CTT Report Hub
3.13K subscribers
7.53K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
03-05-2022

Analysis of BlackByte Ransomware's Go-Based Variants. Key Points

https://www.zscaler.com/blogs/security-research/analysis-blackbyte-ransomwares-go-based-variants

Threats:
Blackbyte (tags: ransomware, malware, rat)
Revil
Lockbit

Industry:
Ics, Financial

Geo:
Russia, Russian, Ukrainian, Belarusian

TTPs:
Tactics: 1
Technics: 0

IOCs:
Hash: 9
Url: 4
Path: 20
File: 36
Registry: 7
IP: 1

Links:
https://github.com/golang/go/blob/master/src/crypto/des/cipher.go
https://github.com/SpiderLabs/BlackByteDecryptor/blob/main/BlackByteDecryptor/Decryptor.cs
https://github.com/andrivet/ADVobfuscator
https://gist.github.com/api0cradle/d4aaef39db0d845627d819b2b6b30512
#ParsedReport
04-05-2022

A new secret stash for fileless malware

https://securelist.com/a-new-secret-stash-for-fileless-malware/106393

Threats:
Cobalt_strike (tags: malware)
Netspi (tags: malware, trojan)
Blackbone (tags: malware, trojan)
Slingshot
Beacon
Mimikatz

IOCs:
File: 17
Path: 11
Domain: 7
Url: 1
IP: 2
Hash: 29

Links:
https://github.com/silentbreaksec/Throwback
#ParsedReport
04-05-2022

Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive

https://www.cybereason.com/blog/operation-cuckoobees-a-winnti-malware-arsenal-deep-dive

Actors/Campaigns:
Axiom (tags: rootkit, rat, backdoor, proxy, malware)

Threats:
Deploylog (tags: rootkit, rat, malware)
Spyder (tags: malware)
Privatelog (tags: rootkit)
Winnkit (tags: rootkit, rat, malware)
Stashlog (tags: malware)
Sparklog
Lolbin
Cryptopp_tool

Industry:
Government

Geo:
Chinese

TTPs:
Tactics: 4
Technics: 0

IOCs:
File: 18
Path: 32
Registry: 1
Hash: 14

Links:
https://github.com/securycore/Ikeext-Privesc
#ParsedReport
04-05-2022

Attacking Emotets Control Flow Flattening

https://news.sophos.com/en-us/2022/05/04/attacking-emotets-control-flow-flattening

Actors/Campaigns:
Stone_panda

Threats:
Emotet (tags: spam, botnet, malware)
Stantinko

IOCs:
Hash: 2

Links:
https://github.com/obfuscator-llvm/obfuscator/wiki
https://github.com/eset/stadeo
https://github.com/sophoslabs/emotet\_unflatten\_poc
#ParsedReport
04-05-2022

Old Services, New Tricks: Cloud Metadata Abuse by UNC2903

https://www.mandiant.com/resources/cloud-metadata-abuse-unc2903

Actors/Campaigns:
Unc2903 (tags: scan, rat, malware, proxy, vpn)

Industry:
Financial

CVEs:
CVE-2021-21311 [Vulners]
Vulners: Score: 6.4, CVSS: 4.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 5.3
X-Force: Patch: Official fix
Soft:
- adminer (<4.7.9)
- debian debian linux (9.0)

CVE-2019-0211 [Vulners]
Vulners: Score: 7.2, CVSS: 3.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.2
X-Force: Patch: Official fix
Soft:
- apache http server (le2.4.38)
- fedoraproject fedora (29, 30)
- canonical ubuntu linux (16.04, 18.04, 18.10, 14.04)
- debian debian linux (9.0)
- opensuse leap (42.3, 15.0)
have more...

TTPs:
Tactics: 5
Technics: 6

IOCs:
IP: 5
Url: 3
File: 3
Coin: 3
Hash: 1

Links:
https://github.com/duo-labs/cloudmapper
https://github.com/latacora/remediate-AWS-IMDSv1
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6
https://github.com/salesforce/metabadger
https://github.com/prowler-cloud/prowler/blob/master/checks/check\_extra786
#ParsedReport
05-05-2022

NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service. Attack overview

https://www.trendmicro.com/en_us/research/22/e/netdooka-framework-distributed-via-privateloader-ppi.html

Threats:
Netdooka (tags: botnet, backdoor, trojan, malware, dropper, rat, ddos)
Privateloader (tags: botnet, backdoor, trojan, malware, dropper, rat, ddos)
Smokeloader_backdoor (tags: malware)
Redline_stealer (tags: malware)
Anubis (tags: malware)
Viper_rat
Trojan.win32.stop.el
Trojan.win64.protdrive.a
Trojan.win32.vindor.a

