CTT Report Hub
3.22K subscribers
8K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#technique

Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime

https://github.com/D1rkMtr/UnhookingPatch
#technique

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported API from the export table

https://github.com/D1rkMtr/FilelessNtdllReflection
#ParsedReport
05-01-2023

Unraveling the techniques of Mac ransomware

https://www.microsoft.com/en-us/security/blog/2023/01/05/unraveling-the-techniques-of-mac-ransomware

Threats:
Opendir
Filecoder
Keranger
Macransom
Evilquest
Applescript
Timestomp_technique

TTPs:
Tactics: 8
Technics: 27

IOCs:
File: 1
Hash: 5

Softs:
macos, microsoft defender for endpoint, unix, mac os, virtualbox, microsoft edge, microsoft defender, sudo

Algorithms:
xor, cbc, aes, hmac, zip

Functions:
opendir, readdir, closedir, ptrace, time, sleep, kqueue, kevent, CreateMatchingDirectory

Languages:
objective_c

Links:
https://github.com/gdbinit/gopher
#ParsedReport
06-01-2023

Distribution of NetSupport RAT Malware Disguised as a Pokemon Game

https://asec.ahnlab.com/en/45312

Threats:
Netsupportmanager_rat
Ammyyadmin_tool
Anydesk_tool
Teamviewer_tool
Tmate_tool
Socgholish_loader
Malware/win.generic.c5339867
Malware/win.generic.c5335414
Malware/win.generic.c5333592
Malware/win.malware-gen.c5331507

IOCs:
File: 7
Hash: 11
Domain: 1
Url: 6

Softs:
visual studio
#ParsedReport
07-01-2023

Zoom Users At Risk In Latest Malware Campaign

https://blog.cyble.com/2023/01/05/zoom-users-at-risk-in-latest-malware-campaign

Threats:
Icedid
Sandbox_evasion_technique
Emotet
Trickbot
Hancitor
Beacon

Industry:
Financial

TTPs:
Tactics: 4
Technics: 11

IOCs:
Url: 1
File: 2
Hash: 3
Domain: 1
IP: 1

Softs:
zoom

Functions:
ZwQuerySystemInformation, RtlGetVersion

Win API:
GetTickCount64, GetComputerNameExW, GetUserNameW, GetAdaptersInfo, LookupAccountNameW
#ParsedReport
07-01-2023

LummaC2 Stealer: A Potent Threat to Crypto Users

https://blog.cyble.com/2023/01/06/lummac2-stealer-a-potent-threat-to-crypto-users

Threats:
Lumma_stealer

Industry:
Financial

Geo:
Bulgaria, Germany, Russian

TTPs:
Tactics: 5
Technics: 8

IOCs:
File: 1
IP: 2
Hash: 4

Softs:
chromium, telegram, electrum, chrome, kometa, vivaldi, opera, mozilla firefox
#ParsedReport
07-01-2023

Unveiling of a large resilient infrastructure distributing information stealers. Context

https://blog.sekoia.io/unveiling-of-a-large-resilient-infrastructure-distributing-information-stealers

Actors/Campaigns:
Apt31
Lapsus
Darkhalo

Threats:
Raccoon_stealer
Vidar_stealer
Themida_tool
Vmprotect_tool
Traffer
Aurora
Envyscout

Geo:
Dprk

TTPs:
Tactics: 4
Technics: 11

IOCs:
Url: 47
Domain: 260
File: 12
Hash: 152
Registry: 1
Command: 2
IP: 14

Softs:
photoshop, virtualbox, windows defender, microsoft office

Algorithms:
base64

SIGMA: Found

Links:
https://github.com/SEKOIA-IO/Community/blob/main/IOCs/infra\_seo\_crack\_stealers/infra\_seo\_crack\_stealers\_iocs\_20230106.csv
#ParsedReport
07-01-2023

SpyNote: Spyware with RAT capabilities targeting Financial Institutions

https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions.html

Threats:
Spynote_rat
Spymax
Craxsrat

Industry:
Entertainment, Financial

Geo:
Deutsche, America

IOCs:
Hash: 9
IP: 2

Softs:
android, telegram

Algorithms:
base64
#ParsedReport
07-01-2023

Infostealer Malware: Targeting Italian Region - Uptycs. Infostealer Malware: Targeting Italian Region

https://www.uptycs.com/blog/infostealer-malware-attacks-targeting-italian-region

Industry:
Financial

Geo:
Italian, Italy

IOCs:
File: 2
Path: 3
Hash: 8
IP: 1

Softs:
zcash, coinbase, jaxx, bitclip

Algorithms:
base64, zip, gzip

YARA: Found
#ParsedReport
07-01-2023

Turla: A Galaxy of Opportunity

https://www.mandiant.com/resources/blog/turla-galaxy-opportunity

Actors/Campaigns:
Turla (motivation: financially_motivated, cyber_espionage, information_theft)

