CTT Report Hub
3.22K subscribers
7.98K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
21-12-2022

SpiderLabs Blog. Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/malicious-macros-adapt-to-use-microsoft-publisher-to-push-ekipa-rat

Threats:
Ekipa_rat
Amsi_bypass_technique
Cobalt_strike
Beacon
Quantum_locker
Emotet
Svcready_loader
Uac_bypass_technique

Industry:
Education, Government, Financial

Geo:
Ukraine, Ukrainian, Russia, Russian

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 56
File: 13
Domain: 3
IP: 7
Url: 10

Softs:
microsoft publisher, visual basic for applications, microsoft word, microsoft defender, microsoft office, microsoft excel

Algorithms:
zip

Win API:
SetTimer, SendInput

Languages:
visual_basic

Links:
https://github.com/S3cur3Th1sSh1t/WinPwn
#ParsedReport
21-12-2022

Meddler-in-the-Middle Phishing Attacks Explained

https://unit42.paloaltonetworks.com/meddler-phishing-attacks

Threats:
Evilginx_tool
Mitm_technique
Cloaking_technique
Robin_banks_tool
Caffeine_tool
Modlishka_tool
Muraena_tool
Evilnovnc_tool
Evilproxy_tool
Credential_stealing_technique

Industry:
Financial

IOCs:
Domain: 7

Softs:
chrome

Links:
https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication#configuring-two-factor-authentication-using-a-security-key
#ParsedReport
21-12-2022

OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations

https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations

Threats:
Owassrf
Proxynotshell_vuln
Playcrypt
Plink
Anydesk_tool

CVEs:
CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41123 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
Path: 1
Email: 1

Softs:
microsoft exchange, microsoft exchange server, microsoft iis server

Languages:
python

Links:
https://github.com/CrowdStrike/OWASSRF
#ParsedReport
20-12-2022

GuLoaders Unique Approach to Obfuscation: Understanding Stack Manipulation

https://www.0ffset.net/reverse-engineering/guloaders-stack-manipulation

Actors/Campaigns:
Tick

Threats:
Cloudeye
Agent_tesla
Formbook
Remcos_rat
Smokeloader
Cyberchef_tool

IOCs:
Hash: 1

Softs:
visual studio

Algorithms:
xor

Functions:
w_string_decrypt, string_decrypt, malloc, main, sub_401010, printf

Win API:
MessageBoxA

Languages:
python

YARA: Found
#ParsedReport
22-12-2022

Nitol DDoS Malware Installing Amadey Bot

https://asec.ahnlab.com/en/44504

Threats:
Nitol
Amadey
Lockbit
Themida_tool
Njrat_rat
Smokeloader
Teamviewer_tool
Anydesk_tool
Trojan/win.generic.r539958
Malware/mdp.behavior.m3108

Geo:
Korean

IOCs:
File: 7
Path: 1
Hash: 6
Url: 9
IP: 3
Domain: 1

Softs:
internet explorer

Languages:
csharp
#ParsedReport
22-12-2022

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

https://zimpstage.wpengine.com/blog/moneymonger-predatory-loan-scam-campaigns-move-to-flutter

Actors/Campaigns:
Moneymonger (motivation: information_theft)

Threats:
Bazarbackdoor

Industry:
Financial

Geo:
Peru, Indian

IOCs:
Url: 33
Hash: 39
File: 1

Softs:
flutter, flutters, flutter-java, android

Algorithms:
xor, aes

Functions:
collects_privateInfo

Languages:
java
#ParsedReport
22-12-2022

Vidar Stealer Exploiting Various Platforms

https://asec.ahnlab.com/en/44554

Threats:
Vidar_stealer
Trojan/win.injection.c5318441
Infostealer/win.generic.c5308804
Arkei_stealer

IOCs:
IP: 1
File: 1
Hash: 5

Softs:
telegram, tiktok, windows defender

Algorithms:
xor, zip, base64
#ParsedReport
22-12-2022

Ransomware and wiper signed with stolen certificates

https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/108350

Threats:
Roadsweep
Zerocleare_wiper
Anydesk_tool
Disttrack
Dustman_wiper
Alureon
Ransom.win32.agent.gen
Ransom.win32.gen.aghh
Ransom.win64.agent.dpf

