CTT Report Hub
3.22K subscribers
7.98K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
22-12-2022

New Ransomware Strains Emerging from Leaked Contis Source Code

https://blog.cyble.com/2022/12/22/new-ransomware-strains-emerging-from-leaked-contis-source-code

Actors/Campaigns:
Putin_team
Bluesky

Threats:
Conti
Scarecrow
Babuk

Industry:
Financial

Geo:
Russian

TTPs:
Tactics: 4
Technics: 6

IOCs:
File: 10
Hash: 6

Softs:
telegram

Algorithms:
exhibit, chacha20

Functions:
CreateIOCompletionPort, GetQueuedCompletionPort

Win API:
GetLogicalDriveStringsW, PostQueuedCompletionStatus
#ParsedReport
22-12-2022

SiestaGraph: New implant uncovered in ASEAN member foreign ministry. Key takeaways

https://www.elastic.co/security-labs/siestagraph-new-implant-uncovered-in-asean-member-foreign-ministry

Threats:
Siestagraph
Seth_locker
Doorme
Dll_sideloading_technique
Cobalt_strike
Chinachopper
Godzilla_loader
Dcsync_technique
Process_injection_technique

Industry:
Foodtech, Government

Geo:
Netherlands, Asia, China, Asian

TTPs:
Tactics: 10
Technics: 0

IOCs:
File: 17
IP: 1
Path: 6
Hash: 14

Softs:
microsoft exchange server, windows service, microsoft exchange, windows media player, kibana

Algorithms:
base64, zip, 7zip

Win API:
NtAllocateVirtualMemory, NtProtectVirtualMemory, NtCreateThreadEx

Languages:
javascript, jscript

YARA: Found

Links:
https://github.com/elastic/detection-rules/blob/main/rules/windows/credential\_access\_copy\_ntds\_sam\_volshadowcp\_cmdline.toml
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/initial\_access\_suspicious\_microsoft\_iis\_worker\_descendant.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/collection\_email\_powershell\_exchange\_mailbox.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/collection\_winrar\_encryption.toml
https://github.com/ysrc/webshell-sample/blob/master/aspx/54a5620d4ea42e41beac08d8b1240b642dd6fd7c.aspx#L11
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_potential\_masquerading\_as\_svchost.toml
https://github.com/tennc/webshell/blob/master/Godzilla/123.ashx
https://github.com/elastic/detection-rules/blob/main/rules/windows/discovery\_net\_view.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/credential\_access\_dcsync\_replication\_rights.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/privilege\_escalation\_windows\_service\_via\_unusual\_client.toml
https://github.com/elastic/detection-rules/blob/main/rules/windows/defense\_evasion\_suspicious\_certutil\_commands.toml
https://github.com/elastic/protections-artifacts/blob/main/yara/rules/Windows\_VulnDriver\_Mhyprot.yar
https://github.com/KoenZomers/OneDriveAPI
https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/defense\_evasion\_binary\_masquerading\_via\_untrusted\_path.toml
#ParsedReport
22-12-2022

Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development

https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development

Actors/Campaigns:
Vice_society (motivation: financially_motivated)

Threats:
Polyvice
Printnightmare_vuln
Lolbin_technique
Hellokitty
Zeppelin
Redalert
Sunnyday

IOCs:
Hash: 8
Email: 5
Domain: 8

Softs:
esxi

Algorithms:
chacha20-poly1305, ntruencrypt

Functions:
WaitForMultipleObject, Win32, FindFirstFile, FindNextFile

Win API:
CreateThread, CreateIoCompletionPort, GetQueuedCompletionStatus, PostQueuedCompletionStatus, WaitForMultipleObjects

YARA: Found

Links:
https://github.com/tbuktu/libntru
https://github.com/grigorig/chachapoly
#ParsedReport
22-12-2022

Ransomware Roundup Play Ransomware

https://www.fortinet.com/blog/threat-research/ransomware-roundup-play-ransomware

Threats:
Playcrypt
Lotl_technique
Lolbin_technique
W32/filecoder.play!tr.ransom
W32/filecoder.olt!tr.ransom
W32/filecoder.nhqdtez!tr.ransom

Industry:
Financial

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 38

Softs:
microsoft visual c++

Functions:
ReadMe
#ParsedReport
23-12-2022

Godfather Android banking malware is on the rise

https://www.malwarebytes.com/blog/news/2022/12/godfather-android-banking-malware-is-on-the-rise

Threats:
Godfather
Anubis

Industry:
Financial

Geo:
Spain, France, Belarusian, Germany, Azerbaijani, Canada, Turkish, Turkey, Russian

IOCs:
Hash: 1

Softs:
android, telegram
#ParsedReport
23-12-2022

Python crawling on your keys. Source Code Extraction

https://labs.k7computing.com/index.php/python-crawling-on-your-keys

IOCs:
File: 3
Hash: 1

Softs:
pyinstaller, chrome, internet explorer

Functions:
createStartup

Languages:
python

Links:
https://github.com/rocky/python-decompile3
https://github.com/extremecoders-re/pyinstxtractor
#ParsedReport
23-12-2022

New RisePro Stealer distributed by the prominent PrivateLoader. Context

https://blog.sekoia.io/new-risepro-stealer-distributed-by-the-prominent-privateloader

Actors/Campaigns:
Lapsus
Dev-0960

Threats:
Risepro
Privateloader
Redline_stealer
Raccoon_stealer
Dead_drop_technique
Cobalt_strike
Bumblebee
Mixloader
Vidar_stealer

Industry:
Financial

TTPs:
Tactics: 6
Technics: 16

IOCs:
Hash: 63
File: 8
Url: 3
Domain: 37
Path: 1
IP: 3

Softs:
telegram, google chrome, nichrome, chromodo, torch, orbitum, coowon, chromium, vivaldi, chedot, have more...

