CTT Report Hub
3.22K subscribers
7.97K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
19-12-2022

CVE-2022-41040 and CVE-2022-41082 zero-days in MS Exchange

https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364

Threats:
Proxynotshell_vuln
Proxyshell_vuln
Dllhijacker
Trojan.win64.agent.qwibok
Dll_hijacking_technique

CVEs:
CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: 9
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 4
IP: 1
Hash: 5

Softs:
microsoft exchange server, microsoft exchange

Languages:
python
#ParsedReport
19-12-2022

SentinelSneak: Malicious PyPI module poses as security software development kit

https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk

Actors/Campaigns:
Iconburst

Threats:
Sentinelsneak
Typosquatting_technique
W4sp

Geo:
German

IOCs:
IP: 1
Hash: 48

Languages:
ruby, javascript, python

Links:
https://github.com/javascript-obfuscator/javascript-obfuscator
#ParsedReport
20-12-2022

Lazarus APTs Operation Interception Uses Signed Binary

https://labs.k7computing.com/index.php/lazarus-apts-operation-interception-uses-signed-binary

Actors/Campaigns:
Lazarus

IOCs:
File: 2
Hash: 1

Softs:
macos, coinbase, microsoft word, curl

Functions:
startDaemon, DownloadFile, curl_easy_init, curl_easy_setopt

Platforms:
apple, intel, arm
#ParsedReport
20-12-2022

Nokoyawa Ransomware: Rust orBust. Key Points

https://www.zscaler.com/blogs/security-research/nokoyawa-ransomware-rust-or-bust

Actors/Campaigns:
Blackcat

Threats:
Nokoyawa
Karma
Nemty
Hive
Blackcat

Industry:
Financial

IOCs:
Hash: 3

Algorithms:
curve25519, salsa20, base64, ecc, sect233r1

Languages:
rust, golang

Links:
https://github.com/threatlabz/tools/tree/main/nokoyawa
https://github.com/kokke/tiny-ECDH-c
#ParsedReport
20-12-2022

Raspberry Robin Malware Targets Telecom, Governments

https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html

Threats:
Raspberry_robin
Browserassistant
Uacme
Uac_bypass_technique
Lockbit

Industry:
Government, Telco

Geo:
Australia, Oceania, America

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 9
Registry: 3
Path: 1
Hash: 1

Softs:
windows installer, windows shell, (windows installer)

Algorithms:
rc4
#ParsedReport
20-12-2022

Cisco Talos Intelligence Blog. Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins

https://blog.talosintelligence.com/xlling-in-excel-malicious-add-ins

Actors/Campaigns:
Stone_panda (motivation: cyber_espionage)
Ta410 (motivation: cyber_espionage)
Donot
Carbanak (motivation: financially_motivated)

Threats:
Motw_bypass_technique
Meterpreter_tool
Dridex
Formbook
Anel
Process_injection_technique
Buer_loader
Agent_tesla
Vidar_stealer
Nanocore_rat
Icedid
Arkei_stealer
Asyncrat_rat
Bazarbackdoor
Avemaria_rat
Lokibot_stealer
Ducktail_stealer

Industry:
Education, Government, Healthcare

Geo:
Pakistan, Japan, India, Vietnam, China, Russia, Hungarian, Budapest, Africa, Pakistani

IOCs:
Registry: 1
File: 12
Hash: 11
Url: 1

Softs:
microsoft office, visual basic for applications, windows explorer, microsoft excel, net framework, discord

Algorithms:
aes, base32

YARA: Found

Links:
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/donot\_mutex.yaml
https://github.com/Cisco-Talos/IOCs/blob/main/2022/12/xlling-in-excel-malicious-add-ins.txt
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/malware\_avemaria\_filepath.yaml
https://github.com/Cisco-Talos/osquery\_queries/blob/master/win\_malware/malware\_lokibot\_filepath.yaml
#ParsedReport
20-12-2022

Russias Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine

https://unit42.paloaltonetworks.com/trident-ursa

Actors/Campaigns:
Gamaredon

Threats:
Mispadu
Fastflux_technique
Beacon

Industry:
Petroleum, Government

Geo:
Apac, Russian, Russia, Ukrainian, Emea, America, Japan, Ukraine

IOCs:
Hash: 12
Domain: 7
Url: 10
IP: 3
File: 9
Path: 3

Softs:
telegram, windows scheduled task, mac os

Algorithms:
xor, base64

Functions:
GetSynchronization-USA

Win API:
CreateProcessA

Platforms:
intel, x64

Links:
https://github.com/pan-unit42/iocs/blob/master/Gamaredon/Gamaredon\_IoCs\_DEC2022.txt
#technique

Venom is a C++ library that is meant to give an alternative way to communicate, instead of creating a socket that could be traced back to the process, it creates a new "hidden" (there is no window shown) detached edge process (edge was chosen because it is a browser that is installed on every Windows 10+ and won't raise suspicious) and stealing one of its sockets to perform the network operations.

https://github.com/Idov31/Venom
#ParsedReport
21-12-2022

Surge of Fake FIFA World Cup Streaming Sites Targets Virtual Fans

http://www.zscaler.com/blogs/security-research/surge-fake-fifa-world-cup-streaming-sites-targets-virtual-fans

Threats:
Solarmarker

Industry:
E-commerce, Financial, Aerospace

Geo:
Tokyo, Qatar, Africa

IOCs:
Domain: 29
Hash: 10

Softs:
wordpress, windows installer, joomla)

