CTT Report Hub
3.22K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
07-12-2022

An Update on HIVE Ransomware

https://www.avertium.com/resources/threat-reports/an-update-on-hive-ransomware

Threats:
Hive
Vssadmin_tool

Industry:
Energy, Financial, Government, Retail, Healthcare

Geo:
Quebec, Indias, Canada, Ontario

CVEs:
CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)


IOCs:
Domain: 4

Softs:
esxi, microsoft exchange server, macos

Algorithms:
zip

Languages:
golang

Links:
https://github.com/reecdeep/HiveV5\_file\_decryptor/blob/main/README.md
#ParsedReport
07-12-2022

Torii. Reference materials:

https://mp.weixin.qq.com/s/2RluW4O56UWiNSQB2hQtGA

Actors/Campaigns:
Oceanlotus

Threats:
Torii_botnet
Mirai
Rotajakiro
Phantomlance
Kerrdown
Cobalt_strike

Industry:
Iot, Government

Geo:
China

TTPs:
Tactics: 3
Technics: 0

IOCs:
File: 6

Softs:
android, macos, crontab

Algorithms:
aes, gzip, aes-128, rc4

Platforms:
arm, x86, mips, x64
#ParsedReport
07-12-2022

AndroxGh0st the python malware exploiting your AWS keys

https://www.lacework.com/blog/androxghost-the-python-malware-exploiting-your-aws-keys

Threats:
Androxgh0st
Xcatze_actor
Redline_stealer

IOCs:
IP: 1
Hash: 7
Url: 2

Softs:
laravel

Functions:
GetSendQuota, CreateUser-, CreateLoginProfile-, DeleteAccessKey-, CreateUser, CreateLoginProfile, DeleteAccessKey

Languages:
php, python

Platforms:
intel

Links:
https://github.com/search?q=%22androxgh0st%22&type=code
https://github.com/lacework/lacework-labs/blob/master/blog/androxgh0st\_IOCs.csv
#ParsedReport
07-12-2022

Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets

https://blogs.blackberry.com/en/2022/12/mustang-panda-uses-the-russian-ukrainian-war-to-attack-europe-and-asia-pacific-targets

Actors/Campaigns:
Red_delta (motivation: cyber_espionage)

Threats:
Plugx_rat
Dll_sideloading_technique
Crashoverride
Romcom_rat

Industry:
Ngo, Telco, Education, Government, Financial

Geo:
Chinese, Vietnam, Pacific, Ukraine, China, Apac, Asia, Myanmar

TTPs:
Tactics: 6
Technics: 21

IOCs:
File: 6
Command: 1
Path: 1
IP: 11
Hash: 4

Softs:
component object model, keepass

Win API:
EnumThreadWindows, EnumSystemCodePagesW

Platforms:
intel
#ParsedReport
07-12-2022

Top 10 macOS Malware Discoveries in 2022

https://www.sentinelone.com/blog/top-10-macos-malware-discoveries-in-2022

Actors/Campaigns:
Lazarus
Earth_berberoka
Emissary_panda

Threats:
Alchimist_tool
Chromeloader
Cloudmensis
Cratedepression
Dazzlespy
Gimmick
Pymafka
Pkexec_tool
Poseidon
Macma
Typosquatting_technique
Cobalt_strike
Upx_tool
Sliver_tool
Xcsset
Pirrit
Bundlore
Adload_loader

Geo:
Chinese, Asia, Korean

CVEs:
CVE-2021-4034 [Vulners]
Vulners: Score: 7.2, CVSS: 4.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- polkit project polkit (*)
- redhat enterprise linux desktop (7.0)
- redhat enterprise linux workstation (7.0)
- redhat enterprise linux for scientific computing (7.0)
- redhat enterprise linux server (7.0, 6.0)
have more...
CVE-2020-9934 [Vulners]
Vulners: Score: 2.1, CVSS: 2.3,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- apple ipad os (<13.6)
- apple iphone os (<13.6)
- apple mac os x (<10.15.6)


IOCs:
Hash: 29
File: 12
Url: 3
Domain: 4
IP: 1

Softs:
macos, unix, chrome, keychain, coinbase

Algorithms:
zip

Languages:
rust, objective_c, python

Platforms:
intel, apple, x86
#ParsedReport
08-12-2022

DeathStalker targets legal entities with new Janicab variant

https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/108131

Actors/Campaigns:
Evilnum

Threats:
Janicab
Dead_drop_technique
Powersing
Powerpepper
Plink
Beacon
Icmpshell_tool
Procdump_tool

Industry:
Financial

Geo:
Egypt, Emirates, Georgia, Bulgaria

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 26
Registry: 1
IP: 4
Hash: 19
Url: 3

Softs:
macos, virtualbox, internet explorer, sysinternals

Algorithms:
base64, zip

Functions:
isVmDrivers, isVmMAC, isVmProduct, InternetExplorer, checkRunningProcess, delFFcookies, delGCcookies, delIEcookies, isMalwb, HandleCCleaner, have more...