Industry:
Telco, Government, Ngo

Geo:
Albanian, Albania, Iran, Kuwait

IOCs:
Hash: 8
File: 2
Path: 1

Algorithms:
rc4

Functions:
CreateFile

Win API:
WriteFile, CryptDecrypt

Links:
https://github.com/maldevel/WinRC4/blob/master/WinRC4/rc4.c
https://github.com/hfiref0x/TDL
#ParsedReport
22-12-2022

New Ransomware Strains Emerging from Leaked Contis Source Code

https://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code

Actors/Campaigns:
Putin_team
Bluesky

Threats:
Conti
Scarecrow
Babuk

Industry:
Financial

Geo:
Russian

TTPs:
Tactics: 4
Technics: 6

IOCs:
File: 10
Hash: 6

Softs:
telegram

Algorithms:
exhibit, chacha20

Functions:
CreateIOCompletionPort, GetQueuedCompletionPort

Win API:
GetLogicalDriveStringsW, PostQueuedCompletionStatus
#ParsedReport
22-12-2022

SiestaGraph: New implant uncovered in ASEAN member foreign ministry. Key takeaways

https://www.elastic.co/security-labs/siestagraph-new-implant-uncovered-in-asean-member-foreign-ministry

Threats:
Siestagraph
Seth_locker
Doorme
Dll_sideloading_technique
Cobalt_strike
Chinachopper
Godzilla_loader
Dcsync_technique
Process_injection_technique

Industry:
Foodtech, Government

Geo:
Netherlands, Asia, China, Asian

TTPs:
Tactics: 10
Technics: 0

IOCs:
File: 17
IP: 1
Path: 6
Hash: 14

Softs:
microsoft exchange server, windows service, microsoft exchange, windows media player, kibana

Algorithms:
base64, zip, 7zip

Win API:
NtAllocateVirtualMemory, NtProtectVirtualMemory, NtCreateThreadEx

Languages:
javascript, jscript

YARA: Found

Links:
https://github.com/elastic/detection-rules/blob/main/rules/windows/credential\_access\_copy\_ntds\_sam\_volshadowcp\_cmdline.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/initial\_access\_suspicious\_microsoft\_iis\_worker\_descendant.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/collection\_email\_powershell\_exchange\_mailbox.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/collection\_winrar\_encryption.toml
https://github.com/ysrc/webshell-sample/blob/master/aspx/54a5620d4ea42e41beac08d8b1240b642dd6fd7c.aspx#L11
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_potential\_masquerading\_as\_svchost.toml
https://github.com/tennc/webshell/blob/master/Godzilla/123.ashx
https://github.com/elastic/detection-rules/blob/main/rules/windows/discovery\_net\_view.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/credential\_access\_dcsync\_replication\_rights.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/privilege\_escalation\_windows\_service\_via\_unusual\_client.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/defense\_evasion\_suspicious\_certutil\_commands.toml
https://github.com/elastic/protections-artifacts/blob/main/yara/rules/Windows\_VulnDriver\_Mhyprot.yar
https://github.com/KoenZomers/OneDriveAPI
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_binary\_masquerading\_via\_untrusted\_path.toml
#ParsedReport
22-12-2022

Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development

https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development

Actors/Campaigns:
Vice_society (motivation: financially_motivated)

Threats:
Polyvice
Printnightmare_vuln
Lolbin_technique
Hellokitty
Zeppelin
Redalert
Sunnyday

IOCs:
Hash: 8
Email: 5
Domain: 8

Softs:
esxi

Algorithms:
chacha20-poly1305, ntruencrypt

Functions:
WaitForMultipleObject, Win32, FindFirstFile, FindNextFile

Win API:
CreateThread, CreateIoCompletionPort, GetQueuedCompletionStatus, PostQueuedCompletionStatus, WaitForMultipleObjects

YARA: Found

Links:
https://github.com/tbuktu/libntru
https://github.com/grigorig/chachapoly