Languages:
javascript, php
#ParsedReport
21-12-2022

Nokoyawa Ransomware: Rust orBust. Key Points

http://www.zscaler.com/blogs/security-research/nokoyawa-ransomware-rust-or-bust

Actors/Campaigns:
Qilin
Blackcat

Threats:
Nokoyawa
Karma
Nemty
Ransomexx
Blackcat

Industry:
Financial

IOCs:
Hash: 3

Algorithms:
salsa20, sect233r1, curve25519, ecc, base64

Languages:
golang, rust

Links:
https://github.com/threatlabz/tools/tree/main/nokoyawa
https://github.com/kokke/tiny-ECDH-c
#ParsedReport
21-12-2022

Technical Analysis of DanaBot Obfuscation Techniques

http://www.zscaler.com/blogs/security-research/technical-analysis-danabot-obfuscation-techniques

Threats:
Danabot
Junk_code_technique
Beacon

Industry:
Financial

IOCs:
File: 1
Hash: 1

Languages:
delphi, python, prolog

Links:
https://github.com/threatlabz/tools/blob/main/danabot/09\_empty\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/idr\_map\_to\_idapy.py
https://github.com/threatlabz/tools/blob/main/danabot/02\_dynamic\_return.py
https://github.com/crypto2011/IDR
https://github.com/threatlabz/tools/blob/main/danabot/idr\_idc\_to\_idapy.py
https://github.com/OALabs/hashdb-ida
https://github.com/threatlabz/tools/blob/main/danabot/12\_rename\_junk\_random\_variables.py
https://github.com/threatlabz/tools/tree/main/danabot
https://github.com/threatlabz/tools/blob/main/danabot/04\_letter\_mapping.py
https://github.com/threatlabz/tools/blob/main/danabot/01\_junk\_byte\_jump.py
https://github.com/threatlabz/tools/blob/main/danabot/07\_stack\_string\_letters\_to\_last\_StrCatN\_call.py
https://github.com/threatlabz/tools/blob/main/danabot/05\_reset\_code.py
https://github.com/threatlabz/tools/blob/main/danabot/08\_set\_stack\_string\_letters\_comments.py
https://github.com/threatlabz/tools/blob/main/danabot/10\_math\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/11\_rename\_junk\_variables.py
https://github.com/threatlabz/tools/blob/main/danabot/06\_fake\_UStrLAsg\_and\_UStrCopy.py
https://github.com/threatlabz/tools/blob/main/danabot/03\_uppercase\_jumps.py
https://github.com/OALabs/hashdb/pull/35
#ParsedReport
21-12-2022

Black Friday Alert: 4 Emerging Skimming Attacks to Watch for This Holiday Season

http://www.zscaler.com/blogs/security-research/black-friday-scams-4-emerging-skimming-attacks-watch-holiday-season

Actors/Campaigns:
Lazarus

Threats:
Magentocore

Industry:
Transport, Financial, E-commerce

Geo:
Australia, Canada

IOCs:
Url: 1
File: 4
Hash: 1
Domain: 23
IP: 2

Algorithms:
base64

Functions:
setInterval, findBtnAddAction, sendCardData, getCardData, Listener, pixtar, _0x54d008

Languages:
php, javascript
#ParsedReport
21-12-2022

Back in Black... Basta. Key Points

http://www.zscaler.com/blogs/security-research/back-black-basta

Threats:
Blackbasta
Conti
Advobfuscator_tool

Industry:
Financial

IOCs:
Hash: 5
File: 4
Command: 1

Algorithms:
hmac, xchacha20, xor, chacha20, ecc

Links:
https://github.com/threatlabz/iocs/tree/main/blackbasta
https://github.com/threatlabz/ransomware\_notes/blob/main/blackbasta/blackbasta3.txt
#ParsedReport
21-12-2022

Reports of ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082)

https://socradar.io/reports-of-proxynotshell-vulnerabilities-being-actively-exploited-cve-2022-41040-and-cve-2022-41082

Threats:
Proxynotshell_vuln
Playcrypt
Owassrf
Plink
Anydesk_tool
Dllhijacker
Trojan.win64.agent.qwibok

CVEs:
CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 2
IP: 1
Hash: 5

Softs:
microsoft exchange
#ParsedReport
21-12-2022

Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks

https://www.trendmicro.com/en_us/research/22/l/conti-team-one-splinter-group-resurfaces-as-royal-ransomware-wit.html

Threats:
Royal_ransomware
Conti
Zeon
Cobalt_strike
Qakbot
Netscan_tool
Process_hacker_tool
Pchunter_tool
Powertool_tool
Gmer_tool
Adfind_tool
Ransom.win64.yoral.smyxcjct
Trojan.win64.cobalt.be
Trojan.win32.deyma.am
Swrort
Ransom.win32.yoral.yxckb
Ransom.win32.yoral.yecjyt

Geo:
Brazil

IOCs:
Command: 1
File: 2
Hash: 20

Softs:
psexec

Algorithms:
aes

Functions:
OpenSSLs

Win API:
FindFirstFileW, FindNextFileW, FindClose, NetShareEnum
#ParsedReport
21-12-2022

Kiss-a-Dog Discovered Utilizing a 20- Year-Old Process Hider

https://www.cadosecurity.com/kiss-a-dog-discovered-utilizing-a-20-year-old-process-hider

Actors/Campaigns:
Kiss_a_dog
Teamtnt

Threats:
Xhide_tool
Tsunami_botnet
Xmrig_miner
Diamorphine_rootkit
Libprocesshider_rootkit
Log4shell_vuln

TTPs:
Tactics: 1
Technics: 0

IOCs:
Domain: 1
Url: 1
Hash: 7

Softs:
docker, redis, ubuntu, unix, macos

Algorithms:
base64

Languages:
python

Platforms:
arm

Links:
https://github.com/chenkaie/junkcode/blob/master/xhide.c
https://github.com/cado-security
https://github.com/m0nad/Diamorphine
https://github.com/gianlucaborello/libprocesshider