CTT Report Hub
3.22K subscribers
8.01K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
13-01-2023

ASEC Weekly Malware Statistics (January 2nd, 2023 January 8th, 2023)

https://asec.ahnlab.com/en/45636

Threats:
Beamwinhttp_loader
Garbage_cleaner
Smokeloader
Agent_tesla
Formbook
Mallox
Clipboard_grabbing_technique

Industry:
Financial

Geo:
Korea

IOCs:
IP: 3
Domain: 9
File: 9
Email: 2
Url: 12

Softs:
telegram, ms-sql
#ParsedReport
15-01-2023

Cisco Talos Intelligence Blog. Threat Round up for January 6 to January 13

https://blog.talosintelligence.com/threat-roundup-0106-0113

Threats:
Lokibot_stealer
Upatre
Vobfus
Remcos_rat
Adwind_rat
Hawkeye_keylogger
Trickbot
Darkcomet_rat
Shiz

Industry:
Financial

IOCs:
File: 2
Domain: 58
Path: 36
Hash: 199
IP: 56
Email: 23

Softs:
microsoft office, directx
#ParsedReport
15-01-2023

QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature

https://blog.eclecticiq.com/qakbot-malware-used-unpatched-vulnerability-to-bypass-windows-os-security-feature

Threats:
Qakbot
Motw_bypass_technique
Lotl_technique
Lolbin_technique
Lolbas_technique
Blackbasta
Process_injection_technique
Process_hollowing_technique
Emotet

Industry:
Government, Financial

Geo:
Russia, Ukraine

CVEs:
CVE-2022-41049 [Vulners]
Vulners: Score: Unknown, CVSS: 2.4,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 21h2, 22h2, 1809)
- microsoft windows 8.1 (-, -)
- microsoft windows server 2016 (-)
have more...
CVE-2022-44698 [Vulners]
Vulners: Score: Unknown, CVSS: 2.1,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (1607, 1809, 20h2, 21h1, 21h2, 22h2)
- microsoft windows server 2016 (-)
- microsoft windows server 2019 (-)
- microsoft windows server 2022 (-)
- microsoft windows 11 (-, -)
have more...
CVE-2022-41091 [Vulners]
Vulners: Score: Unknown, CVSS: 2.4,
Vulners: Exploitation: True
X-Force: Risk: 5.4
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (1607, -, 1809, 20h2, 21h1, 21h2, 22h2)
- microsoft windows server 2016 (-)
- microsoft windows server 2019 (-)
- microsoft windows server 2022 (-, -)
- microsoft windows 11 (-, -, 22h2, 22h2)
have more...

TTPs:

IOCs:
File: 6
Hash: 4

Softs:
windows defender smartscreen, windows security, microsoft office, windows error reporting

Algorithms:
xor, crc-32, rc4, zip, base64

Languages:
javascript

YARA: Found
#technique

Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed. The persistence is triggered each time the explorer process is runned.

https://github.com/D1rkMtr/ExplorerPersist
#ParsedReport
16-01-2023

Gotta Catch Em All \| Understanding the NetSupport RAT Campaigns Hiding Behind Pokemon Lures

https://www.sentinelone.com/blog/gotta-catch-em-all-understanding-the-netsupport-rat-campaigns-hiding-behind-pokemon-lures

Threats:
Netsupportmanager_rat
Teamviewer_tool
Andromeda
Nanocore_rat
Cirenegrat
Meteor_wiper
Ragnarlocker
Maze
Babadeda

Industry:
E-commerce, Financial

TTPs:
Tactics: 1
Technics: 13

IOCs:
File: 6
Hash: 16
Domain: 1

Softs:
google chrome

Algorithms:
base64

Win API:
GetAdaptersAddresses, IsDebuggerPresent, EnumProcesses

Platforms:
x86
#ParsedReport
16-01-2023

APTBitter. APT organization Bitter network spy attack activity instance analysis

https://mp.weixin.qq.com/s/7Q2nulqLsofjSftbWQt2kA

Actors/Campaigns:
Bitter
Manling_flower

Threats:
Disttrack

Industry:
Energy, Government

Geo:
China, Pakistan, Asian, Bangladesh

CVEs:
CVE-2018-0798 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2010, 2016, 2016, 2007, 2013)
- microsoft word (2013, 2016, 2007, 2010, 2013)
- microsoft office compatibility pack (-)


