CTT Report Hub
3.22K subscribers
8.01K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
16-01-2023

APTBitter. APT organization Bitter network spy attack activity instance analysis

https://mp.weixin.qq.com/s/7Q2nulqLsofjSftbWQt2kA

Actors/Campaigns:
Bitter
Manling_flower

Threats:
Disttrack

Industry:
Energy, Government

Geo:
China, Pakistan, Asian, Bangladesh

CVEs:
CVE-2018-0798 [Vulners]
Vulners: Score: 9.3, CVSS: 3.8,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2010, 2016, 2016, 2007, 2013)
- microsoft word (2013, 2016, 2007, 2010, 2013)
- microsoft office compatibility pack (-)


IOCs:
File: 10
Command: 1
Email: 1

Softs:
burpsuite, wechat

Algorithms:
xor
#ParsedReport
16-01-2023

Abusing a GitHub Codespaces Feature For Malware Delivery. What is GitHub Codespaces?

https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html

Threats:
Typosquatting_technique

IOCs:
File: 1

Softs:
visual studio code, docker

Languages:
ruby, javascript, python

Links:
https://docs.github.com/en/codespaces/customizing-your-codespace/configuring-automatic-deletion-of-your-codespaces
https://cli.github.com/
https://docs.github.com/en/codespaces/overview
https://github.com/adititli/adititli
https://docs.github.com/en/codespaces/codespaces-reference/security-in-github-codespaces
#ParsedReport
16-01-2023

APTMuddyWater. APT organization Muddywater analysis

https://mp.weixin.qq.com/s/aYB7W_elO4FHPUtKrUtzHQ

Actors/Campaigns:
Muddywater (motivation: cyber_espionage)
Unc3313

Threats:
Stuxnet
Ransomware.2
Mimikatz_tool
Powgoop
Starwhale
Powerstats
Disttrack
Syncro_tool
Uac_bypass_technique

Industry:
Government, Financial, Healthcare, Energy

Geo:
Israeli, Iranian, Emirates, Iran, Turkish, Iraq, Africa, Azerbaijan, Israel, Pakistan, Asia, Turkey

TTPs:
Tactics: 5
Technics: 56

IOCs:
File: 19
Hash: 30
IP: 16

Languages:
javascript, python, visual_basic
#ParsedReport
17-01-2023

Kasablanka Group Probably Conducted Compaigns Targeting Russia

https://ti.qianxin.com/blog/articles/Kasablanka-Group-Probably-Conducted-Compaigns-Targeting-Russia

Actors/Campaigns:
Kasablanka (motivation: cyber_espionage)
Lazarus
Blindeagle
Confucius
Bitter

Threats:
Avemaria_rat
Lodarat
Motw_bypass_technique

Industry:
Government

Geo:
Kyrgyzstan, Ukraine, Russian, America, Turkey, Bangladesh, Morocco, Russia

IOCs:
IP: 6
File: 5
Path: 1
Hash: 22

Softs:
android, windows firewall, winscp, pyinstaller

Algorithms:
base64, zip

Languages:
autoit
#ParsedReport
17-01-2023

Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks. Indicators of Compromise (IOCs)

https://www.trendmicro.com/en_us/research/23/a/batloader-malware-abuses-legitimate-tools-uses-obfuscated-javasc.html

Actors/Campaigns:
Water_minyades

Threats:
Batloader
Qakbot
Raccoon_stealer
Bumblebee_loader
Pyarmor_tool
Trojan.win32.frs.vsnw1dk22
Cobalt_strike
Atera_tool
Beacon
Royal_ransomware
Gozi
Vidar_stealer
Redline_stealer
Z_loader
Smokeloader
Syncro_tool
Nsudo_tool
Gpg4win_tool
Rig_tool
Anydesk_tool
Logmein_tool
Putty_tool
Teamviewer_tool
Polyglot
Nircmd_tool
Bumblebee

Geo:
Germany, Poland, Netherlands, Canada, Australia, Japan, Brazil, Singapore

IOCs:
Domain: 17
Hash: 14
File: 12

Softs:
windows installer, windows defender, internet explorer, audacity, foxit, grammarly, kmsauto, minersoft, slack, tradingview, have more...

Algorithms:
zip

Functions:
GetNotes

Languages:
java, python, javascript

Links:
https://github.com/Svenskithesource/PyArmor-Unpacker
#ParsedReport
18-01-2023

IcedID and Infostealers Spread Through Adverts Mimicking Popular Tools

https://threatresearch.ext.hp.com/adverts-mimicking-popular-software-leads-to-malware

Threats:
Icedid
Vidar_stealer
Batloader
Rhadamanthys
Typosquatting_technique
Icedid_loader

IOCs:
File: 4
Hash: 4
Url: 9
Domain: 95

Softs:
audacity, telegram, microsoft teams

Algorithms:
zip
#Research
Open SESAME: Fighting Botnets with Seed Reconstructions of
Domain Generation Algorithms

https://arxiv.org/pdf/2301.05048.pdf
#ParsedReport
19-01-2023

New version of Remcos RAT uses direct syscalls to evade detection.

https://minerva-labs.com/blog/new-version-of-remcos-rat-uses-direct-syscalls-to-evade-detection

Threats:
Remcos_rat
Process_hollowing_technique
A310loggerstealer
Uac_bypass_technique
Pony
Process_injection_technique

TTPs:

IOCs:
File: 4
Path: 1
Registry: 2
Command: 1
Hash: 4

Softs:
nsis installer, windows service

Algorithms:
xor

Functions:
Function

Win API:
ResumeThread, NtCreateSection, NtMapViewOfSection, CreateProcessW, NtGetContextThread, NtQueryInformationProcess, ReadProcessMemory, NtWriteVirtualMemory, SetThreadContext, NtResumeThread, have more...

Links:
https://github.com/rxOred/process-hollowing