CTT Report Hub
3.13K subscribers
7.52K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
25-04-2022

ASEC Weekly Malware Statistics (April 11th, 2022 April 17th, 2022)

https://asec.ahnlab.com/en/33763

Threats:
Agent_tesla (tags: malware)
Formbook (tags: malware)
Lokibot_stealer (tags: malware)
Redline_stealer (tags: malware)
Beamwinhttp_loader (tags: malware)
Snake_keylogger (tags: malware)

Industry:
Financial

IOCs:
Domain: 5
IP: 6
Email: 7
File: 18
Url: 15
#ParsedReport
25-04-2022

INDUSTROYER.V2: Old Malware Learns New Tricks

https://www.mandiant.com/resources/industroyer-v2-old-malware-new-tricks

Threats:
Crashoverride (tags: malware)
Incontroller_tool (tags: malware)

Industry:
Ics

Geo:
Ukraine

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 1
File: 1

YARA: Found
#ParsedReport
25-04-2022

Defeating BazarLoader Anti-Analysis Techniques

https://unit42.paloaltonetworks.com/bazarloader-anti-analysis-techniques

Threats:
Bazarbackdoor (tags: malware, ransomware, backdoor)

IOCs:
Hash: 1

Links:
https://github.com/pan-unit42/iocs/blob/master/DeObfuscate\_Opaque
https://github.com/pan-unit42/iocs/blob/master/Appcall\_rename\_api
https://github.com/idapython
#ParsedReport
25-04-2022

THREAT ANALYSIS REPORT: SocGholish and Zloader From Fake Updates and Installers to Owning Your Systems. MITRE ATT&CK Techniques

https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems

Threats:
Socgholish_loader (tags: backdoor, rat, ransomware, malware, scan, phishing, proxy)
Z_loader (tags: backdoor, rat, ransomware, malware, scan, phishing, proxy)
Cobalt_strike
Egregor
Ryuk
Atera_tool
Nsudo_tool

Industry:
Government

Geo:
Russia

CVEs:
CVE-2013-3900 [Vulners]
Vulners: Score: 7.6, CVSS: 7.3,
Vulners: Exploitation: True
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows 7 (-)
- microsoft windows rt (-)
- microsoft windows 8.1 (-)
- microsoft windows server 2003 (-)
have more...

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 20
IP: 6
Domain: 10
Path: 27
Hash: 8

Links:
https://github.com/M2Team/NSudo
#ParsedReport
25-04-2022

New Core Impact Backdoor Delivered Via VMWare Vulnerability

https://blog.morphisec.com/vmware-identity-manager-attack-backdoor

Actors/Campaigns:
Cleaver (tags: backdoor)
Woolen_goldfish

Threats:
Cobalt_strike (tags: backdoor)
Metasploit_tool (tags: backdoor)
Powertrash_tool
Log4shell_vuln
Jssloader

Geo:
London, Iran

CVEs:
CVE-2022-22958 [Vulners]
Vulners: Score: 6.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- vmware cloud foundation (<5.0)
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, <9.0)
- vmware vrealize suite lifecycle manager (<9.0)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
have more...
CVE-2022-22957 [Vulners]
Vulners: Score: 6.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- vmware cloud foundation (<5.0)
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, <9.0)
- vmware vrealize suite lifecycle manager (<9.0)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
have more...
CVE-2022-22954 [Vulners]
Vulners: Score: 10.0, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, le8.6)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
- vmware cloud foundation (le4.3.1)
- vmware vrealize suite lifecycle manager (le8.2)
have more...

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 1
IP: 1
Domain: 2
Url: 1
Hash: 2
#ParsedReport
26-04-2022

New Malware of Lazarus Threat Actor Group Exploiting INITECH Process

https://asec.ahnlab.com/en/33801

Actors/Campaigns:
Lazarus (tags: malware)

Threats:
Lazarshell (tags: malware)
Infostealer/win.outlook (tags: malware)
Trojan/win.agent (tags: malware)
Akdoor (tags: malware)
Lazarbinder (tags: malware)
Lazardoor (tags: malware)
Lazarkeyloger (tags: malware)
Lazarloader (tags: malware)
Lazarportscan (tags: malware)
Zvrek (tags: malware)
Trojan/win32.agent (tags: malware)

Industry:
Chemical

Geo:
Korean

IOCs:
File: 8
Hash: 49
Url: 7
Path: 2
IP: 6
#ParsedReport
26-04-2022

ASEC Weekly Malware Statistics (April 18th, 2022 April 24th, 2022)

https://asec.ahnlab.com/en/33798

Threats:
Agent_tesla (tags: malware)
Formbook (tags: malware)
Lokibot_stealer (tags: malware)
Beamwinhttp_loader (tags: malware)
Garbage_cleaner (tags: malware)
Snake_keylogger (tags: malware)

