CTT Report Hub
3.13K subscribers
7.53K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
19-05-2022

Phishing Campaign Delivering Three Fileless Malware: AveMariaRAT / BitRAT / PandoraHVNC Part I

https://www.fortinet.com/blog/threat-research/phishing-campaign-delivering-fileless-malware

Actors/Campaigns:
Keksec (tags: malware, phishing)

Threats:
Avemaria_rat (tags: ransomware, spam, malware, phishing, rat, ddos, proxy, botnet)
Sbit_rat (tags: ransomware, spam, malware, phishing, rat, ddos, proxy, botnet)
Pandorahvnc (tags: spam, botnet, malware, phishing, rat, ddos, proxy, ransomware)
Emotet (tags: malware, phishing)
Enemybot (tags: malware, phishing)
Vba/agent.ddon!tr (tags: malware)

Industry:
Financial

IOCs:
File: 17
Url: 5
Path: 2
Hash: 3
#ParsedReport
19-05-2022

The BlackByte ransomware group is striking users all over the globe

http://blog.talosintelligence.com/2022/05/the-blackbyte-ransomware-group-is.html

Threats:
Blackbyte (tags: vpn, phishing, malware, ransomware)
Lolbin
Anydesk_tool
Proxyshell_vuln
Psexec_tool

Industry:
Financial

Geo:
Mexico, Netherlands, America, China, Colombia, Vietnam

IOCs:
File: 5
Path: 1

Links:
https://github.com/Neo23x0/Raccine
#ParsedReport
19-05-2022

Chaos Ransomware Variant Sides with Russia

https://www.fortinet.com/blog/threat-research/chaos-ransomware-variant-sides-with-russia

Threats:
Chaos (tags: phishing, ransomware, malware)
Conti (tags: ransomware)
Lockbit (tags: ransomware)
Filecoder

Industry:
Financial

Geo:
Russia, Japanese, Ukraine

TTPs:
Tactics: 5
Technics: 6

IOCs:
File: 1
Hash: 1
#ParsedReport
19-05-2022

New SYK Crypter Distributed Via Discord

https://blog.morphisec.com/syk-crypter-discord

Threats:
Babadeda (tags: ransomware)
Dnetloader (tags: rat, ransomware, malware, stealer)
Asyncrat_rat (tags: ransomware)
Njrat_rat (tags: ransomware)
Quasar_rat (tags: ransomware)
Avemaria_rat (tags: ransomware)
Nanocore_rat (tags: ransomware)
Redline_stealer (tags: ransomware)
Agent_tesla

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 6
Url: 26
Domain: 17
IP: 2
Path: 5
Hash: 47
#ParsedReport
20-05-2022

Why Remediation Alone Is Not Enough When Infected by Malware

https://asec.ahnlab.com/en/34549

Actors/Campaigns:
Darkside (tags: malware)

Threats:
Cobalt_strike (tags: malware)
Runminer
Reverserdp_technique
Dropper/win.agent
Dropper/win32.agent
Nbtscan_tool
Malware/win64.generic
Win_loader

Geo:
Korean

CVEs:
CVE-2017-10271 [Vulners]
Vulners: Score: 5.0, CVSS: 4.9,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- oracle weblogic server (10.3.6.0.0, 12.2.1.1.0, 12.1.3.0.0, 12.2.1.2.0)


IOCs:
IP: 6
File: 4
Hash: 21
#ParsedReport
20-05-2022

Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies

https://unit42.paloaltonetworks.com/excel-add-ins-dridex-infection-chain

Threats:
Dridex (tags: malware, rat, dropper)
Agent_tesla
Atomic_bombing_technique

Geo:
Japan, Apac, Emea, America

IOCs:
File: 2
Hash: 6338
Url: 1496
IP: 4

Links:
https://github.com/pan-unit42/iocs/blob/master/Dridex%20Infection%20Chain%20Case%20Studies
#ParsedReport
20-05-2022

PDF Malware Is Not Yet Dead

https://threatresearch.ext.hp.com/pdf-malware-is-not-yet-dead

Threats:
Snake_keylogger

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 8.3,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
File: 3
Hash: 6
Url: 3
Domain: 1

Links:
https://github.com/decalage2/oletools/wiki/oleid
https://github.com/decalage2/oletools/wiki/rtfobj
#ParsedReport
20-05-2022

Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022

https://www.crowdstrike.com/blog/linux-mirai-malware-double-on-stronger-chips

Threats:
Mirai (tags: rat, malware, proxy, botnet, ddos)
Log4shell_vuln
Satori
Mozi
Bashlite
Xorddos

Industry:
Iot

IOCs:
Hash: 10
#ParsedReport
23-05-2022

A peek behind the BPFDoor

https://elastic.github.io/security-research/intelligence/2022/05/04.bpfdoor/article

