CTT Report Hub
3.22K subscribers
7.97K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
21-12-2022

Surge of Fake FIFA World Cup Streaming Sites Targets Virtual Fans

http://www.zscaler.com/blogs/security-research/surge-fake-fifa-world-cup-streaming-sites-targets-virtual-fans

Threats:
Solarmarker

Industry:
E-commerce, Financial, Aerospace

Geo:
Tokyo, Qatar, Africa

IOCs:
Domain: 29
Hash: 10

Softs:
wordpress, windows installer, joomla)

Languages:
javascript, php
#ParsedReport
21-12-2022

Nokoyawa Ransomware: Rust orBust. Key Points

http://www.zscaler.com/blogs/security-research/nokoyawa-ransomware-rust-or-bust

Actors/Campaigns:
Qilin
Blackcat

Threats:
Nokoyawa
Karma
Nemty
Ransomexx
Blackcat

Industry:
Financial

IOCs:
Hash: 3

Algorithms:
salsa20, sect233r1, curve25519, ecc, base64

Languages:
golang, rust

Links:
https://github.com/threatlabz/tools/tree/main/nokoyawa
https://github.com/kokke/tiny-ECDH-c
#ParsedReport
21-12-2022

Technical Analysis of DanaBot Obfuscation Techniques

http://www.zscaler.com/blogs/security-research/technical-analysis-danabot-obfuscation-techniques

Threats:
Danabot
Junk_code_technique
Beacon

Industry:
Financial

IOCs:
File: 1
Hash: 1

Languages:
delphi, python, prolog

Links:
https://github.com/threatlabz/tools/blob/main/danabot/09\_empty\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/idr\_map\_to\_idapy.py
https://github.com/threatlabz/tools/blob/main/danabot/02\_dynamic\_return.py
https://github.com/crypto2011/IDR
https://github.com/threatlabz/tools/blob/main/danabot/idr\_idc\_to\_idapy.py
https://github.com/OALabs/hashdb-ida
https://github.com/threatlabz/tools/blob/main/danabot/12\_rename\_junk\_random\_variables.py
https://github.com/threatlabz/tools/tree/main/danabot
https://github.com/threatlabz/tools/blob/main/danabot/04\_letter\_mapping.py
https://github.com/threatlabz/tools/blob/main/danabot/01\_junk\_byte\_jump.py
https://github.com/threatlabz/tools/blob/main/danabot/07\_stack\_string\_letters\_to\_last\_StrCatN\_call.py
https://github.com/threatlabz/tools/blob/main/danabot/05\_reset\_code.py
https://github.com/threatlabz/tools/blob/main/danabot/08\_set\_stack\_string\_letters\_comments.py
https://github.com/threatlabz/tools/blob/main/danabot/10\_math\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/11\_rename\_junk\_variables.py
https://github.com/threatlabz/tools/blob/main/danabot/06\_fake\_UStrLAsg\_and\_UStrCopy.py
https://github.com/threatlabz/tools/blob/main/danabot/03\_uppercase\_jumps.py
https://github.com/OALabs/hashdb/pull/35
#ParsedReport
21-12-2022

Black Friday Alert: 4 Emerging Skimming Attacks to Watch for This Holiday Season

http://www.zscaler.com/blogs/security-research/black-friday-scams-4-emerging-skimming-attacks-watch-holiday-season

Actors/Campaigns:
Lazarus

Threats:
Magentocore

Industry:
Transport, Financial, E-commerce

Geo:
Australia, Canada

IOCs:
Url: 1
File: 4
Hash: 1
Domain: 23
IP: 2

Algorithms:
base64

Functions:
setInterval, findBtnAddAction, sendCardData, getCardData, Listener, pixtar, _0x54d008

Languages:
php, javascript
#ParsedReport
21-12-2022

Back in Black... Basta. Key Points

http://www.zscaler.com/blogs/security-research/back-black-basta

Threats:
Blackbasta
Conti
Advobfuscator_tool

Industry:
Financial

IOCs:
Hash: 5
File: 4
Command: 1

Algorithms:
hmac, xchacha20, xor, chacha20, ecc

Links:
https://github.com/threatlabz/iocs/tree/main/blackbasta
https://github.com/threatlabz/ransomware\_notes/blob/main/blackbasta/blackbasta3.txt
#ParsedReport
21-12-2022

Reports of ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082)

https://socradar.io/reports-of-proxynotshell-vulnerabilities-being-actively-exploited-cve-2022-41040-and-cve-2022-41082

Threats:
Proxynotshell_vuln
Playcrypt
Owassrf
Plink
Anydesk_tool
Dllhijacker
Trojan.win64.agent.qwibok

CVEs:
CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 2
IP: 1
Hash: 5

Softs:
microsoft exchange
#ParsedReport
21-12-2022

Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks

https://www.trendmicro.com/en_us/research/22/l/conti-team-one-splinter-group-resurfaces-as-royal-ransomware-wit.html

