Quantcast
Channel: Cisco Talos Blog
Viewing all 1925 articles
Browse latest View live

Registration for the 2019 Talos Threat Research Summit is now open

$
0
0

The Talos Threat Research Summit is officially back.

Registration is open now for the second year of our conference by defenders, for defenders. Tickets sold out quickly last year for our inaugural event, so act quickly.

This year’s Research Summit will take place on June 9 in San Diego, Calif. — the same day Cisco Live kicks off. A pass to the Talos Threat Research Summit will not provide you access to the rest of Cisco Live.

This summit is designed to assist you in keeping your users and network safer. Our roster of experienced speakers will share their deep expertise in network defense, tracking the bad guys and identifying trends in the threat landscape. The exact speaker list will be released on the registration site in the near future. The goal of the summit is that you will leave with up-to-date, actionable intel you can take back to your network and use immediately.  There are also opportunities for networking with your defense-focused peers and security leaders.

Here’s what you can expect:

  • A one-day program featuring a curated agenda
  • Insights from industry leaders
  • Peer networking opportunities
  • Discussion focused on defender and defense strategies and tactics

Registration information:

The Talos Threat Research Summit is an add-on to Cisco Live registration, but can also be purchased without a full Cisco Live registration. If you have already registered for Cisco Live, you can add the Talos Threat Summit for $199. You may also register for the Summit without a Cisco Live registration for the same price. All options will be displayed to you during the registration process.






Threat Source (April 4)

$
0
0

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit— our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos


Location: Salt Lake City, Utah
Date: April 25
Speaker: Nick Biasini
Synopsis: Join Nick Biasini as he takes part in a day-long education event on all things Cisco. Nick will be specifically highlighting the work that Talos does as one part of the many breakout sessions offered at Cisco Connect. This session will cover a brief overview of what Talos does and how we operate. Additionally, he'll discuss the threats that are top-of-mind for our researchers and the trends that you, as defenders, should be most concerned about.  

Cyber Security Week in Review

  • Some Facebook users are being prompted to enter their email accounts’ password when signing up. Facebook says it will stop the practice, and reiterated that it never stored those passwords on any servers.
  • Facebook CEO Mark Zuckerberg last week pushed for the U.S. to adopt stronger internet privacy and election laws. Zuckerberg proposed in an interview that the federal government create an independent body that would set definitions for what terrorist content and hate speech are and should, therefore, be banned online.
  • Google’s latest security bulletin warns of three critical vulnerabilities in the Android operating system. These bugs could allow an attacker to remotely take over a device by tricking the user into opening a malicious file.
  • Australia and Singapore introduced new laws that impose harsh punishments on websites that do not remove violent content quickly. The countries hope to reduce the amount of pro-terrorist content circulating online. 
  • The parent company behind Planet Hollywood and Buca di Beppo says more than 2 million customers had their credit card information stolen. The restaurants say a credit card skimming malware existed on their point-of-sale system for months. 
  • Bayer, one of the largest chemicals companies in the world, says it suffered a cyber attack, but no data was taken. The German company said an APT spied on its networks for months, but it so far has not discovered any “data outflow.”
  • Two third-party app developers may have publicly exposed more than 2 million Facebook users’ personal records. Security researchers say they discovered the two data sets on exposed Amazon Web Services S3 servers.
  • A major cryptocurrency exchange in South Korea says it lost millions of dollars worth of currencies in a heist. Bithumb says it believes the attack was carried out by a group of insiders.
  • Cisco says two patches released earlier this year for its routers do not work properly. The company says its seen live attacks on the RV320 and RV325 routers and are working on a new fix.

Notable recent security issues

Description: Microsoft recently discovered a serious vulnerability in Huawei’s PCManager that could allow attackers to alter the Windows 10 kernel in Huawei’s line of MateBook machines. The Chinese tech company patched the bug in January, but it was just disclosed last week. An attacker could exploit this vulnerability by tricking the user into running a malicious application.
Snort SIDs:49628 - 49632

Description: Cisco released a slew of patches last week to fix 24 vulnerabilities in its IOS operating system. The company also warned customers that two routers in its RV line are open to attack, and no fix is available as of yet. Fifteen of the bugs exist on IOS XE, which runs on Cisco networking gear such as switches, routers and controllers.

Most prevalent malware files this week

MD5: a7608ce0baea081df610eb9accb4400e
Typical Filename: 
emotet_e1_d98edcaf8acdd135b38ad5d6ce503e59868555f5acb6aaa95017ec758a6603ac_2019-03-26__175503.exe_
Claimed Product: Advanced PDF Converter
Detection Name: W32.d98edcaf8a.Malspam.MRT.Talos

MD5: 97911a1da380f874393cf15982c6b1b9
Typical Filename: spoolsv.exe
Claimed Product: Microsoft® Windows® Operating System
Detection Name: W32.GenericKD:Trojan.22co.1201

MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

MD5: 4cf6cc9fafde5d516be35f73615d3f00
Typical Filename: max.exe
Claimed Product: 易语言程序
Detection Name: Win.Dropper.Armadillo::1201

MD5: b89b37a90d0a080c34bbba0d53bd66df
Typical Filename: u.exe
Claimed Product: Orgs ps
Detection Name: W32.GenericKD:Trojangen.22ek.1201

Top spams stats for this week

Top 5 spam subjects observed
  • "Microsoft account team"
  • "Award Information."
  • "3-D Secure"
  • "Re: Action Required: You failed our monthly validity check."
  • "ATTENTION: FUND BENEFICIARY 191.98.183.155"
Top 5 most used ASNs for sending spam
  • 8075 Microsoft Corporation
  • 20792 VISTEC Internet Service GmbH
  • 15169 Google LLC
  • 1832 Southern Methodist University
  • 46664 VolumeDrive

Hiding in Plain Sight

$
0
0

This blog was written by Jon Munshaw and Jaeson Schultz.

Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam. This often means pursuing cybercriminals wherever they congregate. However, instead of wheeling-and-dealing using hidden servers on some mysterious dark web address, a surprisingly large number of cyber scofflaws prefer to operate right out in the open using social media. For example, Facebook is host to dozens of groups that serve as online marketplaces and exchanges for cybercriminals. Talos saw spam from services advertised in these Facebook groups show up in our own telemetry data, indicating a potential impact to Cisco customers from these groups.

Over the past several months, Cisco Talos has tracked several groups on Facebook where shady (at best) and illegal (at worst) activities frequently take place. The majority of these groups use fairly obvious group names, including "Spam Professional," "Spammer & Hacker Professional," "Buy Cvv On THIS SHOP PAYMENT BY BTC 💰💵," and "Facebook hack (Phishing)." Despite the fairly obvious names, some of these groups have managed to remain on Facebook for up to eight years, and in the process acquire tens of thousands of group members.

In all, Talos has compiled a list of 74 groups on Facebook whose members promised to carry out an array of questionable cyber dirty deeds, including the selling and trading of stolen bank/credit card information, the theft and sale of account credentials from a variety of sites, and email spamming tools and services. In total, these groups had approximately 385,000 members.

These Facebook groups are quite easy to locate for anyone possessing a Facebook account. A simple search for groups containing keywords such as "spam," "carding," or "CVV" will typically return multiple results. Of course, once one or more of these groups has been joined, Facebook's own algorithms will often suggest similar groups, making new criminal hangouts even easier to find. Facebook seems to rely on users to report these groups for illegal and illicit activities to curb any abuse.

Talos initially attempted to take down these groups individually through Facebook's abuse reporting functionality. While some groups were removed immediately, other groups only had specific posts removed. Eventually, through contact with Facebook's security team, the majority of malicious groups was quickly taken down, however new groups continue to pop up, and some are still active as of the date of publishing. Talos continues to cooperate with Facebook to identify and take down as many of these groups as possible.

This is not a new problem for Facebook. In April 2018, security reporter Brian Krebs alerted the social media site to dozens of Facebook groups wherein hackers routinely offered a variety of services including carding (the theft of credit card information), wire fraud, tax refund fraud and distributed denial-of-service (DDoS) attacks. Months later, though the specific groups identified by Krebs had been permanently disabled, Talos discovered a new set of groups, some having names remarkably similar, if not identical, to the groups reported on by Krebs.

Inside the online criminal flea market


Many of the activities on these pages are outright illegal. For example, we discovered several posts where users were selling credit card numbers and their accompanying CVVs, sometimes with identification documents or photos belonging to the victims.
Others products and services were also promoted. We saw spammers offering access to large email lists, criminals offering assistance moving large amounts of cash, and sales of shell accounts at various organizations, including government.
We even saw users offering the ability to forge/edit identification documents.
The majority of the time, these sellers asked for payment in the form of cryptocurrencies. Others employ the use of so-called "middlemen" who act as a go-between between the buyer and the seller of the information and take a cut of the profits. These users usually promoted the use of PayPal accounts to complete the transaction.

It's unclear based on these groups how successful or legitimate some of the users are. There are often complaints posted by group members who have been scammed by other group members. In most groups, there is a particular etiquette and form to the posts. Typically sellers will describe what they have versus what they want. Almost all transactions are "you first" (written as "U_f," "uf," etc.), meaning the person interested in making the purchase or trade has to pay or provide their service or product up front. Like many other Facebook groups, these scammer groups also exist as a forum for scammers to share jokes about some of their less successful campaigns.

Scammers in the wild


One thing is certain, even though some group members only seem to be out to scam other members, others are out in the wild committing crimes that show up in Talos' data. For example, below is a post from one of the Facebook groups that Talos was monitoring. In the post, the spammer is advertising spamming services, promising to land their Apple-themed phish into the inbox folder at Hotmail and Yahoo. They helpfully included a screenshot demonstrating the spam they received into their inbox.
Talos was able to locate examples of this same phish in our telemetry data. Based on the email samples Talos recovered for analysis, the attackers had attached a PDF file that claimed to be an invoice for a purchase at Apple. The PDF included links to view or cancel your order.
An analysis inside the ThreatGrid malware sandbox indicates that when the user selects to either view or cancel the order, the link directs the victim to a phishing website that was located at a recently registered domain: appleid[.]apple.com.verifysecureinfomanage.info. The phishing website itself was created using "16Shop," an infamous phishing kit that is known to target Apple users.
Cisco Umbrella's Investigate indicates that the IP address used to host the phishing domain is also home to many other suspicious-looking domain names that have likely been used for similar scams in the past.
This is not the only example in our data that we found regarding this type of illicit activity that was followed by posts in Facebook groups selling the same tools, techniques or services used by the scammer. Some group members do indeed "walk the walk" when it comes to perpetrating these sorts of online crimes.

Conclusion


Social media has provided tools enabling individuals from all over the globe to congregate and share ideas. This is one of social media's defining features. However, the underlying computer algorithms that help us connect, suggesting new friends or networks, are not intelligent enough to distinguish benign activities from the unethical or outright illegal. So far, Facebook has apparently relied on these communities to police themselves, which for obvious reasons, these criminal communities are reticent to do. As a consequence of this, a substantial number of cyber-scammers have continued to proliferate and profit from illegal activities. Operating with impunity, these attackers relentlessly probe cyber-defenses of enterprises everywhere. This is a high-stakes endeavor because an attacker with even the smallest foothold inside an organization can do considerable damage.

To combat these motivated adversaries, we need to work together. Social media platforms should continue their efforts, both manual and automated, aimed at identifying and removing malicious groups. Security teams and vendors must work together to actively share information, take action and inform our customers. Businesses need to be diligent about their protection and cyber hygiene efforts. And finally, consumers need to become as informed and skeptical as possible. Attacks like spam prey on the individual as an entry point.

Note: If users encounter malicious groups in Facebook, they can always report the groups through Facebook's "report" function, which is located at the top of the group's page in the drop-down menu under the "... More" button.

Beers with Talos Ep. #50: Operating under the cover of… nothing

$
0
0


Beers with Talos (BWT) Podcast Ep. No. 50 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded March 29, 2019 - Matt and Joel are both on the road this week, and Omar Santos from Cisco PSIRT joins the crew to discuss malware posing as ransomware and defending against supply chain attacks. We go deeper on the Talos story exposing criminal groups operating in the open on social media platforms like Facebook and the implications of criminal groups leveraging social networking. Facebook has removed the disclosed groups, so we discuss the best-effort ways to play whack-a-mole with bad guys on the open web.

The timeline:

  • 01:00 — Roundtable: Holy crap. Will Nigel’s own nephew get to be a Mighty Red??
  • 12:15 — Locker Goga: Disruptive, but less than useful as ransomware
  • 19:35 — Asus backdoor: How big was it? What are your defenses against supply chain attacks?
  • 38:30 — Criminal hacking marketplaces activity in plain sight
  • 49:00 — Parting shots and closing thoughts: Talos Threat Research Summit reg is open!

The links:

==========

Featuring: Craig Williams (@Security_Craig) and Nigel Houghton (@EnglishLFC) with special guest Omar Santos (@SantosOmar)

Hosted by Mitch Neff (@MitchNeff).

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Roundup for March 29 to April 5

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 29 and April 05. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Vobfus-6919817-0
    Malware
    Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
     
  • Win.Malware.Barys-6919339-0
    Malware
    This is a trojan and downloader that allows malicious actors to upload files to a victim's computer.
     
  • Win.Malware.Zbot-6919277-0
    Malware
    Zbot, also known as Zeus, is trojan that steals information such as banking credentials using a variety of methods, including key-logging and form-grabbing.
     
  • Win.Malware.Autoit-6919193-0
    Malware
    Autoit is a malware family leveraging the well-known AutoIT automation tool, widely used by system administrators. AutoIT exposes a rich scripting language that allows to write fully functional malicious software. This family will install itself on the system and contact a C2 server to receive additional instructions.
     
  • Win.Virus.Expiro-6918982-0
    Virus
    Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
     
  • Win.Trojan.Winwebsec-6918829-0
    Trojan
    A that masquerades as legitimate antivirus software, alerting users to nonexistent threats. It disables Windows Defender and Windows System Restore. It also may block users from accessing websites or programs until they buy the "antivirus" software.
     
  • Win.Trojan.Emotet-6918815-0
    Trojan
    Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
     

Threats

Win.Malware.Vobfus-6919817-0


Indicators of Compromise


Registry Keys
  • N/A
Mutexes
  • Local\MSCTF.Asm.MutexDefault1
  • \BaseNamedObjects\A
  • A
IP Addresses contacted by malware. Does not indicate maliciousness
  • 208[.]91[.]197[.]66
Domain Names contacted by malware. Does not indicate maliciousness
  • ns1[.]backdates1[.]net
  • ns1[.]backdates2[.]com
  • ns1[.]backdates4[.]com
  • ns1[.]backdates2[.]net
  • ns1[.]backdates11[.]com
  • ns1[.]backdates17[.]com
  • ns1[.]backdates8[.]com
  • ns1[.]backdates15[.]com
  • ns1[.]backdates3[.]net
  • ns1[.]backdates1[.]com
  • ns1[.]backdates3[.]com
  • ns1[.]backdates5[.]com
  • ns1[.]backdates1[.]org
  • ns1[.]backdates9[.]com
  • ns1[.]backdates10[.]com
  • ns1[.]backdates16[.]com
  • ns1[.]backdates1[.]net[.]example[.]org
  • ns1[.]backdates15[.]com[.]example[.]org
  • ns1[.]backdates4[.]com[.]example[.]org
  • ns1[.]backdates9[.]com[.]example[.]org
  • ns1[.]backdates8[.]com[.]example[.]org
  • ns1[.]backdates11[.]com[.]example[.]org
  • ns1[.]backdates17[.]com[.]example[.]org
  • ns1[.]backdates2[.]net[.]example[.]org
  • ns1[.]backdates16[.]com[.]example[.]org
  • ns1[.]backdates3[.]com[.]example[.]org
  • ns1[.]backdates10[.]com[.]example[.]org
  • ns1[.]backdates3[.]net[.]example[.]org
  • ns1[.]backdates1[.]com[.]example[.]org
Files and or directories created
  • \??\E:\autorun.inf
  • %System32%\winevt\Logs\System.evtx
  • \autorun.inf
  • \??\E:\System Volume Information.exe
  • \$RECYCLE.BIN.exe
  • \??\E:\$RECYCLE.BIN.exe
  • \Secret.exe
  • \??\E:\Passwords.exe
  • \??\E:\Porn.exe
  • \??\E:\Secret.exe
  • \??\E:\Sexy.exe
  • \??\E:\x.mpeg
  • \Passwords.exe
  • \Porn.exe
  • \Sexy.exe
  • %HOMEPATH%\Passwords.exe
  • %HOMEPATH%\Porn.exe
  • %HOMEPATH%\Sexy.exe
  • %HOMEPATH%\c\Passwords.exe
  • %HOMEPATH%\c\Porn.exe
  • %HOMEPATH%\c\Secret.exe
  • %HOMEPATH%\c\Sexy.exe
  • %HOMEPATH%\Secret.exe
  • %HOMEPATH%\c\autorun.inf
  • %HOMEPATH%\seofuaj.exe
  • %HOMEPATH%\RCX9D65.tmp
  • %HOMEPATH%\RCX9DC4.tmp
  • %HOMEPATH%\RCX9E23.tmp
  • %HOMEPATH%\RCX9E91.tmp
  • %HOMEPATH%\RCX9EEF.tmp
  • %HOMEPATH%\RCX9F5E.tmp
  • %HOMEPATH%\c\RCXAE6C.tmp
  • %HOMEPATH%\c\RCXAEDA.tmp
  • %HOMEPATH%\c\RCXAF39.tmp
  • %HOMEPATH%\c\RCXAFA7.tmp
  • %HOMEPATH%\c\RCXB015.tmp
  • %HOMEPATH%\c\RCXB083.tmp
  • \??\E:\seofuaj.exe
  • \seofuaj.exe
File Hashes
  • 046c299741954c07ca5feab9039d7a7208c9e5dad3fca354041acdecab550cf9
  • 057d66787c6ee44bd9d8015f563c3b6e2eab4a83bfe2eee53e1b7d0006e0df84
  • 05f0f24b4fc446cf95fe3be015fe0f61908d1b5cbb1706a14c2e393886454f38
  • 0b5716a756064ebe398f0e164f8d7e0dd747ca50795e3624b5574fd78e92059d
  • 119bb2c3b038c70448cbb9a4a8f8eeed1071d2174f5d1907a01d348f1740927e
  • 1506a6d7439fab0a6b3c775fdde0627bacafa4760900c0f111edce4d55a03a50
  • 1bd8db7ee7413001573a689ae4ebcb29da7652717f35ecbd735a87f3d621586b
  • 272c48ac067319a1c8d51717c5f34b34ac4db4f970f9fccc5915d7bf77123ecb
  • 2bd2f27610560eea9d652b3b8c44225a4b66ef349350e53fff8b42406f74ad3d
  • 2dd8cc3597a6e411b7f258c2ecb78aacd54d9cadb3807997b2b00c1a4e07e178
  • 368d741aef2ab6e41a4696f5d28dee169580dfff4cc69a5946faaec3d14925bb
  • 3b6a66df8369ac8bf26e8402989d29534b7d7e1c7e460d970f50416e2afe5ffe
  • 40466788e57d5200867dcfd7a3f2c18004b8317c19a0528af585c537edfc1201
  • 4a67a46ce70cd36aab995cd0a04621a4050cac0488bab6c433efb1324c6b4513
  • 4b77f7be93f7a27a30a87f5d3fd611d54ead6b62a18a12dcfca3bd65f3081e86
  • 4cbbeba77a0e8af025aeb17352a36b6c75687a00827ecac1f9dfac206603ab52
  • 4ce11c03c2fd40bd58f7044d9bf17fce4118e31cc058113a8cb6d68b0fe2cbc7
  • 5312c2573551bf4ea733031528f4e79b8b1c675c2a05e4059c06cf9c2706b9e1
  • 5ebbf7f1ffdb7f5a5483ad26971c20bf7ffdea7fd1566260d6e4875ff9a477c1
  • 61707b56cec807908e713dd8acbcc2ee8b7359c9c3e8eb826e53fca3fa0de866
  • 62312807fa51f896940f2480b29a133365a146eccb5c5775faf886f3238b2f9a
  • 66c85f135b970fd774f2582202458bd083ecf71bc1f80cd195706d7b354bb601
  • 689860f079fe900589e3c70af6932587b44135439b48cde5462537008a9537f4
  • 6c863b2f65224fbc6d85702cf9cf48b120a851ec4c2f7e76b21c9c56b5427d82
  • 6fc3ab28e7177cf2ca67f6d3a945979b6bdce37eea446d21cef54181a673a35c

Coverage


Screenshots of Detection

AMP




ThreatGrid




Umbrella



Win.Malware.Barys-6919339-0


Indicators of Compromise


Registry Keys
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
    • Value Name: Index
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
    • Value Name: Path
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
    • Value Name: Id
Mutexes
  • N/A
IP Addresses contacted by malware. Does not indicate maliciousness
  • 216[.]218[.]206[.]69
Domain Names contacted by malware. Does not indicate maliciousness
  • N/A
Files and or directories created
  • %System32%\config\SYSTEM
  • %System32%\config\SOFTWARE.LOG1
  • %ProgramData%\Mozilla\thfirxd.exe
  • %ProgramData%\Mozilla\thfirxd.exe
  • %System32%\Tasks\aybbmte
  • %ProgramData%\Mozilla\lygbwac.dll
  • %ProgramData%\Mozilla\lygbwac.dll
  • %HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll
  • %HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe
  • %SystemRoot%\Tasks\kylaxsk.job
File Hashes
  • 0869ac4f786a1f544abdab137e4470e008b50ae49e740f4137d2457805e4ded4
  • 0db104c871e5214fc4365b34cfdc74c4e0330668da0399653865f43d96b58160
  • 106af8294406803fa0773813b3d827acdacc00e2faabb99d215afd091226b7b2
  • 1ea3c3bd8673dec3901d7f82b77f8e8bfad3bd51bd80d7796b2a9b7e07a98339
  • 223b3d2d4ada9ab9423efa187c1d230503ebd37fecca1209f3afcb9c15d961db
  • 2ecbd255bd3f1a60450a1b7df2d3643ad517372e9a74b41fb2981d31ceeb017a
  • 4034f9ff4d3fb10e1afe93e12e97183f8859b5c745cde8e9a52cbe0c93a7524c
  • 4b89e180490dd4da410bedbccb5c98cb78901b752eedeea3588c25a833117b8b
  • 50136cda2cb504a1c9dc6344b24d1b46c5c24c87b97fb33da23ab52346217f95
  • 5316ea912b78ff5f98cffbd4104bc5f57abc07946e53a0e7b4ed4100e9a511e0
  • 58007a4c73c96932b44d67ec7c6db050ed18577f2cc5eec427be6a2b6a962dd6
  • 5a5c3aa34c245fb90404cba3d98ab53445683ed8dc470bad316707915ad1fbe7
  • 5e0b77a4db61b89aa98faa07433c12366cef0b747b677005df139c18a48e8643
  • 60a0121cfcffdd898bb452aa464bc9dd0cf658b11285b4ba917c480046503370
  • 6b4864ef87cbc0b4884075a60f5bfbdb39e84405fd6f7f01b019c81013ef9b68
  • 7e777487165f72a5d42608e2bc4c3fb8ccf0c2aa0c059c53f4c05d6318803be6
  • 809c104c5546b025e8680f612573ed4e1123a19cab555deb9984407d69c18abd
  • 84d35bea78f59fcb33cc45d7ea6eca8d9cb1b9b1a1a5c493e88e020386c1eb43
  • 868b8e6f1301f54178839130eaefc5bbf2e6aa1c78e6054389a1f2d0b02a1bcd
  • a0aa2c03d0f4e9caed5f0a1e52e59423944864ad2d9ccdcd54b271d7133bbf2f
  • a6e84c3b4c46fbb17f9ae770c2244579ab3e7b82621290d977ff93b539b9bf37
  • afecfc0b7e4c6218fcfb546ce088cbd6b5087358a5e44bab9595df720e1a7490
  • bb04cca5245d8ddda41a24339ab63e8519bffd83a2bbcf80e74c2945bd1420c5
  • bf211d2a71ff102c2c4fc3d41afb7f9a4f46e37aea06b64d86cddca372438d44
  • da42054f51ba5744d7b2be271b96bc220002a1c5dee7580c540746a6f8436dc5

