CTT Report Hub
3.22K subscribers
8.02K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#Research
Open SESAME: Fighting Botnets with Seed Reconstructions of
Domain Generation Algorithms

https://arxiv.org/pdf/2301.05048.pdf
#ParsedReport
19-01-2023

New version of Remcos RAT uses direct syscalls to evade detection.

https://minerva-labs.com/blog/new-version-of-remcos-rat-uses-direct-syscalls-to-evade-detection

Threats:
Remcos_rat
Process_hollowing_technique
A310loggerstealer
Uac_bypass_technique
Pony
Process_injection_technique

TTPs:

IOCs:
File: 4
Path: 1
Registry: 2
Command: 1
Hash: 4

Softs:
nsis installer, windows service

Algorithms:
xor

Functions:
Function

Win API:
ResumeThread, NtCreateSection, NtMapViewOfSection, CreateProcessW, NtGetContextThread, NtQueryInformationProcess, ReadProcessMemory, NtWriteVirtualMemory, SetThreadContext, NtResumeThread, have more...

Links:
https://github.com/rxOred/process-hollowing
#ParsedReport
19-01-2023

Gigabud RAT: New Android RAT Masquerading as Government Agencies. Technical Analysis

https://blog.cyble.com/2023/01/19/gigabud-rat-new-android-rat-masquerading-as-government-agencies

Threats:
Gigabud_rat

Industry:
Telco, Financial, Aerospace, Government

Geo:
Thailand, Philippine, Peru, Peruvian, Philippines

TTPs:
Tactics: 7
Technics: 9

IOCs:
Url: 5
File: 2
Hash: 2

Softs:
android

Functions:
OpenService
#ParsedReport
19-01-2023

Sliver C2 Leveraged by Many Threat Actors

https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors

Actors/Campaigns:
Duke
Shathak
Exotic_lily

Threats:
Sliver_tool
Cobalt_strike
Bumblebee
Uac_bypass_technique
Process_injection_technique
Rubeus_tool
Seatbelt_tool
Metasploit_tool
Silver_c2
Wellmess_rat
Wellmail
Gozi
Icedid
Qakbot
Beacon
Procdump_tool
Pypykatz_tool
Mimikatz_tool
Nltest_tool
Golden_ticket_technique
Dcsync_technique

Geo:
Russian

TTPs:
Tactics: 9
Technics: 0

IOCs:
File: 17
Path: 5
IP: 3

Softs:
psexec, wireguard, microsoft office, curl, sudo, systemd, active directory, confluence, openssl, windows service, have more...

Algorithms:
zip

Functions:
GetSystem

Win API:
CreateRemoteThread

Languages:
golang

Platforms:
amd64, intel, arm

Links:
https://github.com/gentilkiwi/mimikatz
https://github.com/BishopFox/sliver
https://github.com/salesforce/jarm
https://github.com/sliverarmory/armory
https://github.com/BishopFox/
https://github.com/BishopFox/sliver/releases/tag/v1.1.0
https://github.com/skelsec/pypykatz
https://github.com/GhostPack/Rubeus
#ParsedReport
19-01-2023

Dancing With Shellcodes: Analyzing Rhadamanthys Stealer. Threat Background

https://elis531989.medium.com/dancing-with-shellcodes-analyzing-rhadamanthys-stealer-3c4986966a88

Threats:
Rhadamanthys
Anydesk_tool
Bumblebee

Industry:
Financial

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 1
File: 14
Url: 1

Softs:
windows error reporting, keepass, pale moon, sleipnir5, opera, chrome, coreftp, discord, telegram, foxmail, have more...

Algorithms:
rc4

Functions:
Unhooking, CreateCompletionPort, OpenVPN, GetModuleHandle

Win API:
VirtualAlloc, VirtualProtect, WinMain, ImmEnumInputContext, CreateThread, CreateRemoteThread, LocalFree, LocalAlloc, VirtualFree, ZwQueryInformationProcess, have more...

Links:
https://github.com/OALabs/BlobRunner
https://github.com/HoLLy-HaCKeR/KeePassHax
https://github.com/LordNoteworthy/al-khaser
#ParsedReport
19-01-2023

Darth Vidar: The Dark Side of Evolving Threat Infrastructure

https://www.team-cymru.com/post/darth-vidar-the-dark-side-of-evolving-threat-infrastructure

Threats:
Vidar_stealer
Arkei_stealer
Anydesk_tool
Lumma_stealer
Oski_stealer
Stop_ransomware
Icedid
Redline_stealer

Industry:
Financial

Geo:
Russian

IOCs:
Domain: 10
IP: 10
File: 1
Hash: 6
Url: 6

Softs:
telegram, opera, mastodon

Platforms:
intel
#ParsedReport
19-01-2023

Aurora A Stealer Using Shapeshifting Tactics

https://blog.cyble.com/2023/01/18/aurora-a-stealer-using-shapeshifting-tactics

Threats:
Aurora
Teamviewer_tool
Redline_stealer
Vidar_stealer
Record_breaker_stealer
Beacon

TTPs:
Tactics: 6
Technics: 15

IOCs:
Url: 3
IP: 1
Hash: 4

Softs:
telegram, discord, (chrome

Algorithms:
gzip, base64

Functions:
wine_get_version

Win API:
GetProcAddress

Languages:
golang
#ParsedReport
19-01-2023

Roaming Mantis implements new DNS changer in its malicious mobile app in 2022

https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464

Actors/Campaigns:
Roaming_mantis (motivation: financially_motivated)

