CTT Report Hub
3.22K subscribers
8.02K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
19-01-2023

Roaming Mantis implements new DNS changer in its malicious mobile app in 2022

https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464

Actors/Campaigns:
Roaming_mantis (motivation: financially_motivated)

Threats:
Dns_changer
Mantis_botnet
Moqhao
Dns_hijacking_technique
Formbook

Industry:
Aerospace

Geo:
Asian, Malaysia, Korea, India, Germany, Austria, France, Taiwan, Turkey, Japan

IOCs:
Hash: 6
File: 1
IP: 48
Url: 34
Domain: 21

Softs:
android
#ParsedReport
18-01-2023

Chinese Playful Taurus Activity in Iran

https://unit42.paloaltonetworks.com/playful-taurus

Actors/Campaigns:
Playful_taurus (motivation: cyber_espionage)

Threats:
Terra_stealer
Turian
Vmprotect_tool
Api_obfuscation_technique
Neshta

Industry:
Telco, Government

Geo:
Iranian, Syrian, Irans, Iran, America, Apac, Africa, Senegal, Japan, Emea, Chinese, China

IOCs:
Domain: 14
IP: 9
Hash: 7
File: 2

Algorithms:
xor

Functions:
connect

Win API:
InitSecurityInterfaceA, AcquireCredentialsHandleA, InitializeSecurityContextA, EncryptMessage, DecryptMessage

Languages:
python

Platforms:
x64
#ParsedReport
20-01-2023

ASEC Weekly Malware Statistics (January 9th, 2023 January 15th, 2023)

https://asec.ahnlab.com/en/46169

Threats:
Smokeloader
Beamwinhttp_loader
Garbage_cleaner
Formbook
Clipboard_grabbing_technique
Agent_tesla
Lokibot_stealer

Industry:
Transport, Financial

Geo:
Korea

IOCs:
File: 15
Url: 23
Domain: 3
Email: 5

Softs:
telegram
#ParsedReport
20-01-2023

Following the LNK metadata trail

https://blog.talosintelligence.com/following-the-lnk-metadata-trail

Actors/Campaigns:
Obama
Gamaredon

Threats:
Mlnk_tool
Quantumbuilder_tool
Quantum_locker
Macropack_tool
Lnkup_tool
Lnk2pwn_tool
Sharpersist_tool
Rustlnkbuilder_tool
Raspberry_robin
Qakbot
Motw_bypass_technique
Meterpreter_tool
Cobalt_strike
Redline_stealer
Glowsand
Bumblebee
Icedid

Geo:
Ukranian, Ukrainian

CVEs:
CVE-2015-0096 [Vulners]
Vulners: Score: 9.3, CVSS: 4.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows rt (-)
- microsoft windows rt 8.1 (-)
- microsoft windows server 2012 (-, r2)
- microsoft windows 8.1 (-)
- microsoft windows server 2003 (-)
have more...

IOCs:
Hash: 35
Url: 1

Softs:
office 365, microsoft defender

Algorithms:
zip

Functions:
WriteTime

Languages:
python

YARA: Found

Links:
https://github.com/Cisco-Talos/IOCs/blob/main/2023/01/following-the-lnk-metadata-trail.txt
https://github.com/EricZimmerman/LECmd
#ParsedReport
19-01-2023

StrongPity APT After Android Users with Trojanized Telegram App

https://www.secureblink.com/threat-research/strong-pity-apt-after-android-users-with-trojanized-telegram-app

Threats:
Strongpity
Watering_hole_technique

Industry:
Telco

Geo:
Syrian, Turkish, Italian, Africa, Spain, Turkey, Belgium, Italy, France, America

IOCs:
File: 5
Hash: 5

Softs:
android, telegram, tinder

Algorithms:
aes
#ParsedReport
21-01-2023

Album Stealer Targets Facebook Adult-Only Content Seekers

https://www.zscaler.com/blogs/security-research/album-stealer-targets-facebook-adult-only-content-seekers

Threats:
Album_stealer
Dll_sideloading_technique
Sparkle
Beacon

Geo:
Vietnamese, Vietnam

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 32
Url: 5
Registry: 1
Path: 7
Hash: 14
Domain: 9

Softs:
microsoft onedrive, curl, google chrome, opera, microsoft edge, chromium

Algorithms:
gzip, aes, base64, zip

Languages:
php
#ParsedReport
23-01-2023

Information Stealers going Incognito on Google Ads

https://labs.k7computing.com/index.php/information-stealers-going-incognito-on-google-ads

Threats:
Anydesk_tool
Aurora
Vidar_stealer
Rhadamanthys
Icedid
Gozi
Redline_stealer
Gpg4win_tool

IOCs:
File: 11
Url: 8
IP: 3
Hash: 17
Domain: 1

Softs:
pyinstaller, windows explorer, discord, zoom

Algorithms:
base64, zip

Win API:
VirtualAlloc, RtlMoveMemory, CreateThread

Languages:
python
#ParsedReport
23-01-2023

Attackers Exploit Fortinet Zero-Day CVE-2022-42475 with BoldMove Malware

https://socradar.io/attackers-exploit-fortinet-zero-day-cve-2022-42475-with-boldmove-malware