Coverage


Screenshots of Detection

AMP





ThreatGrid



Win.Malware.Zbot-6919277-0


Indicators of Compromise


Registry Keys
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
    • Value Name: aybbmte.job
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
    • Value Name: Path
  • <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
    • Value Name: Id
Mutexes
  • N/A
IP Addresses contacted by malware. Does not indicate maliciousness
  • 216[.]218[.]206[.]69
  • 116[.]255[.]235[.]9
Domain Names contacted by malware. Does not indicate maliciousness
  • N/A
Files and or directories created
  • %ProgramData%\Mozilla\thfirxd.exe
  • %ProgramData%\Mozilla\lygbwac.dll
  • %ProgramData%\Mozilla\lygbwac.dll
  • %HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll
  • %HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe
File Hashes
  • 19300406a8fedba8513085fa93004d3330024e3a97d685c34bf4404e15e9beea
  • 1d8005f6fecbb238db1b40e6cb7afc2baf323c0059883f0bb7b11c01c1067026
  • 276dab07147db188ff45e12e53ec462af42e1973a4687a2b2e3e9301c15db929
  • 2a0588520f7752424195cc36e6843d09ec850b6c7a41e966af58f3ebee8353c0
  • 33626a9cd5105d595872d76146629d1b440bb625383ac30f71c7f9ff369982f3
  • 35b7a37a7bd1ad371add7f0d3a3d9e3f9d8dc22894d0949c775f9eec5fd60104
  • 3832485cab5a4ea92c616b24bf79374a4999eb76119e2e14e40c7f693a71ea1c
  • 408f335dc58fa9fe44e16c4f76813c3cb6bca1821134cd3eaacc162787d74ee7
  • 424171b94775b10d108095adb1a29f3ee6b8918e2bc3e6b96d62ea8a9c2ff01a
  • 42c89f9e463771c6de93ecbd94210a7242234ca512ba2d68e4133e7835ce9f46
  • 466731dc06288c6288b2b306ecd2d457d23624b32dc8a6ba950f2344a4ec0228
  • 4e90c6ace53e3278aec3df081252e46b6d6f32e3786c862895fc724595bdfd09
  • 54f29401d5a69da03b8e1ed390e76a94b0967ae4859d885db5abd5a8632a8ce1
  • 58b1da3642367b1f8f80a018befaaeaa91ddbc0187d56f52c62eebeb06ac4291
  • 5c41aca107b6f288e5436c5722150e62845d594a89dd31de98865f87a1618880
  • 6ce10269595ec82e081472bddbdfd235086f6205dd836464e68c11b29b56a96c
  • 701fd08f2dcd10f75e462feaeedbc04c5d640d57e7203bfecf490c79b8da50ab
  • 795fb4569df188d5ce7ec1448d5088ffa7dc79bf60ea02e0fde15a2e8b4d0868
  • 79af5e9ff5b60e9ac555bf82c43d01b20d7a2d4faa85fff2651883cff52be4e8
  • 7dcde4f60dd8f1caf3c37047cbde35c00ff4c70d2bb6e33ac6811c0f2d0a7742
  • 84ab81138637667e9a304c70f6332d6e07a7fe01cada75b87501e1119654fe62
  • 88fd82e899034dfaeaf5fb3fa40ee31849e35dc781718119207c049a506d47b8
  • 8be6442f102a1a607ba44cb708e1b78c847a17d583e8caf673885613ac58eb35
  • 8d6f9213c8611b2d23dbe7ad43749c20332f35926c72eb71d4b8bc125b80730f
  • 8fe26438c3bd8257c7c09e13bcb06f049a65cdeef64fdf6260048b97c839c72c

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Autoit-6919193-0


Indicators of Compromise


Registry Keys
  • <HKCR>\LOCAL SETTINGS\MUICACHE\3E\52C64B7E
    • Value Name: LanguageList
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing
  • <HKCU>\Software\Microsoft\SystemCertificates\My
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
    • Value Name: ProxyBypass
  • <HKCU>\Software\Microsoft\RAS AutoDial
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\Certificates
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\CRLs
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA\CTLs
  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\Disallowed
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\Certificates
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\CRLs
  • <HKLM>\Software\Wow6432Node\Microsoft\SystemCertificates\Root
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\ROOT\CRLs
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\ROOT\CTLs
  • <HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CRLs
  • <HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs
  • <HKLM>\Software\Wow6432Node\Policies\Microsoft\SystemCertificates\TrustedPeople
  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\TrustedPeople
  • <HKCU>\Software\Policies\Microsoft\SystemCertificates\trust
  • <HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates
  • <HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs
  • <HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CTLs
  • <HKLM>\Software\Wow6432Node\Microsoft\EnterpriseCertificates\trust
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUST\CRLs
  • <HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\TRUST\CTLs
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
  • <HKCU>\SOFTWARE\MICROSOFT\RAS AUTODIAL\Default
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\OK3KMXI9HE
    • Value Name: inst
Mutexes
  • 3749282D282E1E80C56CAE5A
  • Local\ZonesCacheCounterMutex
  • Local\ZonesLockedCacheCounterMutex
  • eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-21-2580483871-590521980-3826313501-500
  • dxdiag
  • \BaseNamedObjects\dxdiag
IP Addresses contacted by malware. Does not indicate maliciousness
  • 62[.]173[.]139[.]203
  • 85[.]143[.]175[.]2
  • 107[.]173[.]219[.]120
Domain Names contacted by malware. Does not indicate maliciousness
  • jfnutts[.]com
  • jamesxx[.]dynu[.]net
Files and or directories created
  • %APPDATA%\D282E1\1E80C5.lck
  • \PC*\MAILSLOT\NET\NETLOGON
  • \lsass
  • %APPDATA%\D282E1
  • %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5
  • \samr
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\7bfba4ab-37fb-49ad-95de-c46116256232
  • %ProgramFiles%\Microsoft DN1
  • %ProgramData%\images.exe
  • %LOCALAPPDATA%\Microsoft Vision
  • %HOMEPATH%\Documents\20190401
  • %TEMP%\~DF3968B9D4F94E63DD.TMP
  • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\.url
  • %TEMP%\4vlsgi4i.nxw.ps1
  • %TEMP%\gs2vkrhw.jd3.psm1
  • %TEMP%\1xjo2rvg.l3o.psm1
  • %HOMEPATH%\.exe
  • %HOMEPATH%\.vbs
  • %HOMEPATH%\Start Menu\Programs\Startup\.url
File Hashes
  • 00e6268b7676fe162515c9b4191ae17186d708961a5545cf2b0e76e0d702a035
  • 02f9a5389aea7c071f277a51bbd449d845b7e5acb5a94c5e795bd283415569be
  • 055f89ea1016a672124bf38461d7a04632c9caf270714a783b34fa014e038c57
  • 06e27b85a1994a896d81cf423bbf9bbff1bbc5d89d26d4aa8b0fbbfa6b824d13
  • 0837fda8e72d32584a4c53dcc8f7ca75f38eae979d178f6db434e9521fbe82e8
  • 11a4e3e12cec6041bdf9508c56a7d75a00992f59c929172eabd8725a89904970
  • 15159b94f3fbf990f53b9df0a5f08b66fb1548e84d48c99a7537be84bece2062
  • 1f450f566e7896c60524017d006bb01902e854371313abb8d8f62038de2ecc7b
  • 21705746b4eb464753d99cc7999db91a55ca4a8a08ab53b8031c969adc47d899
  • 31cdf98e7e648986edabcbf58a70030ff882d2ec08106440b2b97b7d17d890f5
  • 468bd5cd0779eec9d11b325e5dd7aa7721e7189a04b7d92a236279d1cbab4439
  • 4e46d7ddef280bb91c73f15975b610d3bc4be014d29f05dade4860932cd63913
  • 556b0f36507a9da9bc8236d6328ac25b7d42e7d62d859ccb6163d117d9d39ccc
  • 64c2d4517abd6081f6401ee4237132f087177b8891d9840ae9e69fdd128dc9b0
  • 7254eb9ebb64ad0916d7678e8d01fca31a18d73f970a64394f9fc88069590929
  • 8594f3e2f19d3512830312737a9706fb8a3a92ab8d4afad9f2005c8d6c644db7
  • 8616e952c063ad624242745f595803a39931e134bd319b57cc36251e73aad3cb
  • 8acab560aa72f1d6a39b1bcdc48334e51cb9654fb21185da22413434bb01d22c
  • 9104f6034c2e99c2fd8d3158be68b20a93ba51f0d25b6e4908094f75cc3234ad
  • 977eb4729a3f3f20fdda9cc7cb4ba5e5e6066f3e9f0d05874b9978bcd6471532
  • a428bb2458b74579874a41d9ebb463835dc938777b7a21f52454af4e52856603
  • b1aa39eef0e0f815f9c91993cc24e786cf050f17e818f103416e7dd95727b911
  • c0406b0fedfb94e25ddd6b04947830c82460f5080999ad08fd5abc23fcf004dd
  • d9e637657dacc3e665fa5abbaa30443f474a299c0fa61b801409233a62e8440d
  • dad963b9062233185343b7564500514c8e51ed1056f717615e7885524a5ba8a6

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella


Win.Virus.Expiro-6918982-0


Indicators of Compromise


Registry Keys
  • <HKLM>\Software\Microsoft\WBEM\CIMOM
  • <HKCU>\Software\Microsoft\SystemCertificates\MY
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
    • Value Name: Start
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\4
    • Value Name: 1406
  • <A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\75
    • Value Name: AeFileID
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
    • Value Name: Start
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
    • Value Name: Type
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\VSS
    • Value Name: Type
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WMIAPSRV
    • Value Name: Type
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WMIAPSRV
    • Value Name: Start
  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\.NetFramework\v2.0.50727\NGENService\State
  • <HKLM>\SOFTWARE\Wow6432Node\Microsoft\.NetFramework\v2.0.50727\NGENService\ListenedState
  • <HKLM>\SOFTWARE\Microsoft\.NetFramework\v2.0.50727\NGENService\State
  • <HKLM>\SOFTWARE\MICROSOFT\SECURITY CENTER\SVC\S-1-5-21-2580483871-590521980-3826313501-500
    • Value Name: EnableNotifications
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\0
    • Value Name: 2103
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\1
    • Value Name: 2103
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\2
    • Value Name: 2103
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\3
    • Value Name: 2103
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
    • Value Name: CheckSetting
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
    • Value Name: CheckSetting
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
    • Value Name: CheckSetting
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
    • Value Name: CheckSetting
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
    • Value Name: CheckSetting
Mutexes
  • Global\LOADPERF_MUTEX
  • ASP.NET_Perf_Library_Lock_PID_640
  • BITS_Perf_Library_Lock_PID_640
  • ESENT_Perf_Library_Lock_PID_640
  • Lsa_Perf_Library_Lock_PID_640
  • MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_640
  • MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_640
  • MSDTC_Perf_Library_Lock_PID_640
  • Outlook_Perf_Library_Lock_PID_640
  • PerfDisk_Perf_Library_Lock_PID_640
  • PerfNet_Perf_Library_Lock_PID_640
  • PerfOS_Perf_Library_Lock_PID_640
  • PerfProc_Perf_Library_Lock_PID_640
  • RemoteAccess_Perf_Library_Lock_PID_640
  • SMSvcHost 3.0.0.0_Perf_Library_Lock_PID_640
  • SMSvcHost 4.0.0.0_Perf_Library_Lock_PID_640
  • ServiceModelEndpoint 3.0.0.0_Perf_Library_Lock_PID_640
  • ServiceModelOperation 3.0.0.0_Perf_Library_Lock_PID_640
  • ServiceModelService 3.0.0.0_Perf_Library_Lock_PID_640
  • Spooler_Perf_Library_Lock_PID_640
  • TapiSrv_Perf_Library_Lock_PID_640
  • Tcpip_Perf_Library_Lock_PID_640
  • TermService_Perf_Library_Lock_PID_640
  • Windows Workflow Foundation 3.0.0.0_Perf_Library_Lock_PID_640
  • Windows Workflow Foundation 4.0.0.0_Perf_Library_Lock_PID_640
  • WmiApRpl_Perf_Library_Lock_PID_640
  • aspnet_state_Perf_Library_Lock_PID_640
  • rdyboost_Perf_Library_Lock_PID_640
  • usbhub_Perf_Library_Lock_PID_640
  • kkq-vx_mtx1
  • gazavat-svc
  • kkq-vx_mtx89
  • kkq-vx_mtx91
  • kkq-vx_mtx92
  • kkq-vx_mtx93
  • kkq-vx_mtx94
  • kkq-vx_mtx95
  • kkq-vx_mtx96
  • kkq-vx_mtx97
  • kkq-vx_mtx98
  • kkq-vx_mtx99
  • kkq-vx_mtx31
  • kkq-vx_mtx32
  • kkq-vx_mtx33
  • kkq-vx_mtx29
  • gazavat-svc_29
IP Addresses contacted by malware. Does not indicate maliciousness
  • N/A
Domain Names contacted by malware. Does not indicate maliciousness
  • N/A
Files and or directories created
  • \srvsvc
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
  • %CommonProgramFiles%\Microsoft Shared\OFFICE14\MSOXMLED.EXE
  • %CommonProgramFiles%\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe
  • %ProgramFiles%\Java\jre6\bin\javaw.exe
  • %ProgramFiles%\Java\jre6\bin\javaws.exe
  • %ProgramFiles%\Java\jre6\bin\unpack200.exe
  • %ProgramFiles%\Java\jre7\bin\jabswitch.exe
  • %ProgramFiles%\Java\jre7\bin\java.exe
  • %ProgramFiles%\Java\jre7\bin\javacpl.exe
  • %ProgramFiles%\Java\jre7\bin\javaw.exe
  • %ProgramFiles%\Java\jre7\bin\javaws.exe
  • %ProgramFiles%\Java\jre7\bin\jp2launcher.exe
  • %ProgramFiles%\Java\jre7\bin\ssvagent.exe
  • %ProgramFiles%\Java\jre7\bin\unpack200.exe
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
  • %CommonProgramFiles%\Microsoft Shared\ink\ConvertInkStore.exe
  • %CommonProgramFiles%\Microsoft Shared\ink\InputPersonalization.exe
  • %CommonProgramFiles%\Microsoft Shared\ink\ShapeCollector.exe
  • %CommonProgramFiles%\Microsoft Shared\ink\TabTip.exe
  • %ProgramFiles%\DVD Maker\DVDMaker.exe
  • %ProgramFiles%\Internet Explorer\ieinstal.exe
  • %CommonProgramFiles(x86)%\microsoft shared\source engine\ose.exe
  • %ProgramFiles(x86)%\microsoft office\office14\groove.exe
  • %ProgramFiles(x86)%\mozilla maintenance service\maintenanceservice.exe
  • %CommonProgramFiles%\microsoft shared\officesoftwareprotectionplatform\osppsvc.exe
  • %SystemRoot%\ehome\ehsched.exe
  • %SystemRoot%\microsoft.net\framework64\v2.0.50727\mscorsvw.exe
  • %SystemRoot%\microsoft.net\framework64\v4.0.30319\mscorsvw.exe
  • %SystemRoot%\microsoft.net\framework\v2.0.50727\mscorsvw.exe
  • %SystemRoot%\microsoft.net\framework\v4.0.30319\mscorsvw.exe
  • %System32%\alg.exe
  • %System32%\dllhost.exe
  • %System32%\fxssvc.exe
  • %System32%\ieetwcollector.exe
  • %System32%\msdtc.exe
  • %System32%\msiexec.exe
  • %System32%\snmptrap.exe
  • %System32%\sppsvc.exe
  • %System32%\ui0detect.exe
  • %System32%\vds.exe
  • %System32%\vssvc.exe
  • %System32%\wbem\wmiApsrv.exe
  • %System32%\wbengine.exe
  • %CommonProgramFiles%\Microsoft Shared\ink\mip.exe
  • %System32%\FXSSVC.exe
  • %System32%\UI0Detect.exe
  • %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock
  • %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat
  • %SystemRoot%\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat
  • %SystemRoot%\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
  • %ProgramFiles%\Internet Explorer\ielowutil.exe
  • %SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{33EC2C09-9668-4DE7-BCC0-EFC69D7355D7}.crmlog
  • %SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat
  • %ProgramFiles%\Internet Explorer\iexplore.exe
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.vir
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.vir
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.vir
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.vir
  • %CommonProgramFiles%\Microsoft Shared\OFFICE14\MSOXMLED.vir
  • %CommonProgramFiles%\Microsoft Shared\VSTO\10.0\VSTOInstaller.vir
  • %CommonProgramFiles%\Microsoft Shared\ink\ConvertInkStore.vir
  • %CommonProgramFiles%\Microsoft Shared\ink\ShapeCollector.vir
  • %ProgramFiles%\DVD Maker\DVDMaker.vir
  • %ProgramFiles%\Internet Explorer\ieinstal.vir
  • %ProgramFiles%\Internet Explorer\ielowutil.vir
  • %ProgramFiles%\Internet Explorer\iexplore.vir
  • %ProgramFiles%\Java\jre6\bin\java.vir
  • %ProgramFiles%\Java\jre6\bin\javaw.vir
  • %ProgramFiles%\Java\jre6\bin\javaws.vir
  • %ProgramFiles%\Java\jre6\bin\unpack200.vir
  • %ProgramFiles%\Java\jre7\bin\jabswitch.vir
  • %ProgramFiles%\Java\jre7\bin\java.vir
  • %ProgramFiles%\Java\jre7\bin\javacpl.vir
  • %ProgramFiles%\Java\jre7\bin\javaw.vir
  • %ProgramFiles%\Java\jre7\bin\javaws.vir
  • %ProgramFiles%\Java\jre7\bin\jp2launcher.vir
  • %ProgramFiles%\Java\jre7\bin\ssvagent.vir
  • %ProgramFiles%\Java\jre7\bin\unpack200.vir
  • %CommonProgramFiles(x86)%\microsoft shared\source engine\ose.vir
  • %ProgramFiles(x86)%\microsoft office\office14\groove.vir
  • %ProgramFiles(x86)%\mozilla maintenance service\maintenanceservice.vir
  • %SystemRoot%\ehome\ehsched.vir
  • %SystemRoot%\microsoft.net\framework64\v2.0.50727\mscorsvw.vir
  • %SystemRoot%\microsoft.net\framework\v2.0.50727\mscorsvw.vir
  • %SystemRoot%\microsoft.net\framework\v4.0.30319\mscorsvw.vir
  • %System32%\alg.vir
  • %System32%\dllhost.vir
  • %System32%\fxssvc.vir
  • %System32%\ieetwcollector.vir
  • %System32%\msiexec.vir
  • %System32%\snmptrap.vir
  • %System32%\ui0detect.vir
  • %System32%\vds.vir
  • %System32%\vssvc.vir
  • %System32%\wbem\wmiApsrv.vir
  • %System32%\wbengine.vir
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.vir
  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.vir
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.vir
  • \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.vir
  • %CommonProgramFiles%\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppsvc.vir
  • %CommonProgramFiles%\Microsoft Shared\ink\TabTip.vir
  • %CommonProgramFiles%\Microsoft Shared\ink\mip.vir
  • %SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.vir
  • %System32%\msdtc.vir
  • %System32%\msiexec.vir
  • %System32%\sppsvc.vir
  • %SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{C0F5CDA5-94A5-411C-9D50-E0AEC7EA25A6}.crmlog
  • %APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\29a1f50d-6e60-4de9-b56c-1a6439e5baa1
File Hashes
  • 57d65c0c068da7ec72e8c9ba0c6f9a354917bae5127f55de1635a6d5d471d60b
  • 6e16f59631c0382f8902123e8f021656235724d3b76ec33913dcd813f567df4e
  • a9a42f7c8d67d59137bcdb813ff2c92277fcf778599e349062be332960b91c62
  • ad6d8581a541cc8622b132e171627324d8e02c4ba2a3804e0f6763d336207a01
  • ad73a287c879b1ac9605f5889064373e95f3db526e98c3349a48d63c549c23c2
  • b0aa80111d23dd578815c935aa529f30a5f10b38e6ef799a402f7819bb077d89
  • b21649f76ec9cce8d3937f512c8d9a841979d1b90cb3f24ca2eb1a0d97c615f0
  • b9e9f61ba07393c6da51ea20c3764b0088f0fc9cfc6be99d355fe1f5aec82f8f
  • ba649d6fbcade5b73b2a761f4d40702c2a21195fed22285213959abebd818833
  • c11d1f5a9c5056c439ddfef99150dd0a817c728c73dbcee9d80956389164b9d0
  • c56268667843181e7aad8cb849496a530be0a7916cfda65e34942bb8e0b909bd
  • c7f0f4fde7c85f456e95bfdbe2a5ab25f07a8e749c11e62b8be2e56587d9ebaf
  • c9785ee70ca68ac41cb78fd83e37fc33837c10d3d82ad2188b2554ef14c2a345
  • cc7f00cab330786e2de92e1fb3b36baed5868da2f66744d9d058072e9b5587b9
  • d7d5248e70e3ebfd772783ef78f22d7843596fda42231659373827504ce9ca2b
  • dc78031890299fa4a8ee415a90ed95a79dc060a2a55342d7d60da8c468bf5288
  • dd198d756ce002a3eab75e4faedb6e48cfd27032ad4e9f4643f454b613b616dc
  • ee3c63c6c9d0c5887b22a820d1b97b44ec97ee212f819d9ad478a6846e6a5f87
  • faab282b345611411cbe53e35c94f2c56c9314bb4211a20ebfb6b17d85366cf4
  • fac8e1f9ef6b06eff6e7ec4a5c088644f21f82882daf674e27e699fa9563357b
  • ffb30a4ba399b607cb0b72fc67353a75609c28f66c73d41cc5f13fecc8f400c1