Threats:
Royal_ransomware
Conti
Zeon
Cobalt_strike
Qakbot
Netscan_tool
Process_hacker_tool
Pchunter_tool
Powertool_tool
Gmer_tool
Adfind_tool
Ransom.win64.yoral.smyxcjct
Trojan.win64.cobalt.be
Trojan.win32.deyma.am
Swrort
Ransom.win32.yoral.yxckb
Ransom.win32.yoral.yecjyt

Geo:
Brazil

IOCs:
Command: 1
File: 2
Hash: 20

Softs:
psexec

Algorithms:
aes

Functions:
OpenSSLs

Win API:
FindFirstFileW, FindNextFileW, FindClose, NetShareEnum
#ParsedReport
21-12-2022

Kiss-a-Dog Discovered Utilizing a 20- Year-Old Process Hider

https://www.cadosecurity.com/kiss-a-dog-discovered-utilizing-a-20-year-old-process-hider

Actors/Campaigns:
Kiss_a_dog
Teamtnt

Threats:
Xhide_tool
Tsunami_botnet
Xmrig_miner
Diamorphine_rootkit
Libprocesshider_rootkit
Log4shell_vuln

TTPs:
Tactics: 1
Technics: 0

IOCs:
Domain: 1
Url: 1
Hash: 7

Softs:
docker, redis, ubuntu, unix, macos

Algorithms:
base64

Languages:
python

Platforms:
arm

Links:
https://github.com/chenkaie/junkcode/blob/master/xhide.c
https://github.com/cado-security
https://github.com/m0nad/Diamorphine
https://github.com/gianlucaborello/libprocesshider
#ParsedReport
21-12-2022

Godfather:

https://blog.group-ib.com/godfather-trojan

Threats:
Godfather
Anubis
Cerberus

Industry:
Financial

Geo:
Belarus, Moldova, Turkey, France, Uzbekistan, Poland, Spanish, Armenia, Canada, Germany, Azerbaijan, Kyrgyzstan, Italy, Tajikistan, Russian, Spain, Kazakhstan, Turkish, Russia

TTPs:
Tactics: 1
Technics: 0

IOCs:
Domain: 4
File: 1
Hash: 11
Url: 6

Softs:
android, telegram, unix

Algorithms:
aes, cbc

Languages:
php, java

Links:
https://github.com/LibVNC/libvncserver
#ParsedReport
21-12-2022

BrasDex: A new Brazilian ATS Android Banker with ties to Desktop malware

https://www.threatfabric.com/blogs/brasdex-a-new-brazilian-ats-malware.html

Threats:
Brasdex
Metamorfo
Bratarat
Vultur
Flubot
Gustuff
Sharkbot
Cashback

Industry:
Financial

Geo:
Brasil, Brazil, Brazilian, Ita, Latam, America

IOCs:
Hash: 5
Domain: 1
File: 2

Softs:
android

Algorithms:
zip

Functions:
SetPwCharAt

Languages:
autoit, javascript, delphi

Platforms:
intel
#ParsedReport
21-12-2022

SpiderLabs Blog. Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/malicious-macros-adapt-to-use-microsoft-publisher-to-push-ekipa-rat

Threats:
Ekipa_rat
Amsi_bypass_technique
Cobalt_strike
Beacon
Quantum_locker
Emotet
Svcready_loader
Uac_bypass_technique

Industry:
Education, Government, Financial

Geo:
Ukraine, Ukrainian, Russia, Russian

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 56
File: 13
Domain: 3
IP: 7
Url: 10

Softs:
microsoft publisher, visual basic for applications, microsoft word, microsoft defender, microsoft office, microsoft excel

Algorithms:
zip

Win API:
SetTimer, SendInput

Languages:
visual_basic

Links:
https://github.com/S3cur3Th1sSh1t/WinPwn
#ParsedReport
21-12-2022

Meddler-in-the-Middle Phishing Attacks Explained

https://unit42.paloaltonetworks.com/meddler-phishing-attacks

Threats:
Evilginx_tool
Mitm_technique
Cloaking_technique
Robin_banks_tool
Caffeine_tool
Modlishka_tool
Muraena_tool
Evilnovnc_tool
Evilproxy_tool
Credential_stealing_technique

Industry:
Financial

IOCs:
Domain: 7

Softs:
chrome

Links:
https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication#configuring-two-factor-authentication-using-a-security-key
#ParsedReport
21-12-2022

OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations

https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations

Threats:
Owassrf
Proxynotshell_vuln
Playcrypt
Plink
Anydesk_tool

CVEs:
CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41123 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
Path: 1
Email: 1

Softs:
microsoft exchange, microsoft exchange server, microsoft iis server

Languages:
python

Links:
https://github.com/CrowdStrike/OWASSRF
#ParsedReport
20-12-2022

GuLoaders Unique Approach to Obfuscation: Understanding Stack Manipulation

https://www.0ffset.net/reverse-engineering/guloaders-stack-manipulation

Actors/Campaigns:
Tick

Threats:
Cloudeye
Agent_tesla
Formbook
Remcos_rat
Smokeloader
Cyberchef_tool

IOCs:
Hash: 1

Softs:
visual studio

Algorithms:
xor

Functions:
w_string_decrypt, string_decrypt, malloc, main, sub_401010, printf

Win API:
MessageBoxA

Languages:
python

YARA: Found