CTT Report Hub
3.22K subscribers
8.01K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
12-01-2023

STOP/DJVU Ransomware

https://minerva-labs.com/blog/stop-djvu-ransomware

Threats:
Stop_ransomware
Process_hollowing_technique
Vidar_stealer
Gozi

Industry:
Financial

Geo:
Tajikistan, Ukraine, Kazakhstan, Uzbekistan, Azerbaijan, Kyrgyzstan, Belarus, Russia, Armenia, Syria

IOCs:
Registry: 1
Path: 2
Url: 2
File: 3

Win API:
InternetReadFile, ShellExecuteA

Platforms:
x86, intel
#ParsedReport
12-01-2023

SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security

https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic

Actors/Campaigns:
0ktapus

Threats:
Byovd_technique
Kdmapper_tool

Industry:
Bp_outsourcing, Telco

CVEs:
CVE-2015-2291 [Vulners]
Vulners: Score: 7.2, CVSS: 6.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Unavailable
Soft:
- intel ethernet diagnostics driver iqvw32.sys (1.03.0.7)
- intel ethernet diagnostics driver iqvw64.sys (1.03.0.7)


IOCs:
File: 2
Hash: 2

Softs:
windows security, windows kernel, microsoft defender for endpoint, windows registry, microsoft windows defender application control

Algorithms:
xor

Functions:
DbgPrintEx

Platforms:
intel
#ParsedReport
13-01-2023

Orcus RAT Being Distributed Disguised as a Hangul Word Processor Crack

https://asec.ahnlab.com/en/45462

Threats:
Orcus_rat
Sbit_rat
Xmrig_miner
Nircmd_tool
Process_hacker_tool
Cobalt_strike
Androm
Trojan/win.injection.c5347028
Orcusrat

Industry:
Media

Geo:
Korean

IOCs:
File: 38
Path: 1
Coin: 1
Hash: 8
Domain: 3
Url: 13

Softs:
task scheduler, microsoft office word, windows defender, telegram, exe,v_ser, process explorer, visual studio
#ParsedReport
13-01-2023

ASEC Weekly Malware Statistics (January 2nd, 2023 January 8th, 2023)

https://asec.ahnlab.com/en/45636

Threats:
Beamwinhttp_loader
Garbage_cleaner
Smokeloader
Agent_tesla
Formbook
Mallox
Clipboard_grabbing_technique

Industry:
Financial

Geo:
Korea

IOCs:
IP: 3
Domain: 9
File: 9
Email: 2
Url: 12

Softs:
telegram, ms-sql
#ParsedReport
15-01-2023

Cisco Talos Intelligence Blog. Threat Round up for January 6 to January 13

https://blog.talosintelligence.com/threat-roundup-0106-0113

Threats:
Lokibot_stealer
Upatre
Vobfus
Remcos_rat
Adwind_rat
Hawkeye_keylogger
Trickbot
Darkcomet_rat
Shiz

Industry:
Financial

IOCs:
File: 2
Domain: 58
Path: 36
Hash: 199
IP: 56
Email: 23

Softs:
microsoft office, directx
#ParsedReport
15-01-2023

QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature

https://blog.eclecticiq.com/qakbot-malware-used-unpatched-vulnerability-to-bypass-windows-os-security-feature

Threats:
Qakbot
Motw_bypass_technique
Lotl_technique
Lolbin_technique
Lolbas_technique
Blackbasta
Process_injection_technique
Process_hollowing_technique
Emotet