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Trojan.Winwebsec-6918829-0


Indicators of Compromise


Registry Keys
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
  • <HKCR>\LOCAL SETTINGS\MUICACHE\3E\52C64B7E
    • Value Name: LanguageList
  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
    • Value Name: PnpInstanceID
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
    • Value Name: CachePrefix
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
    • Value Name: CachePrefix
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
    • Value Name: CachePrefix
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
    • Value Name: ProxyEnable
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
    • Value Name: AutoDetect
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2
  • <HKCU>\Software
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
    • Value Name: AntiVirusOverride
  • <HKLM>\SOFTWARE\WOW6432NODE\Microsoft
  • <HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
  • <HKLM>\SYSTEM\CONTROLSET001\ENUM\WPDBUSENUMROOT\UMB\2&37C186B&0&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_GENERIC&PROD_HARDDISK&REV_2.5+#1-0000:00:1D.7-2&0#
    • Value Name: CustomPropertyHwIdKey
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\svc
  • <HKLM>\System\CurrentControlSet\Services\luafv
  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Live Security Platinum
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SYSTEMRESTORE
    • Value Name: RPSessionInterval
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\LUAFV
    • Value Name: Start
  • <HKU>\Software\Microsoft\Windows\CurrentVersion\RunOnce
Mutexes
  • Local\ZonesCacheCounterMutex
  • Local\ZonesLockedCacheCounterMutex
  • Local\MSCTF.Asm.MutexDefault1
  • DBWinMutex
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_1024.db!dfMaintainer
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_256.db!dfMaintainer
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_32.db!dfMaintainer
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_96.db!dfMaintainer
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_idx.db!ThumbnailCacheInit
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_idx.db!rwReaderRefs
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_idx.db!rwWriterMutex
  • Global\C::Users:Administrator:AppData:Local:Microsoft:Windows:Explorer:thumbcache_sr.db!dfMaintainer
  • 539D542E222D2DDE0101049AB5EC2432
  • ..MTX
  • 529C532D212C2CDD00000399B4EB2331
  • 56A05731253030E10404079DB8EF2735
  • 57A15832263131E20505089EB9F02836
  • 5AA45B35293434E508080BA1BCF32B39
  • \BaseNamedObjects\5B4FD7CC222D2DDE0101F14FD252FD4F
  • \BaseNamedObjects\5A4ED6CB212C2CDD0000F04ED151FC4E
IP Addresses contacted by malware. Does not indicate maliciousness
  • 116[.]255[.]235[.]9
Domain Names contacted by malware. Does not indicate maliciousness
  • www[.]w3[.]org
Files and or directories created
  • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Live Security Platinum
  • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Live Security Platinum\Live Security Platinum.lnk
  • %HOMEPATH%\Desktop\Live Security Platinum.lnk
  • %ProgramData%\529C532D212C2CDD00000399B4EB2331
  • %ProgramData%\529C532D212C2CDD00000399B4EB2331\529C532D212C2CDD00000399B4EB2331.exe
  • %ProgramData%\529C532D212C2CDD00000399B4EB2331\529C532D212C2CDD00000399B4EB2331
  • %ProgramData%\5A4ED6CB212C2CDD0000F04ED151FC4E\5A4ED6CB212C2CDD0000F04ED151FC4E
  • %ProgramData%\5A4ED6CB212C2CDD0000F04ED151FC4E\5A4ED6CB212C2CDD0000F04ED151FC4E.exe
File Hashes
  • 04311b0a06d95014390434149f1dae9f1c8e399e678fe80903d515501b4ac04a
  • 0ee9b85dd0d097210d138ac73b5687d8de17e4880131360a258295b0ece85006
  • 35512788e3ec6bf939840d6ac94191b7976b4309bb26bf91eb00b461beb29ad3
  • 420a929f0ce0a6194d82a41b1674f2e2fbc78278c0723c37a2bcd038aa997301
  • 4ce41686ffaea1f9c80d2bbe00bbbe0a1da864a038a0a48066f209bbc98cb969
  • 520eefe6fde2fe435b885080259ae7357c291de05c7d3df8ae69095e48a1ca1d
  • 73208a63a25abaec555e1621f991b167ccd40eac8b06d330fd2642d157d028d1
  • 7340137319da76ae915a176658a9f577847aac97908d2ab1edaa289c092f8954
  • b34930cdd050eb0968301ec594091dd714f516547bc41f37390031655f282577
  • b7192f768a639280169016309758dd5e4d5be76a96850b7eab52c25198ecdafa
  • e639df0b0afa8a5fafd40064339d75b7098de98068ed9b9d1e20da9e3649d25e

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Trojan.Emotet-6918815-0


Indicators of Compromise


Registry Keys
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\PORTKEYWORDS\DHCP
    • Value Name: Collection
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NETBT\PARAMETERS
    • Value Name: DhcpScopeID
  • <HKCR>\LOCAL SETTINGS\MUICACHE\3E\52C64B7E
    • Value Name: LanguageList
  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
    • Value Name: PnpInstanceID
  • <HKU>\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad
  • <A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\IndexTable
  • <A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE
    • Value Name: _CurrentObjectId_
  • <A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\LRULIST
    • Value Name: CurrentLru
  • <HKU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
    • Value Name: Type
  • <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\5A-54-99-D2-86-6F
    • Value Name: WpadDecisionReason
  • <HKLM>\SOFTWARE\Microsoft\ESENT\Process\guiddefribbon\DEBUG
Mutexes
  • Global\I98B68E3C
  • Global\M98B68E3C
  • \BaseNamedObjects\Global\M3C28B0E4
  • \BaseNamedObjects\Global\I3C28B0E4
IP Addresses contacted by malware. Does not indicate maliciousness
  • 212[.]227[.]15[.]158
  • 72[.]167[.]238[.]29
  • 216[.]40[.]42[.]5
  • 74[.]208[.]5[.]5
  • 74[.]208[.]5[.]15
  • 196[.]25[.]211[.]150
  • 97[.]74[.]135[.]10
  • 173[.]201[.]192[.]158
  • 67[.]195[.]228[.]95
  • 192[.]211[.]51[.]147
  • 74[.]6[.]141[.]43
  • 74[.]202[.]142[.]72
  • 184[.]106[.]54[.]10
  • 173[.]201[.]193[.]101
  • 196[.]11[.]146[.]149
  • 193[.]252[.]22[.]84
  • 64[.]98[.]36[.]5
  • 74[.]6[.]137[.]75
  • 173[.]194[.]204[.]108
  • 64[.]90[.]62[.]162
  • 107[.]6[.]16[.]19
  • 208[.]84[.]244[.]49
  • 69[.]168[.]106[.]36
  • 74[.]208[.]5[.]13
  • 107[.]14[.]166[.]78
  • 173[.]201[.]192[.]101
  • 212[.]227[.]15[.]138
  • 40[.]97[.]124[.]18
  • 107[.]14[.]166[.]72
  • 65[.]254[.]228[.]100
  • 74[.]202[.]142[.]71
  • 190[.]95[.]221[.]182
  • 200[.]58[.]118[.]149
  • 190[.]226[.]40[.]3
  • 200[.]24[.]13[.]80
  • 18[.]211[.]9[.]206
  • 64[.]250[.]117[.]68
  • 200[.]45[.]191[.]16
  • 69[.]156[.]240[.]33
  • 64[.]59[.]136[.]142
  • 89[.]19[.]2[.]235
  • 192[.]185[.]4[.]138
  • 64[.]85[.]73[.]16
  • 200[.]50[.]175[.]25
  • 200[.]40[.]31[.]18
  • 209[.]249[.]170[.]98
  • 65[.]182[.]102[.]90
  • 200[.]58[.]113[.]90
  • 173[.]203[.]187[.]187
  • 52[.]96[.]38[.]82
  • 31[.]172[.]86[.]183
  • 186[.]64[.]119[.]135
  • 192[.]185[.]16[.]118
  • 50[.]87[.]144[.]197
  • 190[.]96[.]118[.]53
  • 67[.]241[.]81[.]253
  • 154[.]0[.]163[.]40
  • 174[.]136[.]30[.]150
  • 190[.]15[.]222[.]14
  • 200[.]58[.]110[.]122
  • 205[.]204[.]67[.]142
  • 158[.]69[.]99[.]42
  • 162[.]144[.]71[.]101
  • 74[.]205[.]78[.]113
  • 121[.]78[.]246[.]33
  • 200[.]58[.]123[.]107
  • 201[.]220[.]211[.]7
  • 173[.]0[.]129[.]16
  • 190[.]224[.]160[.]116
  • 200[.]107[.]202[.]6
  • 188[.]165[.]208[.]226
  • 66[.]96[.]134[.]1
  • 103[.]15[.]48[.]91
  • 50[.]23[.]248[.]182
  • 179[.]60[.]208[.]2
  • 192[.]185[.]107[.]140
  • 192[.]185[.]90[.]238
  • 108[.]179[.]234[.]88
  • 162[.]241[.]2[.]35
  • 192[.]185[.]185[.]176
  • 108[.]167[.]189[.]42
  • 108[.]167[.]160[.]249
  • 59[.]124[.]1[.]19
  • 192[.]185[.]184[.]94
  • 192[.]185[.]26[.]156
  • 108[.]167[.]181[.]188
  • 192[.]185[.]2[.]182
  • 98[.]136[.]96[.]84
  • 207[.]249[.]74[.]109
  • 83[.]170[.]124[.]82
  • 159[.]203[.]163[.]219
  • 184[.]150[.]200[.]201
  • 50[.]87[.]150[.]177
  • 190[.]107[.]22[.]116
  • 66[.]195[.]202[.]115
  • 69[.]16[.]228[.]14
  • 66[.]96[.]147[.]110
  • 190[.]124[.]215[.]2
  • 50[.]87[.]59[.]65
  • 187[.]157[.]85[.]132
  • 200[.]119[.]246[.]201
  • 96[.]116[.]224[.]179
  • 69[.]175[.]31[.]212
  • 188[.]121[.]52[.]82
  • 200[.]58[.]110[.]40
  • 69[.]61[.]0[.]198
  • 50[.]62[.]176[.]244
  • 104[.]236[.]244[.]101
  • 67[.]222[.]2[.]148
  • 14[.]49[.]39[.]215
  • 192[.]185[.]37[.]19
  • 162[.]217[.]70[.]59
  • 192[.]185[.]190[.]90
  • 192[.]185[.]136[.]209
  • 192[.]185[.]76[.]191
  • 192[.]185[.]129[.]8
  • 192[.]254[.]185[.]112
  • 192[.]185[.]4[.]23
  • 66[.]96[.]147[.]103
  • 108[.]163[.]221[.]2
  • 190[.]11[.]243[.]146
  • 66[.]71[.]241[.]102
  • 212[.]83[.]168[.]160
  • 62[.]210[.]127[.]136
  • 50[.]62[.]176[.]42
  • 64[.]26[.]60[.]221
  • 67[.]225[.]221[.]173
  • 67[.]241[.]81[.]253
  • 190[.]96[.]118[.]53
Domain Names contacted by malware. Does not indicate maliciousness
  • imap[.]1and1[.]co[.]uk
  • mail[.]gmail[.]com
  • imap[.]gmail[.]com
  • smtp[.]secureserver[.]net
  • pop[.]1and1[.]com
  • smtp[.]1and1[.]es
  • MAIL[.]GMAIL[.]COM
  • mail[.]1and1[.]co[.]uk
  • smtp[.]live[.]com
  • smtp[.]mail[.]com
  • pop[.]secureserver[.]net
  • mail[.]secureserver[.]net
  • pop3[.]telkomsa[.]net
  • imap[.]secureserver[.]net
  • secure[.]emailsrvr[.]com
  • mail[.]multisistemas[.]com[.]mx
  • pop[.]infinitummail[.]com
  • smtp[.]mail[.]yahoo[.]com
  • smtp[.]telkomsa[.]net
  • outlook[.]office365[.]com
  • smtpout[.]secureserver[.]net
  • imap[.]comcast[.]net
  • smtp[.]vodamail[.]co[.]za
  • smtp[.]orange[.]fr
  • imap[.]mail[.]com
  • mail[.]biz[.]rr[.]com
  • pop[.]biz[.]rr[.]com
  • correoweb[.]iess[.]gob[.]ec
  • smtp[.]roadrunner[.]com
  • mail[.]basculasmagnino[.]com[.]ar
  • smtp[.]infinitummail[.]com
  • smtp[.]windstream[.]net
  • smtp[.]shaw[.]ca
  • correo[.]movistarcloud[.]com[.]ve
  • smtp[.]arnet[.]com[.]ar
  • pop[.]broadband[.]rogers[.]com
  • pop[.]hostcentric[.]com
  • smtp[.]arnetbiz[.]com[.]ar
  • smtp[.]broadband[.]rogers[.]com
  • gator4126[.]hostgator[.]com
  • mail[.]dotster[.]com
  • adinet[.]com[.]uy
  • mail[.]mi[.]com[.]co
  • imap[.]bell[.]net
  • pop[.]everyone[.]net
  • mail[.]chikool[.]cl
  • smtp[.]mailplug[.]co[.]kr
  • royalmabati[.]com
  • mail[.]infovia[.]com[.]ar
  • mail[.]pomonatowing[.]co[.]za
  • mail[.]tmmchealthcare[.]com
  • mail[.]interdns[.]co[.]uk
  • mail[.]hazari[.]com[.]pk
  • smtp[.]tesapparel[.]com
  • mail[.]empresasjayir[.]cl
  • mail[.]serbanc[.]cl
  • mail[.]shineaccesorios[.]com[.]ar
  • mail[.]teambuildingempresarial[.]com
  • smtp[.]berabevudigital[.]com[.]ar
  • mail[.]conduto[.]com
  • gator4216[.]hostgator[.]com
  • smtp[.]terra[.]com[.]mx
  • webmail[.]carbonesdesantander[.]com
  • smtp[.]mail[.]yahoo[.]com[.]ar
  • correo2[.]redynet[.]com[.]ar
  • mail[.]freightlineroftoledo[.]com
  • mail[.]ebmworld[.]cu
  • smtp[.]dreamhost[.]com
  • p3plcpnl0728[.]prod[.]phx3[.]secureserver[.]net
  • mail[.]oxigenoshoes[.]com[.]ar
  • newmaq[.]com[.]bo
  • sintcom[.]com[.]mx
  • mail[.]inttegrain[.]com[.]mx
  • email8[.]luxsci[.]com
  • pop[.]itcsa[.]net
  • mail[.]grupodemejoracontinua[.]com[.]mx
  • mail[.]dtpressnorte[.]com[.]ar
  • pop[.]cbacontadores[.]com[.]uy
  • gator4012[.]hostgator[.]com
  • mail[.]ahesan[.]com[.]mx
  • mail2[.]isysa[.]com[.]mx
  • mail[.]peltier[.]net
  • pop[.]moorwaymanagement[.]com
  • mail[.]ykkip[.]com
  • mail[.]refridcol[.]com
  • mail[.]digosaautopartes[.]com[.]mx
  • mail[.]merzey[.]com
  • pop[.]icon1[.]ca
  • mail[.]cablenettv[.]com[.]ar
  • mail[.]petrovalle[.]com[.]ar
  • md-ht-2[.]webhostbox[.]net
  • iceschool[.]com[.]pe
  • imap[.]europe[.]secureserver[.]net
  • mail[.]hblseguros[.]com[.]co
  • mail[.]bell[.]net
  • mail[.]listo[.]com[.]co
  • pop[.]mcargo[.]net
  • mail[.]heyas[.]com[.]ar
  • mail[.]sedicomsa[.]com
  • filter1[.]nsbasicmail[.]com
  • mail[.]iphsa[.]com[.]mx
  • mail[.]seproacr[.]com
  • pop[.]startlogic[.]com
  • cowealth[.]com[.]tw
  • mailbox[.]carrossierprocolor[.]com
  • mail[.]enviro5[.]com
  • grupomycasa[.]com
  • mail[.]cssialtda[.]com
  • mail[.]diligroup[.]com
  • mail[.]salon53[.]mx
  • imap[.]tiendasenforma[.]com
  • pop3[.]sld[.]cu
  • smtp[.]ipv4networks[.]net
  • mail[.]navarac[.]com
  • gator3161[.]hostgator[.]com
  • mail[.]ramasa[.]com[.]mx
  • mail[.]tradequimsa[.]com
  • pop[.]premium-soft[.]com
  • mail[.]comodoro[.]coop
  • mail[.]distribuidoralamaro[.]com
  • mail[.]gaiasrl[.]com[.]ar
  • server1[.]cosefa[.]com[.]ar
  • lamallorquina[.]com[.]uy
  • mail[.]dycindustrial[.]cl
  • mail[.]ibs[.]mx
  • MAIL[.]BELL[.]NET
  • mail[.]kinderland[.]com[.]ar
  • mail[.]metropolitainerefrigeration[.]com
  • frbb[.]utn[.]edu[.]ar
  • mail[.]manchesterdental[.]co[.]uk
  • p3plcpnl0515[.]prod[.]phx3[.]secureserver[.]net
  • mail[.]lodis[.]cl
  • mail[.]lionquick[.]com
  • eclipse[.]websitewelcome[.]com
Files and or directories created
  • %SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
  • %SystemRoot%\SysWOW64\kyGqvfpU.exe
File Hashes
  • 02a0a4800d92ba59432af6e47480ede2769bd53d7af7840ce9a8ee7097ae0003
  • 079dd41f7437110d28bbd3c0f6bacb2f0cd1b23cb899772e8c380124be044fac
  • 09ad52e3866b1cd1629f5206c38d968ed82977026dfa79f3f9313625fce9298c
  • 16969a648499623f5b6d61785673c445035bcfa90d4303b88b922d76e6d95728
  • 1ab5e8be2711179c75581141bdaacf4b1fbc1806806d73e53b94e2286e150569
  • 2ca9efb4e856be7af3bbaa2c22108ab30a0aa30203b5accdd2787f4d4bda0315
  • 337af19fb5a1403b332b77a5c6958387ba9150d225d32c6474d5807fb5e9c21c
  • 43e226bd92a81a17a2f73a0e9f2f0ea7dee5c7756a4a6d476483cdf456024fdf
  • 49116b29290b3878908d64fc78d1fc92c21f9add774c8a3b2e55e8763f8a8267
  • 503c9111d0fc0efb4a3290c977dd8f0f6cf4925de69bf644fbbdf03857ca1776
  • 521c964fe97018ae915a3762dbf31a2397f7c283a494f19671354d5a179dcf3a
  • 524622e92156fb4e155e18f820b2897f60b49b2e0533ed449ab99642b16ef887
  • 52f83952d33df5dea2440d6a0211c004a41b6543f64edc6b9428c2b55897d45b
  • 53523d8333a3e913bb53523269c22af0e38d26bae9f637f2617acef7dabab06e
  • 5353758894e7cfaee0376ac38e76a1c366b1d0ea19911affdd23f2cbdc12d020
  • 53c708d13bb6526de05446fdef04d9d9f183f825596c89cc92d8e7aced3acbd0
  • 53d075b5be564101c888a82187527845404a2df42e7ae774937f9630da98fc3a
  • 559028389697aa6b223920c69441d68dddf5c1d46d7be8b3fb0d23af183d477c
  • 5844365b389ab2865c1c032561da07954e1b8312a61fe612672d7c11aca908c9
  • 5971aaaa42335a059f017e6586776f5b5de40590b4e68dfca8124811e372300e
  • 64cffcac96694cf3ffce2b7ff2962176f0fea267093ea4970d2aac3d53038fea
  • 67f41f532423939b59a2f0b890028ec7b9de5ec71b7e8bd0a8aee7906101174b
  • 689685a2edd6b0cabc8ca0fcbcf39e53e4da57d65dfe0e2658964dfb8cca39dd
  • 6cfc0383c421992c8d4e0f8a9a13e705e67b1735ad71520eacc1351c9e8cdc14
  • 78a0a5844a1ca119d94bcaea5ac5b8e256f2711b76eaccdffd0089c18f079e2d

Coverage


Screenshots of Detection

AMP




ThreatGrid




Umbrella



Microsoft Patch Tuesday — April 2019: Vulnerability disclosures and Snort coverage

$
0
0















Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 74 vulnerabilities, 16 of which are rated “critical” and 58 that are considered “important.” This release also includes a critical advisory covering a security update to Adobe Flash Player.

This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra Scripting Engine, Microsoft Office and Windows 10. For more on our coverage of these bugs, check out the Snort blog post here, covering all of the new rules we have for this release.

Critical vulnerabilities

Microsoft disclosed 16 critical vulnerabilities this month, four of which we will highlight below.

CVE-2019-0753 is a remote code execution vulnerability in the Microsoft Scripting Engine that exists in the way the Internet Explorer web browser handles objects in memory. The bug could allow an attacker to corrupt the system in a way that would allow them to gain the same rights as the current user and execute code remotely. In order to trigger this vulnerability, the attacker needs to convince the user to open a specially crafted website in Internet Explorer. They could also embed an ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the Internet Explorer rendering engine.

CVE-2019-0790CVE-2019-0791, CVE-2019-0792CVE-2019-0793 and CVE-2019-0795 are all remote code execution vulnerabilities that arise when the Microsoft XML Core Services MSXML parser processes user input. An attacker could exploit any of these bugs to take control of the user’s system. A user could trigger these vulnerabilities by visiting an attacker-created web page that contains malicious MSXML.

The other critical vulnerabilities are:

Important vulnerabilities

This release also contains 58 important vulnerabilities, eight of which we will highlight below.

CVE-2019-0732 is a feature bypass vulnerability in several versions of the Windows operating system that could allow an attacker to bypass Windows Device Guard. This bug exists because Windows improperly handles calls to the LUAFV driver. An attacker could exploit this vulnerability by accessing the local machine and then running a malicious program, giving them the ability to evade a User Mode Code Integrity policy on the machine.

