CTT Report Hub
3.13K subscribers
7.53K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
23-05-2022

Sandworm uses a new version of ArguePatch to attack targets in Ukraine

https://www.welivesecurity.com/2022/05/20/sandworm-ukraine-new-version-arguepatch-malware-loader

Actors/Campaigns:
Sandworm (tags: ransomware, malware)

Threats:
Arguepatch_loader (tags: ransomware, malware)
Crashoverride
Killdisk
Hermeticwiper
Hermeticwizard
Partyticket
Isaacwiper

Industry:
Energy

Geo:
Ukraine

IOCs:
File: 1
Hash: 1
#ParsedReport
23-05-2022

Spoofed Saudi Purchase Order Drops GuLoader: Part 1

https://www.fortinet.com/blog/threat-research/spoofed-saudi-purchase-order-drops-guloader

Threats:
Cloudeye (tags: spam, ransomware, rat, phishing, malware)
Chaos
Agent_tesla
Formbook
Lokibot_stealer

Industry:
Energy, Petroleum

Geo:
Russia, Arabia, Saudi, Ukraine

IOCs:
Email: 1
Domain: 1
File: 1
Hash: 3

Links:
https://github.com/myfreeer/7z-build-nsis
#ParsedReport
24-05-2022

TURLAs new phishing-based reconnaissancecampaignin Eastern Europe. TURLAs new phishing-based reconnaissance campaign in Eastern Europe

https://blog.sekoia.io/turla-new-phishing-campaign-eastern-europe

Actors/Campaigns:
Curious_gorge
Fancy_bear
Coldriver
Ghostwriter
Turla
Molerats

Threats:
Turla (tags: phishing, malware)
Uroburos
Maze

Industry:
Government, Petroleum, Education

Geo:
Russia, Latvia, Usa, Chinese, Austria, Lithuania, Russian, Ukraine, Chinas, Estonia

TTPs:

IOCs:
Domain: 3
File: 4
IP: 3
Url: 1
Hash: 2

YARA: Found
#ParsedReport
23-05-2022

Metastealer filling the Racoon void. tl;dr

https://research.nccgroup.com/2022/05/20/metastealer-filling-the-racoon-void

Threats:
Meta_stealer (tags: stealer, keylogger, spam, malware)
Raccoon_stealer (tags: stealer, keylogger, spam, malware)
Hiddenvnc_tool

Industry:
E-commerce

Geo:
Israeli

TTPs:
Tactics: 2
Technics: 0

IOCs:
IP: 1
File: 5
Path: 3

YARA: Found

Links:
https://github.com/yhirose/cpp-httplib
https://github.com/Ybalrid/kissnet
https://github.com/nlohmann/json
#ParsedReport
23-05-2022

Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof of Concept to Deliver Cobalt-Strike Beacon

https://blog.cyble.com/2022/05/20/malware-campaign-targets-infosec-community-threat-actor-uses-fake-proof-of-concept-to-deliver-cobalt-strike-beacon

Threats:
Cobalt_strike (tags: phishing, malware, rat)
Beacon (tags: phishing, rat, malware)
Confuserex_tool

CVEs:
CVE-2022-1388 [Vulners]
Vulners: Score: 7.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- f5 big-ip access policy manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip advanced firewall manager (le11.6.5, le12.1.6, <15.1.5.1, <14.1.4.6, <13.1.5, <16.1.2.2)
- f5 big-ip analytics (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip application acceleration manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
- f5 big-ip application security manager (le11.6.5, le12.1.6, <16.1.2.2, <15.1.5.1, <14.1.4.6, <13.1.5)
have more...
CVE-2022-26809 [Vulners]
Vulners: Score: 10.0, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...
CVE-2022-24500 [Vulners]
Vulners: Score: 6.8, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- microsoft windows 10 (-, 20h2, 21h1, 21h2, 1607, 1809, 1909)
- microsoft windows 11 (-, -)
- microsoft windows 7 (-)
- microsoft windows 8.1 (-)
- microsoft windows rt 8.1 (-)
have more...

TTPs:
Tactics: 3
Technics: 3

IOCs:
File: 1
IP: 2
Hash: 2
#ParsedReport
24-05-2022

Malware Analysis: Trickbot

https://thehackernews.com/2022/05/malware-analysis-trickbot.html

Actors/Campaigns:
Wizard_spider
Shathak

Threats:
Trickbot (tags: phishing, scan, ransomware, trojan, malware)
Cobalt_strike (tags: malware)
Ryuk (tags: malware)
Conti (tags: malware)
Comrade_circle
Bazarbackdoor

Industry:
Financial

TTPs:
Tactics: 3
Technics: 0

IOCs:
File: 5
Hash: 1
IP: 2
#ParsedReport
24-05-2022

Yashma Ransomware, Tracing the Chaos Family Tree

https://blogs.blackberry.com/en/2022/05/yashma-ransomware-tracing-the-chaos-family-tree

Actors/Campaigns:
Wizard_spider

Threats:
Yashma (tags: malware, ransomware, rat)
Chaos (tags: malware, ransomware, rat)
Onyx (tags: malware, ransomware)
Ryuk (tags: ransomware)

Industry:
Healthcare, Financial

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 3
Path: 1
Hash: 14

YARA: Found
#ParsedReport
24-05-2022

New Nokoyawa Variant Catching Up to Peers with Blatant Code Reuse

https://www.fortinet.com/blog/threat-research/nokoyawa-variant-catching-up

Actors/Campaigns:
Keksec

Threats:
Nokoyawa (tags: cryptomining, malware, botnet, phishing, ddos, ransomware)
Chaos
Pandora
Enemybot
Karma (tags: ransomware)
Nemty
Babuk (tags: ransomware)
Filecoder