Industry:
Government, Financial

Geo:
Russia, Ukraine

CVEs:
CVE-2022-41049 [Vulners]
Vulners: Score: Unknown, CVSS: 2.4,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 21h2, 22h2, 1809)
- microsoft windows 8.1 (-, -)
- microsoft windows server 2016 (-)
have more...
CVE-2022-44698 [Vulners]
Vulners: Score: Unknown, CVSS: 2.1,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (1607, 1809, 20h2, 21h1, 21h2, 22h2)
- microsoft windows server 2016 (-)
- microsoft windows server 2019 (-)
- microsoft windows server 2022 (-)
- microsoft windows 11 (-, -)
have more...
CVE-2022-41091 [Vulners]
Vulners: Score: Unknown, CVSS: 2.4,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (1607, -, 1809, 20h2, 21h1, 21h2, 22h2)
- microsoft windows server 2016 (-)
- microsoft windows server 2019 (-)
- microsoft windows server 2022 (-, -)
- microsoft windows 11 (-, -, 22h2, 22h2)
have more...

TTPs:

IOCs:
File: 6
Hash: 4

Softs:
windows defender smartscreen, windows security, microsoft office, windows error reporting

Algorithms:
xor, crc-32, rc4, zip, base64

Languages:
javascript

YARA: Found
#technique

Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed. The persistence is triggered each time the explorer process is runned.

https://github.com/D1rkMtr/ExplorerPersist
#ParsedReport
16-01-2023

Gotta Catch Em All \| Understanding the NetSupport RAT Campaigns Hiding Behind Pokemon Lures

https://www.sentinelone.com/blog/gotta-catch-em-all-understanding-the-netsupport-rat-campaigns-hiding-behind-pokemon-lures

Threats:
Netsupportmanager_rat
Teamviewer_tool
Andromeda
Nanocore_rat
Cirenegrat
Meteor_wiper
Ragnarlocker
Maze
Babadeda

Industry:
E-commerce, Financial

TTPs:
Tactics: 1
Technics: 13

IOCs:
File: 6
Hash: 16
Domain: 1

Softs:
google chrome

Algorithms:
base64

Win API:
GetAdaptersAddresses, IsDebuggerPresent, EnumProcesses

Platforms:
x86
#ParsedReport
16-01-2023

APTBitter. APT organization Bitter network spy attack activity instance analysis

https://mp.weixin.qq.com/s/7Q2nulqLsofjSftbWQt2kA

Actors/Campaigns:
Bitter
Manling_flower

Threats:
Disttrack

Industry:
Energy, Government

Geo:
China, Pakistan, Asian, Bangladesh

CVEs:
CVE-2018-0798 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2010, 2016, 2016, 2007, 2013)
- microsoft word (2013, 2016, 2007, 2010, 2013)
- microsoft office compatibility pack (-)


IOCs:
File: 10
Command: 1
Email: 1

Softs:
burpsuite, wechat

Algorithms:
xor
#ParsedReport
16-01-2023

Abusing a GitHub Codespaces Feature For Malware Delivery. What is GitHub Codespaces?

https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html

Threats:
Typosquatting_technique

IOCs:
File: 1

Softs:
visual studio code, docker

Languages:
ruby, javascript, python

Links:
https://docs.github.com/en/codespaces/customizing-your-codespace/configuring-automatic-deletion-of-your-codespaces
https://cli.github.com/
https://docs.github.com/en/codespaces/overview
https://github.com/adititli/adititli
https://docs.github.com/en/codespaces/codespaces-reference/security-in-github-codespaces
#ParsedReport
16-01-2023

APTMuddyWater. APT organization Muddywater analysis

https://mp.weixin.qq.com/s/aYB7W_elO4FHPUtKrUtzHQ

Actors/Campaigns:
Muddywater (motivation: cyber_espionage)
Unc3313

Threats:
Stuxnet
Ransomware.2
Mimikatz_tool
Powgoop
Starwhale
Powerstats
Disttrack
Syncro_tool
Uac_bypass_technique

Industry:
Government, Financial, Healthcare, Energy

Geo:
Israeli, Iranian, Emirates, Iran, Turkish, Iraq, Africa, Azerbaijan, Israel, Pakistan, Asia, Turkey

TTPs:
Tactics: 5
Technics: 56

IOCs:
File: 19
Hash: 30
IP: 16

Languages:
javascript, python, visual_basic