CVE-2019-0752 is a remote code execution vulnerability in the Microsoft Scripting Engine that exists in the way the Internet Explorer web browser handles objects in memory. The bug could allow an attacker to corrupt the system in a way that would allow them to gain the same rights as the current user and execute code remotely. In order to trigger this vulnerability, the attacker needs to convince the user to open a specially crafted website in Internet Explorer. They could also embed an ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the Internet Explorer rendering engine.

CVE-2019-0790 and CVE-2019-0795 are remote code execution vulnerabilities that arise when the Microsoft XML Core Services MSXML parser processes user input. An attacker could exploit any of these bugs to take control of the user’s system. A user could trigger these vulnerabilities by visiting an attacker-created web page that contains malicious MSXML.

CVE-2019-0801 is a remote code execution vulnerability in Microsoft Office that arises when the software attempts to open PowerPoint or Excel files. An attacker could exploit this bug by tricking the user into clicking on a specially crafted URL file that points to an Excel or PowerPoint file, causing the file to download.

CVE-2019-0803 and CVE-2019-0859 are elevation of privilege vulnerabilities in some versions of Windows that exist when the Win32k component improperly handles objects in memory. If exploited, an attacker could gain the ability to run arbitrary code in kernel mode. An attacker could exploit this bug by logging onto the system and then running a specially crafted application.

CVE-2019-0822 is a remote code execution vulnerability that exists in the way Microsoft Graphics Components handles objects in memory. An attacker could exploit this vulnerability by tricking the user into opening a specially crafted file, eventually allowing them to execute arbitrary code in the context of the current user.

The other important vulnerabilities are:

Coverage 

In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

Snort rules: 45632, 45635, 46548, 46549, 49380, 49381, 49688, 49689, 49692 - 49711, 49716 - 49723, 49727 - 49747, 49750 - 49755

Gustuff banking botnet targets Australia

$
0
0

Vitor Ventura authored this post.

Executive summary

Cisco Talos has uncovered a new Android-based campaign targeting Australian financial institutions. As the investigation progressed, Talos came to understand that this campaign was associated with the "ChristinaMorrow" text message spam scam previously spotted in Australia.

Although this malware's credential-harvest mechanism is not particularly sophisticated, it does have an advanced self-preservation mechanism. Even though this is not a traditional remote access tool (RAT), this campaign seems to target mainly private users. Aside from the credential stealing, this malware also includes features like the theft of users' contact list, collecting phone numbers associated names, and files and photos on the device. But that doesn't mean companies and organizations are out of the woods. They should still be on the lookout for these kinds of trojans, as the attackers could target corporate accounts that contain large amounts of money.

The information collected by the malware and the control over the victim's mobile device allows their operators to perform more complex social engineering attacks. A motivated attacker can use this trojan to harvest usernames and passwords and then reuse them to login into the organization's system where the victim works. This is a good example where two-factor authentication based on SMS would fail since the attacker can read the SMS. Corporations can protect themselves from these side-channel attacks by deploying client-based two-factor authentication, such as Duo Security.

One of the most impressive features of this malware is its resilience. If the command and control (C2) server is taken down, the malicious operator can still recover the malware control by sending SMS messages directly to the infected devices. This makes the taking down and recovery of the network much harder and poses a considerable challenge for defenders.

The campaign


The malware's primary infection vector is SMS. Just like the old-school mail worms that used the victim's address book to select the next victims, this banking trojan's activation cycle includes the exfiltration of the victim's address book. The trojan will receive instructions from the C2 to spread.
Spread command from C2

The victim receives the command sendSMSMass. Usually, this message targets four or five people at a time. The body contains a message and URL. Again, the concept is that new victims are more likely to install the malware if the SMS comes from someone they know. When a victim tries to access the URL in the SMS body, the C2 will check if the mobile device meets the criteria to receive the malware (see infrastructure section). If the device does not meet the criteria, it won't receive any data, otherwise, it will be redirected to a second server to receive a copy of the malware to install on their device.

The domain on this campaign was registered on Jan. 19, 2019. However, Talos has identified that was used at least since November 2018. During the investigation, Talos was also able to determine that the same infrastructure has been used to deploy similar campaigns using different versions of the malware.
Distribution of victims.

Talos assess with high confidence that this campaign is targeting Australian financial institutions based on several factors. Our Umbrella telemetry shows that the majority of the request comes from Australia and the majority of the phone numbers infected have the international indicative for Australia. Finally, the specific overlays are designed for Australian financial institutions, and Australia is one of the geographic regions that is accepted by the C2.
DNS queries distribution over time

The campaign doesn't seem to be growing at a fast pace. Our data shows, on average, about three requests per hour to the drop host. This request is only made upon installation, but there is no guarantee that it will be installed. This data, when analyzed with the number of commands to send SMSs that Talos received during the investigation, lead us to conclude that the malicious operator is aggressively spreading the malware, but that doesn't seem to result in the same number of new infections.
Examples of the overlays available to the malware

Above, you can see examples of the injections that distributed to the malware as part of this specific campaign.

While doing our investigation we were able to identify other malware packages with different names. Some of these might have been used on old campaigns or were already prepared for new campaigns.

Malware technical details


During our investigation, researchers uncovered a malware known as "Gustuff." . Given the lack of indicators of compromise, we decided to check to see if this was the same malware we had been researching. Our Threat Intelligence and Interdiction team found the Gustuff malware being advertised in the Exploit.in forum as a botnet for rent. The seller, known as "bestoffer," was, at some point, expelled from the forum.

Gustuff advertising screenshot

The companies advertised in the image above were from Australia, which matches up with the campaign we researched. The screenshots provided by the author align with the advertised features and the features that we discovered while doing our analysis.
Admin panel

The administration panel shows the application configuration, which matches the commands from the C2.
Country selection

The administration console screenshots also show the ability to filter the results by country. In this case, "AU" is the code shown, which is Australia.

Based on this information, Talos assesses with high confidence that the malware is the same and this is, in fact, the Gustuff malware.

Design


In the manifest, the malware requests a large number of permissions. However, it doesn't request permissions like BIND_ADMIN. To perform some of its activities, the malware does not need high privileges inside the device, as we will explain ahead.
Permissions in the manifest

This malware is designed to avoid detection and analysis. It has several protections in place, both in the C2 and the malware's code. The code is not only obfuscated but also packed. The packer, besides making the static analysis more complex, will break the standard debugger.
Manifest activity declaration

Class list inside the dex file

The main malware classes are packed, to a point where the class defined in the manifest has a handler for the MAIN category that does not exist in the DEX file.
Error when trying to debug the malware using the Android Studio IDE.

One of the side effects of this packer is the inability of Android Studio IDE to debug the code. This happens because the IDE executes the code from the Android debug bridge (ADB) by calling the activity declared in the manifest by name. Since the class does not exist at startup, the application does not run on the debugger. Although Talos analyzed the unpacked version of the code, the packer analysis is beyond the scope of this post.
Check code for emulators

As part of its defense, the malware payload first checks for emulators to prevent analysis on sandboxes. It checks for different kinds of emulators, including QEMU, Genymotion, BlueStacks and Bignox. If the malware determines that is not running on an emulator, it then performs additional checks to ensure that it won't be detected.
Code to check the existence of SafetyNet Google API

It also checks if the Android SafetyNet is active and reporting back to the C2. This helps the C2 define what actions it can do before being detected on the mobile device.
List of anti-virus packages that are checked

The payload goes a long way to protect itself and checks for anti-virus software installed on the mobile device. The trojan uses the Android Accessibility API to intercept all interactions between the user and the mobile device.

The Android developer documentation describes the accessibility event class as a class that "represents accessibility events that are seen by the system when something notable happens in the user interface. For example, when a button is clicked, a view is focused, etc."

For each interaction, the malware will check if the generator is a package that belongs to the anti-virus list, the malware will abuse another feature of the Accessibility API. There is a function called "performGlobalAction" with the description below.

Android documentation describes that function as "a global action. Such an action can be performed at any moment, regardless of the current application or user location in that application. For example, going back, going home, opening recents, etc."

The trojan calls this function with the action GLOBAL_ACTION_BACK, which equals the pressing of the back button on the device, thus canceling the opening of the anti-virus application.
The same event interception is used to place the webview overlay when the user tries to access the targeted applications, allowing it to display its overlay, thus intercepting the credentials.

The beaconing only starts after the application is installed and removed from the running tasks.
Beaconing information

The ID is generated for each installation of the malware, while the token remains unique. Some of the checks performed previously are immediately sent to the C2, like the safetyNet, admin and defaultSMSApp. The beaconing is sent to the URL http://<SERVER>/api/v2/get.php with an interval of 60 seconds.

Answer from the C2

The C2 will check the country field, if it's empty or if the country is not targeted, it will reply with a "Unauthorized" answer. Otherwise, it will return a JSON encoded "OK," and if that is the case, the command to be executed.
List of available commands

The command names are self-explanatory. The command will be issued as an answer to the beaconing, and the result will be returned to the URL http://<SERVER>/api/v2/set_state.php
Example of the command "changeServer"

The commands are issued in a JSON format, and the obfuscation is part of the malware code and not added by the packer. It is a custom obfuscation partly based on base85 encoding, which is in itself unusual, in malware. Base85 encoding is usually used on pdf and postscript documentsThe configuration of the malware is stored in custom preferences files, using the same obfuscation scheme.

Activation cycle


As we have explained above, the malware has several defence mechanisms. Beside the obfuscation and the environment checks, the malware also has some interesting anti-sandbox mechanisms.

After installation, the user needs to run the application. The user needs to press the "close" button to finish the installation. However, this won't close the application, it will send it to the background, instead. While the application is in the background, although the service is already running, the beaconing will not start. The beaconing will only start after the application is removed from the background, ultimately stopping it. This will be the trigger for the service to start the beaconing.

As mentioned previously, the beaconing is done every 60 seconds. However, no command is received from the C2 until the inactiveTime field (see beaconing information image above) has at least the value of 2000000. This time resets every time the user performs some activity.

After the checks, the malware becomes active, but first, it goes through seven steps, each one calling a different command:
  1. uploadPhoneNumbers: Exfiltrates all phone numbers that are in the contact list. Aside from the natural value of phone numbers associated with the names of their owners. Using the SMS has an initial infection vector is another possibility for the exfiltration. One of the purposes of the exfiltration of the contact list is to use them to attack other victims using SMS as an initial vector.
  2. checkApps: Asks the malware to see if the packages sent as parameters are installed. The malware contains a list of 209 packages hardcoded in its source code. However, the C2 can send an updated list.
  3. List of packages received from the C2

  4. adminNumber: Setup of the admin phone number. In our case, the administrator phone number belongs to a mobile network in Australia.
  5. Phone number for administration

  6. changeServer: At this point, the malware changes the C2 to a new host, even though the API and communication protocol continues to be the same.
  7. Change server request

    The URL's for the new server is obfuscated, preventing easy network identification.

  8. changeActivity: This command will set up the webview to overlay any of the target activities.
  9. changeActivity command

    The webview injects are not hosted on the C2, they are hosted on a completely different server.

  10. params: This command allows the malicious operator to change configuration parameters in the malware. During this stage of the activation cycle, the malware increases the beaconing time to avoid detection.
  11. Command to change the beaconing

  12. changeArchive: The final command of the activation cycle is the download of an archive. This archive is stored in the same host has the webviews. The archive is a ZIP containing several files, which is protected with a password.
Change archive command

After this activation cycle, the malware will start the collection of information activities and dissemination.

Malicious activity


Once the activation cycle ends, the trojan will start its malicious activities. These activities depend on the device configuration. Depending if the victim has any of the targeted applications, the anti-virus installed or geographic location, the malware can harvest credentials from the targeted applications, exfiltrate all personal information or simply use the victim's device to send SMS to spread the trojan

The malware deploys overlaying webviews to trick the user and eventually steal their login credentials. These are adapted to the information the malicious operator wants to retrieve. The first webview overlay is created on step 6 of the activation cycle.
Pin request overlay

This overlay asks the user to provide their PIN to unlock the mobile device, which is immediately exfiltrated to the C2. The last step of the activation cycle is the download of a password-protected ZIP file. This file contains all HTML, CSS and PNG files necessary to create overlays. Talos found 189 logos from banks to cryptocurrency exchanges inside the archive, all of which could be targeted. The archive also contained all the necessary codes to target Australian financial institutions. The overlays are activated by the malicious operator using the command changeActivity, as seen on step 5 of the activation cycle. In this case, we can see that the HTML code of the overlay is stored in the C2 infrastructure. However, since the archive that is downloaded into the device has all the necessary information and the malicious actor has access to the device via SMS, the malicious operator can keep its activity even without the C2 infrastructure.

Infrastructure


The infrastructure supporting this malware is rather complex. It is clear that on all stages there are at least two layers.

The infrastructure has several layers, although not being very dynamic, still has several layers each one providing some level of protection. All the IP addresses belong to the same company Hetzner, an IP-hosting firm in Germany.

Coverage

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of compromise (IOCs)

Domains


Facebook-photos-au.su
Homevideo2-12l.ml
videohosting1-5j.gq

URLs

hxxp://88.99.227[.]26/html2/2018/GrafKey/new-inj-135-3-dark.html
hxxp://88.99.227[.]26/html2/arc92/au483x.zip
hxxp://94.130.106[.]117:8080/api/v1/report/records.php
hxxp://88.99.227[.]26/html2/new-inj-135-3-white.html
hxxp://facebook-photos-au[.]su/ChristinaMorrow
hxxp://homevideo2-12l[.]ml/mms3/download_3.php

IP addresses

78.46.201.36
88.99.170.84
88.99.227.26
94.130.106.117
88.99.174.200
88.99.189.31

Hash
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Additional information

Packages monitored

pin.secret.access
com.chase.sig.android
com.morganstanley.clientmobile.prod
com.wf.wellsfargomobile
com.citi.citimobile
com.konylabs.capitalone
com.infonow.bofa
com.htsu.hsbcpersonalbanking
com.usaa.mobile.android.usaa
com.schwab.mobile
com.americanexpress.android.acctsvcs.us
com.pnc.ecommerce.mobile
com.regions.mobbanking
com.clairmail.fth
com.grppl.android.shell.BOS
com.tdbank
com.huntington.m
com.citizensbank.androidapp
com.usbank.mobilebanking
com.ally.MobileBanking
com.key.android
com.unionbank.ecommerce.mobile.android
com.mfoundry.mb.android.mb_BMOH071025661
com.bbt.cmol
com.sovereign.santander
com.mtb.mbanking.sc.retail.prod
com.fi9293.godough
com.commbank.netbank
org.westpac.bank
org.stgeorge.bank
au.com.nab.mobile
au.com.bankwest.mobile
au.com.ingdirect.android
org.banksa.bank
com.anz.android
com.anz.android.gomoney
com.citibank.mobile.au
org.bom.bank
com.latuabancaperandroid
com.comarch.mobile
com.jpm.sig.android
com.konylabs.cbplpat
by.belinvestbank
no.apps.dnbnor
com.arkea.phonegap
com.alseda.bpssberbank
com.belveb.belvebmobile
com.finanteq.finance.ca
pl.eurobank
pl.eurobank2
pl.noblebank.mobile
com.getingroup.mobilebanking
hr.asseco.android.mtoken.getin
pl.getinleasing.mobile
com.icp.ikasa.getinon
eu.eleader.mobilebanking.pekao
softax.pekao.powerpay
softax.pekao.mpos
dk.jyskebank.mobilbank
com.starfinanz.smob.android.bwmobilbanking
eu.newfrontier.iBanking.mobile.SOG.Retail
com.accessbank.accessbankapp
com.sbi.SBIFreedomPlus
com.zenithBank.eazymoney
net.cts.android.centralbank
com.f1soft.nmbmobilebanking.activities.main
com.lb.smartpay
com.mbmobile
com.db.mobilebanking
com.botw.mobilebanking
com.fg.wallet
com.sbi.SBISecure
com.icsfs.safwa
com.interswitchng.www
com.dhanlaxmi.dhansmart.mtc
com.icomvision.bsc.tbc
hr.asseco.android.jimba.cecro
com.vanso.gtbankapp
com.fss.pnbpsp
com.mfino.sterling
cy.com.netinfo.netteller.boc
ge.mobility.basisbank
com.snapwork.IDBI
com.lcode.apgvb
com.fact.jib
mn.egolomt.bank
com.pnbrewardz
com.firstbank.firstmobile
wit.android.bcpBankingApp.millenniumPL
com.grppl.android.shell.halifax
com.revolut.revolut
de.commerzbanking.mobil
uk.co.santander.santanderUK
se.nordea.mobilebank
com.snapwork.hdfc
com.csam.icici.bank.imobile
com.msf.kbank.mobile
com.bmm.mobilebankingapp
net.bnpparibas.mescomptes
fr.banquepopulaire.cyberplus
com.caisseepargne.android.mobilebanking
com.palatine.android.mobilebanking.prod
com.ocito.cdn.activity.creditdunord
com.fullsix.android.labanquepostale.accountaccess
mobi.societegenerale.mobile.lappli
com.db.businessline.cardapp
com.skh.android.mbanking
com.ifs.banking.fiid1491
de.dkb.portalapp
pl.pkobp.ipkobiznes
pl.com.suntech.mobileconnect
eu.eleader.mobilebanking.pekao.firm
pl.mbank
pl.upaid.nfcwallet.mbank
eu.eleader.mobilebanking.bre
pl.asseco.mpromak.android.app.bre
pl.asseco.mpromak.android.app.bre.hd
pl.mbank.mnews
eu.eleader.mobilebanking.raiffeisen
pl.raiffeisen.nfc
hr.asseco.android.jimba.rmb
com.advantage.RaiffeisenBank
pl.bzwbk.ibiznes24
pl.bzwbk.bzwbk24
pl.bzwbk.mobile.tab.bzwbk24
com.comarch.mobile.investment
com.android.vending
com.snapchat.android
jp.naver.line.android
com.viber.voip
com.gettaxi.android
com.whatsapp
com.tencent.mm
com.skype.raider
com.ubercab
com.paypal.android.p2pmobile
com.circle.android
com.coinbase.android
com.walmart.android
com.bestbuy.android
com.ebay.gumtree.au
com.ebay.mobile
com.westernunion.android.mtapp
com.moneybookers.skrillpayments
com.gyft.android
com.amazon.mShop.android.shopping
com.comarch.mobile.banking.bgzbnpparibas.biznes
pl.bnpbgzparibas.firmapp
com.finanteq.finance.bgz
pl.upaid.bgzbnpp
de.postbank.finanzassistent
pl.bph
de.comdirect.android
com.starfinanz.smob.android.sfinanzstatus
de.sdvrz.ihb.mobile.app
pl.ing.mojeing
com.ing.mobile
pl.ing.ingksiegowosc
com.comarch.security.mobilebanking
com.comarch.mobile.investment.ing
com.ingcb.mobile.cbportal
de.buhl.finanzblick
pl.pkobp.iko
pl.ipko.mobile
pl.inteligo.mobile
de.number26.android
pl.millennium.corpApp
eu.transfer24.app
pl.aliorbank.aib
pl.corelogic.mtoken
alior.bankingapp.android
com.ferratumbank.mobilebank
com.swmind.vcc.android.bzwbk_mobile.app
de.schildbach.wallet
piuk.blockchain.android
com.bitcoin.mwallet
com.btcontract.wallet
com.bitpay.wallet
com.bitpay.copay
btc.org.freewallet.app
org.electrum.electrum
com.xapo
com.airbitz
com.kibou.bitcoin
com.qcan.mobile.bitcoin.wallet
me.cryptopay.android
com.bitcoin.wallet
lt.spectrofinance.spectrocoin.android.wallet
com.kryptokit.jaxx
com.wirex
bcn.org.freewallet.app
com.hashengineering.bitcoincash.wallet
bcc.org.freewallet.app
com.coinspace.app
btg.org.freewallet.app
net.bither
co.edgesecure.app
com.arcbit.arcbit
distributedlab.wallet
de.schildbach.wallet_test
com.aegiswallet
com.plutus.wallet
com.coincorner.app.crypt
eth.org.freewallet.app
secret.access
secret.pattern

Vulnerability Spotlight: Adobe Acrobat Reader remote code execution

$
0
0

Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.

Executive summary

There is a remote code execution vulnerability in Adobe Acrobat Reader that could occur if a user were to open a malicious PDF on their machine using the software. Acrobat is the most widely used PDF reader on the market, making the potential target base for these bugs fairly large. The program supports embedded JavaScript code in the PDF to allow for interactive PDF forms, giving the potential attacker the ability to precisely control memory layout and creating an additional attack surface.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that the issue is resolved and that an update is available for affected customers.

Vulnerability details

Adobe Acrobat Adobe Acrobat Reader DC text field value remote code execution vulnerability (TALOS-2018-0774/CVE-2019-7125)

A specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC 2019.10.20069. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page. The vulnerability in this advisory is the same as TALOS-2018-0704 (CVE-2018-19716), which was disclosed in December 2018, as it wasn't properly patched to cover all cases.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Adobe Acrobat Reader DC, version 2019.010.20069 is affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48293, 48294


Sextortion profits decline despite higher volume, new techniques

$
0
0
Post authored by Nick Biasini and Jaeson Schultz.

Sextortion spammers continue blasting away at high volume. The success they experienced with several high-profile campaigns last year has led these attackers to continue transmitting massive amounts of sextortion email. These sextortion spammers have been doing everything they can to keep their approach fresh. Not only does this help sextortionists evade spam filters, increasing their chances of landing in recipients' inboxes, but it also ups their chances of finding a message that has language that resonates, convincing potential victims that the perceived threat is indeed real. Let's take a look at some of the recent changes we've seen in the sextortion email landscape.

Sextortion profits decline sharply


In an effort to see how lucrative sextortion schemes continue to be, Cisco Talos revisited some of the larger campaigns we had seen since the beginning of 2019. We selected one of the highest volume campaigns for deeper analysis: sextortion messages containing "Subject: <username> : <password>." The same attackers behind the "Aaron Smith" campaigns last year, which we wrote about in October, are behind these new efforts.

After collating all the email samples we could find in SpamCop, we then extracted the Bitcoin addresses where victims were asked to deposit their extortion payments. Talos identified over 1 million sextortion emails transmitted by these sextortionists between January and March 2019. However, after reviewing the targets, we found only 29,000 unique email recipients. This means that each user is receiving an average of 38 emails from this one sextortion campaign. This seems like a counter-intuitive approach since after a user receives one or maybe two of these emails, the effectiveness is going to be greatly reduced. However, that doesn't mean at least some of the targets aren't paying up.

The reuse of Bitcoin addresses are rampant in this campaign, with only about 9,000 unique Bitcoin addresses among the entire set of messages. We began an analysis of these addresses to determine how many Bitcoins have been deposited into the attackers' accounts. After pulling the current value of these addresses, we were able to find ~3.5 BTC in the addresses, which equals about $17,000. These returns are quite disappointing when compared with the $150,000 these same attackers obtained in just two months of sextortion attacks last fall. Rather than face the harsh reality that fewer victims continue to fall for their scams, however, sextortionists are redoubling their efforts.

