorer (11)


TTPs:
Tactics: 9
Technics: 30

IOCs:
Path: 7
Registry: 1
Hash: 5

Softs:
internet explorer, chrome

Algorithms:
cbc, base64, zip, xor, aes

Win API:
GetAsyncKeyState

Languages:
javascript, python

Platforms:
x86, x64

Links:
https://github.com/microsoft/windows-classic-samples/tree/main/Samples/PortableDeviceCOM
#ParsedReport
01-12-2022

Buyer Beware: Fake Cryptocurrency Applications Serving as Front for AppleJeus Malware

https://www.volexity.com/blog/2022/12/01/buyer-beware-fake-cryptocurrency-applications-serving-as-front-for-applejeus-malware

Actors/Campaigns:
Lazarus

Threats:
AppleJeus
Dll_sideloading_technique
Api_obfuscation_technique
Dll_hijacking_technique

Industry:
Financial

Geo:
Korean, Korea, Dprk

IOCs:
Domain: 7
File: 9
Path: 3
Hash: 18
Url: 1

Softs:
microsoft office, qtbitcointrader, microsoft excel, volexity volcano

Algorithms:
base64, xor

Functions:
OpenDrive, EXE

Languages:
php

YARA: Found

Links:
https://github.com/volexity/threat-intel/blob/main/2022/2022-12-01%20Buyer%20Beware%20-%20Fake%20Cryptocurrency%20Applications%20Serving%20as%20Front%20for%20AppleJeus%20Malware/yara.yar
https://github.com/volexity/threat-intel/blob/main/2022/2022-12-01%20Buyer%20Beware%20-%20Fake%20Cryptocurrency%20Applications%20Serving%20as%20Front%20for%20AppleJeus%20Malware/indicators.csv
https://github.com/JulyIGHOR/QtBitcoinTrader
https://github.com/volexity/threat-intel
#ParsedReport
01-12-2022

W4SP continues to nest in PyPI: Same supply chain attack, different distribution method

https://blog.reversinglabs.com/blog/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method

Threats:
W4sp
Climax_loader
Typosquatting_technique

IOCs:
Url: 1
File: 3
IP: 2
Hash: 33

Softs:
discord, telegram

Algorithms:
base64, zip, lzma

Languages:
rust, python

YARA: Found

Links:
https://github.com/cloudflare/cloudflared/releases
https://github.com/liftoff/pyminifier
#ParsedReport
02-12-2022

FBI, CISA Issue Warning on Cuba Ransomware

https://www.cybereason.com/blog/fbi-cisa-warning-on-cuba-ransomware

Threats:
Cuba
Romcom_rat
Hancitor
Kerbercache_tool
Zerologon_vuln
Qakbot

Industry:
Government, Financial

CVEs:
CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...
CVE-2022-24521 [Vulners]
Vulners: Score: 4.6, CVSS: 4.2,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...

Softs:
active directory, local security authority

Languages:
jscript
#ParsedReport
05-12-2022

Aqua Nautilus Discovers Redigo New Redis Backdoor Malware

https://blog.aquasec.com/redigo-redis-backdoor-malware

Threats:
Nautilus
Redigo

CVEs:
CVE-2022-0543 [Vulners]
Vulners: Score: 10.0, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- redis (-)
- debian debian linux (9.0, 10.0, 11.0)


TTPs:
Tactics: 6
Technics: 0

IOCs:
File: 1
IP: 1
Hash: 2

Softs:
redis, scripting engine, debian

Languages:
lua, golang

Links:
https://github.com/aquasecurity/trivy
https://github.com/aquasecurity/chain-bench
https://github.com/aquasecurity/chain-bench/blob/main/docs/CIS-Software-Supply-Chain-Security-Guide-v1.0.pdf
https://github.com/aquasecurity/tracee
#ParsedReport
05-12-2022

Blowing Cobalt Strike Out of the Water With Memory Analysis

https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis

Threats:
Cobalt_strike
Lithiumloader
Magnetloader
Beacon
Reflectiveloader
Dll_sideloading_technique
Metasploit_tool

Industry:
Education

Geo:
Thailand, Japan, Japanese

IOCs:
Hash: 12
File: 10
Path: 4
Domain: 1
Url: 2

Softs:
windows defender

Algorithms:
xor, base64

Functions:
load_shellcode

Win API:
NtCreateSection, NtMapViewOfSection, NtCreateFile, NtAllocateVirtualMemory, RtlCreateProcessParameters, RtlCreateUserProcess, RtlCreateUserThread, RtlExitUserProcess, DllCanUnloadNow, HeapAlloc, have more...

Platforms:
x86

Links:
https://github.com/curl/curl/blob/2610142139d14265ed9acf9ed83cdf73d6bb4d05/lib/easy.c#L727
https://github.com/Sentinel-One/CobaltStrikeParser