Algorithms:
xor, zip

Functions:
GetModuleHandle

Win API:
GetProcAddress, RtlGetVersion

Languages:
php

YARA: Found
#ParsedReport
23-12-2022

New YouTube Bot Malware Spotted Stealing Users Sensitive Information

https://blog.cyble.com/2022/12/23/new-youtube-bots-malware-spotted-stealing-users-sensitive-information

Threats:
Antivm
Beacon
Process_injection_technique

TTPs:
Tactics: 8
Technics: 15

IOCs:
Hash: 12
File: 6
Path: 1

Softs:
virtualbox, task scheduler, chromium, chrome

Functions:
DetectVM, DeleteProcessesByMutexName, RegisterScheduledTask, Grab, CookieRecovery, AutofillRecovery, PassRecovery, ClickAsync, ConnectToServer, OnServerMessageReceived, have more...
#ParsedReport
23-12-2022

New STEPPY#KAVACH Attack Campaign Likely Targeting Indian Government: Technical Insights and Detection Using Securonix

https://www.securonix.com/blog/new-steppykavach-attack-campaign

Actors/Campaigns:
Steppy_kavach
Sidecopy
Transparenttribe

Threats:
Lotl_technique
Lolbin_technique
Lolbas_technique

Industry:
Government

Geo:
Germany, Indian, Pakistan, India, Indias

TTPs:
Tactics: 6
Technics: 12

IOCs:
File: 23
Path: 10
Url: 6
Registry: 2
IP: 6
Domain: 2
Hash: 16

Softs:
net framework

Algorithms:
base64

Functions:
prparingsiej, bndkrknwakro

Win API:
WmiCreateProcess

Languages:
jscript, visual_basic, csharp, javascript
#ParsedReport
23-12-2022

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html

Threats:
Icedid
Anydesk_tool
Teamviewer_tool
Cobalt_strike

Industry:
Government, Financial

TTPs:
Tactics: 1
Technics: 3

IOCs:
File: 7
Hash: 4
Domain: 68
IP: 1

Softs:
discord, microsoft office, slack, windows installer, curl

Algorithms:
zip

Links:
https://github.com/struppigel/PortEx
#ParsedReport
23-12-2022

Threat Brief: OWASSRF Vulnerability Exploitation

https://unit42.paloaltonetworks.com/threat-brief-owassrf

Threats:
Owassrf
Proxynotshell_vuln
Silverarrow
Anydesk_tool
Putty_tool

Industry:
E-commerce

Geo:
Apac, Japan, Emea, America, Japanese

CVEs:
CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 7
Email: 2
IP: 7
Coin: 1

Softs:
microsoft exchange server, windows remote desktop protocol, microsoft exchange, windows remote desktop

Algorithms:
base64

Languages:
python
#ParsedReport
23-12-2022

Trade with caution - bad guys arestealing. Trade with caution - bad guys are stealing

https://www.zscaler.com/blog/security-research/trade-with-caution

Threats:
Redline_stealer
Record_breaker_stealer
Arkei_stealer
Vidar_stealer
Legionloader
Batloader
Smokeloader
Minebridge_rat
Dll_sideloading_technique

Industry:
Financial

Geo:
Usa

TTPs:
Tactics: 3
Technics: 14

IOCs:
IP: 2
Domain: 2
Url: 1
Hash: 8
File: 12

Softs:
windows installer, macos, nginx, mozilla firefox, visual studio, windows explorer

Algorithms:
zip

Platforms:
intel
#ParsedReport
26-12-2022

Caution! Malware Signed With Microsoft Certificate

https://asec.ahnlab.com/en/44726

Threats:
Trojan/win32.agent.c114064
Trojan/win.rootkitdrv.c5311744
Trojan/win.rootkitdrv.c5311748
Trojan/win.rootkitdrv.c5311745
Trojan/win.rootkitdrv.c5313281
Trojan/win.rootkitdrv.c5313299
Trojan/win.rootkitdrv.c5313267
Trojan/win.rootkitdrv.c5313273
Trojan/win.rootkitdrv.c5313261
Trojan/win.rootkitdrv.c5313014
Trojan/win.rootkitdrv.c5313271
Trojan/win.rootkitdrv.c5313304
Trojan/win.rootkitdrv.c5313297
Trojan/win.rootkitdrv.c5313257
Trojan/win.rootkitdrv.c5311743
Trojan/win.rootkitdrv.c5313262
Trojan/win.rootkitdrv.c5311747
Trojan/win.rootkitdrv.c5313269
Trojan/win.rootkitdrv.c5313259
Trojan/win.rootkitdrv.c5313278
Trojan/win.rootkitdrv.c5313296
Trojan/win.rootkitdrv.c5311742
Trojan/win.rootkitdrv.c5311746
Trojan/win.rootkitdrv.c5313303
Trojan/win.rootkitdrv.c5313265
Trojan/win.rootkitdrv.c5311749
Trojan/win.rootkitdrv.c5313295
Trojan/win.rootkitdrv.c5313263
Trojan/win.rootkitdrv.c5313260
Trojan/win.rootkitdrv.c5313302
Burntcigar_tool
Poortry
Stonestop

Softs:
(microsoft defender, windows security