A lot of simple tricks and nonsense

For a large sextortion spam campaign, there is no greater nemesis than the anti-spam filter. Messages reusing the same content over and over are quite easy to identify and preempt into the trash bin as they arrive. Last year, many of the sextortion emails we encountered varied some of the wording inside the emails but did not make much effort to try and bypass anti-spam filters. For example, below is the HTML body from one of the messages sent last October as a part of the "Aaron Smith" sextortion campaign.
Now, however, these same attackers have taken to designing their messages with the objective of improving their performance against anti-spam filters. From the perspective of the victim, the message itself is still as readable as it ever was. However, the underlying code that the mail client uses to render the message has become much more complex. In the example below, the attackers are using a combination of the username in comments, plain text letters and HTML character entities.
Since tricks like this aren't guaranteed to bypass anti-spam filters, spammers have also dusted off some crusty old techniques dating from back in 2005: image spam. The concept of image spam is simple enough — instead of transmitting the body of the email as text, spammers include only an image of the text, leaving very little for the anti-spam system to examine. Below is an example of a sextortion message using this image spam technique. Unfortunately for the attackers, this tactic wasn't thought through completely. The sextortion email asks the victim to copy and paste the Bitcoin address, but this is impossible to do, as the text is inside the image.

Scammers offer "proof"

Besides varying the technical and structural details of their messages, sextortion spammers are similarly freshening up their social engineering approach. Previously, in order to convince recipients that the lies in the sextortion email were true, many early sextortion campaigns included victim's passwords that attackers had obtained from publicly available data breaches. Other techniques we saw early on included supposedly sending the sextortion email from the same address as the recipient (The emails are coming from *inside* the house!!) Now, sextortion attackers are once again upping the ante by offering "proof" associated with their extortion claims.

Sextortion messages from this particular campaign include a ZIP file attachment which purportedly contains evidence. When extracted, this file prompts the user to visit a URL, and then extracts a file, "Password.txt," that contains the same URL and instructions, plus another ZIP file. A variation of this same technique includes a similar setup with the instructions to get the password in the email itself, as is shown in the example below.
At this point, the URLs have resulted in dead links or non-existent pages. However, if the link is active, the user is prompted with a request to purchase the password for $50. This would ensure that the actor would at least get some money from the victim.

Another campaign switched from attaching ZIP files to PDFs. These PDFs then link to a webpage, which is redirecting to a Cryptonator — a cryptocurrency wallet — portal requesting $25 for the ZIP file. This may be an indication that the initial effort of sending a ZIP file directly is not paying off as well as expected.
If you try to decompress the ZIP file without a password, some of the files will decompress and others will not. What the user will see is some directories being created that appear to be associated with a free digital audio recorder, editor and mixer. There are files that would appear interesting to the user as well, but those files, obviously, do not extract.
Without paying for the password, we have been unable to identify the contents of these files, but they are likely just some sort of innocuous junk data. Ideally, the adversary is hoping that just the presence of these files is enough to persuade the users to pay the ransom, and unfortunately, it appears to have worked. During the investigation, we were able to find a small number of victims that appear to have paid the extortion payment into the attackers' Bitcoin addresses.

Conclusion

Early success has led to a proliferation of sextortion spam, but profits from these types of scams are declining rapidly. Going back to their inception months ago, the adversaries have made hundreds of thousands of dollars with little more than publicly available data and some ingenuity. Users need to understand that these sextortion attempts are nothing but a sham, and the threat isn't backed up by real data. Unfortunately, the reality is that it is still far too easy to extort users with the threat of exposure without any real data backing it up and the bad guys are continuing to cash in on users' own paranoia.

As always, users are encouraged to use strong, unique passwords for accounts online and to rotate those passwords regularly. This type of simple password hygiene can greatly reduce the success of these types of attacks and protect the user from real account compromise impacts. In today's internet, having usernames and passwords breached is a part of being online, and users need to be prepared for that eventuality. Using multi-factor authentication for those critical accounts is a great additional step users can take to help eliminate some of the risks. As the efficacy of sextortion scams continues to decline, Talos expects attackers to pivot to one of the many other tricks they have up their sleeves.

Coverage


Email Security can block malicious emails sent by threat actors as part of their campaign.













IOC

Email Subjects:

  • Ticket: #<Random Number>
  • Re: #<Random Number>
  • RE: Case #<Random Number>
  • Subject: <Username> : <Password>

Attachments:

  • <Random String>_Proof#<Random Number from subject>.zip
  • <Random String>_Proof#<Random Number from subject>.pdf

Threat Source (April 11)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit— our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

We made waves this week with an article on malicious groups on Facebook. We discovered thousands of users who were offering to buy and sell various malicious services, such as carding, spamming and the creation of fake IDs. News outlets across the globe covered this story, including NBC News, Forbes and WIRED.

There’s also new research on the Gustuff malware. Researchers discovered this banking trojan earlier this year, and recently, we tracked it targeting Australian users in the hopes of stealing their login credentials to financial services websites.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos


Location: Salt Lake City, Utah
Date: April 25
Speaker: Nick Biasini
Synopsis: Join Nick Biasini as he takes part in a day-long education event on all things Cisco. Nick will be specifically highlighting the work that Talos does as one part of the many breakout sessions offered at Cisco Connect. This session will cover a brief overview of what Talos does and how we operate. Additionally, he'll discuss the threats that are top-of-mind for our researchers and the trends that you, as defenders, should be most concerned about.  

Cyber Security Week in Review

  • WikiLeaks founder Julian Assange was arrested in London on Thursday after being extradited from the Ecuadorian embassy. Hours later, the U.S. formally charged him with conspiracy to commit computer intrusion. WikiLeaks is responsible for leaking thousands of classified government documents over the years.
  • Amazon workers reportedly listen to some conversations with Alexa devices in order to improve the software’s voice recognition technology. A handful of employees transcribe the recordings, annotate them and then feed it back into the software.
  • Yahoo agreed to a $118 million settlement with users over a 2013 data breach. The company, which is now owned by Verizon, affected 3 billion users worldwide, but Yahoo kept it quiet for years.
  • The U.S. government released a warning regarding the new “HOPLIGHT” malware that appears to originate from North Korea. According to a report from the FBI and Department of Homeland Security, the malware has the ability to read, write and move files, connect to a remote host, and upload and download files, among other functions.
  • Verizon patched a vulnerability in some of its routers that could have allowed an attacker to gain root privileges. This could allow them to target other devices on the network, such as internet-of-things equipment. 
  • Security researchers bypassed the Samsung Galaxy S10’s fingerprint scanner with a 3-D printed model. This means that attackers could potentially steal users’ fingerprints and then be able to gain physical access to their devices.
  • Three recent spam campaigns are spreading the TrickBot malware via malicious attachments that disguise themselves as tax documents. The attackers spoof ADP and Paychex, two producers of human resources and payment software.
  • Cybersecurity companies are pledging to help users remove so-called "stalkerware" from users' smartphones. The companies say they will send alerts to users if this software, which is traditionally used to track other users, is dected on their device.

Notable recent security issues

Title: Microsoft patches 74 vulnerabilities, 14 critical
Description: Microsoft released its monthly security update Tuesday, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 74 vulnerabilities, 16 of which are rated “critical” and 58 that are considered “important.” This release also includes a critical advisory covering a security update to Adobe Flash Player. This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra Scripting Engine, Microsoft Office and Windows 10.
Snort SIDs: 45632, 45635, 46548, 46549, 49380, 49381, 49688, 49689, 49692 - 49711, 49716 - 49723, 49727 - 49747, 49750 - 49755

Title:Adobe fixes vulnerabilities in Flash Player, Acrobat
Description: Adobe patched vulnerabilities in 15 of its products this week as part of its monthly security update. The vulnerabilities disclosed include critical memory corruption bugs in Shockwave, as well as remote code execution vulnerabilities in Acrobat Reader.
Snort SIDs: 48293, 49294

Most prevalent malware files this week

SHA 256:d05a8eaf45675b2e0cd6224723ededa92c8bb9515ec801b8b11ad770e9e1e7ed
MD5: 6372f770cddb40efefc57136930f4eb7
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: PUA.Osx.Adware.Gt32supportgeeks::tpd

SHA 256:3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256:8f236ac211c340f43568e545f40c31b5feed78bdf178f13abe498a1f24557d56
MD5: 4cf6cc9fafde5d516be35f73615d3f00
Typical Filename: max.exe
Claimed Product:易语言程序
Detection Name: Win.Dropper.Armadillo::1201

SHA 256:46bc86cff88521671e70edbbadbc17590305c8f91169f777635e8f529ac21044
MD5: b89b37a90d0a080c34bbba0d53bd66df
Typical Filename: cab.exe
Claimed Product: Orgs ps
Detection Name: W32.GenericKD:Trojangen.22ek.1201

SHA 256:790c213e1227adefd2d564217de86ac9fe660946e1240b5415c55770a951abfd
MD5: 147ba798e448eb3caa7e477e7fb3a959
Typical Filename: ups.exe
Claimed Product: TODO: <产品名>
Detection Name: W32.Variant:XMRig.22fc.1201

Top spams stats for this week

Top 5 spam subjects observed
  • "Help Desk: Planned maintenance for Tuesday 9th"
  • "Iron Mountain Australia Group Pty Ltd - Invoice Number AUS402803"
  • "Fwd: Netflix statement Of Payment."
  • "Please approve - Allina"
  • "Your Netflix Membership Has Been Suspended"
Top 5 most used ASNs for sending spam
  • 8075 Microsoft Corporation
  • 3136 State of WI Dept. of Administration
  • 6276 OVH SAS
  • 8560 1&1 Internet SE
  • 16509 Amazon.com, Inc.

Threat Roundup for April 5 to April 12

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 05 and April 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Eyooun-6931755-0
    Malware
    Eyooun downloads and installs additional malicious and non-malicious programs onto the system.
     
  • Doc.Malware.Sagent-6932497-0
    Malware
    Sagent launches PowerShell through macros in Microsoft Office documents. The PowerShell then downloads unwanted software from remote websites.
     
  • Win.Malware.Emotet-6933520-0
    Malware
    Emotet is a banking trojan that remains relevant due to its ability to evolve and bypass antivirus products. It is commonly spread via malicious email attachments and links.
     
  • Win.Worm.Scar-6934835-0
    Worm
    Scar will download and execute files to the system while attempting to spread to other machines by copying itself to removable media.
     
  • Win.Worm.Aspxor-6935052-0
    Worm
    Aspxor botnet has the capabilities to send spam, download and execute other samples. This botnet is known for collecting credentials from infected computers.
     
  • Win.Malware.Vbkeylog-6935273-0
    Malware
    This generic family will attempt to deceive the infected computer's users into receiving a payment or getting personal data.
     
  • Win.Malware.Zbot-6935412-0
    Malware
    Zbot, also known as Zeus, is trojan that steals information such as banking credentials using a variety of methods, including key-logging and form-grabbing.
     
  • Win.Ransomware.Cerber-6935713-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Trojan.Winwebsec-6935682-0
    Trojan
    Winwebsec installs itself to a compromised system as a "anti-malware" software with desktop links and various persistence techniques (Windows service, Registry Run key, etc.). This family is known for using fake alerts for malware found on the system to deceive users into buying services before the "malware" can be removed.
     
  • Win.Malware.Tovkater-6936213-0
    Malware
    This malware is able to download and upload files, inject malicious code and install additional malware.
     

Threats

Win.Malware.Eyooun-6931755-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP6\PARAMETERS
Value Name: DisabledComponents
34
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
Value Name: GlobalAssocChangedCounter
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\APPLICATIONDESTINATIONS
Value Name: MaxEntries
18
<HKLM>\SOFTWARE\MICROSOFT\TRACING\WCLGSITA_RASAPI32
Value Name: FileDirectory
8
<HKLM>\SOFTWARE\MICROSOFT\TRACING\WCLGSITA_RASMANCS
Value Name: FileDirectory
8
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\DIRECTDRAW\MOSTRECENTAPPLICATION
Value Name: ID
7
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: svchost.exe
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LYPWXAWN
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ISFCQMJB
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IUGPWHEJ
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OJIKFFNJ
Value Name: name
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\PSCEGPBN
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\QSWARNLV
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATDUWYIG
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OTMYZEPH
Value Name: DisplayName
2
MutexesOccurrences
CommLogDbgStrMutex61
\BaseNamedObjects\CommLogDbgStrMutex61
DBWinMutex32
8Bc0E7-2F5D-49c0-A6D6-appadvert19
Local\MSIMGSIZECacheMutex14
openbox12
adkuai8_client_newdown11
adkuai8_newdown11
04AEB7B0-04A8-04A82810F7B640-8A4A82810F7B610
Local\__DDrawCheckExclMode__7
Local\__DDrawExclMode__7
Local\DDrawDriverObjectListMutex7
Local\DDrawWindowListMutex7
Local\InternetExplorerDOMStoreQuota2
Local\http://www.baidu.com/2
Local\DirectSound DllMain mutex (0x00000174)1
fc23890639e7d704fbd1b52b749200a51
fccb83f4591c45a062aa5389a08b9eef1
8e92460d25c534d048fd1c88e802f7e81
dbc843e527e2b5c81be3562287f89d3c1
5d25335e7777648b50dc7504f83b06da1
Local\DirectSound DllMain mutex (0x000005AC)1
73b50e38332dbd8c708884de7b44d0f01
efc928dd753ae98b928ed12919a305ca1
53279609cec7acce6827bdec60299b7d1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
18[.]223[.]92[.]14542
116[.]28[.]63[.]21442
122[.]152[.]212[.]22432
218[.]65[.]30[.]4130
117[.]41[.]234[.]9230
122[.]224[.]34[.]10325
150[.]138[.]92[.]6224
18[.]218[.]183[.]2123
222[.]214[.]218[.]23920
113[.]105[.]164[.]3120
120[.]55[.]244[.]21219
175[.]126[.]163[.]12414
42[.]62[.]4[.]6213
47[.]92[.]249[.]15212
120[.]77[.]171[.]3712
47[.]107[.]83[.]21212
219[.]150[.]218[.]11912
125[.]88[.]158[.]21211
219[.]145[.]240[.]8611
219[.]145[.]240[.]8511
219[.]145[.]240[.]8411
106[.]122[.]250[.]21210
150[.]138[.]92[.]10610
219[.]150[.]218[.]449
59[.]110[.]185[.]1049
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
wj[.]center[.]oldlist[.]info61
ecount[.]2019cn[.]com54
nj9qq[.]cn42
top[.]sefcg[.]com23
pack[.]1e5[.]com22
ad[.]uuuwin[.]com19
ks2[.]we2019[.]com14
imgwx4[.]2345[.]com13
tv[.]2345[.]com13
imgwx3[.]2345[.]com13
imgwx2[.]2345[.]com13
imgwx1[.]2345[.]com13
imgwx5[.]2345[.]com13
mini[.]sefcg[.]com13
log2[.]nagirl[.]cn13
LOG2[.]NAGIRL[.]CN13
union[.]lm33[.]com12
liosm231[.]com12
list[.]adkuai8[.]com11
p2p[.]adkuai8[.]com11
down02[.]adkuai8[.]com11
ipaddress[.]adkuai8[.]com11
tongji[.]adkuai8[.]com11
log[.]uinfo[.]soomeng[.]com10
next[.]91xiaba[.]com10
See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini59
%TEMP%\SSL40
%TEMP%\SSL\cert.db40
%TEMP%\SSL\Small DigiCert Baltimore Root 2.cer34
%SystemRoot%\SysWOW64\Log31
%TEMP%\h2u31tg4.exe30
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\config[1].zip30
\PC*\MAILSLOT\NET\NETLOGON23
%HOMEPATH%\Desktop\¿³°×Öí±¬9999¼¶ÉñÆ÷.lnk23
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\190[1].ico23
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\215[1].ico23
\DosDevices\C:\Windows\System32\wfp\wfpdiag.etl23
%System32%\wfp\wfpdiag.etl23
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\procelist[1].ini22
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\018[1].exe19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V0100009.log14
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000B.log14
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000D.log14
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000F.log14
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\mini[1].htm13
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\hideconfig[1].zip13
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\6YL4T24G\classicTv_tvHotMini[1].htm12
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\LOLO[1].png12
%SystemRoot%\api-ms-win-cx0-l1-01-19.dll12
%SystemRoot%\SysWOW64\del.bat12
See JSON for more IOCs
File Hashes
  • 002a3ee5d238a80bd8c3759d8478d7d9098af54cbcbd264bcd78ad172c7fded5
  • 0066dccf58f6d2ea4e303e870aea20c25d0c945a4b5c6796548acb20ae2dd268
  • 015d9a05e3595d8902031dda87e999396a9a2b5267195e35f3752cef08a37b50
  • 0181a703fa74afdd4640b52de9338b0dd6e14446c0635bebf8883999cfa0be01
  • 090f9030986cdb1413bc9f5c6901952e23be5f6c48b7ce0f9858e92e91142d26
  • 09d3b0027fba2e0419841177734b811e506aed12d758d75d77a1f71ebb1b16bf
  • 09f0116a571ccf405cf2b83507fb2d3c139a8f9fe7ce9fc77595c7c66d4f9a53
  • 0f0d5f033b1096e209857c255edb94e30306087a172edb5816f4464c92a9870c
  • 1029ddb2e83f17e8318199afb81a4434de65e12728552f66255cd7814b7cce0f
  • 159a0f8cc9ed369de6b89806b3d29a287183dc15deb59ea916d246d736385684
  • 179662d10fbf28f36e7fbf9d61e20ecf01ea0efe03223e19aad2e24a4ae56bb0
  • 19fb21319fb6479eb23cf06f3298f991466dbd1954c320db749e6f4ee727a27c
  • 1ac81f029e1fc5c7c11045d910ba3882946bd6535369675c6b443c35ef2e5c18
  • 1f78e240a8cdfda72e443b39cbfdf4faab1ed8092cdf9b02bdc7456dffbe1f47
  • 1fb5ec3d10289d0f00460070da92853ba1d90dbebd6dc6a8266a09ad3c36a154
  • 208d2e1fdf8b87f1b37644e57f340b984c8d68de8ba02525c61b6158b9d6e539
  • 24b4b426368e29fe933d6b427d1ae47e31fb346b2392e2161a67add890bae196
  • 2d60ced2eef863bc23232f4c3a80be8545902f2efa4dd9eab7f680a5643d8289
  • 2ec0873e6ce50626bccb3217c8fe10fd421604dd5fe45fa58c6f54b90b369d6b
  • 30944e432f0f25fda774cfe7090a9cef872b02bd754636a1176e98f7298c5780
  • 3291d369e4f69353b221ef184731f93c80f3762de2114d4b4f1a6b200f66aab8
  • 388259027de10322e1da522901d84a83bc8a5585d2d61a47b4ecd9c87cc30d26
  • 3960aa9d31ec0dacc0f11edbebc8820e4f929bdfc2943aec52dea840c456e264
  • 39d8b6f916b96060c7e55c468fb066a51ccd5a8c1e0f3d43fa29dc12dad129f0
  • 3a328a6515c449cf1f1807ede10f790014b5905cda161828d3eea7750a7d2264
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Doc.Malware.Sagent-6932497-0


Indicators of Compromise


Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
10
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 10
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 10
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 10
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 10
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 10
<HKCR>\WOW6432NODE\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 10
<HKCR>\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 10
<HKCR>\WOW6432NODE\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 10
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 10
<HKCR>\WOW6432NODE\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 10
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 10
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 10
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 10
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 10
<HKCR>\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 10
MutexesOccurrences
Global\I98B68E3C10
Global\M98B68E3C10
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
89[.]188[.]124[.]14510
190[.]117[.]82[.]10310
190[.]0[.]32[.]20610
104[.]18[.]35[.]1637
104[.]18[.]34[.]1633
43[.]229[.]62[.]1861
104[.]2[.]2[.]1531
201[.]165[.]102[.]491
187[.]189[.]210[.]1431
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
xoso[.]thememanga[.]com10
Files and or directories createdOccurrences
\EVENTLOG10
%APPDATA%\Microsoft\Forms10
%APPDATA%\Microsoft\Forms\WINWORD.box10
%HOMEPATH%\80.exe10
\REGISTRY\MACHINE\SOFTWARE\Classes\.doc1
%System32%\WindowsPowerShell\v1.0\Certificate.format.ps1xml1
%SystemRoot%\SysWOW64\A7Nx4PQT5.exe1
%SystemRoot%\SysWOW64\N6yvu6lNl.exe1
%SystemRoot%\SysWOW64\g6iqfJhcB0Xc88E.exe1
%SystemRoot%\SysWOW64\f9XnJqVa5Bt6Sf.exe1
%SystemRoot%\SysWOW64\9yMQn0Zw.exe1
%SystemRoot%\SysWOW64\c33fB.exe1
%SystemRoot%\SysWOW64\aThVJIMunDfvC.exe1
%SystemRoot%\SysWOW64\SqxzR9tB3STZYB9o1.exe1
%SystemRoot%\SysWOW64\WyFb5EUyZBFDn5Gb.exe1
%SystemRoot%\SysWOW64\TYVGTeXwXGD.exe1
File Hashes
  • 310c672343531ecc8fb2bc22b979a34f6e3c3d6c56eaad0dadeecade3e6c64d9
  • 60973bfc7ccac458d9ac4b7192a40774316b04d86cdb106b0c205d75778b7c65
  • b3ff81bf64f077e1b466d3696c3528f9c644d503b515473b16803610f240dd05
  • d1d756451258f60d10e1c46540438f9a7c9ad84bfe7b4a1cb944ae02e456d3aa
  • dfcb889cbff15a54eab56367f8f5da6855cf534ad732938eb4cc472a77c231a0
  • e39863e66ab0f1bf0b8d35f2715d3de220f6bb3d0c28b68d8f14d53ed1acb7e4
  • e8ca6c66c79cca9404a9f6a6920ff02010dc799435381a97fd5c57cf0c3abb41
  • e9a0aabcf4e854ca4b16e9ebd2d228b2e581abc12d27ef34b9f8a5978d224128
  • eba143b8f9ea163949037b683622c1cf9672e9a4e63513ecd20ebe1aff4e3ff5
  • f4282b6fc250485ebd045d3008195a5c3e2b385c5caaada93ea221f53326d3ec