Threats:
Dns_changer
Mantis_botnet
Moqhao
Dns_hijacking_technique
Formbook

Industry:
Aerospace

Geo:
Asian, Malaysia, Korea, India, Germany, Austria, France, Taiwan, Turkey, Japan

IOCs:
Hash: 6
File: 1
IP: 48
Url: 34
Domain: 21

Softs:
android
#ParsedReport
18-01-2023

Chinese Playful Taurus Activity in Iran

https://unit42.paloaltonetworks.com/playful-taurus

Actors/Campaigns:
Playful_taurus (motivation: cyber_espionage)

Threats:
Terra_stealer
Turian
Vmprotect_tool
Api_obfuscation_technique
Neshta

Industry:
Telco, Government

Geo:
Iranian, Syrian, Irans, Iran, America, Apac, Africa, Senegal, Japan, Emea, Chinese, China

IOCs:
Domain: 14
IP: 9
Hash: 7
File: 2

Algorithms:
xor

Functions:
connect

Win API:
InitSecurityInterfaceA, AcquireCredentialsHandleA, InitializeSecurityContextA, EncryptMessage, DecryptMessage

Languages:
python

Platforms:
x64
#ParsedReport
20-01-2023

ASEC Weekly Malware Statistics (January 9th, 2023 January 15th, 2023)

https://asec.ahnlab.com/en/46169

Threats:
Smokeloader
Beamwinhttp_loader
Garbage_cleaner
Formbook
Clipboard_grabbing_technique
Agent_tesla
Lokibot_stealer

Industry:
Transport, Financial

Geo:
Korea

IOCs:
File: 15
Url: 23
Domain: 3
Email: 5

Softs:
telegram
#ParsedReport
20-01-2023

Following the LNK metadata trail

https://blog.talosintelligence.com/following-the-lnk-metadata-trail

Actors/Campaigns:
Obama
Gamaredon

Threats:
Mlnk_tool
Quantumbuilder_tool
Quantum_locker
Macropack_tool
Lnkup_tool
Lnk2pwn_tool
Sharpersist_tool
Rustlnkbuilder_tool
Raspberry_robin
Qakbot
Motw_bypass_technique
Meterpreter_tool
Cobalt_strike
Redline_stealer
Glowsand
Bumblebee
Icedid

Geo:
Ukranian, Ukrainian

CVEs:
CVE-2015-0096 [Vulners]
Vulners: Score: 9.3, CVSS: 4.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows rt (-)
- microsoft windows rt 8.1 (-)
- microsoft windows server 2012 (-, r2)
- microsoft windows 8.1 (-)
- microsoft windows server 2003 (-)
have more...

IOCs:
Hash: 35
Url: 1

Softs:
office 365, microsoft defender

Algorithms:
zip

Functions:
WriteTime

Languages:
python

YARA: Found

Links:
https://github.com/Cisco-Talos/IOCs/blob/main/2023/01/following-the-lnk-metadata-trail.txt
https://github.com/EricZimmerman/LECmd
#ParsedReport
19-01-2023

StrongPity APT After Android Users with Trojanized Telegram App

https://www.secureblink.com/threat-research/strong-pity-apt-after-android-users-with-trojanized-telegram-app

Threats:
Strongpity
Watering_hole_technique

Industry:
Telco

Geo:
Syrian, Turkish, Italian, Africa, Spain, Turkey, Belgium, Italy, France, America

IOCs:
File: 5
Hash: 5

Softs:
android, telegram, tinder

Algorithms:
aes
#ParsedReport
21-01-2023

Album Stealer Targets Facebook Adult-Only Content Seekers

https://www.zscaler.com/blogs/security-research/album-stealer-targets-facebook-adult-only-content-seekers

Threats:
Album_stealer
Dll_sideloading_technique
Sparkle
Beacon

Geo:
Vietnamese, Vietnam

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 32
Url: 5
Registry: 1
Path: 7
Hash: 14
Domain: 9

Softs:
microsoft onedrive, curl, google chrome, opera, microsoft edge, chromium

Algorithms:
gzip, aes, base64, zip

Languages:
php
#ParsedReport
23-01-2023

Information Stealers going Incognito on Google Ads

https://labs.k7computing.com/index.php/information-stealers-going-incognito-on-google-ads

Threats:
Anydesk_tool
Aurora
Vidar_stealer
Rhadamanthys
Icedid
Gozi
Redline_stealer
Gpg4win_tool

IOCs:
File: 11
Url: 8
IP: 3
Hash: 17
Domain: 1

Softs:
pyinstaller, windows explorer, discord, zoom

Algorithms:
base64, zip

Win API:
VirtualAlloc, RtlMoveMemory, CreateThread

Languages:
python
#ParsedReport
23-01-2023

Attackers Exploit Fortinet Zero-Day CVE-2022-42475 with BoldMove Malware

https://socradar.io/attackers-exploit-fortinet-zero-day-cve-2022-42475-with-boldmove-malware

Threats:
Boldmove

Industry:
Government

Geo:
China, African

CVEs:
CVE-2022-42475 [Vulners]
Vulners: Score: Unknown, CVSS: 6.2,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- fortinet fortios (le5.6.14, le5.4.13, le5.2.15, le5.0.14, le6.2.11, le6.0.15, le6.4.10, le7.2.2, le7.0.8, le6.0.14, le6.2.11, le6.4.9, le7.0.7)
- fortinet fortiproxy (le1.0.7, le1.1.6, le1.2.13, 7.2.0, le7.0.7, le2.0.11)


IOCs:
Hash: 6