IOCs:
File: 10
Command: 1
Email: 1

Softs:
burpsuite, wechat

Algorithms:
xor
#ParsedReport
16-01-2023

Abusing a GitHub Codespaces Feature For Malware Delivery. What is GitHub Codespaces?

https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html

Threats:
Typosquatting_technique

IOCs:
File: 1

Softs:
visual studio code, docker

Languages:
ruby, javascript, python

Links:
https://docs.github.com/en/codespaces/customizing-your-codespace/configuring-automatic-deletion-of-your-codespaces
https://cli.github.com/
https://docs.github.com/en/codespaces/overview
https://github.com/adititli/adititli
https://docs.github.com/en/codespaces/codespaces-reference/security-in-github-codespaces
#ParsedReport
16-01-2023

APTMuddyWater. APT organization Muddywater analysis

https://mp.weixin.qq.com/s/aYB7W_elO4FHPUtKrUtzHQ

Actors/Campaigns:
Muddywater (motivation: cyber_espionage)
Unc3313

Threats:
Stuxnet
Ransomware.2
Mimikatz_tool
Powgoop
Starwhale
Powerstats
Disttrack
Syncro_tool
Uac_bypass_technique

Industry:
Government, Financial, Healthcare, Energy

Geo:
Israeli, Iranian, Emirates, Iran, Turkish, Iraq, Africa, Azerbaijan, Israel, Pakistan, Asia, Turkey

TTPs:
Tactics: 5
Technics: 56

IOCs:
File: 19
Hash: 30
IP: 16

Languages:
javascript, python, visual_basic
#ParsedReport
17-01-2023

Kasablanka Group Probably Conducted Compaigns Targeting Russia

https://ti.qianxin.com/blog/articles/Kasablanka-Group-Probably-Conducted-Compaigns-Targeting-Russia

Actors/Campaigns:
Kasablanka (motivation: cyber_espionage)
Lazarus
Blindeagle
Confucius
Bitter

Threats:
Avemaria_rat
Lodarat
Motw_bypass_technique

Industry:
Government

Geo:
Kyrgyzstan, Ukraine, Russian, America, Turkey, Bangladesh, Morocco, Russia

IOCs:
IP: 6
File: 5
Path: 1
Hash: 22

Softs:
android, windows firewall, winscp, pyinstaller

Algorithms:
base64, zip

Languages:
autoit
#ParsedReport
17-01-2023

Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks. Indicators of Compromise (IOCs)

https://www.trendmicro.com/en_us/research/23/a/batloader-malware-abuses-legitimate-tools-uses-obfuscated-javasc.html

Actors/Campaigns:
Water_minyades

Threats:
Batloader
Qakbot
Raccoon_stealer
Bumblebee_loader
Pyarmor_tool
Trojan.win32.frs.vsnw1dk22
Cobalt_strike
Atera_tool
Beacon
Royal_ransomware
Gozi
Vidar_stealer
Redline_stealer
Z_loader
Smokeloader
Syncro_tool
Nsudo_tool
Gpg4win_tool
Rig_tool
Anydesk_tool
Logmein_tool
Putty_tool
Teamviewer_tool
Polyglot
Nircmd_tool
Bumblebee

Geo:
Germany, Poland, Netherlands, Canada, Australia, Japan, Brazil, Singapore

IOCs:
Domain: 17
Hash: 14
File: 12

Softs:
windows installer, windows defender, internet explorer, audacity, foxit, grammarly, kmsauto, minersoft, slack, tradingview, have more...

Algorithms:
zip

Functions:
GetNotes

Languages:
java, python, javascript

Links:
https://github.com/Svenskithesource/PyArmor-Unpacker