CTT Report Hub
3.22K subscribers
7.98K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
23-12-2022

Godfather Android banking malware is on the rise

https://www.malwarebytes.com/blog/news/2022/12/godfather-android-banking-malware-is-on-the-rise

Threats:
Godfather
Anubis

Industry:
Financial

Geo:
Spain, France, Belarusian, Germany, Azerbaijani, Canada, Turkish, Turkey, Russian

IOCs:
Hash: 1

Softs:
android, telegram
#ParsedReport
23-12-2022

Python crawling on your keys. Source Code Extraction

https://labs.k7computing.com/index.php/python-crawling-on-your-keys

IOCs:
File: 3
Hash: 1

Softs:
pyinstaller, chrome, internet explorer

Functions:
createStartup

Languages:
python

Links:
https://github.com/rocky/python-decompile3
https://github.com/extremecoders-re/pyinstxtractor
#ParsedReport
23-12-2022

New RisePro Stealer distributed by the prominent PrivateLoader. Context

https://blog.sekoia.io/new-risepro-stealer-distributed-by-the-prominent-privateloader

Actors/Campaigns:
Lapsus
Dev-0960

Threats:
Risepro
Privateloader
Redline_stealer
Raccoon_stealer
Dead_drop_technique
Cobalt_strike
Bumblebee
Mixloader
Vidar_stealer

Industry:
Financial

TTPs:
Tactics: 6
Technics: 16

IOCs:
Hash: 63
File: 8
Url: 3
Domain: 37
Path: 1
IP: 3

Softs:
telegram, google chrome, nichrome, chromodo, torch, orbitum, coowon, chromium, vivaldi, chedot, have more...

Algorithms:
xor, zip

Functions:
GetModuleHandle

Win API:
GetProcAddress, RtlGetVersion

Languages:
php

YARA: Found
#ParsedReport
23-12-2022

New YouTube Bot Malware Spotted Stealing Users Sensitive Information

https://blog.cyble.com/2022/12/23/new-youtube-bots-malware-spotted-stealing-users-sensitive-information

Threats:
Antivm
Beacon
Process_injection_technique

TTPs:
Tactics: 8
Technics: 15

IOCs:
Hash: 12
File: 6
Path: 1

Softs:
virtualbox, task scheduler, chromium, chrome

Functions:
DetectVM, DeleteProcessesByMutexName, RegisterScheduledTask, Grab, CookieRecovery, AutofillRecovery, PassRecovery, ClickAsync, ConnectToServer, OnServerMessageReceived, have more...
#ParsedReport
23-12-2022

New STEPPY#KAVACH Attack Campaign Likely Targeting Indian Government: Technical Insights and Detection Using Securonix

https://www.securonix.com/blog/new-steppykavach-attack-campaign

Actors/Campaigns:
Steppy_kavach
Sidecopy
Transparenttribe

Threats:
Lotl_technique
Lolbin_technique
Lolbas_technique

Industry:
Government

Geo:
Germany, Indian, Pakistan, India, Indias

TTPs:
Tactics: 6
Technics: 12

IOCs:
File: 23
Path: 10
Url: 6
Registry: 2
IP: 6
Domain: 2
Hash: 16

Softs:
net framework

Algorithms:
base64

Functions:
prparingsiej, bndkrknwakro

Win API:
WmiCreateProcess

Languages:
jscript, visual_basic, csharp, javascript
#ParsedReport
23-12-2022

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

https://www.trendmicro.com/en_us/research/22/l/icedid-botnet-distributors-abuse-google-ppc-to-distribute-malware.html

Threats:
Icedid
Anydesk_tool
Teamviewer_tool
Cobalt_strike

Industry:
Government, Financial

TTPs:
Tactics: 1
Technics: 3

IOCs:
File: 7
Hash: 4
Domain: 68
IP: 1

Softs:
discord, microsoft office, slack, windows installer, curl

Algorithms:
zip

Links:
https://github.com/struppigel/PortEx
#ParsedReport
23-12-2022

Threat Brief: OWASSRF Vulnerability Exploitation

https://unit42.paloaltonetworks.com/threat-brief-owassrf

Threats:
Owassrf
Proxynotshell_vuln
Silverarrow
Anydesk_tool
Putty_tool

Industry:
E-commerce

Geo:
Apac, Japan, Emea, America, Japanese

CVEs:
CVE-2022-41080 [Vulners]
Vulners: Score: Unknown, CVSS: 3.4,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 6.5
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


IOCs:
File: 7
Email: 2
IP: 7
Coin: 1

Softs:
microsoft exchange server, windows remote desktop protocol, microsoft exchange, windows remote desktop

Algorithms:
base64

Languages:
python
#ParsedReport
23-12-2022

Trade with caution - bad guys arestealing. Trade with caution - bad guys are stealing

https://www.zscaler.com/blog/security-research/trade-with-caution

Threats:
Redline_stealer
Record_breaker_stealer
Arkei_stealer
Vidar_stealer
Legionloader
Batloader
Smokeloader
Minebridge_rat
Dll_sideloading_technique

Industry:
Financial

Geo:
Usa

TTPs:
Tactics: 3
Technics: 14

IOCs:
IP: 2
Domain: 2
Url: 1
Hash: 8
File: 12

Softs:
windows installer, macos, nginx, mozilla firefox, visual studio, windows explorer