IOCs:
File: 4
Path: 3
IP: 3
Hash: 38
Url: 5

Links:
https://github.com/microsoft/Windows-driver-samples/tree/master/general/obcallback
https://github.com/SweetIceLolly/Prevent\_File\_Deletion
#ParsedReport
05-05-2022

Top Cyber Threats to the Telecom Industry

https://www.intezer.com/blog/incident-response/cyber-threats-telecom-industry

Actors/Campaigns:
Lightbasin
Lapsus
Evil_corp

Threats:
Macaw
Cobalt_strike
Beacon
Vermilion

Industry:
Telco, Iot, Aerospace, Media

Geo:
Russian, Iranian, Polish
#ParsedReport
05-05-2022

Mustang Panda deploys a new wave of malware targeting Europe

http://blog.talosintelligence.com/2022/05/mustang-panda-targets-europe.html

Actors/Campaigns:
Red_delta (tags: trojan, rat, phishing, malware)

Threats:
Meterpreter_tool (tags: rat, malware)
Plugx_rat (tags: rat, malware)
Cobalt_strike
Bespoke (tags: rat, malware)
Lolbas_technique

Industry:
Telco, Government, Ngo

Geo:
Russia, Mongolia, Afghan, Japanese, Ukraine, Asia, Tibet, Japan, Taiwan, Ukrainian, Belarus, Myanmar, Greece, Indian, American, Asian

IOCs:
File: 14
IP: 28
Path: 5
Registry: 1
Hash: 114
Domain: 1
Url: 44
#ParsedReport
05-05-2022

"Excuse me, how will the conflict between Russia and Ukraine affect the situation on the peninsula?" Analysis of the recent targeted attack activities of APT organization Kimsuky

https://blog-nsfocus-net.translate.goog/apt-kimsuky-3/?_x_tr_sch=http&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp

Actors/Campaigns:
Kimsuky (tags: trojan, phishing, malware)

Geo:
Ukraine, Korea, Russia

IOCs:
File: 27
Url: 7
Path: 1
#ParsedReport
05-05-2022

North Koreas Lazarus: their initial access trade-craft using social media and social engineering. tl;dr

https://research.nccgroup.com/2022/05/05/north-koreas-lazarus-and-their-initial-access-trade-craft-using-social-media-and-social-engineering

Actors/Campaigns:
Lazarus (tags: malware, vpn, phishing)

Threats:
Lcpdot (tags: vpn, malware)

Industry:
Government

Geo:
Koreas

TTPs:
Tactics: 1
Technics: 4

IOCs:
Domain: 6
Path: 2
File: 3
IP: 1
Hash: 6
#ParsedReport
05-05-2022

Nigerian Tesla: 419 scammer gone malware distributor unmasked

https://blog.malwarebytes.com/threat-intelligence/2022/05/nigerian-tesla-419-scammer-gone-malware-distributor-unmasked

Threats:
Agent_tesla (tags: phishing, ransomware, malware, spam, stealer, scam, dns, vpn)
Avemaria_rat
Netwire_rat
4shared
Cassandraprotector_tool

Geo:
Nigeria, Nigerian, Ukraine, Ukrainian

IOCs:
File: 2
Email: 25
Domain: 1
#ParsedReport
05-05-2022

Cybercrime loves company: Conti cooperated with other ransomware gangs

https://intel471.com/blog/conti-ransomware-cooperation-maze-lockbit-ragnar-locker

Threats:
Conti (tags: ransomware, malware)
Ryuk (tags: ransomware)
Maze (tags: ransomware)
Lockbit (tags: ransomware)
Ragnarlocker (tags: ransomware)
Emotet (tags: ransomware)
Trickbot

Geo:
Russian
#ParsedReport
05-05-2022

Shells blooming in Spring

https://labs.k7computing.com/index.php/shells-blooming-in-spring

Threats:
Spring4shell (tags: rat)
Log4shell_vuln (tags: rat)
Mirai
Emotet

CVEs:
CVE-2022-22965 [Vulners]
Vulners: Score: 7.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- vmware spring framework (<5.2.20, <5.3.18)
- cisco cx cloud agent (<2.1.0)
- oracle communications cloud native core automated test suite (1.9.0, 22.1.0)
- oracle communications cloud native core console (1.9.0, 22.1.0)
- oracle communications cloud native core network exposure function (22.1.0)
have more...
CVE-2022-22695 [Vulners]
CVE-2022-22963 [Vulners]
Vulners: Score: 7.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- vmware spring cloud function (le3.1.6, le3.2.2)


IOCs:
File: 8
Hash: 1

Links:
https://github.com/dinosn/CVE-2022-22963
https://github.com/lunasec-io/Spring4Shell-POC
https://github.com/reznok/Spring4Shell-POC