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Malware



Win.Malware.Emotet-6933520-0


Indicators of Compromise


Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
16
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
Value Name: SavedLegacySettings
16
<HKU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\sourcebulk 16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Description
16
<HKLM>\SOFTWARE\Microsoft\ESENT\Process\guiddefribbon\DEBUG 16
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
Value Name: WpadDecisionTime
16
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\A4-E3-E4-11-EC-FD
Value Name: WpadDetectedUrl
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\2c-28-30-ca-41-e3 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\2c-28-30-ca-41-e3 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\c0-21-36-0e-b0-2b 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\c0-21-36-0e-b0-2b 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\c8-7c-48-93-48-f7 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\c8-7c-48-93-48-f7 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\24-f7-27-10-2d-94 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\24-f7-27-10-2d-94 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\dc-35-3c-bc-55-73 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\dc-35-3c-bc-55-73 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\46-b9-fc-8e-0c-36 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\46-b9-fc-8e-0c-36 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\e2-85-af-73-a1-bc 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\e2-85-af-73-a1-bc 1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\46-B9-FC-8E-0C-36
Value Name: WpadDecisionTime
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\E2-85-AF-73-A1-BC
Value Name: WpadDecisionTime
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\24-F7-27-10-2D-94
Value Name: WpadDecisionTime
1
MutexesOccurrences
Global\I98B68E3C16
Global\M98B68E3C16
\BaseNamedObjects\Global\M3C28B0E416
\BaseNamedObjects\Global\I3C28B0E416
Global\Nx534F51BC1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
43[.]229[.]62[.]18615
190[.]0[.]32[.]20615
187[.]189[.]210[.]14315
201[.]165[.]102[.]4915
89[.]188[.]124[.]14515
104[.]2[.]2[.]15315
190[.]117[.]82[.]10315
208[.]100[.]26[.]2511
5[.]196[.]133[.]2061
198[.]187[.]30[.]2491
104[.]236[.]135[.]1191
71[.]78[.]158[.]1901
190[.]219[.]231[.]691
208[.]180[.]217[.]1731
181[.]31[.]182[.]1381
201[.]249[.]117[.]1231
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat16
%System32%\guiddefribbon.exe (copy)2
%SystemRoot%\SysWOW64\SBp2VS8N7jU.exe1
%SystemRoot%\SysWOW64\yXRDTc.exe1
%SystemRoot%\SysWOW64\LvO5IJ1Sr5t.exe1
%SystemRoot%\SysWOW64\5kQW.exe1
%SystemRoot%\SysWOW64\Nsa7bjsedHZNrMyW.exe1
%SystemRoot%\SysWOW64\MZ5WK.exe1
%SystemRoot%\SysWOW64\FxiHy64z3NDOiHEgC.exe1
%SystemRoot%\SysWOW64\hlaVhqNG.exe1
%SystemRoot%\SysWOW64\Ahfk9lC4PqeGiyhY.exe1
%SystemRoot%\SysWOW64\xdm5D3NLE.exe1
%SystemRoot%\SysWOW64\2o75cQI.exe1
%SystemRoot%\SysWOW64\oxJI2FKrOP.exe1
%SystemRoot%\SysWOW64\MoSv9WL5Pn2Rd22eN.exe1
%SystemRoot%\SysWOW64\LQRA42.exe1
%SystemRoot%\SysWOW64\MVED6NriD.exe1
File Hashes
  • 07bb6313dc4e4e47fffe542787f7e5f085f7a0b827a3614a666b8ba122895a5b
  • 1317735faa4586cd57e311b7fa5462675b19b6767898bbc9fd1ea438e9b269a1
  • 1cfb22555921bcd42ea2976527cedebe9b0a70a24ca2f4695d61496956a9fb65
  • 34dc74f395344d40e6ce6e08f73ea822d83107c276e230862aa7f20ec24677d9
  • 5bcbb702d1936de97fc26a33767f7d1b1973455d7a783dae80246fae99024b98
  • 6123a5957f13a02e1752a9242f68f2cec27443ea0e4fbea65edde4c05a48ec38
  • 642b1802bb2c429da4521e8fd159498cf814ab43df41d2213ccf4c8e7bf3a58f
  • 67121ec06c244e75ba3c217b6ec7c9ea795f71bb673c87ced115a7bae939b6a2
  • 67b8cdfe8f7b193723a6db03fb8f2246710ba6b4bfd2681134175f98150d307a
  • 7581c79cd28ae473538de22e69f00d8a0642937621a08d6a304e7bae7cc1f467
  • 86630ccb5c7e8d248e28446f27f2faf21d2712e18b3b6fb7749c9dd0d82c2752
  • 87989bca4fcdaf8bde36f1893ce293da2f11c330cdd0f9746956241d6fac63da
  • a8caf1e24c6972c1338eb4cc5d061fe7b6618657720b375e43385c9118b3aad9
  • bdc575561b7b6ccd315cc5aa6c0f05d346201917e05490ff9203ee804b9d4fd7
  • c6f1c07bbf320307ab784db15f0dc7ecc09c2f96150cda7126569a2d77935b2a
  • e1226793b90a2c765d227e365b24271282c85ba9b7b5eb642f9f4b145ba0b932

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Worm.Scar-6934835-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft
32
MutexesOccurrences
DSKQUOTA_SIDCACHE_MUTEX32
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
175[.]126[.]123[.]21920
67[.]228[.]31[.]2253
64[.]186[.]131[.]471
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
byvolker[.]co[.]cc19
canappe[.]co[.]cc1
getvolkerdns[.]co[.]cc1
killervolk-dns[.]co[.]cc1
Files and or directories createdOccurrences
\??\E:\autorun.inf32
\autorun.inf32
\AUTORUN.INF32
\??\E:\AUTORUN.INF32
%System16%\svcrcs.exe32
\??\E:\UsbDrivers.exe23
\UsbDrivers.exe23
\??\E:\Setup.exe8
\Setup.exe8
\??\E:\open=Setup.exe1
\open=Setup.exe1
File Hashes
  • 0801e6c88de29d1418e3c7e89c72ff0e9147607f1c36ea657f60c557bc2ca91c
  • 08c755993f57b3c2adb4893504683394b81e9dba822ccd6bdad9dc9710155078
  • 096b4a3371120250dbd0c85c19730f92d0beaa3af16d73a44c6c81e81e0371f8
  • 11566d54a186019e24e0fe51ecfcc8a6e954c3ff0ec58e89130c81c2c9fe3652
  • 18bc9b638b1770d6b76de5be46ecc50d2b2a428053b131b02cf76d9feac9566f
  • 22afe3eae9acd98fa25f5e06a7f3fa2716aa6af527d1232e5ba4c95e199b851b
  • 25fb8e7a4039c200fa74246ae62629e6a1db5400e2c8ebe14b041f0dc2bc60f7
  • 391483fc42fa770ae9a6e0bb615536b9c3f1a908931d5222d4f1eab68a50c91f
  • 3b62f8abfdb792b3419ac346fcbc5d004a9b67dc1b5a93b2eda4da53fc27263d
  • 3be4799debfab2081853244700668d7303752272978941b551d21e6cfc476a69
  • 424c3baead90385b2fd8cc6ef98534119ce5ea41f9488c0e64d1829ae61ec957
  • 453b4a1818de6d3e8d67632e31bcca085cd8f5e44e775a7959246eaa4c925d2d
  • 4a800c7c54850630561ffe6d54a3390a93192c7fa6301f5d6ea9368f2c6421bb
  • 4ec4bcca36e92304469192ab25d97cacb192413f4092a37a5f1e76575beaa0de
  • 55562749de33d7cc4f93d0342514467c31b975907d9f0dcd8ec78f735ce6b1d8
  • 5b642baf8e06c96a72ee7e8e55f98bd25a6180fce57fa25c2691782a23c76794
  • 5efacdb03391aa114a6dcac90a6f8f8562c0a2e666185f1f8f63065364993143
  • 6178e5bcda89cd0c4760545b3208cf56ce26fc9fe51551d1389505d30de75830
  • 621bc4bb35821d5a7784bda820acd368d863b2430974952f83a14051693c2fda
  • 75504f094939ab33f14cdf1a6c1be3cad5ae7f89d48d925fca65222062ea27e5
  • 8320a5187226606270a82f0acf50449a11d3bc6bfed10618e7a7d79ea4564401
  • 86ebccdb2f90a5b5ca49911155eac4d05769138d8f72856d4cd9be2323037b29
  • 871aaaf9a80009c78539d2a8b1bbfee432c1afc08511d25e057373731f06a061
  • 8fd6c4a70953f044073299ad6ba883d94d7be1a723d8aaa908435318509cda05
  • 915c2d8d8bf3391aee7ee8a4d732cd861aa30eba8219b240b66041a860a32cc0
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Malware



Win.Worm.Aspxor-6935052-0


Indicators of Compromise


Registry KeysOccurrences
N/A-
MutexesOccurrences
2GVWNQJz125
Djjwy&22bsqobnaHhdGwemvt(&11839)25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
217[.]115[.]50[.]22817
93[.]186[.]181[.]6215
194[.]85[.]183[.]214
46[.]55[.]222[.]2412
222[.]124[.]166[.]1210
82[.]116[.]211[.]1610
209[.]170[.]120[.]1639
186[.]115[.]122[.]678
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%SystemRoot%\SoftwareDistribution\DataStore\Logs\tmp.edb1
%HOMEPATH%\Local Settings\Application Data\ksgxpasi.exe1
%HOMEPATH%\Local Settings\Application Data\joorwdum.exe1
%HOMEPATH%\Local Settings\Application Data\unfdefqq.exe1
%HOMEPATH%\Local Settings\Application Data\ahnatfuo.exe1
%LOCALAPPDATA%\ffueegqn.exe1
%LOCALAPPDATA%\hahxwkrq.exe1
%LOCALAPPDATA%\erhipkjf.exe1
%LOCALAPPDATA%\qrfcduvn.exe1
%LOCALAPPDATA%\bbpikrlh.exe1
%LOCALAPPDATA%\gbmscrrf.exe1
%LOCALAPPDATA%\uhotvrfs.exe1
%LOCALAPPDATA%\vwaffned.exe1
%LOCALAPPDATA%\wscftndd.exe1
%LOCALAPPDATA%\fapgaxbx.exe1
%LOCALAPPDATA%\kselhlpe.exe1
%LOCALAPPDATA%\lupjoaow.exe1
%LOCALAPPDATA%\oxhojtxr.exe1
%LOCALAPPDATA%\bgnifxtm.exe1
%LOCALAPPDATA%\annimrmg.exe1
%LOCALAPPDATA%\teconvea.exe1
%LOCALAPPDATA%\jwclsdrd.exe1
%LOCALAPPDATA%\txfqjufq.exe1
%LOCALAPPDATA%\ridhufao.exe1
%LOCALAPPDATA%\ndfgutar.exe1
See JSON for more IOCs
File Hashes
  • 0212de9641f40da0e6bdad747f807eca71356ddc298263c20676321863326f70
  • 098631c475084bd57815d245af1252c70bb4b918df059844aa167ec189bc955b
  • 0c5634fd44849ef51ac6f7133cdea66da960a64a6c165bf038f17d97610ce5d9
  • 195b4c47c63c9d6fbd745da31721b086e931c0d60c1759e414c564cea4e1d6c2
  • 1ccb17748bc70035a00a5ea94d223e1e425163e191bfb92271d191d7ced3347d
  • 1f5286c16b783ebbcf24cd92cae2f1eb50d69e6f4cc0d0c97408f03abe1de161
  • 29614ffd96412f26a5cf2fee3648e4954c2ac095543b3633e03dfaab12d1ff60
  • 29de1a963a1f1bf15435da9020a2eadfa9d3054160e545b49b89135a6eaac2a9
  • 2c85e5a8a1c3e5c0e6fcf4902780824c9014298ff01f823ae8f4d2633f64c0b4
  • 2ebd4a5e0954ef8cfa8f338caf6bc6763e6519c9be2b71e31186f91b29312e13
  • 37d5963a73acccd5b60d59e27c19fc30c1806679724338e1d4962d04748934f9
  • 386ecf6b47b1f1d71b3797adb0335a806452d3346e108b758594f07dfcb49f97
  • 3b03b188ac995d7fcab65e70b9ada8d2b126313318a981ec396a2111a34bfd64
  • 40ebfa0f7b15bd9a0827c9c597340b1ab91a0b352232052094dbbf6e951617b9
  • 4ad58e6014e62529af11bdc456bd4fec94ee3138f6e8c679a963512709a72452
  • 5147b90fa72506bd6c47bed8b03f82f8eab5e6ab6f6216289680429ed915422e
  • 543cb5dba99c251147551c65e8db498b1b16f2084933596159006482ce1be633
  • 5d19478d27e1697220d54e158ecbe4190287c34f507d46717f06195acee8507d
  • 601d8a181beb7451b6d45b6938a398b8c09bfba4d858b5de52d79ad55ff733fc
  • 64816d8573edd50f3ba63d0c1b9e491e461dea9f4dab78b85986959346d7769c
  • 65f8b7cf030977bb60ae0e21b3514d4407090de968c505ccdaed0ea73d2b882d
  • 66bff41b7bad9cd835e0e698cfc574a576caf819a3c9abecc473eb8ec31a53a2
  • 68e6f59b6c52c804dcebebbc2eb54ad7a00c9e0302f429bfef2300d33abdc4a3
  • 6d610fd8891c60bd39978d90f76e803a878fd1bb36061e7a970ad79af20accd2
  • 70d71ecfbb763f5e97379bc3d75412e56aec4574affadc1d4bcb09a2fc70d923
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Malware.Vbkeylog-6935273-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\DIRECT3D\MOSTRECENTAPPLICATION
Value Name: Name
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\SHELL EXTENSIONS\CACHED
Value Name: {FFE2A43C-56B9-4BF5-9A79-CC6D4285608A} {00000122-0000-0000-C000-000000000046} 0xFFFF
5
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
\TEMP\NewBitmapImage.bmp2
\TEMP\taximg.bmp1
\TEMP\tooooos.txt1
\TEMP\jon.bmp1
\TEMP\SureTools.txt1
\TEMP\rum.txt1
\TEMP\SLIPUSD124.985,67(1).jpg1
\TEMP\TAXFILE.bmp1
\SureTools.txt1
\rum.txt1
\tooooos.txt1
File Hashes
  • 44414ef55e3f6368f1df92f06a5f29f4dda15554720b7cb4a7ad22ef73023ce6
  • 5164b6fd11a2fb210d88ee920b95a62e8ba0904797c015f2edf20fe519678777
  • 64ab1d27afd0c17215e56c0c97b2de6e8862573cf8663e60832d5d14ab9f635c
  • 940f6e0c84f2ea9db97ce376fdfd8b111f3fd50ddcac3d303b5b9d69a7a89dd5
  • 98408e5c6a013289ce93486234965b89f164c568f5f772d9082d6ddbfab7c506
  • 99773cfde40fbf0a2e681cbb27b64616c4e401b47ad88255be843c3084e41e29
  • b698ccf0db3ef9d598333cdb998beabbc0e59ba6a528e02a2870687b863ff0a3
  • dce28ef0578d3d8d14159a098ef4f8f15995996c2c2e512caa456d8c0f5114dd
  • f0b0138e46957c77c6b40f7c2ed6b16bf7aea25cd02ac62e4298b559de2b385b
  • f1632ccc48b023eeab044ed42093e748e501c0afdde9b97d22d27ad09b01dbea
  • f51e016793c920faad2abe8da9d14a6d6ecd1f73b8ccd68d583b4ddcbf9341fa

Coverage


Screenshots of Detection

AMP



ThreatGrid



Malware



Win.Malware.Zbot-6935412-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: LoadAppInit_DLLs
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: aybbmte.job.fp
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
Value Name: Index
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
Value Name: DynamicInfo
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{F2B28AC6-1443-43F4-9832-8315397F35E8}
Value Name: data
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{088B2EE3-A639-491E-B1E6-84AE447D785F}
Value Name: DynamicInfo
7
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{94669170-5F40-43E0-9D77-69BC9146DF72}
Value Name: data
7
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9C9693B0-E894-414D-8675-6B58133E665B}
Value Name: DynamicInfo
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{6E1FF505-4705-412B-825D-ECE026885614}
Value Name: data
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{48716312-C151-484D-9EC0-E5B4883DF1B7}
Value Name: DynamicInfo
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{90EA3D0B-BA3B-4356-A2CD-915E5BB4CF7B}
Value Name: data
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{65579417-B766-4127-BD16-88A7D90F9ADD}
Value Name: DynamicInfo
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{E4AA06C0-45E2-4E4D-B133-96D82B197EA1}
Value Name: data
1
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%ProgramData%\Mozilla\thfirxd.exe25
%System32%\Tasks\aybbmte25
%ProgramData%\Mozilla\lygbwac.dll25
%HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll25
%HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe25
%SystemRoot%\Tasks\kylaxsk.job25
File Hashes
  • 038925296d4fdaa55efcfa1ad8c02ce08d6f3673bc042fed1bd20d9f29fad5d3
  • 0ca97f5d0c9e6de090568cb7285db362d7210c45e2213be617fdd4ba2ae8dc7d
  • 109de4dba47129449293624f674a90a8d6381d5f827e4192f1efc97e4b08748e
  • 4155d902b22a775b172e7d86d4958e9088d571bfda7810fd6eceaa5bfb44e847
  • 56d02ae6de618c67968b5c6ca583372e1388c89424f2c2118aac6a8548b909ce
  • 5880016db066b6d864c72234d1404cb0ac8953a0ca35b1edae8fc1c8c6c8a7b2
  • 591e2322c4e4a65b02694f0066ef6c18ceff25c50ea0c118591170af3e4e9cce
  • 5a48b66eb3c6581073bd8b85f9a8151364f089dd91997d82ec42709f3f813def
  • 697000ba4047468f1005194dcbd2ae90e444a7e1a8b52c3904a3001358387af9
  • 89a3ecc59f1bd6d62f71b2dccbf03e433d99cee9f9e8d961e19d5e3ca7bb3f15
  • 95ce736766aa931ba16df831dabc530f64e9e9a6d1a134e6931987fa1c8fd544
  • a3309cb7bf90a6f6220bbf9a6b018d5f41334407a431b5101874e4d3436382ff
  • b28ca331d6466f83028b9e8c4e9fd6511dad0a599859ea21f8dd02618eabc1d4
  • c27265eca8f4f1d0606e3e6acc971721410f7430d3b8c487b128fee5a910f8cd
  • c6b0d5b496baca826833a12e9863292ecdd92931ce682d61a74ee62e97c39382
  • cf9e75a01b1ee5093c7ca244f5568becd535c6e9f56885a11a25dc1e9621d502
  • d5587aef2b6a77a22904f8cff993d6e35a832f7552f8f3124c772b1700077622
  • d7fb034de95b8ef46570d15391cb1c8181e2145076831813563a947d8d1616db
  • dc68ea18ef5b981d2fefd632a9e7fe51bc03c5058dcff708b9aa255e9ebbfe06
  • e1c784eada950c0b8a9ff1a533d95252bf4cf36314b8b52aaef1ce51c3fe3704
  • eb84091df0b6ea62d38e2240201dc93fbb5db4b878c595937cd9ff77508dacc1
  • ec5dd84f2cd6083165187eff18bb55f382719977092eaeea642868d062926970
  • ed8887e64560574df7491a6ba7feff32433fed157e02f39ce86fb8689d5a2207
  • f443021ba52b571fa16f440f171e85430eb6d925882bdffc339de6917b6e13b6
  • f4fd6c5f9fdeb3196e09b5ee9854f0c06d320c8cfe8c7fc04e234c35cfcc26b7
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Ransomware.Cerber-6935713-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: Run
54
<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
Value Name: AutoRun
54
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
54
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}
Value Name: Component_00
54
<HKU>\Control Panel\Desktop 42
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F95BF9F7-D3F3-4AC5-8A3F-4B59850DD369}
Value Name: DynamicInfo
31
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{99EF6702-6773-48D3-992B-6F4C187FAC71} 17
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\SHELL EXTENSIONS\CACHED
Value Name: {FBF23B40-E3F0-101B-8488-00AA003E56F8} {000214FA-0000-0000-C000-000000000046} 0xFFFF
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\IEXPLORE
Value Name: Blocked
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\IEXPLORE
Value Name: Blocked
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\IEXPLORE
Value Name: Blocked
11
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN
Value Name: Window_Placement
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\STAGINGINFO\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
Value Name: Active
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
Value Name: Set
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\IEXPLORE
Value Name: LoadTimeArray
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{DBC80044-A445-435B-BC74-9C25C1C588A9}\IEXPLORE
Value Name: LoadTimeArray
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ipconfig
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: ipconfig
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: ipconfig.job.fp
2
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}54
Local\VERMGMTBlockListFileMutex14
Local\!BrowserEmulation!SharedMemory!Mutex14
Local\URLBLOCK_DOWNLOAD_MUTEX14
Local\URLBLOCK_HASHFILESWITCH_MUTEX14
cversions.1.m14
GeneratingSchemaGlobalMapping14
cversions.2.m14
_SHuassist.mtx13
{5312EE61-79E3-4A24-BFE1-132B85B23C3A}13
Local\Shell.CMruPidlList13
Local\InternetShortcutMutex13
Local\ExplorerIsShellMutex13
CDBurnNotify13
Global\CDBurnExclusive13
{C20CD437-BA6D-4ebb-B190-70B43DE3B0F3}12
!PrivacIE!SharedMem!Mutex11
ALTTAB_RUNNING_MUTEX11
{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}8
_!SHMSFTHISTORY!_5
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_13883
\BaseNamedObjects\shell.{3AFC1C93-3B52-BB89-3222-3835B13B7C57}3
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_10842
\BaseNamedObjects\shell.{2DA495A3-711D-597E-268E-77F8D29EB324}2
\BaseNamedObjects\shell.{37AB6120-3C1B-909E-8A46-BA7ED26D587E}2
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
31[.]184[.]235[.]9531
31[.]184[.]235[.]9431
31[.]184[.]235[.]9331
31[.]184[.]234[.]9031
31[.]184[.]235[.]9231
31[.]184[.]234[.]9131
31[.]184[.]235[.]9131
31[.]184[.]234[.]9231
31[.]184[.]235[.]9031
31[.]184[.]234[.]9331
31[.]184[.]234[.]9431
31[.]184[.]234[.]9531
31[.]184[.]234[.]9631
31[.]184[.]234[.]9731
31[.]184[.]234[.]9831
31[.]184[.]234[.]9931
31[.]184[.]235[.]9931
31[.]184[.]235[.]9831
31[.]184[.]235[.]9731
31[.]184[.]235[.]9631
31[.]184[.]235[.]21431
31[.]184[.]235[.]21531
31[.]184[.]235[.]21231
31[.]184[.]235[.]21331
31[.]184[.]235[.]21831
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io54
onion[.]to23
cerberhhyed5frqa[.]onion[.]to23
ip-api[.]com19
freegeoip[.]net18
en[.]wikipedia[.]org5
www[.]collectionscanada[.]ca5
alpha3[.]suffolk[.]lib[.]ny[.]us5
www[.]archives[.]gov5
www[.]vitalrec[.]com5
www[.]cdc[.]gov5
4kqd3hmqgptupi3p[.]u57u1e[.]top1
4kqd3hmqgptupi3p[.]hlu8yz[.]top1
4kqd3hmqgptupi3p[.]58na23[.]top1
4kqd3hmqgptupi3p[.]132z80[.]top1
4kqd3hmqgptupi3p[.]asd3r3[.]top1
4kqd3hmqgptupi3p[.]h9ihx3[.]top1
4kqd3hmqgptupi3p[.]ep493u[.]top1
4kqd3hmqgptupi3p[.]h079j8[.]top1
4kqd3hmqgptupi3p[.]fgkr56[.]top1
4kqd3hmqgptupi3p[.]azwsxe[.]top1
Files and or directories createdOccurrences
%HOMEPATH%\NTUSER.DAT54
%HOMEPATH%\ntuser.dat.LOG154
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}54
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\json[1].json54
%HOMEPATH%\ntuser.ini38
%APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.html37
%APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt37
%APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.url37
%APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.vbs37
%HOMEPATH%\# DECRYPT MY FILES #.html37
%HOMEPATH%\# DECRYPT MY FILES #.txt37
%HOMEPATH%\# DECRYPT MY FILES #.url37
%HOMEPATH%\# DECRYPT MY FILES #.vbs37
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\glob.settings.js36
%APPDATA%\Adobe\Acrobat\9.0\TMGrpPrm.sav36
%APPDATA%\Microsoft\Outlook\Outlook.xml36
%APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.html36
%APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.txt36
%APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.url36
%APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.vbs36
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\# DECRYPT MY FILES #.html36
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\# DECRYPT MY FILES #.txt36
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\# DECRYPT MY FILES #.url36
%APPDATA%\Adobe\Acrobat\9.0\JavaScripts\# DECRYPT MY FILES #.vbs36
%APPDATA%\Microsoft\Outlook\# DECRYPT MY FILES #.html36
See JSON for more IOCs
File Hashes
  • 0209aa718b9b606b5cad5f9783ef1eb441ab1b6ff63283855e8b6d74f4649ec5
  • 03050ca0e3c1e6fc7a9782b5791aeccc77a1f07a7a8a675feb6e756226174410
  • 04043499a4936537e774dc6a381ccaeab8bb853d84819b9be12de2931d6646de
  • 0468b2231ea7059a58566e1a77d170f9c3a7e417d0221e8d7ca0747607bba2c3
  • 0680c78425029623806a8fd8f305523564e52bb68779ccffd698b78e218e249e
  • 087fa7d28264fc9c06eb7031891b68794c67b7b571176194e313c227437a1ea8
  • 09b4791e9e2eed217cf3df60f0386b010dccfc12a0b8c67b3cd2007fdbfb8e74
  • 0adb55a70a4c9f9e2bfcd33bb7c7b7b2f5d309b5ad006e7364aca2fbcda6c505
  • 0ca6bf5961f23df78cd48d7cde29d58b7d23e22598f784d04a1ca0676a466c0a
  • 0cf92c126ff4860a912d3e5d9d21c546edf434b46a1ea8bdddaf1eace91bc7ce
  • 0d7b033bd7734735b8e101b820be42c37e6957dd556da8b26f05f50edc3cb96f
  • 0dc0bfebad2716cfc4eb1b6d2853929d110fa2589af4d662d0c35231e9e1e291
  • 0eb148582c01d74361a630671d8c4d7f2577cbf09bea123f16df962e4b7d3df8
  • 0fa00710b9232318f7288b3723436ccc51714089030fabe581a00cd057b71865
  • 0fcb3e096368ecbe9d96c2c88ef721c29b596db298a6790a27ccab7bffe5a12b
  • 103517b74d9bc58c6a54d0a635ef45417540aeb5d8b5809ad110abb4685b0c2b
  • 10de95456a338a6f0edc9cd277ed314380a335dcc8e921e6eb7b40b526bca0fc
  • 130cd09e0e050acf6b75411b57c1146cd6f177f765e8cde272bd45b641e068d8
  • 13f983ebe9787626f1fe2e6615ad9c8cbc997b363ad9c2f91a1295a9a1db65db
  • 1677324000e28746b206c781a6b653f87b69e144c18d5f366aa9f0f2af83a8b7
  • 1768e3f32fe5c938f3baed815000b18020b10dd8ac440aa4bef7258cab863395
  • 177644a4e59f0f0b468e176972895a55b724fc19db205f555e98c06851982084
  • 179f11a15d4a284bf8e10002663f744bee9903bb2c8eae9e22308a49bca9ff03
  • 17f46c0701439f25126d59dd4b3b8c4cb131e260cc199bb8bb61414128fd3aef
  • 18adeddd8205122987da070c640e8eaf72e2e4bc5f2f58491a5e83f7ed6c2c25
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella




Malware



Win.Trojan.Winwebsec-6935682-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
10
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
10
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\System 10
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: ConsentPromptBehaviorAdmin
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: HideSCAHealth
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER\svc 10
<HKLM>\System\CurrentControlSet\Services\luafv 10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LUAFV
Value Name: Start
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SYSTEMRESTORE
Value Name: RPSessionInterval
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER
Value Name: DisableAntiSpyware
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 98BE0FA9BB7E8E3C000098BD76F2948C
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: 98BE0FA9BB7E8E3C000098BD76F2948C
10
<HKLM>\SYSTEM\CONTROLSET001\ENUM\WPDBUSENUMROOT\UMB\2&37C186B&0&STORAGE#VOLUME#_??_USBSTOR#DISK&VEN_GENERIC&PROD_HARDDISK&REV_2.5+#1-0000:00:1D.7-2&0#
Value Name: CustomPropertyHwIdKey
3
<HKCU>\Software\Microsoft\Installer\Products\98BE0FA9BD7E903C000098BD76F2968C 3
<HKCU>\SOFTWARE\MICROSOFT\INSTALLER\PRODUCTS\98BE0FA9BD7E903C000098BD76F2968C 3
MutexesOccurrences
98BE0FA9BB7E8E3C000098BD76F2948C10
98BE0FA9BC7E8F3C000098BD76F2958C3
98BE0FA9BCBE8F7C000098BD76F295CC3
98BE0FA9BD7E903C000098BD76F2968C3
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
123[.]108[.]108[.]4210
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%ProgramData%\98BE0FA9BB7E8E3C000098BD76F2948C10
%ProgramData%\98BE0FA9BB7E8E3C000098BD76F2948C\98BE0FA9BB7E8E3C000098BD76F2948C.exe10
%ProgramData%\98BE0FA9BB7E8E3C000098BD76F2948C\98BE0FA9BB7E8E3C000098BD76F2948C.ico10
%ProgramData%\98BE0FA9BB7E8E3C000098BD76F2948C\98BE0FA9BB7E8E3C000098BD76F2948C3
%APPDATA%\Microsoft\Windows\Start Menu\Programs\System Care Antivirus\System Care Antivirus.lnk3
%HOMEPATH%\Desktop\System Care Antivirus.lnk3
%APPDATA%\Microsoft\Windows\Start Menu\Programs\System Care Antivirus3
File Hashes
  • 10b34c1a0b739cd6c12e2926372afcd0cbf6f95be9d1b45038144bd3efb5eb79
  • 1a448e78d2668f4dad016aca5092107f4d1ee19dadf8886e8a0ec4e2b550b317
  • 26a08a46deffe995ba67d9aaf547b55a265fe513a8293d51f3f9f0b3d944808c
  • 72f94e87b1fa1393360d9cacbdebb1ffebd5754c7d93121e0e887eacb8529c87
  • 8725d076eb421b4e4737792ad07647db9a263e4da2f0436bccd6c8ff9f752d39
  • b18e5830f0e557d72ba6ba2dbb59da23cf8e2539148efc51ed01a0364210b06d
  • b4b5fdc7fcf6f86a9ffba97a9d2e159f0078e9ffc090deb948660a3c8e5cdd07
  • d45ba937d7d532907d5da3fc979a96b1efa5e9c9a4c6b5c45f683925a9524ac2
  • d54730e93be5c4d17de56a904aa56610c06fdf425083277343c9ece4ecc922df
  • e165145377ae247117657cb0172fd7767907dd1ee5d4a698cbf58a6f4af03624

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Malware.Tovkater-6936213-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Control\Session Manager 14
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
14
<HKLM>\SYSTEM\ControlSet001\Control\Session Manager 10
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
185[.]53[.]178[.]61
185[.]147[.]15[.]51
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
MIRRACLEZ[.]CLUB10
mirraclez[.]club10
zaltzburgopportunity[.]top4
binocularhearing[.]top4
CARIBZ[.]CLUB2
flowergroup[.]top1
binoculuz[.]club1
BINOCULUZ[.]CLUB1
backverge[.]top1
gaslight[.]metimes[.]ru1
BACKVERGE[.]TOP1
frock[.]encours[.]ru1
caribz[.]club1
lurk[.]ecolleague[.]ru1
simpledrive[.]top1
Files and or directories createdOccurrences
masrra11.exe8
imasrr13.exe4
%LocalAppData%\Temp\nsnD405.tmp2
%LocalAppData%\Temp\nscD4B1.tmp\nsJSON.dll1
%LocalAppData%\Temp\nsnD010.tmp\INetC.dll1
%LocalAppData%\Temp\nsnD010.tmp\Y gamemonitor.dll1
%LocalAppData%\Temp\nsnD010.tmp\cmutil.dll1
%LocalAppData%\Temp\nsnD010.tmp\colbact.dll1
%LocalAppData%\Temp\nsnD010.tmp\icrub.exe1
%LocalAppData%\Temp\nsnD010.tmp\nsJSON.dll1
%LocalAppData%\Temp\nsiD435.tmp\INetC.dll1
%LocalAppData%\Temp\nsiD435.tmp\X shmgrate.exe1
%LocalAppData%\Temp\nsiD435.tmp\Y gamemonitor.dll1
%LocalAppData%\Temp\nsiD435.tmp\Z shmgrate.exe1
%LocalAppData%\Temp\nsiD435.tmp\cmutil.dll1
%LocalAppData%\Temp\nsiD435.tmp\colbact.dll1
%LocalAppData%\Temp\nsiD435.tmp\msimn.exe1
%LocalAppData%\Temp\nsiD435.tmp\nsJSON.dll1
%LocalAppData%\Temp\nsiD435.tmp\shmgrate.exe1
%LocalAppData%\Temp\nsiD435.tmp\xantacla.exe1
%LocalAppData%\Temp\nsiDC21.tmp\INetC.dll1
%LocalAppData%\Temp\nsiDC21.tmp\X shmgrate.exe1
%LocalAppData%\Temp\nsiDC21.tmp\Y gamemonitor.dll1
%LocalAppData%\Temp\nsiDC21.tmp\Z shmgrate.exe1
%LocalAppData%\Temp\nsiDC21.tmp\cmutil.dll1
See JSON for more IOCs
File Hashes
  • 4f8cf035324575449ee73dcfcc1ecededc5d1f3f8a4cec2f0e85455516207eb0
  • 9fc837165be91f7c7042e1dbcc4db8dd38d002f9214b861db6214c636055bac4
  • a40c7290af61e7f34282faf839982f9fbb33db423751ce59d11a156140e711ef
  • bd9f2de34957bcd509e47fcd7cd7e7f2af01b0e5078c0823680cdcd1d753341a
  • c880d5254c7e1d5723862100c2d57bd3cbcaad6560437ac59bd1071172980197
  • cd69efb3bb139a1675b90690635f8584896fc10c1f85be17f92206f8d856289d
  • d6dc00609f709cc451cb61f1d77fc84e8572494ebc3ba0de80518f7ab234384e
  • e82dd6108b2272e13f6365d75943de81b4196cfa4d885a78a2ac3665249ba2c5
  • f102bc0d0ebe8adf4486b0567c9ab493faa619aa1ae48ac3572ecb23b2de9836
  • f997bc9973d1bac7be25513c9ef80783949069a00732fd630e74876a3019dd3b
  • fcec660083595a7956cc13f9815ce23edcfbfa3e82c150a2f0fe6c0449433ce0
  • fd7696f075bb712bd4d7f14dad9c297d99669d3b1c61e51ee2dae4cfa897b9ff
  • fdac4b0e291a27c91cd3050c4e811d4fe33bb2189e44015d0d5a88f168441815
  • fef0d09e80bce24d232f60977972934eb9b1a984f4b42fac5a9d9ebd93757127

Coverage


Screenshots of Detection

AMP



ThreatGrid




Umbrella



Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN's helper tool

$
0
0


Discovered by Tyler Bohan of Cisco Talos.

Overview

Cisco Talos is disclosing a series of vulnerabilities found in the Shimo VPN Helper Tool. Shimo VPN is a popular VPN client for MacOS that can be used to connect multiple VPN accounts to one application. These specific vulnerabilities were found in the “helper tool,” a feature that Shimo VPN uses to accomplish some of its privileged work.

These vulnerabilities are being released without a patch, per our disclosure policy, after repeated attempts were made to communicate with the vendor.

Vulnerability Details

TALOS-2018-0673

TALOS-2018-0673/CVE-2018-4004 is a privilege escalation vulnerability that resides in the Shimo VPN helper service, specifically the disconnectService function. The vulnerability requires local access to the machine but could allow a non-root user to kill privileged processes on the system. 

Detailed vulnerability information can be found here.

TALOS-2018-0674

TALOS-2018-0674/CVE-2018-4005 is an exploitable privilege escalation vulnerability that resides in the Shimo VPN helper service, specifically the configureRoutingWithCommand function. The vulnerability requires local access to the machine but could allow an attacker to escalate their privileges to root.  

Detailed vulnerability information can be found here.

TALOS-2018-0675

TALOS-2018-0675 / CVE-2018-4006 is an exploitable privilege escalation vulnerability that resides in the Shimo VPN helper service, specifically the writeConfig functionality. The vulnerability requires local access to the machine but could allow an attacker to escalate their privileges to root. 

Detailed vulnerability information can be found here.

TALOS-2018-0676

TALOS-2018-0676 / CVE-2018-4007 is an exploitable privilege escalation vulnerability that resides in the Shimo VPN helper service, specifically the deleteConfig functionality. The vulnerability requires local access to the machine but could allow an attacker to delete any protected file on the system. 

Detailed vulnerability information can be found here.

TALOS-2018-0677

TALOS-2018-0677 / CVE-2018-4008 is an exploitable privilege escalation vulnerability that resides in the Shimo VPN helper service, specifically the RunVpncScript command. The vulnerability requires local access to the machine. The command takes a user-supplied script argument and executes it under root context.  

Detailed vulnerability information can be found here.

TALOS-2018-0678

TALOS-2018-0678 / CVE-2018-4009 is an exploitable privilege escalation vulnerability that resides in the Shimo VPN helper service due to improper validation of code signing.  The vulnerability requires local access to the machine but could allow an attacker to escalate their privileges to root.  

Detailed vulnerability information can be found here.

Known Vulnerable Versions

Shimo VPN 4.1.5.1




Coverage

The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 47801 - 47804

Vulnerability Spotlight: Denial of service in VMWare Workstation 15

$
0
0

Piotr Bania of Cisco Talos discovered this vulnerability.

Executive summary

VMware Workstation 15 contains an exploitable denial-of-service vulnerability. Workstation allows users to run multiple operating systems on a Linux or Windows PC. An attacker could trigger this particular vulnerability from VMware guest user mode to cause a denial-of-service condition through an out-of-bounds read. This vulnerability only affects Windows machines.

In accordance with our coordinated disclosure policy, Cisco Talos worked with VMware to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

VMware Workstation 15 vertex shader functionality denial-of-service vulnerability (TALOS-2018-0762/CVE-2019-5516)

An exploitable denial-of-service vulnerability exists in VMware Workstation 15. A specially crafted vertex shader can cause denial-of-service issues. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host, leading to a vmware-vmx.exe process crash on host.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that VMware Workstation 15 (15.0.2 build-10952284) with Windows 10 x64 as guestVM is affected by this vulnerability.

CoverageThe following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49045, 49046

New HawkEye Reborn Variant Emerges Following Ownership Change

$
0
0
Edmund Brumaghin and Holger Unterbrink authored this blog post.

Executive summary


Malware designed to steal sensitive information has been a threat to organizations around the world for a long time. The emergence of the greyware market and the increased commercialization of keyloggers, stealers, and remote access trojans (RATs) has magnified this threat by reducing the barrier to entry for attackers. In many cases, the adversaries leveraging these tools do not need to possess programming skills or in-depth computer science expertise, as they are now being provided as commercial offerings across the cybercriminal underground. We have previously released in-depth analyses of these types of threats and how malicious attackers are leveraging them to attack organizations with Remcos in August and Agent Tesla in October.

HawkEye is another example of a malware kit that is actively being marketed across various hacking forums. Over the past several months, Talos observed ongoing malware distribution campaigns attempting to leverage the latest version of the HawkEye keylogger/stealer, HawkEye Reborn v9, against organizations to steal sensitive information and account credentials for use in additional attacks and account compromise.

History of HawkEye


HawkEye is a malware kit that has been around for several years and has seen continuous development and iterations since at least 2013. It is commonly sold on various hacking forums as a keylogger and stealer that can be used to monitor systems and exfiltrate information from those systems. It features robust stealing capabilities as it can be used to obtain sensitive information from a variety of different applications. This information can then be transmitted to the attacker using protocols such as FTP, HTTP, and SMTP. Talos has recently identified several changes concerning HawkEye Reborn in the latest version, HawkEye Reborn v9.

In December 2018, a thread on HackForums described a change in the ownership and ongoing development of the HawkEye keylogger.
Shortly following this exchange, new posts began to appear that were attempting to market and sell new versions of HawkEye (HawkEye Reborn v9), with these new posts also referencing the change in ownership of the project moving forward.
HawkEye Reborn v9 is currently marketed as an "Advance Monitoring Solution." It is currently being sold using a licensing model, with purchasers gaining access to the software and updates for different periods based on a tiered pricing model.
HawkEye Reborn v9 also features a Terms of Service agreement that provides some additional insight. While the seller specifies that HawkEye Reborn should only be used on systems with permission, they also explicitly forbid scanning of HawkEye Reborn executables using antivirus software, likely an attempt to minimize the likelihood that anti-malware solutions will detect HawkEye Reborn binaries.
Following these changes, the new developer of HawkEye Reborn has continued to make changes and we expect this to continue as long as the developer can monetize their efforts.
As with other malware that we wrote about last year, while the developer claims that the software should only be used on systems with permission, or "for educational purposes," malicious attackers have been continuously leveraging it against various targets around the world.

Distribution campaigns


For several months during the last half of 2018 and continuing into 2019, Cisco Talos has observed ongoing malicious email campaigns that are being used to distribute versions of the HawkEye Reborn keylogger/stealer. The current version, HawkEye Reborn v9 has been modified from earlier versions and heavily obfuscated to make analysis more difficult.

The email campaigns that have been observed feature characteristics that are consistent with what is commonly seen with malspam campaigns, with the emails purporting to be associated with various documents such as invoices, bills of materials, order confirmations, and other corporate functions. An example of one of these emails is below:
Figure 1: Example email message

While the current email contains leverage malicious Microsoft Excel files, earlier campaigns have also been observed leveraging RTF and DOC files. Additionally, a small number of campaigns over this same period also made use of various file-sharing platforms like Dropbox for hosting the malicious documents rather than directly attaching them to the messages themselves.
Figure 2: Example malicious Excel document

Similar to the technique described in our previous blog about Remcos, the contents of the documents have been intentionally made to appear as if they are blurry, with the user being prompted to enable editing to have a clearer view of the contents.

Another interesting characteristic of the malicious documents is that the metadata associated with the document files themselves also matches that found in many of the malicious documents that were previously being used to spread Remcos.
Figure 3: Document metadata

Additionally, the creation and modification dates associated with these documents are shortly after we released a detailed analysis of Remcos distribution campaigns that were being observed throughout 2018.

Assuming the victim opens the attachment, the infection process begins as described in the following section.

Many of the distribution servers that are being used to host the HawkEye keylogger binaries that are retrieved during the infection process are hosting large numbers of malicious binaries and, in many cases, contain open directory listings that can be used to identify the scope of the infections that they are being used to facilitate. In many cases, additional stealers, RATs, and other malware were observed being hosted on the same web servers.

Analysis of HawkEye Reborn


The campaign starts with sending the aforementioned Excel sheets that exploit the well-known CVE-2017-11882 vulnerability, an arbitrary code execution bug in Microsoft Office. The exploit works similarly to what we saw with Agent Tesla in October. It leverages a buffer overflow in the Equation Editor, which occurs if someone hands over a font name that's too long. The shellcode starts after the MTEF font tag "08 13 36" in this case.


After execution in the Equation Editor (EQNEDT32.EXE) context, it downloads the malicious data from the malware server as you can see in the ThreatGrid Process Timeline screenshot below. After a successful download, it creates and starts the RegAsm.exe process.
This RegAsm.exe process is a heavily obfuscated AutoIT script compiled into a PE. After decompiling it from the PE file, it is heavily obfuscated and still almost unreadable.
We deobfuscated the script to understand how the infection process works. It first creates the "winrshost" mutex. Then, it extracts the final payload malware from two objects in the PE resource section (capisp1, appsruprov2).
It concatenates them and uses AES to decrypt the result, using the hardcoded key "pydbdio…" which is handed over to the DecryptData function (see above). The screen capture below shows the decryption function.
It then calls the StartAndPatchRegAsm function.
This function tries to find the original Microsoft RegAsm executable path. It hands over the decrypted buffer extracted from the resource section and the path from the original RegAsm executable to the start_protect_hexcode function.

Then it starts the process-hollowing shellcode, which is stored in the HEXCODE1 variable. This shellcode injects the final payload taken from the resource section into the original RegAsm.exe process. The shellcode in HEXCODE1 is very similar to this RunPE example.

The AutoIT script is offering a lot of other functions which are not used in this campaign, like anti-virtual machine detection, USB drive infection and others.

The final payload — which we found in the AutoIT PE file resource section and was started by the process-hollowing shellcode — is a .NET PE file that's obfuscated with ConfuserEx.
Deobfuscated, we can see it is the HawkEye Keylogger — Reborn v9, Version=9.0.1.6.