Threats:
Bpfdoor (tags: rat, malware, vpn, scan, backdoor)
Bvp47

Industry:
Logistic, Iot, Telco, Ics, Government, Education

Geo:
Myanmar, India, Korea, Turkey, Taiwan, Asia, Vietnam, China

TTPs:
Tactics: 3
Technics: 0

IOCs:
Hash: 15

YARA: Found

Links:
https://github.com/elastic/detection-rules/blob/main/rules/linux/execution\_process\_started\_in\_shared\_memory\_directory.toml
https://github.com/rhysre
https://github.com/elastic/detection-rules/blob/main/rules/linux/execution\_abnormal\_process\_id\_file\_created.toml
https://github.com/DefSecSentinel
https://github.com/jtnk
https://github.com/tabell
#ParsedReport
23-05-2022

ASEC Weekly Malware Statistics (May 9th, 2022 May 15th, 2022)

https://asec.ahnlab.com/en/34624

Threats:
Agent_tesla (tags: malware)
Formbook (tags: malware)
Lokibot_stealer (tags: malware)
Avemaria_rat (tags: malware)
Redline_stealer (tags: malware)
Beamwinhttp_loader (tags: malware)

Industry:
Financial, Transport

Geo:
Korea

IOCs:
Domain: 4
IP: 8
Email: 6
File: 27
Url: 18
#ParsedReport
23-05-2022

Sandworm uses a new version of ArguePatch to attack targets in Ukraine

https://www.welivesecurity.com/2022/05/20/sandworm-ukraine-new-version-arguepatch-malware-loader

Actors/Campaigns:
Sandworm (tags: ransomware, malware)

Threats:
Arguepatch_loader (tags: ransomware, malware)
Crashoverride
Killdisk
Hermeticwiper
Hermeticwizard
Partyticket
Isaacwiper

Industry:
Energy

Geo:
Ukraine

IOCs:
File: 1
Hash: 1
#ParsedReport
23-05-2022

Spoofed Saudi Purchase Order Drops GuLoader: Part 1

https://www.fortinet.com/blog/threat-research/spoofed-saudi-purchase-order-drops-guloader

Threats:
Cloudeye (tags: spam, ransomware, rat, phishing, malware)
Chaos
Agent_tesla
Formbook
Lokibot_stealer

Industry:
Energy, Petroleum

Geo:
Russia, Arabia, Saudi, Ukraine

IOCs:
Email: 1
Domain: 1
File: 1
Hash: 3

Links:
https://github.com/myfreeer/7z-build-nsis
#ParsedReport
24-05-2022

TURLAs new phishing-based reconnaissancecampaignin Eastern Europe. TURLAs new phishing-based reconnaissance campaign in Eastern Europe

https://blog.sekoia.io/turla-new-phishing-campaign-eastern-europe

Actors/Campaigns:
Curious_gorge
Fancy_bear
Coldriver
Ghostwriter
Turla
Molerats

Threats:
Turla (tags: phishing, malware)
Uroburos
Maze

Industry:
Government, Petroleum, Education

Geo:
Russia, Latvia, Usa, Chinese, Austria, Lithuania, Russian, Ukraine, Chinas, Estonia

TTPs:

IOCs:
Domain: 3
File: 4
IP: 3
Url: 1
Hash: 2

YARA: Found
#ParsedReport
23-05-2022

Metastealer filling the Racoon void. tl;dr

https://research.nccgroup.com/2022/05/20/metastealer-filling-the-racoon-void

Threats:
Meta_stealer (tags: stealer, keylogger, spam, malware)
Raccoon_stealer (tags: stealer, keylogger, spam, malware)
Hiddenvnc_tool

Industry:
E-commerce

Geo:
Israeli

TTPs:
Tactics: 2
Technics: 0

IOCs:
IP: 1
File: 5
Path: 3

YARA: Found

Links:
https://github.com/yhirose/cpp-httplib
https://github.com/Ybalrid/kissnet
https://github.com/nlohmann/json
#ParsedReport
23-05-2022

Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof of Concept to Deliver Cobalt-Strike Beacon

https://blog.cyble.com/2022/05/20/malware-campaign-targets-infosec-community-threat-actor-uses-fake-proof-of-concept-to-deliver-cobalt-strike-beacon

Threats:
Cobalt_strike (tags: phishing, malware, rat)
Beacon (tags: phishing, rat, malware)
Confuserex_tool

CVEs:
CVE-2022-1388 [Vulners]
Vulners: Score: 7.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- f5 big-ip access policy manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip advanced firewall manager (le11.6.5, le12.1.6, <15.1.5.1, <14.1.4.6, <13.1.5, <16.1.2.2)
- f5 big-ip analytics (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip application acceleration manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip application security manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
have more...
CVE-2022-26809 [Vulners]
Vulners: Score: 10.0, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...
CVE-2022-24500 [Vulners]
Vulners: Score: 6.8, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...

TTPs:
Tactics: 3
Technics: 3

IOCs:
File: 1
IP: 2
Hash: 2