CTT Report Hub
3.21K subscribers
7.95K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
16-12-2022

Dark Web Profile: Black Basta Ransomware

https://socradar.io/dark-web-profile-black-basta-ransomware

Actors/Campaigns:
Carbanak

Threats:
Blackbasta
Lockbit
Conti
Cobalt_strike
Qakbot

Industry:
Retail, Healthcare, Foodtech

Geo:
Deutsche, American

Algorithms:
chacha20

YARA: Found
SIGMA: Found
#ParsedReport
16-12-2022

Sophisticated DarkTortilla Malware Spreading Via Phishing Sites

https://blog.cyble.com/2022/12/16/sophisticated-darktortilla-malware-spreading-via-phishing-sites

Actors/Campaigns:
Tortilla

Threats:
Darktortilla
Agent_tesla
Asyncrat_rat
Nanocore_rat
Process_injection_technique

TTPs:
Tactics: 5
Technics: 6

IOCs:
Hash: 10
Url: 2
Registry: 1
File: 4
Path: 1
Domain: 2

Softs:
task scheduler, net framework, chrome

Algorithms:
rc4, exhibit, zip

Functions:
CreateDecryptor, FindNextFileExW, WriteFileA

Win API:
FindFirstFileExW, CreateFileA, GetObjectA
#ParsedReport
16-12-2022

. Types of the latest .NET packers and domestic distribution trends

https://asec.ahnlab.com/ko/44066

Threats:
Agent_tesla
Formbook
Postealer
Avemaria_rat
Asyncrat_rat
Darktortilla
Purecrypter
Confuserex_tool
Lokibot_stealer
Remcos_rat
Trojan/win.msilkrypt.r478738
Trojan/win.msilkrypt.r479010
Trojan/win.malwarex-gen.c4922823
Trojan/win.msilkrypt.c5020026
Trojan/win.msil.r503383
Trojan/win.msil.r510208
Trojan/win.msil.r492640
Trojan/win.msilkrypt.r478746
Trojan/win.msil.r491654
Trojan/win.msil.r479032
Trojan/win.msil.r536135
Trojan/win.loader.c5020045
Trojan/win.msilkrypt.r479033
Trojan/win.generic.c5197697
Trojan/win.msilkrypt.r479202
Trojan/win.msil.r5288800
Trojan/win.msil.c5134406
Trojan/win.msil.r498082
Trojan/win.msil.c5198300
Trojan/win.msil.r510204

Industry:
Transport

Geo:
Korea

IOCs:
File: 101
Hash: 33
Url: 27

Softs:
discord

Algorithms:
base64, xor

Functions:
Gameloader, Type

Languages:
csharp
#ParsedReport
16-12-2022

I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware

Actors/Campaigns:
Mofang
Contileaks

Threats:
Poortry
Stonestop
Plugx_rat
Trickbot
Fivesys
Vmprotect_tool

Industry:
Entertainment, Education

Geo:
Chinese, Iranian, Russian

IOCs:
Hash: 288
IP: 7
File: 13
Path: 3

Languages:
python

YARA: Found
#ParsedReport
16-12-2022

Dark Web Profile: Killnet Russian Hacktivist Group

https://socradar.io/dark-web-profile-killnet-russian-hacktivist-group

Actors/Campaigns:
Killnet (motivation: financially_motivated, hacktivism)
Xaknet (motivation: hacktivism)
Zarya (motivation: hacktivism)
Anonymous_russia (motivation: hacktivism)
Dpr_joker (motivation: hacktivism)
Beregini (motivation: hacktivism)
Rahdit (motivation: hacktivism)
Noname057 (motivation: hacktivism)
Zsecnet (motivation: hacktivism)

Threats:
Killmilk_actor
Joker
Orbit_technique
Cannon
Karma

Industry:
Transport, Government, Aerospace, Telco, Financial, Healthcare

Geo:
Poland, Italy, Japan, Romania, London, Ukrainian, Germany, Ukraines, Indiana, Russia, Norwegian, Estonia, Ukraine, Italian, Romanian, Russian, Lithuania, Czech, American

TTPs:
Tactics: 3
Technics: 5

Softs:
telegram, teamspeak
#ParsedReport
19-12-2022

Veeam Fixes Critical Vulnerabilities in Backup & Replication Software (CVE-2022-26500 & CVE-2022-26501)

https://socradar.io/veeam-fixes-critical-vulnerabilities-in-backup-replication-software-cve-2022-26500-cve-2022-26501

Threats:
Monti
Yanluowang
Empire_loader

CVEs:
CVE-2022-26500 [Vulners]
Vulners: Score: 6.5, CVSS: 7.4,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- veeam backup \& replication (9.5.0.1536, 9.5.4.2615, <10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, <11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261)

CVE-2022-26501 [Vulners]
Vulners: Score: 10.0, CVSS: 2.0,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- veeam backup \& replication (<10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, <11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261)

