CTT Report Hub
3.22K subscribers
7.99K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
23-12-2022

Trade with caution - bad guys arestealing. Trade with caution - bad guys are stealing

https://www.zscaler.com/blog/security-research/trade-with-caution

Threats:
Redline_stealer
Record_breaker_stealer
Arkei_stealer
Vidar_stealer
Legionloader
Batloader
Smokeloader
Minebridge_rat
Dll_sideloading_technique

Industry:
Financial

Geo:
Usa

TTPs:
Tactics: 3
Technics: 14

IOCs:
IP: 2
Domain: 2
Url: 1
Hash: 8
File: 12

Softs:
windows installer, macos, nginx, mozilla firefox, visual studio, windows explorer

Algorithms:
zip

Platforms:
intel
#ParsedReport
26-12-2022

Caution! Malware Signed With Microsoft Certificate

https://asec.ahnlab.com/en/44726

Threats:
Trojan/win32.agent.c114064
Trojan/win.rootkitdrv.c5311744
Trojan/win.rootkitdrv.c5311748
Trojan/win.rootkitdrv.c5311745
Trojan/win.rootkitdrv.c5313281
Trojan/win.rootkitdrv.c5313299
Trojan/win.rootkitdrv.c5313267
Trojan/win.rootkitdrv.c5313273
Trojan/win.rootkitdrv.c5313261
Trojan/win.rootkitdrv.c5313014
Trojan/win.rootkitdrv.c5313271
Trojan/win.rootkitdrv.c5313304
Trojan/win.rootkitdrv.c5313297
Trojan/win.rootkitdrv.c5313257
Trojan/win.rootkitdrv.c5311743
Trojan/win.rootkitdrv.c5313262
Trojan/win.rootkitdrv.c5311747
Trojan/win.rootkitdrv.c5313269
Trojan/win.rootkitdrv.c5313259
Trojan/win.rootkitdrv.c5313278
Trojan/win.rootkitdrv.c5313296
Trojan/win.rootkitdrv.c5311742
Trojan/win.rootkitdrv.c5311746
Trojan/win.rootkitdrv.c5313303
Trojan/win.rootkitdrv.c5313265
Trojan/win.rootkitdrv.c5311749
Trojan/win.rootkitdrv.c5313295
Trojan/win.rootkitdrv.c5313263
Trojan/win.rootkitdrv.c5313260
Trojan/win.rootkitdrv.c5313302
Burntcigar_tool
Poortry
Stonestop

Softs:
(microsoft defender, windows security
#ParsedReport
26-12-2022

RedDelta Targets European Government Organizations and Continues to Iterate Custom PlugX Variant

https://www.recordedfuture.com/reddelta-targets-european-government-organizations-continues-iterate-custom-plugx-variant

Actors/Campaigns:
Red_delta (motivation: cyber_espionage)

Threats:
Plugx_rat

Industry:
Government

Geo:
Tibetan, Vietnam, Asia, Ukraine, Myanmar, Russia, China, Chinese

IOCs:
IP: 57
Domain: 3
Hash: 24
File: 19
#ParsedReport
26-12-2022

W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names

https://thehackernews.com/2022/12/w4sp-stealer-discovered-in-multiple.html

Threats:
W4sp
Billythegoat_actor

IOCs:
Domain: 1

Softs:
discord

Languages:
python

Links:
https://github.com/billythegoat356/pystyle
#ParsedReport
26-12-2022

APT41 The spy who failed to encrypt me. Timeline

https://medium.com/@DCSO_CyTec/apt41-the-spy-who-failed-to-encrypt-me-24fc0f49cad1

Actors/Campaigns:
Axiom
Cuckoobees

Threats:
Proxylogon_exploit
Chinachopper
Bestcrypt
Natbypass_tool
Procdump_tool
Nltest_tool
Miping_tool
Cobalt_strike
Beacon
Bitlocker
Ransom:bat/bljammer.a

Industry:
Financial

Geo:
China, German

CVEs:
CVE-2021-27065 [Vulners]
Vulners: Score: 6.8, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019)