Industry:
Financial

Geo:
Russia

IOCs:
File: 33
Hash: 2
#ParsedReport
25-05-2022

Method that Tricks Users to Perceive Attachment of PDF File as Safe File

https://asec.ahnlab.com/en/34707

Threats:
Formbook
Lokibot_stealer
Trojan/win.nsisinject.r491618
Trojan/win.nsisinject.r487995
Trojan/win.generic.r481309

Geo:
Korean

CVEs:
CVE-2018-0798 [Vulners]
Vulners: Score: 9.3, CVSS: 9.3,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft office (2010, 2016, 2016, 2007, 2013)
- microsoft word (2013, 2016, 2007, 2010, 2013)
- microsoft office compatibility pack (-)

CVE-2017-0199 [Vulners]
Vulners: Score: 9.3, CVSS: 9.6,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, *)
- microsoft windows server 2012 (-)
- microsoft windows vista (*)
- microsoft office (2010, 2013, 2016, 2007)
- microsoft windows 7 (*)
have more...

IOCs:
File: 7
Url: 6
Hash: 9
#ParsedReport
25-05-2022

Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

https://www.crowdstrike.com/blog/how-to-hunt-for-decisivearchitect-and-justforfun-implant

Actors/Campaigns:
Lightbasin

Threats:
Red_menshen (tags: malware, rat)
Bpfdoor (tags: malware, rat)
Sysvinit_tool
Mimikatz
Psexec_tool

Industry:
Logistic, Telco

CVEs:
CVE-2019-3010 [Vulners]
Vulners: Score: 4.6, CVSS: 5.2,
Vulners: Exploitation: Unknown
X-Force: Risk: 8.8
X-Force: Patch: Official fix
Soft:
- oracle solaris (11)


TTPs:
Tactics: 1
Technics: 0

IOCs:
Url: 1
Path: 1
#ParsedReport
25-05-2022

Blame the Messenger: 3 Types of Dropper Malware in Microsoft Office & How to Detect Them

https://www.deepinstinct.com/blog/types-of-dropper-malware-in-microsoft-office

Actors/Campaigns:
Aggaa (tags: malware)

Threats:
Emotet (tags: malware, dropper)
Revenge_rat (tags: malware)
Dridex (tags: dropper)

IOCs:
Url: 1
Path: 1
File: 2
Hash: 7

Links:
https://github.com/deepinstinct/Exceller
https://github.com/DidierStevens/DidierStevensSuite/blob/master/oledump.py
#ParsedReport
25-05-2022

How the Saitama backdoor uses DNS tunnelling

https://blog.malwarebytes.com/threat-intelligence/2022/05/how-the-saitama-backdoor-uses-dns-tunnelling

Actors/Campaigns:
Oilrig (tags: backdoor)

Threats:
Dnstunnelling_technique (tags: malware, backdoor, dns)
Saitama (tags: malware, backdoor, dns)

Industry:
Government

Geo:
Jordan, Iranian

IOCs:
IP: 1
File: 1
Hash: 2
#ParsedReport
25-05-2022

Attacker Caught Hijacking Packages Using Multiple Techniques to Steal AWS Credentials. What Happened?

https://checkmarx.com/blog/attacker-caught-hijacking-packages-using-multiple-techniques-to-steal-aws-credentials

IOCs:
Domain: 1

Links:
https://github.com/optimistdigital
https://github.com/checkmarx/chainjacking
https://github.com/hautelook/phpass
https://github.com/optimistdigital/nova-tailwind
https://github.com/bordoni/phpass
https://github.com/hautelook
https://github.com/outl1ne/nova-tailwind
https://github.com/hautelook/phpass/commit/3119474dbd111f4f489e34cc72a9f95fc991858a
#ParsedReport
25-05-2022

ChromeLoader: a pushy malvertiser

https://redcanary.com/blog/chromeloader

Threats:
Gootloader
Kerberoasting_technique
Raspberry_robin
Chromeloader

Industry:
Media

TTPs:
Tactics: 2
Technics: 0

IOCs:
File: 7
Path: 1
#ParsedReport
25-05-2022

ERMAC Back In Action. Latest Version of Android Banking Trojan Targets over 400 Applications

https://blog.cyble.com/2022/05/25/ermac-back-in-action

Threats:
Ermac (tags: trojan, malware, botnet, phishing)
Cerberus

Industry:
Financial

Geo:
Polish, Poland

TTPs:
Tactics: 6
Technics: 2

IOCs:
File: 2
Url: 5
Hash: 2
#ParsedReport
25-05-2022

Unknown APT group has targeted Russia repeatedly since Ukraine invasion

https://blog.malwarebytes.com/malwarebytes-news/2022/05/unknown-apt-group-has-targeted-russia-repeatedly-since-ukraine-invasion

Actors/Campaigns:
Shell_crew
Pirate_panda
Lazarus

Threats:
Log4shell_vuln (tags: phishing, malware)
Sakula_rat
Trickbot
Bazarbackdoor

Industry:
Media, Telco, Government

Geo:
Saudi, Russian, Ukraine, Chinese, Russia

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 9
Path: 2
Domain: 4
IP: 5
Hash: 48

Links:
https://github.com/wolfSSL/wolfssl
https://github.com/wolfSSL/wolfssl/blob/c9ae021427fd21f1a91e4020bf50bb3573c15abe/src/x509.c#L4539
https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/net/lib/http/http\_parser.c
https://github.com/obfuscator-llvm/obfuscator
https://github.com/obfuscator-llvm/obfuscator/wiki/Bogus-Control-Flow