CTT Report Hub
3.22K subscribers
8K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
07-01-2023

Dridex Returns, Targets MacOS Using New Entry Method. Introduction

https://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html

Threats:
Dridex

Industry:
Financial

TTPs:
Tactics: 4
Technics: 6

IOCs:
File: 4
Hash: 2
Url: 1

Softs:
macos, microsoft word

Functions:
CreatePicture, CreateColor, RuBik

Languages:
python, visual_basic

Links:
https://github.com/decalage2/oletools
#ParsedReport
09-01-2023

Unwrapping Ursnifs Gifts. Exfiltration

https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts

Threats:
Gozi
Cobalt_strike
Beacon
Icedid
Atera_tool
Splashtop_tool
Quantum_locker
Bumblebee
Diavol
Process_injection_technique
Mimikatz_tool
Impacket_tool
Hostile
Meterpreter_tool

Industry:
Financial

Geo:
Rus

TTPs:
Tactics: 9
Technics: 24

IOCs:
Domain: 2
IP: 72
File: 26
Registry: 1
Path: 10
Command: 16
Hash: 17
Coin: 1
Email: 1

Softs:
internet explorer, windows security

Algorithms:
base64

Functions:
eval

Win API:
DllRegisterServer, QueueUserAPC, GetCurrentThreadId, OpenThread, VirtualAlloc, CreateThread, SetThreadContext, CreateRemoteThread, RtlCreateUserThread, VirtualAllocEx, have more...

Win Services:
BITS, NtLmSsp

Languages:
visual_basic, php, javascript

Platforms:
x64

YARA: Found
SIGMA: Found

Links:
https://github.com/The-DFIR-Report/Suricata-Rules/blob/main/potential-impacket-wmiexec.py-activity.rules
https://github.com/fortra/impacket/blob/master/examples/wmiexec.py
#ParsedReport
09-01-2023

Dark Web Profile: Royal Ransomware

https://socradar.io/dark-web-profile-royal-ransomware

Actors/Campaigns:
Dev-0569

Threats:
Royal_ransomware
Conti
Bazaar
Blackcat
Zeon
Process_injection_technique

Industry:
Petroleum, Healthcare, Telco

Geo:
American

TTPs:
Tactics: 1
Technics: 17

IOCs:
File: 1
Hash: 3
IP: 5
Url: 1

Softs:
zoom, microsoft teams, component object model

Algorithms:
aes
#ParsedReport
09-01-2023

0day in {REA_TEAM}

https://kienmanowar.wordpress.com/2023/01/09/quicknote-another-nice-plugx-sample

Actors/Campaigns:
Red_delta

Threats:
Plugx_rat
Dll_sideloading_technique

IOCs:
File: 28
Hash: 1
IP: 1

Softs:
wordpress

Functions:
plx_read_Mc_cp_content_and_exec, plx_patching_func, GetProcAdderss, GetProcAddress_rva

Win API:
VirtualAlloc, GetModuleFileNameW, lstrcpyW, CreateFileW, ReadFile, LoadLibraryW, GetLastError, GetSystemTime, VirtualProtect, GetProcAddress, have more...

Links:
https://github.com/m4now4r/PlugX\_Mustang-Panda/blob/main/390f166753608a29b350c43f91b3b252\_vhd.zip
#ParsedReport
09-01-2023

APTSaaiwc Group. New forces in Southeast Asia: New APT Organization Saaiwc Group analyzes the attack activities of Southeast Asia's military, finance and other departments

https://mp.weixin.qq.com/s/G3gUjg9WC96NW4cRPww6gw

Actors/Campaigns:
Saaiwc

Threats:
Lockbit

Industry:
Government, Financial

Geo:
Philippine, Cambodia, Asian, Vietnam, Asia, Philippines

CVEs:
CVE-2017-0199 [Vulners]
Vulners: Score: 9.3, CVSS: 7.8,
Vulners: Exploitation: True
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, *)
- microsoft windows server 2012 (-)
- microsoft windows vista (*)
- microsoft office (2010, 2013, 2016, 2007)
- microsoft windows 7 (*)
have more...

