CTT Report Hub
3.22K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
02-12-2022

FBI, CISA Issue Warning on Cuba Ransomware

https://www.cybereason.com/blog/fbi-cisa-warning-on-cuba-ransomware

Threats:
Cuba
Romcom_rat
Hancitor
Kerbercache_tool
Zerologon_vuln
Qakbot

Industry:
Government, Financial

CVEs:
CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...
CVE-2022-24521 [Vulners]
Vulners: Score: 4.6, CVSS: 4.2,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...

Softs:
active directory, local security authority

Languages:
jscript
#ParsedReport
05-12-2022

Aqua Nautilus Discovers Redigo New Redis Backdoor Malware

https://blog.aquasec.com/redigo-redis-backdoor-malware

Threats:
Nautilus
Redigo

CVEs:
CVE-2022-0543 [Vulners]
Vulners: Score: 10.0, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- redis (-)
- debian debian linux (9.0, 10.0, 11.0)


TTPs:
Tactics: 6
Technics: 0

IOCs:
File: 1
IP: 1
Hash: 2

Softs:
redis, scripting engine, debian

Languages:
lua, golang

Links:
https://github.com/aquasecurity/trivy
https://github.com/aquasecurity/chain-bench
https://github.com/aquasecurity/chain-bench/blob/main/docs/CIS-Software-Supply-Chain-Security-Guide-v1.0.pdf
https://github.com/aquasecurity/tracee
#ParsedReport
05-12-2022

Blowing Cobalt Strike Out of the Water With Memory Analysis

https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis

Threats:
Cobalt_strike
Lithiumloader
Magnetloader
Beacon
Reflectiveloader
Dll_sideloading_technique
Metasploit_tool

Industry:
Education

Geo:
Thailand, Japan, Japanese

IOCs:
Hash: 12
File: 10
Path: 4
Domain: 1
Url: 2

Softs:
windows defender

Algorithms:
xor, base64

Functions:
load_shellcode

Win API:
NtCreateSection, NtMapViewOfSection, NtCreateFile, NtAllocateVirtualMemory, RtlCreateProcessParameters, RtlCreateUserProcess, RtlCreateUserThread, RtlExitUserProcess, DllCanUnloadNow, HeapAlloc, have more...

Platforms:
x86

Links:
https://github.com/curl/curl/blob/2610142139d14265ed9acf9ed83cdf73d6bb4d05/lib/easy.c#L727
https://github.com/Sentinel-One/CobaltStrikeParser
#ParsedReport
05-12-2022

Exbyte: BlackByte. EXBYTE: BLACKBYTE Ransomware Attack Group develops new data theft tools

https://broadcom-software.security.com/japanese-broadcom-software/exbyte-blackbyteransamuueanogongjikurufukaxintanatetaqiequtsuruwozhankai

Actors/Campaigns:
Blackmatter
Blackcat
Unc3524

Threats:
Exbyte_stealer
Blackbyte
Megadumper_tool
Ollydbg_tool
Windbg_tool
Lockbit
Exmatter_tool
Ryuk
Stealbit
Proxylogon_exploit
Adfind_tool
Anydesk_tool
Netscan_tool
Powerview
Edrsandblast_tool
Vssadmin_tool
Conti
Revil

Geo:
Japanese

CVEs:
CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)


IOCs:
File: 20
Command: 15
Path: 1
IP: 1
Hash: 15
Url: 7

YARA: Found

Links:
https://github.com/wavestone-cdt/EDRSandblast
#ParsedReport
05-12-2022

KoiVM Loader Resurfaces With a Bang

https://labs.k7computing.com/index.php/koivm-loader-resurfaces-with-a-bang

Threats:
Koivm
Remcos_rat
Agent_tesla
M4use_loader
Confuserex_tool
Process_injection_technique

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 2
Email: 1
Hash: 5
Url: 2
IP: 1

Algorithms:
base64, zip, rc4, xor

Languages:
python

Links:
https://github.com/dnSpyEx
https://github.com/Loksie/KoiVM-Virtualization#koivm
https://github.com/yck1509/ConfuserEx
https://github.com/SychicBoy/NETReactorSlayer
https://github.com/horsicq/Detect-It-Easy
https://github.com/Loksie/KoiVM-Virtualization#:\~:text=first%20one%20is%20certainly%20ridiculous%20as%20it%20will%20%22merge%22%20with%20cex%20and%20virtualize%20every%20single%20method%2C%20including%20protections%20from%20ConfuserEX%2C%20however%20note%20that%20this%20might%20KILL%20your%20performan
#ParsedReport
05-12-2022

Exposed Remote Desktop Protocol actively targeted by Threat Actors to deploy Ransomware

https://blog.cyble.com/2022/12/02/exposed-remote-desktop-protocol-actively-targeted-by-threat-actors-to-deploy-ransomware

Threats:
Redeemer
Vohuk
Amelia
Blackhunt
Daixin
Medusalocker
Conti
Bluekeep_vuln

Industry:
Financial, Government, Telco

Geo:
Korea, India, Vietnam, Russian, Netherlands, Russia

CVEs:
CVE-2019-0708 [Vulners]
Vulners: Score: 10.0, CVSS: 5.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows vista (-)
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows xp (-, -)
- microsoft windows server 2003 (-, -, r2)
- microsoft windows 7 (-)
have more...

