CTT Report Hub
3.22K subscribers
7.99K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
27-12-2022

BlueNoroff introduces new methods bypassing MoTW

https://securelist.com/bluenoroff-methods-bypass-motw/108383

Actors/Campaigns:
Lazarus (motivation: financially_motivated)

Threats:
Motw_bypass_technique
Lotl_technique
Lolbin_technique
Perseus
Process_injection_technique

Industry:
Financial

Geo:
Japan, Japanese, America, Taiwan, Usa

TTPs:
Tactics: 6
Technics: 16

IOCs:
File: 22
Path: 2
Url: 8
Hash: 13
Command: 1
IP: 3

Softs:
windows installer, microsoft office, microsoft powerpoint, windows defender, curl, windows scheduled task

Algorithms:
zip, rc4

Languages:
visual_basic

Platforms:
intel
#ParsedReport
27-12-2022

ZetaNile: Open source software trojans from North Korea

https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea

Actors/Campaigns:
Lazarus

Threats:
Zetanile
Putty_tool
Tightvnc_tool
Dll_hijacking_technique

Industry:
Energy

Geo:
Korea, Korean, Japanese

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 4
Url: 2
Path: 2
Command: 3
IP: 1
Hash: 8

Softs:
sumatra pdf, wordpress

Algorithms:
aes, base64

Languages:
php

Platforms:
x64
#ParsedReport
27-12-2022

W4SP continues to nest in PyPI: Same supply chain attack, different distribution method

https://www.reversinglabs.com/blog/w4sp-continues-to-nest-in-pypi-same-supply-chain-attack-different-distribution-method

Actors/Campaigns:
Iconburst

Threats:
W4sp
Climax_loader
Typosquatting_technique

IOCs:
Url: 1
File: 3
IP: 2
Hash: 33

Softs:
discord, telegram, flask

Algorithms:
lzma, base64, zip

Languages:
rust, python

YARA: Found

Links:
https://github.com/liftoff/pyminifier
https://github.com/reversinglabs/reversinglabs-yara-rules
https://github.com/cloudflare/cloudflared/releases
#ParsedReport
27-12-2022

ASEC (20221219 \~ 20221225). ASEC Weekly Malware Statistics (20221219 \~ 20221225)

https://asec.ahnlab.com/ko/44946

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Azorult
Tofsee
Stop_ransomware
Smokeloader
Vidar_stealer
Nemty
Ryuk
Revil
Raccoon_stealer
Predator
Formbook
Clipboard_grabbing_technique
Snake_keylogger

Industry:
Transport, Financial

Geo:
Korea

IOCs:
File: 25
Email: 9
Domain: 2
Url: 11

Softs:
telegram, discord

Languages:
php
#ParsedReport
27-12-2022

Pure coder offers multiple malware for sale in Darkweb forums

https://blog.cyble.com/2022/12/27/pure-coder-offers-multiple-malware-for-sale-in-darkweb-forums

Threats:
Purecoder_actor
Purelogs
Purecryptor
Pureminer
Blueloader
Purehvnc_tool
Hvnc_tool

Industry:
Financial

Geo:
Italy

TTPs:
Tactics: 6
Technics: 9

IOCs:
File: 2
Hash: 4

Softs:
winscp, bitcoincore, dashcore, electrum, telegram, jaxx, litecoincore, zcash, tronlink, coinbase, have more...

Algorithms:
zip

Functions:
InternetDM, OpenVPN, InvokeMember
#ParsedReport
27-12-2022

PSA: YITH WooCommerce Gift Cards Premium Plugin Exploited in the Wild

https://www.wordfence.com/blog/2022/12/psa-yith-woocommerce-gift-cards-premium-plugin-exploited-in-the-wild

Threats:
Marijuana

CVEs:
CVE-2022-45359 [Vulners]
Vulners: Score: Unknown, CVSS: 2.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- yithemes yith woocommerce gift cards (le3.19.0)


IOCs:
File: 3
Domain: 1
Hash: 3
IP: 2

Softs:
wordpress

Functions:
import_actions_from_settings_panel

Languages:
php
#ParsedReport
27-12-2022

SlowMist: Investigation of North Korean APTs Large-Scale Phishing Attack on NFT Users

https://slowmist.medium.com/slowmist-our-in-depth-investigation-of-north-korean-apts-large-scale-phishing-attack-on-nft-users-362117600519

Industry:
Financial

Geo:
Korean

IOCs:
File: 1
Url: 3

Softs:
slowmist, misttrack

Functions:
OpenSea

Languages:
php

Links:
https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook/blob/main/README.md
#ParsedReport
28-12-2022