TTPs:
Tactics: 1
Technics: 0

IOCs:
Registry: 2
File: 11
Url: 1
Hash: 4

Softs:
telegram
#ParsedReport
10-01-2023

Crypto-inspired Magecart skimmer surfaces via digital crime haven

https://www.malwarebytes.com/blog/threat-intelligence/2023/01/crypto-inspired-magecart-skimmer-surfaces-via-digital-crime-haven

Threats:
Magentocore
Agent_tesla
Teamviewer_tool
Anydesk_tool
Vidar_stealer
Gozi
Aurora
Robin_banks_tool

Industry:
Financial, E-commerce, Retail

Geo:
American, Ukraine, Russian

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 1
Domain: 11
IP: 15
Url: 3

Softs:
cpanel

Languages:
javascript

Links:
https://gist.github.com/krautface/e5444c1bb9880518db0f128416c911e6
#ParsedReport
10-01-2023

THREAT ANALYSIS: From IcedID to Domain Compromise

https://www.cybereason.com/blog/threat-analysis-from-icedid-to-domain-compromise

Actors/Campaigns:
Shathak

Threats:
Icedid
Cobalt_strike
Conti
Lockbit
Fivehands
Beacon
Rubeus_tool
Kerberoasting_technique
Atera_tool
Dcsync_technique
Credential_stealing_technique
Nltest_tool

Industry:
Financial, Education

Geo:
French

TTPs:
Tactics: 4
Technics: 2

IOCs:
File: 28
Domain: 5

Softs:
active directory, curl, chrome, windows explorer

Algorithms:
base64, zip

Functions:
RPC, MSRPC

Languages:
python

Links:
https://github.com/hashcat/hashcat
https://github.com/openwall/john
https://github.com/GhostPack/Rubeus
#ParsedReport
10-01-2023

A Deep Dive Into poweRAT: a Newly Discovered Stealer/RAT Combo Polluting PyPI

https://blog.phylum.io/a-deep-dive-into-powerat-a-newly-discovered-stealer/rat-combo-polluting-pypi

Threats:
Powerat
Xrat_rat

Industry:
Government

IOCs:
File: 7
Domain: 1

Softs:
flask, telegram, discord

Algorithms:
lzma, base64, zip

Functions:
run_with_cloudflared

Languages:
javascript, python

Links:
https://github.com/cloudflare/cloudflared
#ParsedReport
11-01-2023

A View Into Web(View) Attacks in Android

https://securityintelligence.com/posts/view-into-webview-attacks-android

Threats:
Fake-trusteer
Zeus_sphinx
Zeus
Sphinx
Icedid
Trickbot
Rustock
Flubot
Sharkbot
Hydra

Industry:
Financial, E-commerce

IOCs:
Hash: 2

Softs:
android, google chrome, chrome

Algorithms:
base64

Functions:
val, loadUrl, getCookie

Languages:
javascript
#ParsedReport
11-01-2023

NeedleDropper

https://decoded.avast.io/threatresearch/needledropper/?utm_source=rss&utm_medium=rss&utm_campaign=needledropper

Threats:
Needledropper
Formbook

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 5
Path: 1
Hash: 9

Softs:
discord

Win API:
CryptDecrypt, WriteProcessMemory

Languages:
visual_basic, autoit

Links:
https://github.com/avast/ioc/tree/master/NeedleDropper
#ParsedReport
11-01-2023

Raspberry Robins botnet second life

https://blog.sekoia.io/raspberry-robins-botnet-second-life

Actors/Campaigns:
Evil_corp (motivation: financially_motivated)
Turla
Apt31

Threats:
Raspberry_robin
Qnapworm
Dridex
Socgholish_loader
Bumblebee
Truebot
Icedid
Dns_hijacking_technique
Quantum_locker
Retadup
Andromeda
Aurora

Industry:
Education

Geo:
Kazakhstan, France, Romania, Oman, Russian, Bahrain, Germany, Morocco

IOCs:
Domain: 3

Softs:
microsoft jscript
#ParsedReport
11-01-2023

DDosia Project: Volunteers Carrying out NoName(057)16s Dirty Work

https://decoded.avast.io/martinchlumecky/ddosia-project/?utm_source=rss&utm_medium=rss&utm_campaign=ddosia-project

Actors/Campaigns:
Noname057
Killnet

Threats:
Ddosia_botnet
Bobiks
Redline_stealer
Nmap_tool
Prestige_ransomware

Industry:
Education, Financial, Healthcare, Government, Transport, Aerospace

Geo:
Polish, Polands, Belarus, Canada, Germany, Ukrainian, Moscow, Ukraine, Poland, Russian, Lithuania, Berlin, Russia, Latvia

IOCs:
File: 3
IP: 1
Url: 2

Softs:
telegram, macos, pyinstaller, nginx

Algorithms:
zip

Languages:
python

Links:
https://github.com/avast/ioc/blob/master/Bobik/targets.xlsx