CVE-2021-26855 [Vulners]
Vulners: Score: 7.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2016, 2016, 2013, 2016, 2016, 2013, 2016, 2019, 2013, 2016, 2016, 2016, 2016, 2016, 2016, 2016, 2019, 2019, 2019, 2019, 2019, 2019, 2019, 2019)


TTPs:
Tactics: 9
Technics: 20

IOCs:
File: 29
Path: 10
IP: 3
Registry: 1
Command: 1
Hash: 10

Softs:
microsoft defender for endpoint, microsoft exchange server, bitlocker, msexchange, sysinternals, pyinstaller, active directory, component object model

SIGMA: Found

Links:
https://github.com/cw1997/NATBypass
#ParsedReport
26-12-2022

New info-stealer malware infects software pirates via fake cracks sites

https://www.bleepingcomputer.com/news/security/new-info-stealer-malware-infects-software-pirates-via-fake-cracks-sites

Actors/Campaigns:
Dev-0960

Threats:
Risepro
Privateloader
Vidar_stealer
Netdooka
Redline_stealer
Raccoon_stealer

Industry:
Financial

Geo:
Russian

Softs:
telegram, google chrome, maxthon3, nichrome, chromodo, netbox, torch, orbitum, coowon, have more...

Algorithms:
zip
#ParsedReport
27-12-2022

SentinelSneak: Malicious PyPI module poses as security software development kit

https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk

Actors/Campaigns:
Iconburst

Threats:
Sentinelsneak
Typosquatting_technique
W4sp

Geo:
German

IOCs:
IP: 1
Hash: 48

Languages:
python, javascript, ruby

YARA: Found

Links:
https://github.com/javascript-obfuscator/javascript-obfuscator
#ParsedReport
27-12-2022

BlueNoroff introduces new methods bypassing MoTW

https://securelist.com/bluenoroff-methods-bypass-motw/108383

Actors/Campaigns:
Lazarus (motivation: financially_motivated)

Threats:
Motw_bypass_technique
Lotl_technique
Lolbin_technique
Perseus
Process_injection_technique

Industry:
Financial

Geo:
Japan, Japanese, America, Taiwan, Usa

TTPs:
Tactics: 6
Technics: 16

IOCs:
File: 22
Path: 2
Url: 8
Hash: 13
Command: 1
IP: 3

Softs:
windows installer, microsoft office, microsoft powerpoint, windows defender, curl, windows scheduled task

Algorithms:
zip, rc4

Languages:
visual_basic

Platforms:
intel
#ParsedReport
27-12-2022

ZetaNile: Open source software trojans from North Korea

https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea

Actors/Campaigns:
Lazarus

Threats:
Zetanile
Putty_tool
Tightvnc_tool
Dll_hijacking_technique

Industry:
Energy

Geo:
Korea, Korean, Japanese

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 4
Url: 2
Path: 2
Command: 3
IP: 1
Hash: 8

Softs:
sumatra pdf, wordpress

Algorithms:
aes, base64

Languages:
php

Platforms:
x64
#ParsedReport
27-12-2022

W4SP continues to nest in PyPI: Same supply chain attack, different distribution method

https://www.reversinglabs.com/blog/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method

Actors/Campaigns:
Iconburst

Threats:
W4sp
Climax_loader
Typosquatting_technique

IOCs:
Url: 1
File: 3
IP: 2
Hash: 33

Softs:
discord, telegram, flask

Algorithms:
lzma, base64, zip

Languages:
rust, python

YARA: Found

Links:
https://github.com/liftoff/pyminifier
https://github.com/reversinglabs/reversinglabs-yara-rules
https://github.com/cloudflare/cloudflared/releases
#ParsedReport
27-12-2022

ASEC (20221219 \~ 20221225). ASEC Weekly Malware Statistics (20221219 \~ 20221225)

https://asec.ahnlab.com/ko/44946

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Azorult
Tofsee
Stop_ransomware
Smokeloader
Vidar_stealer
Nemty
Ryuk
Revil
Raccoon_stealer
Predator
Formbook
Clipboard_grabbing_technique
Snake_keylogger