Threats:
Kopiluwak
Quietcanary
Andromeda
Beacon
Netstat_tool
Process_injection_technique

Geo:
Russian, Ukrainian, Ukraine, Asia

TTPs:
Tactics: 8
Technics: 21

IOCs:
Path: 4
Hash: 6
Domain: 4
File: 7
IP: 2
Registry: 1

Algorithms:
rc4, base64

Languages:
php, javascript

YARA: Found
#ParsedReport
07-01-2023

Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa

https://symantec-enterprise-blogs.security.com/threat-intelligence/bluebottle-banks-targeted-africa

Actors/Campaigns:
Bluebottle (motivation: financially_motivated)
Opera1er
Blackcat

Threats:
Lotl_technique
Revealer_keylogger
Cobalt_strike
Rdpwrap_tool
Beacon
Cloudeye
Bumblebee
Quasar_rat
Netwire_rat
Api_hammering_technique
Lockbit
Cuba
Eamfo
Poortry
Stonestop
Burntcigar_tool
Mimikatz_tool
Bloodhound_tool

Industry:
Financial

Geo:
African, Canada, Africa

TTPs:
Tactics: 1
Technics: 0

IOCs:
Domain: 3
File: 8
Url: 10
Command: 1
Hash: 34
IP: 1

Softs:
psexec, internet explorer, asp.net, windows service, sysinternals

Algorithms:
zip

Links:
https://github.com/asmtron/rdpwrap
#ParsedReport
07-01-2023

LABScon Replay \| InkySquid: The Missing Arsenal. InkySquid: The Missing Arsenal: Audio automatically transcribed by Sonix

https://www.sentinelone.com/labs/labscon-replay-inkysquid-the-missing-arsenal

Actors/Campaigns:
Apt37 (motivation: cyber_espionage)

Threats:
Rokrat
Keybase
Cloudmensis_rat
Applescript
Fireball

Geo:
Korean, Korea, French

IOCs:
File: 1

Softs:
macos, android, microsoft word, zoom

Algorithms:
zip, xor

Platforms:
arm, x86
#ParsedReport
07-01-2023

PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources. Executive Summary

https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources

Actors/Campaigns:
Purpleurchin

Geo:
Japanese, Japan, African

IOCs:
Domain: 1

Softs:
imagemagick

Languages:
php, python

Links:
https://github.com/
#ParsedReport
07-01-2023

Dridex Returns, Targets MacOS Using New Entry Method. Introduction

https://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html

Threats:
Dridex

Industry:
Financial

TTPs:
Tactics: 4
Technics: 6

IOCs:
File: 4
Hash: 2
Url: 1

Softs:
macos, microsoft word

Functions:
CreatePicture, CreateColor, RuBik

Languages:
python, visual_basic

Links:
https://github.com/decalage2/oletools
#ParsedReport
09-01-2023

Unwrapping Ursnifs Gifts. Exfiltration

https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts

Threats:
Gozi
Cobalt_strike
Beacon
Icedid
Atera_tool
Splashtop_tool
Quantum_locker
Bumblebee
Diavol
Process_injection_technique
Mimikatz_tool
Impacket_tool
Hostile
Meterpreter_tool

Industry:
Financial

Geo:
Rus

TTPs:
Tactics: 9
Technics: 24

IOCs:
Domain: 2
IP: 72
File: 26
Registry: 1
Path: 10
Command: 16
Hash: 17
Coin: 1
Email: 1

Softs:
internet explorer, windows security

Algorithms:
base64

Functions:
eval

Win API:
DllRegisterServer, QueueUserAPC, GetCurrentThreadId, OpenThread, VirtualAlloc, CreateThread, SetThreadContext, CreateRemoteThread, RtlCreateUserThread, VirtualAllocEx, have more...

Win Services:
BITS, NtLmSsp

Languages:
visual_basic, php, javascript

Platforms:
x64

YARA: Found
SIGMA: Found

Links:
https://github.com/The-DFIR-Report/Suricata-Rules/blob/main/potential-impacket-wmiexec.py-activity.rules
https://github.com/fortra/impacket/blob/master/examples/wmiexec.py