Industry:
Financial, Transport

Geo:
Korea

IOCs:
Domain: 5
IP: 5
Email: 10
File: 33
Url: 16
#ParsedReport
26-04-2022

A "Naver"-ending game of Lazarus APT

https://www.zscaler.com/blogs/security-research/naver-ending-game-lazarus-apt

Actors/Campaigns:
Lazarus (tags: malware, dropper, phishing, dns, ransomware)

Threats:
Aspacked

Industry:
Telco

Geo:
Korea

IOCs:
IP: 4
Hash: 49
Domain: 53
File: 14
Path: 2
Email: 2
CERT-FR THREATS AND INCIDENTS REPORT. The FIN7 cybercriminal group

https://www.cert.ssi.gouv.fr/cti/CERTFR-2022-CTI-003/
#ParsedReport
27-04-2022

Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage

Actors/Campaigns:
Lazarus
Dream_job

Threats:
Log4shell_vuln
Dtrack_rat
Mimikatz
Putty_tool

Industry:
Government, Financial, Aerospace, Energy

Geo:
Korean

CVEs:
CVE-2021-44228 [Vulners]
Vulners: Score: 9.3, CVSS: 4.0,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.3.1, <2.12.2, <2.15.0)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens captial (<2019.1, 2019.1, 2019.1)
- siemens comos (*)
- siemens desigo cc advanced reports (4.0, 4.1, 4.2, 5.0, 5.1)
have more...

IOCs:
File: 9
Hash: 28
Domain: 4
Url: 6

Links:
https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py
https://github.com/3proxy/3proxy
https://github.com/Kevin-Robertson/Invoke-TheHash
#ParsedReport
27-04-2022

Malware analysis report on SparrowDoor malware

https://www.ncsc.gov.uk/report/mar-sparrowdoor

Threats:
Sparrowdoor (tags: backdoor, malware)

IOCs:
File: 3
Domain: 1
Registry: 2
Hash: 2

YARA: Found
SIGMA: Found
#ParsedReport
27-04-2022

Hive0117 Continues Fileless Malware Delivery in Eastern Europe

https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe

Actors/Campaigns:
Hive0117 (tags: keylogger, malware, trojan, phishing, rat, backdoor)

Threats:
Darkwatchman (tags: malware)

Industry:
Telco, Financial, Energy, Logistic, Government

Geo:
German, Ukraine, Lithuania, Estonia, Russia

IOCs:
Domain: 3
File: 4
IP: 2
Email: 1
Url: 1
Hash: 7
Чуть-чуть офтопа.
Вливать в мастер-ветку теперь может только вице-президент.
Интересная история. После оформления договоренности о покупке Twitter'а Маском руководство соцсети запретило внесение любых изменений в код платформы (для внесения нужно согласование на уровне вице-президента), опасаясь саботажа со стороны сотрудников, которым могла не понравиться продажа компании и личность Маска, что могло заставить их внести в код какую-нибудь бяку. Управление безопасной разработкой становится все более модной темой 😊
#ParsedReport
27-04-2022

Targeted attack on Thailand Pass customers delivers AsyncRAT

https://www.zscaler.com/blogs/security-research/targeted-attack-thailand-pass-customers-delivers-asyncrat

Threats:
Asyncrat_rat (tags: phishing, malware, ransomware, spam, trojan)

Industry:
Aerospace

Geo:
Thailand

IOCs:
Domain: 3
Url: 3
File: 23
IP: 1
Hash: 15
#ParsedReport
27-04-2022

Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload

https://www.nozominetworks.com/blog/industroyer2-nozomi-networks-labs-analyzes-the-iec-104-payload

Actors/Campaigns:
Sandworm

Threats:
Crashoverride (tags: rat, ransomware, scan, malware)
Botenago
Incontroller_tool
Log4shell_vuln

Industry:
Iot, Energy

Geo:
Ukraine

IOCs:
File: 6
Path: 1
Hash: 2

YARA: Found
#ParsedReport
27-04-2022

LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility

https://www.sentinelone.com/labs/lockbit-ransomware-side-loads-cobalt-strike-beacon-with-legitimate-vmware-utility

Threats:
Cobalt_strike (tags: malware, scan, ransomware, rat)
Lockbit (tags: malware, scan, ransomware, rat)
Reflectiveloader
Stealbit

IOCs:
File: 4
Path: 6
Url: 3
Hash: 6
IP: 2

YARA: Found