Languages:
php, python

Platforms:
apple, intel

Links:
https://github.com/bdamele/icmpsh
#ParsedReport
08-12-2022

Lazarus group uses fake cryptocurrency apps to plant AppleJeus malware

https://www.malwarebytes.com/blog/news/2022/12/lazarus-group-uses-fake-cryptocurrency-apps-to-plant-applejeus-malware

Actors/Campaigns:
Lazarus

Threats:
Applejeus
Dll_sideloading_technique

Industry:
Government, Financial

Geo:
Korean

IOCs:
Domain: 6
File: 4
Path: 4

Softs:
microsoft office, qtbitcointrader

Functions:
OpenDrive

Links:
https://github.com/JulyIGHOR/QtBitcoinTrader
#ParsedReport
08-12-2022

APT-C-56. 1. Analysis of attack activities

https://mp.weixin.qq.com/s/J_A12SOX0k5TOYFAegBv_w

Actors/Campaigns:
Transparenttribe
Comment_crew
Manling_flower

Threats:
Spynote_rat
Sonicspy
Ahmyth_rat
Metasploit_tool
Asyncrat_rat
Beacon

Industry:
Government

Geo:
Syrian, Pakistan, Pakistani, Asia

IOCs:
File: 6
Hash: 23

Softs:
android
#ParsedReport
08-12-2022

Breach Prevention Blog. New Babuk Ransomware Found in Major Attack

https://blog.morphisec.com/babuk-ransomware-variant-major-attack

Actors/Campaigns:
Blackmatter

Threats:
Babuk
Wannaren
Dll_sideloading_technique
Uac_bypass_technique
Reflectiveloader
Conti

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 33
Path: 2

Softs:
dbsnmp, onenote, powerpnt, encsvc, thebat, wordpad, event tracing for windows
#ParsedReport
08-12-2022

Mallox Ransomware showing signs of Increased Activity. IoCs

https://blog.cyble.com/2022/12/08/mallox-ransomware-showing-signs-of-increased-activity

Threats:
Mallox
Snake_keylogger
Agent_tesla
Remcos_rat
Intellilock_tool
Gozi

Industry:
Financial

Geo:
Georgia, Australia, Singapore, India, Dubai

TTPs:
Tactics: 6
Technics: 8

IOCs:
Url: 2
File: 4
Hash: 12

Softs:
microsoft sql, mssql, postgresql, microsoft exchange server, wamp, nginx, jenkins, redis, kingdee, virtualbox, have more...

Algorithms:
aes

Functions:
InvokeMember
#ParsedReport
08-12-2022

Internet Explorer 0-day exploited by North Korean actor APT37

https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-korean-actor-apt37

Actors/Campaigns:
Apt37 (motivation: government_sponsored)

Threats:
Rtf_template_inject_technique
Rokrat_rat
Bluelight
Dolphin

Geo:
Korea, Korean

CVEs:
CVE-2017-0199 [Vulners]
Vulners: Score: 9.3, CVSS: 7.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, *)
- microsoft windows server 2012 (-)
- microsoft windows vista (*)
- microsoft office (2010, 2013, 2016, 2007)
- microsoft windows 7 (*)
have more...
CVE-2021-34480 [Vulners]
Vulners: Score: 6.8, CVSS: 2.4,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 1607, 1809, 1909, 2004)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
- microsoft windows server 2008 (r2)
have more...
CVE-2022-41128 [Vulners]
Vulners: Score: Unknown, CVSS: 2.5,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 21h2, 22h2, 1809)
- microsoft windows 8.1 (-, -)
- microsoft windows server 2016 (-)
have more...

IOCs:
File: 1
Hash: 6
Domain: 5

Softs:
internet explorer, microsoft office

Languages:
javascript, jscript
#ParsedReport
08-12-2022

Fantasy a new Agrius wiper deployed through a supplychain attack

https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack

Actor/Campaign:
Agrius

Threats:
Fantasywiper
Apostle
Credential_harvesting_technique
Minidump_tool
Mimikatz_tool
Secretsdump_tool
Killdisk
Lsass_dumper_tool
Impacket_tool
Timestomp_technique
Stop_ransomware

Industry:
Petroleum, Financial

Geo:
Iran, Emirates, Ukraine, African, Israel, Israeli, Africa

TTPs:
Tactics: 9
Technics: 15

IOCs:
Path: 5
File: 4
Registry: 3
Hash: 7

Softs:
psexec

Algorithms:
base64, zip, des

Functions:
SetLastAccessTimeUtc, GetSubDirectoryFileListRecursive

Win API:
SeShutdownPrivilege

Languages:
php, java, lua, python

Links:
https://github.com/cube0x0/MiniDump
https://github.com/bb00/zer0dump/blob/master/secretsdump.py