IOCs:
File: 1
Hash: 3

Softs:
remote desktop services
#ParsedReport
05-12-2022

Hitching a ride with Mustang Panda

https://decoded.avast.io/threatintel/apt-treasure-trove-avast-suspects-chinese-apt-group-mustang-panda-is-collecting-data-from-burmese-government-agencies-and-opposition-groups

Actors/Campaigns:
Red_delta
Luminousmoth
Nightscout

Threats:
Plugx_rat
Hodur_rat
Uac_bypass_technique
Nbtscan_tool

Industry:
Petroleum, Financial, Ngo, Government

Geo:
Pacific, Czech, Chinese, Myanmar, American, Vietnam, Burmese, Mongolia, Russia, Malaysia, Canada, Myanmars, Australia, Usa, China, France, Asian, Netherlands, Serbia, Israel, Tatarstan

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 109
Domain: 6
IP: 38
Hash: 129

Softs:
microsoft office, chrome, opera, telegram, vivaldi

Algorithms:
xor, exhibit

Functions:
GDU1_NEW, GDU_OLD

Languages:
delphi, javascript
#ParsedReport
05-12-2022

. Analysis of the network attack activity of Torii remote control of the sea lotus organization

https://www.antiy.cn/research/notice&report/research_report/20221202.html

Actors/Campaigns:
Oceanlotus (motivation: information_theft)

Threats:
Torii_botnet
Kerrdown
Phantomlance
Cobalt_strike

Industry:
Government, Iot

Geo:
China

TTPs:
Tactics: 3
Technics: 0

IOCs:
File: 6

Softs:
android, macos, crontab

Algorithms:
aes, aes-128, rc4, gzip

Platforms:
x86, mips, arm, x64
#ParsedReport
05-12-2022

Schoolyard Bully Trojan Facebook Credential Stealer

https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer

Threats:
Schoolyardbully
Flytrap

Industry:
Financial, Chemical

Geo:
Vietnamese, Nederlands

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 175

Softs:
android, google chrome, mozilla firefox, opera, microsoft edge

Algorithms:
zip

Languages:
java, javascript

Platforms:
apple
#ParsedReport
05-12-2022

Alert (AA22-335A)

https://us-cert.cisa.gov/ncas/alerts/aa22-335a

Actors/Campaigns:
Lapsus

Threats:
Cuba
Romcom_rat
Ransomware.gov
Hancitor
Kerberoasting_technique
Kerbercache_tool
Zerologon_vuln
Qakbot
Impacket_tool
Meterpreter_tool
Iobit_tool
Powerview

Industry:
Foodtech, Government, E-commerce, Healthcare, Financial

Geo:
Ukrainian, Ukraine

CVEs:
CVE-2022-24521 [Vulners]
Vulners: Score: 4.6, CVSS: 4.2,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...
CVE-2020-1472 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 1903, 1909, 2004)
- microsoft windows server 2019 (-)
- fedoraproject fedora (31, 32, 33)
have more...

TTPs:
Tactics: 8
Technics: 13

IOCs:
File: 71
Path: 1
Hash: 48
IP: 53
Email: 4

Softs:
active directory, local security authority, keepass
#ParsedReport
06-12-2022

Technical Analysis of the Winbox Payload in WindiGo

https://www.nozominetworks.com/blog/technical-analysis-of-the-winbox-payload-in-windigo

Threats:
Windigo
Plaguebot
Meris_botnet
Revil
Glupteba
Mirai

Industry:
Telco, Iot

Geo:
Brazil, China, Vietnam

CVEs:
CVE-2018-14847 [Vulners]
Vulners: Score: 6.4, CVSS: 5.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- mikrotik routeros (le6.42)


TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 4
File: 1
Domain: 17
Registry: 3
#ParsedReport
06-12-2022

Danger Lurking in GitHub Repositories

https://socradar.io/danger-lurking-in-github-repositories

Threats:
Repojacking_technique
Bluekeep_vuln
Houdini_rat

CVEs:
CVE-2019-0708 [Vulners]
Vulners: Score: 10.0, CVSS: 5.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows vista (-)
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows xp (-, -)
- microsoft windows server 2003 (-, -, r2)
- microsoft windows 7 (-)
have more...

IOCs:
IP: 1
Hash: 27
File: 2

Algorithms:
base64

Languages:
python

Links:
https://docs.github.com/en/repositories/creating-and-managing-repositories/transferring-a-repository
#ParsedReport
06-12-2022

Vice Society: Profiling a Persistent Threat to the Education Sector

https://unit42.paloaltonetworks.com/vice-society-targets-education-sector

Actors/Campaigns:
Vice_society (motivation: cyber_criminal)
Unc2447

Threats:
Hellokitty
Printnightmare_vuln
Lockbit
Fivehands
Zeppelin
Lotl_technique
Blackcat
Bloodhound_tool
Systembc
Avoslocker
Sombrat_rat

Industry:
Education, Financial, Healthcare, Government, E-commerce, Ngo

Geo:
Emea, Germany, America, Japan, California, Spain, France, Italy, Apac, Brazil

CVEs:
CVE-2021-34527 [Vulners]
Vulners: Score: 9.0, CVSS: 3.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 1809, 1909, 2004)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-, 20h2, 2004)
have more...
CVE-2021-1675 [Vulners]
Vulners: Score: 9.3, CVSS: 3.5,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 1809, 1909, 2004)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
have more...

TTPs:
Tactics: 11
Technics: 0

IOCs:
Domain: 5
File: 4
Email: 14
Registry: 1
Hash: 15
Path: 1

Softs:
esxi, psexec, windows defender, microsoft defender, local security authority, ive directory data, windows print spooler

Algorithms:
aes