Types of Recent .NET Packers and Their Distribution Trends in Korea

https://asec.ahnlab.com/en/44809

Threats:
Agent_tesla
Snake_keylogger
Formbook
Lokibot_stealer
Asyncrat_rat
Majorcrypter
Darktortilla
Variantcrypter
Purecryptor
Confuserex_tool
Remcos_rat
Trojan/win.msilkrypt.r478738
Trojan/win.msilkrypt.r479010
Trojan/win.malwarex-gen.c4922823
Trojan/win.msilkrypt.c5020026
Trojan/win.msil.r503383
Trojan/win.msil.r510208
Trojan/win.msil.r492640
Trojan/win.msilkrypt.r478746
Trojan/win.msil.r491654
Trojan/win.msil.r479032
Trojan/win.msil.r536135
Trojan/win.loader.c5020045
Trojan/win.msilkrypt.r479033
Trojan/win.generic.c5197697
Trojan/win.msilkrypt.r479202
Trojan/win.msil.r5288800
Trojan/win.msil.c5134406
Trojan/win.msil.r498082
Trojan/win.msil.c5198300
Trojan/win.msil.r510204

Geo:
Korea

IOCs:
File: 52
Hash: 33
Url: 27

Algorithms:
xor, base64

Functions:
Sleep, Loader, Runn

Win API:
GetPixel
#ParsedReport
28-12-2022

RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks

https://socradar.io/rce-vulnerability-cve-2022-45359-in-yith-woocommerce-gift-cards-plugin-exploited-in-attacks

Industry:
E-commerce, Financial

CVEs:
CVE-2022-45359 [Vulners]
Vulners: Score: Unknown, CVSS: 2.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- yithemes yith woocommerce gift cards (le3.19.0)


IOCs:
IP: 2

Softs:
wordpress

Languages:
php
#ParsedReport
29-12-2022

. Typical mining family series analysis 2 \| TeamTNT mining organization

https://www.antiy.cn/research/notice&report/research_report/20221207.html

Actors/Campaigns:
Teamtnt

Threats:
Hezb
Kthmimu
Tsunami_botnet
Masscan_tool
Zgrab_scanner_tool
Conti
Libprocesshider_rootkit
Tmate_tool
Pnscan_tool
Mimipy
Diamorphine_rootkit
Hildegard
Kangaroo
Mimipenguin_tool

Industry:
Energy, Government, Financial, Education

Geo:
Germany, German

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 13
Url: 48
Domain: 23
IP: 35
Hash: 138

Softs:
docker, redis

Algorithms:
aes, base64
#ParsedReport
29-12-2022

. "Eternity" organization: continuous and active commercial arsenal

https://www.antiy.cn/research/notice&report/research_report/20221223.html

Actors/Campaigns:
Eternity

Threats:
Jester_stealer
Lightm4n_actor
Userpro9_actor
Savethekiddes_actor
Ransomware.exe

Geo:
Ukraine

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 6
Hash: 2
Url: 2

Softs:
telegram, pyinstaller, discord

Algorithms:
aes, zip

Languages:
python

Platforms:
intel
#ParsedReport
29-12-2022

New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection

https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection

Threats:
CatB_ransomware
Dll_hijacking_technique
Pandora
Upx_tool

Industry:
Financial, Transport

TTPs:

IOCs:
File: 4
Path: 1
Hash: 2
Email: 1

Softs:
windows service

Win API:
GetSystemInfo, GlobalMemoryStatusEx, DeviceIoControl
#ParsedReport
29-12-2022

. Hidden teeth hidden in South Asia Slang snake tissue recent attack activity briefing

https://ti.qianxin.com/blog/articles/sidewinder-group%27s-recent-attack-activity-briefing

Actors/Campaigns:
Sidewinder

Threats:
Dll_sideloading_technique
Dotnettojscript_technique

Industry:
Government, Maritime, Education

Geo:
Bangladesh, Pakistan, China, Afghanistan, Asia, Pakistani, Nepal

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
File: 11
Hash: 14

Softs:
slack, android

Algorithms:
base64, xor

Languages:
javascript
#ParsedReport
29-12-2022

APT-C-36. 1. Analysis of attack activities

https://mp.weixin.qq.com/s/mTmJLHYC9bJDnphf_52JmA

Actors/Campaigns:
Blindeagle

Threats:
Njrat_rat
Syncrat
Asyncrat_rat

Industry:
Financial, Government

Geo:
Spanish, America, Ecuador, Colombia, Colombian

IOCs:
Hash: 14
File: 26
Url: 6

Softs:
virtualbox

Algorithms:
base64, aes

Functions:
Settings

Languages:
c_language, csharp
#ParsedReport
29-12-2022

Operation Dragon Dance

https://ti.qianxin.com/blog/articles/operation-dragon-dance-the-sword-of-damocles-hanging-over-the-gaming-industry

Actors/Campaigns:
Dragon_dance
Miuuti
Dragon_breath

Threats:
Powerkatz_stealer

Industry:
Entertainment

CVEs:
CVE-2021-21220 [Vulners]
Vulners: Score: 6.8, CVSS: 3.1,
Vulners: Exploitation: True
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- google chrome (<89.0.4389.128)
- fedoraproject fedora (32, 33, 34)


IOCs:
File: 8

Softs:
node.js, curl, chrome, telegram

Languages:
delphi