Industry:
Transport, Financial

Geo:
Korea

IOCs:
File: 25
Email: 9
Domain: 2
Url: 11

Softs:
telegram, discord

Languages:
php
#ParsedReport
27-12-2022

Pure coder offers multiple malware for sale in Darkweb forums

https://blog.cyble.com/2022/12/27/pure-coder-offers-multiple-malware-for-sale-in-darkweb-forums

Threats:
Purecoder_actor
Purelogs
Purecryptor
Pureminer
Blueloader
Purehvnc_tool
Hvnc_tool

Industry:
Financial

Geo:
Italy

TTPs:
Tactics: 6
Technics: 9

IOCs:
File: 2
Hash: 4

Softs:
winscp, bitcoincore, dashcore, electrum, telegram, jaxx, litecoincore, zcash, tronlink, coinbase, have more...

Algorithms:
zip

Functions:
InternetDM, OpenVPN, InvokeMember
#ParsedReport
27-12-2022

PSA: YITH WooCommerce Gift Cards Premium Plugin Exploited in the Wild

https://www.wordfence.com/blog/2022/12/psa-yith-woocommerce-gift-cards-premium-plugin-exploited-in-the-wild

Threats:
Marijuana

CVEs:
CVE-2022-45359 [Vulners]
Vulners: Score: Unknown, CVSS: 2.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- yithemes yith woocommerce gift cards (le3.19.0)


IOCs:
File: 3
Domain: 1
Hash: 3
IP: 2

Softs:
wordpress

Functions:
import_actions_from_settings_panel

Languages:
php
#ParsedReport
27-12-2022

SlowMist: Investigation of North Korean APTs Large-Scale Phishing Attack on NFT Users

https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-large-scale-phishing-attack-on-nft-users-362117600519

Industry:
Financial

Geo:
Korean

IOCs:
File: 1
Url: 3

Softs:
slowmist, misttrack

Functions:
OpenSea

Languages:
php

Links:
https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook/blob/main/README.md
#ParsedReport
28-12-2022

Types of Recent .NET Packers and Their Distribution Trends in Korea

https://asec.ahnlab.com/en/44809

Threats:
Agent_tesla
Snake_keylogger
Formbook
Lokibot_stealer
Asyncrat_rat
Majorcrypter
Darktortilla
Variantcrypter
Purecryptor
Confuserex_tool
Remcos_rat
Trojan/win.msilkrypt.r478738
Trojan/win.msilkrypt.r479010
Trojan/win.malwarex-gen.c4922823
Trojan/win.msilkrypt.c5020026
Trojan/win.msil.r503383
Trojan/win.msil.r510208
Trojan/win.msil.r492640
Trojan/win.msilkrypt.r478746
Trojan/win.msil.r491654
Trojan/win.msil.r479032
Trojan/win.msil.r536135
Trojan/win.loader.c5020045
Trojan/win.msilkrypt.r479033
Trojan/win.generic.c5197697
Trojan/win.msilkrypt.r479202
Trojan/win.msil.r5288800
Trojan/win.msil.c5134406
Trojan/win.msil.r498082
Trojan/win.msil.c5198300
Trojan/win.msil.r510204

Geo:
Korea

IOCs:
File: 52
Hash: 33
Url: 27

Algorithms:
xor, base64

Functions:
Sleep, Loader, Runn

Win API:
GetPixel
#ParsedReport
28-12-2022

RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks

https://socradar.io/rce-vulnerability-cve-2022-45359-in-yith-woocommerce-gift-cards-plugin-exploited-in-attacks

Industry:
E-commerce, Financial

CVEs:
CVE-2022-45359 [Vulners]
Vulners: Score: Unknown, CVSS: 2.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- yithemes yith woocommerce gift cards (le3.19.0)


IOCs:
IP: 2

Softs:
wordpress

Languages:
php