Algorithms:
zip

Platforms:
intel
#ParsedReport
26-12-2022

Caution! Malware Signed With Microsoft Certificate

https://asec.ahnlab.com/en/44726

Threats:
Trojan/win32.agent.c114064
Trojan/win.rootkitdrv.c5311744
Trojan/win.rootkitdrv.c5311748
Trojan/win.rootkitdrv.c5311745
Trojan/win.rootkitdrv.c5313281
Trojan/win.rootkitdrv.c5313299
Trojan/win.rootkitdrv.c5313267
Trojan/win.rootkitdrv.c5313273
Trojan/win.rootkitdrv.c5313261
Trojan/win.rootkitdrv.c5313014
Trojan/win.rootkitdrv.c5313271
Trojan/win.rootkitdrv.c5313304
Trojan/win.rootkitdrv.c5313297
Trojan/win.rootkitdrv.c5313257
Trojan/win.rootkitdrv.c5311743
Trojan/win.rootkitdrv.c5313262
Trojan/win.rootkitdrv.c5311747
Trojan/win.rootkitdrv.c5313269
Trojan/win.rootkitdrv.c5313259
Trojan/win.rootkitdrv.c5313278
Trojan/win.rootkitdrv.c5313296
Trojan/win.rootkitdrv.c5311742
Trojan/win.rootkitdrv.c5311746
Trojan/win.rootkitdrv.c5313303
Trojan/win.rootkitdrv.c5313265
Trojan/win.rootkitdrv.c5311749
Trojan/win.rootkitdrv.c5313295
Trojan/win.rootkitdrv.c5313263
Trojan/win.rootkitdrv.c5313260
Trojan/win.rootkitdrv.c5313302
Burntcigar_tool
Poortry
Stonestop

Softs:
(microsoft defender, windows security
#ParsedReport
26-12-2022

RedDelta Targets European Government Organizations and Continues to Iterate Custom PlugX Variant

https://www.recordedfuture.com/reddelta-targets-european-government-organizations-continues-iterate-custom-plugx-variant

Actors/Campaigns:
Red_delta (motivation: cyber_espionage)

Threats:
Plugx_rat

Industry:
Government

Geo:
Tibetan, Vietnam, Asia, Ukraine, Myanmar, Russia, China, Chinese

IOCs:
IP: 57
Domain: 3
Hash: 24
File: 19
#ParsedReport
26-12-2022

W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names

https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html

Threats:
W4sp
Billythegoat_actor

IOCs:
Domain: 1

Softs:
discord

Languages:
python

Links:
https://github.com/billythegoat356/pystyle
#ParsedReport
26-12-2022

APT41 The spy who failed to encrypt me. Timeline

https://medium.com/@DCSO_CyTec/apt41-the-spy-who-failed-to-encrypt-me-24fc0f49cad1

Actors/Campaigns:
Axiom
Cuckoobees

Threats:
Proxylogon_exploit
Chinachopper
Bestcrypt
Natbypass_tool
Procdump_tool
Nltest_tool
Miping_tool
Cobalt_strike
Beacon
Bitlocker
Ransom:bat/bljammer.a

Industry:
Financial

Geo:
China, German

CVEs:
CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)


TTPs:
Tactics: 9
Technics: 20

IOCs:
File: 29
Path: 10
IP: 3
Registry: 1
Command: 1
Hash: 10

Softs:
microsoft defender for endpoint, microsoft exchange server, bitlocker, msexchange, sysinternals, pyinstaller, active directory, component object model

SIGMA: Found

Links:
https://github.com/cw1997/NATBypass
#ParsedReport
26-12-2022

New info-stealer malware infects software pirates via fake cracks sites

https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites

Actors/Campaigns:
Dev-0960

Threats:
Risepro
Privateloader
Vidar_stealer
Netdooka
Redline_stealer
Raccoon_stealer

Industry:
Financial

Geo:
Russian

Softs:
telegram, google chrome, maxthon3, nichrome, chromodo, netbox, torch, orbitum, coowon, have more...

Algorithms:
zip
#ParsedReport
27-12-2022

SentinelSneak: Malicious PyPI module poses as security software development kit

https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk

Actors/Campaigns:
Iconburst

Threats:
Sentinelsneak
Typosquatting_technique
W4sp

Geo:
German

IOCs:
IP: 1
Hash: 48

Languages:
python, javascript, ruby

YARA: Found

Links:
https://github.com/javascript-obfuscator/javascript-obfuscator
#ParsedReport
27-12-2022

BlueNoroff introduces new methods bypassing MoTW

https://securelist.com/bluenoroff-methods-bypass-motw/108383

Actors/Campaigns:
Lazarus (motivation: financially_motivated)

Threats:
Motw_bypass_technique
Lotl_technique
Lolbin_technique
Perseus
Process_injection_technique

Industry:
Financial

Geo:
Japan, Japanese, America, Taiwan, Usa

TTPs:
Tactics: 6
Technics: 16

IOCs:
File: 22
Path: 2
Url: 8
Hash: 13
Command: 1
IP: 3

Softs:
windows installer, microsoft office, microsoft powerpoint, windows defender, curl, windows scheduled task

Algorithms:
zip, rc4

Languages:
visual_basic

Platforms:
intel