Threats:
Boldmove

Industry:
Government

Geo:
China, African

CVEs:
CVE-2022-42475 [Vulners]
Vulners: Score: Unknown, CVSS: 6.2,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- fortinet fortios (le5.6.14, le5.4.13, le5.2.15, le5.0.14, le6.2.11, le6.0.15, le6.4.10, le7.2.2, le7.0.8, le6.0.14, le6.2.11, le6.4.9, le7.0.7)
- fortinet fortiproxy (le1.0.7, le1.1.6, le1.2.13, 7.2.0, le7.0.7, le2.0.11)


IOCs:
Hash: 6
#ParsedReport
23-01-2023

Hook: a new Ermac fork with RAT capabilities

https://www.threatfabric.com/blogs/hook-a-new-ermac-fork-with-rat-capabilities.html

Actors/Campaigns:
Dukeeugene
Indra

Threats:
Hook
Ermac
Flubot
Anatsa
Hydra
Octo
Cerberus
Spynote_rat
Tron
Geral
Halkbank
Mallox
Robinhood

Industry:
Foodtech, Financial, Retail, E-commerce, Ics

Geo:
America, Indonesia, Argentina, Georgia, Germany, Budapest, India, Chile, Denmark, Deutsche, Turkey, Colombia, Australia, Italia, Emirates, Austria, Kenya, Ita, Africa, Uruguay, Switzerland, Malaysia, Russian, Asian, France, Dubai, Asia, Spain, Singapore, Canada, Portugal

IOCs:
File: 194
Hash: 4
IP: 2

Softs:
android, coinbase, google chrome, wechat, tinder, telegram, tronlink, coinbase.android, instagram.android, instagram, have more...

Algorithms:
aes-256-cbc, zip, base64

Functions:
VNC

Platforms:
intel
#ParsedReport
23-01-2023

The Titan Stealer: Notorious Telegram Malware Campaign - Uptycs

https://www.uptycs.com/blog/titan-stealer-telegram-malware-campaign

Threats:
Titanstealer
Process_hollowing_technique

Geo:
Russian

TTPs:
Tactics: 3
Technics: 4

IOCs:
Hash: 13
File: 1
Path: 26

Softs:
telegram, coinomi, zcash

Algorithms:
base64, xor

Functions:
CreateFile

Win API:
FindFirstFileW

Languages:
golang

YARA: Found
#ParsedReport
24-01-2023

DragonSpark \| Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation

https://www.sentinelone.com/labs/dragonspark-attacks-evade-detection-with-sparkrat-and-golang-source-code-interpretation

Actors/Campaigns:
Dragonspark (motivation: cyber_espionage, information_theft, cyber_criminal)
Emissary_panda (motivation: cyber_espionage, cyber_criminal)
Leviathan (motivation: cyber_espionage, cyber_criminal)

Threats:
Sparkrat
Chinachopper
Sharptoken_tool
Badpotato_tool
Gotohttp_tool
Xzb-1248_actor
Meterpreter_tool
Cobalt_strike
Zegost
Beichendream_tool

Industry:
Retail

Geo:
Asia, Asian, Chinese, Taiwan, China, Singapore

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 5
File: 1
IP: 8
Domain: 5
Url: 7

Softs:
mysql, pyinstaller, macos

Algorithms:
aes, cbc, base64

Win API:
HeapCreate

Languages:
python, golang

Links:
https://github.com/XZB-1248/Spark
https://github.com/BeichenDream/
https://github.com/BeichenDream/BadPotato
https://github.com/XZB-1248
https://github.com/BeichenDream/SharpToken
https://github.com/traefik/yaegi
#ParsedReport
24-01-2023

Vice Society Ransomware Group Targets Manufacturing Companies. Technical analysis and infection flow

https://www.trendmicro.com/en_us/research/23/a/vice-society-ransomware-group-targets-manufacturing-companies.html

Actors/Campaigns:
Vice_society

Threats:
Hellokitty
Printnightmare_vuln
Zeppelin
Cobalt_strike
Rubeus_tool
Mimikatz_tool
Neshta
Ryuk
Conti
Blackcat
Clop
Killdisk
Anydesk_tool
Logmein_tool
Teamviewer_tool
Fivehands
Ransom.win64.ransrevy.thaafbc

Industry:
Education, Healthcare

Geo:
Israel, Argentina, Brazil, Switzerland

IOCs:
File: 5
Domain: 10
Path: 5
Command: 2
Registry: 3
Email: 3
Hash: 13

Softs:
windows defender, hyper-v

Languages:
java
#technique

APCLdr: Payload Loader With Evasion Features

https://github.com/NUL0x4C/APCLdr
#technique

Inline-Execute-PE is a suite of Beacon Object Files (BOF's) and an accompanying Aggressor script for CobaltStrike that enables Operators to load unmanaged Windows executables into Beacon memory and execute them, retrieving the output and rendering it in the Beacon console.

https://github.com/Octoberfest7/Inline-Execute-PE