CVE-2022-265001 [Vulners]
Vulners: Score: Unknown, CVSS: Unknown,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown


IOCs:
File: 4
Hash: 3
IP: 1

Languages:
python
#ParsedReport
19-12-2022

Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government

https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government

Actors/Campaigns:
Unc4166 (motivation: information_theft)
Fancy_bear

Threats:
Stowaway_tool
Beacon
Sparepart
Eternal_petya
Cobalt_strike
Process_injection_technique

Industry:
Government

Geo:
Ukrainian, Russian

TTPs:
Tactics: 7
Technics: 22

IOCs:
File: 13
Hash: 14
Url: 6
Path: 11
Command: 4
Domain: 5
IP: 2

Softs:
curl, windows service, windows image

Algorithms:
zip

Win API:
GetSystemFirmwareTable, DriveType

Languages:
visual_basic

Platforms:
x64

Links:
https://github.com/ethanpil/sheret
https://github.com/microsoft/Windows-universal-samples/blob/main/Samples/CustomCapability/Service/Client/smbios.cpp
https://gist.github.com/poudyalanil/ed1a7ed5603805833ca41cbaccefe0d5
https://github.com/DeltoidDelta/Remove-MS-Telemetry-and-Annoyances/blob/master/remove\_MS\_telemetry.cmd
https://github.com/ph4ntonn/Stowaway
#ParsedReport
19-12-2022

Flying Phish. Timeline

https://www.domaintools.com/resources/blog/flying-phish

Threats:
Cyberchef_tool
Credential_harvesting_technique
Procmon_tool

Industry:
Telco, E-commerce

Geo:
Chinese

IOCs:
Domain: 8
Email: 8
IP: 1
File: 8
Hash: 5
Url: 2

Softs:
discord, instagram

Algorithms:
base64, zip

Languages:
php

Platforms:
intel

YARA: Found

Links:
https://github.com/DomainTools/SecuritySnacks/tree/main/2022/Flying%20Phish
#ParsedReport
19-12-2022

Iran-linked Charming Kitten espionage gang bares claws to pollies, power orgs

https://www.proofpoint.com/us/newsroom/news/iran-linked-charming-kitten-espionage-gang-bares-claws-pollies-power-orgs

Actors/Campaigns:
Cleaver (motivation: hacktivism, information_theft, cyber_espionage)
Phosphorus
Irgc (motivation: cyber_espionage)
Bec

Threats:
Beacon
Credential_harvesting_technique
Ghostecho
Quantum_locker
Revil
Wannacry

Industry:
Government, Energy, Education, Healthcare, Aerospace

Geo:
Iranian, Tehran, American, Iran, Iranians, Emea, Israel

IOCs:
Domain: 2

Platforms:
intel, arm
#ParsedReport
19-12-2022

CVE-2022-41040 and CVE-2022-41082 zero-days in MS Exchange

https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364

Threats:
Proxynotshell_vuln
Proxyshell_vuln
Dllhijacker
Trojan.win64.agent.qwibok
Dll_hijacking_technique

CVEs:
CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: 9
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 4
IP: 1
Hash: 5

Softs:
microsoft exchange server, microsoft exchange

Languages:
python
#ParsedReport
19-12-2022

SentinelSneak: Malicious PyPI module poses as security software development kit

https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk

Actors/Campaigns:
Iconburst

Threats:
Sentinelsneak
Typosquatting_technique
W4sp

Geo:
German

IOCs:
IP: 1
Hash: 48

Languages:
ruby, javascript, python

Links:
https://github.com/javascript-obfuscator/javascript-obfuscator
#ParsedReport
20-12-2022

Lazarus APTs Operation Interception Uses Signed Binary

https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signed-binary

Actors/Campaigns:
Lazarus

IOCs:
File: 2
Hash: 1

Softs:
macos, coinbase, microsoft word, curl

Functions:
startDaemon, DownloadFile, curl_easy_init, curl_easy_setopt

Platforms:
apple, intel, arm
#ParsedReport
20-12-2022

Nokoyawa Ransomware: Rust orBust. Key Points

https://www.zscaler.com/blogs/security-research/nokoyawa-ransomware-rust-or-bust

Actors/Campaigns:
Blackcat

Threats:
Nokoyawa
Karma
Nemty
Hive
Blackcat

Industry:
Financial

IOCs:
Hash: 3

Algorithms:
curve25519, salsa20, base64, ecc, sect233r1

Languages:
rust, golang

Links:
https://github.com/threatlabz/tools/tree/main/nokoyawa
https://github.com/kokke/tiny-ECDH-c
#ParsedReport
20-12-2022

Raspberry Robin Malware Targets Telecom, Governments

https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html

Threats:
Raspberry_robin
Browserassistant
Uacme
Uac_bypass_technique
Lockbit

Industry:
Government, Telco

Geo:
Australia, Oceania, America

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 9
Registry: 3
Path: 1
Hash: 1

Softs:
windows installer, windows shell, (windows installer)

Algorithms:
rc4