When HawkEye is executed, in line 34,
byte[] byte_ = gclass.method_0()["0", GClass30.GEnum3.RCDATA].Byte_0;
it reads the encrypted configuration from the RCDATA resource and in line 33,
byte[] byte_2 = GClass29.smethod_12(byte_, GClass12.string_0);
and then decrypts this data with the Rijndael algorithm you can see below in the RijndaelManaged function to initialize the HawkEye configuration settings.

The decrypted configuration shows us the account used for exfiltration:
The main loop of HawkEye has the following functions:
This shows the rich feature set of HawkEye. The adversaries can get detailed information about the victim's machine, as you can see in the screenshot below.
Beside the system information, it steals passwords from common web browsers, Filezilla, Beyluxe Messenger, CoreFTP and the video game "Minecraft." It also starts a keylogger, steals clipboard content, takes screenshots from the desktop and pictures from the webcam.

Version 9 is still using the well-known MailPassView and WebBrowserPassView freeware tools from Nirsoft to steal web and email passwords. These tools are embedded in the PE file in the form of data which is decoded at runtime and added to the local resources. Then, they are using the process hollowing technique to hide the execution of these tools inside of the original Microsoft vbc.exe (VisualBasic Compiler) process. They are starting an instance of vbc.exe via ProcessCreate, injecting the tool and resume the threat. The stolen passwords are ending up in a temporary file, which is read in and added to the list of data to be exfiltrated. HawkEye offers the following exfiltration options based on the configuration: email, FTP, SFTP, HTTP POST to PanelURL API or ProxyURL.
As mentioned above, in the comments of the main loop section, it also comes with several anti-analysis features, including starting an anti-debugging thread or disabling certain AV-related programs via the Image File Execution Options (IFEO) evasion technique by registering invalid debuggers that redirect and effectively disable various system and security applications.

The following diagram summarizes the full infection process:

Conclusion


Recent changes in both the ownership and development efforts of the HawkEye Reborn keylogger/stealer demonstrate that this is a threat that will continue to experience ongoing development and improvement moving forward. HawkEye has been active across the threat landscape for a long time and will likely continue to be leveraged in the future as long as the developer of this kit can monetize their efforts. While the Terms of Service have been written in an attempt to absolve the developer of any wrongdoing, it is actively leveraged by malicious adversaries. Organizations should be aware of this and similar threats and deploy countermeasures such as Multi-Factor Authentication (MFA) solutions such as Duo, to help reduce the impact of credential theft within their environments. Talos continues to monitor this threat as it changes to ensure that customers remain protected from this and other threats as they continue to emerge and evolve.

Coverage

Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), andMeraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of compromise


The following IOCs are associated with various malware distribution campaigns that were observed during the analysis of Hawkeye Reborn v9 activity.

Attachment hashes (SHA256)


A list of hashes observed to be associated with malicious email attachments can be found here.

PE32 hashes (SHA256)


A list of hashes observed to be associated with malicious PE32 executables can be found here.

Domains


The following domains have been observed to be associated with malware campaigns.

tfvn[.]com[.]vn
shirkeswitch[.]net
guideofgeorgia[.]org
gulfclouds[.]site
jhssourcingltd[.]com
kamagra4uk[.]com
pioneerfitting[.]com
positronicsindia[.]com
scseguros[.]pt
spldernet[.]com
toshioco[.]com
www[.]happytohelpyou[.]in

IP addresses


The following IP addresses have been observed to be associated with malware campaigns.

112.213.89[.]40
67.23.254[.]61
62.212.33[.]98
153.92.5[.]124
185.117.22[.]197
23.94.188[.]246
67.23.254[.]170
72.52.150[.]218
148.66.136[.]62
107.180.24[.]253
108.179.246[.]138
18.221.35[.]214
94.46.15[.]200
66.23.237[.]186
72.52.150[.]218

URLs:


The following URLs have been observed to be associated with malware campaigns.

https[:]//a[.]pomf[.]cat/
http[:]//pomf[.]cat/upload[.]php

DNS Hijacking Abuses Trust In Core Internet Service

$
0
0



Authors: Danny Adamitis, David Maynor, Warren Mercer, Matthew Olney and Paul Rascagneres.


Preface

This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and North Africa, and we do not want to overstate the consequences of this specific campaign, we are concerned that the success of this operation will lead to actors more broadly attacking the global DNS system. DNS is a foundational technology supporting the Internet. Manipulating that system has the potential to undermine the trust users have on the internet. That trust and the stability of the DNS system as a whole drives the global economy. Responsible nations should avoid targeting this system, work together to establish an accepted global norm that this system and the organizations that control it are off-limits, and cooperate in pursuing those actors who act irresponsibly by targeting this system.


Executive Summary

Cisco Talos has discovered a new cyber threat campaign that we are calling "Sea Turtle," which is targeting public and private entities, including national security organizations, located primarily in the Middle East and North Africa. The ongoing operation likely began as early as January 2017 and has continued through the first quarter of 2019. Our investigation revealed that at least 40 different organizations across 13 different countries were compromised during this campaign. We assess with high confidence that this activity is being carried out by an advanced, state-sponsored actor that seeks to obtain persistent access to sensitive networks and systems.

The actors behind this campaign have focused on using DNS hijacking as a mechanism for achieving their ultimate objectives. DNS hijacking occurs when the actor can illicitly modify DNS name records to point users to actor-controlled servers. The Department of Homeland Security (DHS) issued an alert about this activity on Jan. 24 2019, warning that an attacker could redirect user traffic and obtain valid encryption certificates for an organization's domain names.

In the Sea Turtle campaign, Talos was able to identify two distinct groups of victims. The first group, we identify as primary victims, includes national security organizations, ministries of foreign affairs, and prominent energy organizations. The threat actor targeted third-party entities that provide services to these primary entities to obtain access. Targets that fall into the secondary victim category include numerous DNS registrars, telecommunication companies, and internet service providers. One of the most notable aspects of this campaign was how they were able to perform DNS hijacking of their primary victims by first targeting these third-party entities.

We assess with high confidence that these operations are distinctly different and independent from the operations performed by DNSpionage, which we reported on in November 2018. The Sea Turtle campaign almost certainly poses a more severe threat than DNSpionage given the actor's methodology in targeting various DNS registrars and registries. The level of access we presume necessary to engage in DNS hijacking successfully indicates an ongoing, high degree of threat to organizations in the targeted regions. Due to the effectiveness of this approach, we encourage all organizations, globally, to ensure they have taken steps to minimize the possibility of malicious actors duplicating this attack methodology.

The threat actors behind the Sea Turtle campaign show clear signs of being highly capable and brazen in their endeavors. The actors are responsible for the first publicly confirmed case of a DNS registry compromise, highlighting the attacker's sophistication. Notably, the threat actors have continued their attacks despite public reports documenting various aspects of their activity, suggesting they are unusually brazen and may be difficult to deter going forward. In most cases, threat actors typically stop or slow down their activities once their campaigns are publicly revealed.

This post provides the technical findings you would typically see in a Talos blog. We will also offer some commentary on the threat actor's tradecraft, including possible explanations about the actor's attack methodology and thought process. Finally, we will share the IOCs that we have observed thus far, although we are confident there are more that we have not seen.

Background on Domain Name Services and records management

The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space. This section provides a brief overview of where DNS records are managed and how they are accessed to help readers better understand how these events unfolded.

The first and most direct way to access an organization's DNS records is through the registrar with the registrant's credentials. These credentials are used to login to the DNS provider from the client-side, which is a registrar. If an attacker was able to compromise an organization's network administrator credentials, the attacker would be able to change that particular organization's DNS records at will.

The second way to access DNS records is through a DNS registrar, sometimes called registrar operators. These registrars are typically ISPs, telecommunications providers, or web-hosting organizations. These registrars manage DNS records on behalf of the registrant through the domain registry. Records in the domain registry are accessed through the registry application using the Extensible Provisioning Protocol (EPP). EPP was detailed in the request for comment (RFC) 5730 as "a means of interaction between a registrar's applications and registry applications." If the attackers were able to obtain one of these EPP keys, they would be able to modify any DNS records that were managed by that particular registrar.

The third approach to gain access to DNS records is through one of the registries. There are currently 12 different registries that manage different parts of the domain registry. For example, Verisign manages all entities associated with the top-level domain (TLD) ".com." The domain registry is stored on 13 "named authorities in the delegation data for the root zone," according to ICANN. These registries manage entire country code top-level domains (ccTLDs) and generic top-level domains (gTLDs).

Finally, actors could target root zone servers to modify the records directly. It is important to note that there is no evidence during this campaign (or any other we are aware of) that the root zone servers were attacked or compromised. We highlight this as a potential avenue that attackers would consider. The root DNS servers issued a joint statement that stated, "There are no signs of lost integrity or compromise of the content of the root [server] zone…There are no signs of clients having received unexpected responses from root servers."

Assessed Sea Turtle DNS hijacking methodology

It is important to remember that the DNS hijacking is merely a means for the attackers to achieve their primary objective. Based on observed behaviors, we believe the actor ultimately intended to steal credentials to gain access to networks and systems of interest. To achieve their goals, the actors behind Sea Turtle:
  1. Established a means to control the DNS records of the target.
  2. Modified DNS records to point legitimate users of the target to actor-controlled servers.
  3. Captured legitimate user credentials when users interacted with these actor-controlled servers.
The diagram below illustrates how we believe the actors behind the Sea Turtle campaign used DNS hijacking to achieve their end goals.

Redirection Attack Methodology Diagram


Operational tradecraft

Initial access

The threat actors behind the Sea Turtle campaign gained initial access either by exploiting known vulnerabilities or by sending spear-phishing emails. Talos believes that the threat actors have exploited multiple known CVEs to either gain initial access or to move laterally within an affected organization. Based on our research, we know the actor utilizes the following known exploits:
  • CVE-2009-1151: PHP code injection vulnerability affecting phpMyAdmin
  • CVE-2014-6271: RCE affecting GNU bash system, specifically the SMTP (this was part of the Shellshock CVEs)
  • CVE-2017-3881: RCE by unauthenticated user with elevated privileges Cisco switches
  • CVE-2017-6736: Remote Code Exploit (RCE) for Cisco integrated Service Router 2811
  • CVE-2017-12617: RCE affecting Apache web servers running Tomcat
  • CVE-2018-0296: Directory traversal allowing unauthorized access to Cisco Adaptive Security Appliances (ASAs) and firewalls
  • CVE-2018-7600: RCE for Website built with Drupal, aka "Drupalgeddon"
As of early 2019, the only evidence of the spear-phishing threat vector came from a compromised organization's public disclosure. In mid-February, Packet Clearing House, an internet exchange point that manages a core component of the domain name system, provided the first confirmation about this aspect of the actors' tactics when it publicly revealed that it had been compromised by a spear-phishing email.

As with any initial access involving a sophisticated actor, we believe this list of CVEs to be incomplete. The actor in question can leverage known vulnerabilities as they encounter a new threat surface. This list only represents the observed behavior of the actor, not their complete capabilities.

Globalized DNS hijacking activity as an infection vector

During a typical incident, the actor would modify the NS records for the targeted organization, pointing users to a malicious DNS server that provided actor-controlled responses to all DNS queries. The amount of time that the targeted DNS record was hijacked can range from a couple of minutes to a couple of days. This type of activity could give an attacker the ability to redirect any victim who queried for that particular domain around the world. Other cybersecurity firms previously reported some aspects of this activity. Once the actor-controlled name server was queried for the targeted domain, it would respond with a falsified "A" record that would provide the IP address of the actor-controlled MitM node instead of the IP address of the legitimate service. In some instances, the threat actors modified the time-to-live (TTL) value to one second. This was likely done to minimize the risk of any records remaining in the DNS cache of the victim machine.

During 2019, we observe the following name servers being used in support of the Sea Turtle campaign:



Domain
Active Timeframe
ns1[.]intersecdns[.]com
March - April 2019
ns2[.]intersecdns[.]com
March - April 2019
ns1[.]lcjcomputing[.]com
January 2019
ns2[.]lcjcomputing[.]com
January 2019


Credential harvesting: Man-in-the-middle servers

Once the threat actors accessed a domain's DNS records, the next step was to set up a man-in-the-middle (MitM) framework on an actor-controlled server.

The next step for the actor was to build MitM servers that impersonated legitimate services to capture user credentials. Once these credentials were captured, the user would then be passed to the legitimate service. to evade detection, the actors performed "certificate impersonation," a technique in which the attacker obtained a certificate authority-signed X.509 certificate from another provider for the same domain imitating the one already used by the targeted organization. For example, if a DigiCert certificate protected a website, the threat actors would obtain a certificate for the same domain but from another provider, such as Let's Encrypt or Comodo. This tactic would make detecting the MitM attack more difficult, as a user's web browser would still display the expected "SSL padlock" in the URL bar.

When the victim entered their password into the attacker's spoofed webpage, the actor would capture these credentials for future use. The only indication a victim received was a brief lag between when the user entered their information and when they obtained access to the service. This would also leave almost no evidence for network defenders to discover, as legitimate network credentials were used to access the accounts.

In addition to the MitM server IP addresses published in previous reports, Talos identified 16 additional servers leveraged by the actor during the observed attacks. The complete list of known malicious IP addresses are in the Indicators of Compromise (IOC) section below.

Credential harvesting with compromised SSL certificates

Once the threat actors appeared to have access to the network, they stole the organization's SSL certificate. The attackers would then use the certificate on actor-controlled servers to perform additional MitM operations to harvest additional credentials. This allowed the actors to expand their access into the targeted organization's network. The stolen certificates were typically only used for less than one day, likely as an operational security measure. Using stolen certificates for an extended period would increase the likelihood of detection. In some cases, the victims were redirected to these actor-controlled servers displaying the stolen certificate.

One notable aspect of the campaign was the actors' ability to impersonate VPN applications, such as Cisco Adaptive Security Appliance (ASA) products, to perform MitM attacks. At this time, we do not believe that the attackers found a new ASA exploit. Rather, they likely abused the trust relationship associated with the ASA's SSL certificate to harvest VPN credentials to gain remote access to the victim's network. This MitM capability would allow the threat actors to harvest additional VPN credentials.

As an example, DNS records indicate that a targeted domain resolved to an actor-controlled MitM server. The following day, Talos identified an SSL certificate with the subject common name of "ASA Temporary Self Signed Certificate" associated with the aforementioned IP address. This certificate was observed on both the actor-controlled IP address and on an IP address correlated with the victim organization.

In another case, the attackers were able to compromise NetNod, one of the registries, who acknowledged the compromise in a public statement. Using this access, the threat actors were able to manipulate the DNS records for sa1[.]dnsnode[.]net. This redirection allowed the attackers to harvest credentials of administrators who manage domains with the TLD of Saudi Arabia (.sa). It is likely that there are additional Saudi Arabia-based victims from this attack.

In one of the more recent campaigns on March 27, 2019, the threat actors targeted the Sweden-based consulting firm Cafax. On Cafax's public webpage, the company states that one of their consultants actively manages the i[.]root-server[.]net zone. NetNod managed this particular DNS server zone. We assess with high confidence that this organization was targeted in an attempt to re-establish access to the NetNod network, which was previously compromised by this threat actor.

Primary and secondary victims



We identified 40 different organizations that have been targeted during this campaign. The victim organizations appear to be broadly grouped into two different categories. The first group of victims, which we refer to as primary victims, were almost entirely located in the Middle East and North Africa. Some examples of organizations that were compromised include:
  • Ministries of foreign affairs
  • Military organizations
  • Intelligence agencies
  • Prominent energy organizations
The second cluster of victim organizations were likely compromised to help enable access to these primary targets. These organizations were located around the world; however, they were mostly concentrated in the Middle East and North Africa. Some examples of organizations that were compromised include:
  • Telecommunications organizations
  • Internet service providers
  • Information technology firms
  • Registrars
  • One registry

Notably, the threat actors were able to gain access to registrars that manage ccTLDs for Amnic, which is listed as the technical contact on IANA for the ccTLD .am. Obtaining access to this ccTLD registrars would have allowed attackers to hijack any domain that used those ccTLDs.

How is this tradecraft different?

The threat actors behind the Sea Turtle campaign have proven to be highly capable, as they have been able to perform operations for over two years and have been undeterred by public reports documenting various aspects of their activity. This cyber threat campaign represents the first known case of a domain name registry organization that was compromised for cyber espionage operations.

In order to distinguish this activity from the previous reporting on other attackers, such as those affiliated with DNSpionage, below is a list of traits that are unique to the threat actors behind the Sea Turtle campaign:
  • These actors perform DNS hijacking through the use of actor-controlled name servers.
  • These actors have been more aggressive in their pursuit targeting DNS registries and a number of registrars, including those that manage ccTLDs.
  • These actors use Let's Encrypts, Comodo, Sectigo, and self-signed certificates in their MitM servers to gain the initial round of credentials.
  • Once they have access to the network, they steal the organization's legitimate SSL certificate and use it on actor-controlled servers.

Why was it so successful?

We believe that the Sea Turtle campaign continues to be highly successful for several reasons. First, the actors employ a unique approach to gain access to the targeted networks. Most traditional security products such as IDS and IPS systems are not designed to monitor and log DNS requests. The threat actors were able to achieve this level of success because the DNS domain space system added security into the equation as an afterthought. Had more ccTLDs implemented security features such as registrar locks, attackers would be unable to redirect the targeted domains.

The threat actors also used an interesting techniques called certificate impersonation. This technique was successful in part because the SSL certificates were created to provide confidentiality, not integrity. The attackers stole organizations' SSL certificates associated with security appliances such as ASA to obtain VPN credentials, allowing the actors to gain access to the targeted network.

The threat actors were able to maintain long term persistent access to many of these networks by utilizing compromised credentials.

We will continue to monitor Sea Turtle and work with our partners to understand the threat as it continues to evolve to ensure that our customers remain protected and the public is informed.

Mitigation strategy

In order to best protect against this type of attack, we compiled a list of potential actions. Talos suggests using a registry lock service, which will require an out-of-band message before any changes can occur to an organization's DNS record. If your registrar does not offer a registry lock service, we recommend implementing multi-factor authentication, such as DUO, to access your organization's DNS records. If you suspect you were targeted by this type of activity intrusion, we recommend instituting a network-wide password reset, preferably from a computer on a trusted network. Lastly, we recommend applying patches, especially on internet-facing machines. Network administrators can monitor passive DNS record on their domains, to check for abnormalities.

Coverage

CVE-2009-1151: PHP code injection vulnerability affecting phpMyAdmin
SID: 2281

CVE-2014-6271: RCE affecting GNU bash system, specific the SMTP (this was part of the Shellshock CVEs)
SID: 31975 - 31978, 31985, 32038, 32039, 32041 - 32043, 32069, 32335, 32336

CVE-2017-3881: RCE for Cisco switches
SID: 41909 - 41910

CVE-2017-6736: Remote Code Exploit (RCE) for Cisco integrated Service Router 2811
SID: 43424 - 43432

CVE-2017-12617: RCE affecting Apache web servers running Tomcat
SID: 44531

CVE-2018-0296: Directory traversal to gain unauthorized access to Cisco Adaptive Security Appliances (ASAs) and Firewalls
SID: 46897

CVE-2018-7600: RCE for Website built with Drupal aka "Drupalgeddon"
SID: 46316

Indicators of Compromise

The threat actors utilized leased IP addresses from organizations that offer virtual private server (VPS) services. These VPS providers have since resold many of these IP addresses to various benign customers. To help network defenders, we have included the IP address, as well as the month(s) that the IP address was associated with the threat actor.



IP address
Month
Year
Country of targets
199.247.3.191
November
2018
Albania, Iraq
37.139.11.155
November
2018
Albania, UAE
185.15.247.140
January
2018
Albania
206.221.184.133
November
2018
Egypt
188.166.119.57
November
2018
Egypt
185.42.137.89
November
2018
Albania
82.196.8.43
October
2018
Iraq
159.89.101.204
December - January
2018-2019
Turkey, Sweden, Syria, Armenia, US
146.185.145.202
March
2018
Armenia
178.62.218.244
December - January
2018-2019
UAE, Cyprus
139.162.144.139
December
2018
Jordan
142.54.179.69
January - February
2017
Jordan
193.37.213.61
December
2018
Cyprus
108.61.123.149
February
2019
Cyprus
212.32.235.160
September
2018
Iraq
198.211.120.186
September
2018
Iraq
146.185.143.158
September
2018
Iraq
146.185.133.141
October
2018
Libya
185.203.116.116
May
2018
UAE
95.179.150.92
November
2018
UAE
174.138.0.113
September
2018
UAE
128.199.50.175
September
2018
UAE
139.59.134.216
July - December
2018
United States, Lebanon
45.77.137.65
March - April
2019
Syria, Sweden
142.54.164.189
March - April
2019
Syria
199.247.17.221
March
2019
Sweden


The following list contains the threat actor name server domains and their IP address.

Domain
Active Timeframe
IP address
ns1[.]intersecdns[.]com
March - April 2019
95.179.150.101
ns2[.]intersecdns[.]com
March - April 2019
95.179.150.101
ns1[.]lcjcomputing[.]com
January 2019
95.179.150.101
ns2[.]lcjcomputing[.]com
January 2019
95.179.150.101

Beers with Talos Ep. #51: Sea Turtles yeeting packets

$
0
0


Beers with Talos (BWT) Podcast Ep. No. 51 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded April 12, 2019 — Today, we rip through a few other things to spend most of our time discussing Sea Turtle, the latest DNS hijacking campaign discovered by Talos. Also, Joel causes the biggest blockchain outburst in some time. Special thanks for today’s podcast goes to Danny Adamitis, the main Talos researcher on the Sea Turtle campaign. Danny was going to be with us today, but experienced some technical issues that prevented that from happening. RIP Danny’s mic: 4-12-19.

The timeline:

  • 00:35 — Roundtable: Let’s play guess why Mitch(ell) was in the ER and what Nigel scrapes off Craigslist
  • 14:10 — Banking trojans: It’s Gustuff, man.
  • 16:50 — Sextorition scam update: Cash cow or grinders game?
  • 19:00 — DNS Attacks: A primer to Sea Turtle
  • 22:00 — Sea Turtle: Abusing the fundamental trust at the core of the internet
  • 53:00 — Parting shots and closing thoughts

Some other links:

==========

Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

Hosted by Mitch Neff (@MitchNeff).

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Source (April 18): New attacks distribute Formbook, LokiBot

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

If you haven’t yet, there’s still time to register for this year’s Talos Threat Research Summit— our second annual conference by defenders, for defenders. This year’s Summit will take place on June 9 in San Diego — the same day Cisco Live kicks off in the same city. We sold out last year, so hurry to register!

The top news this week is, without a doubt, Sea Turtle. Wednesday, we posted our research related to this DNS hijacking campaign that has impacted countries around the world and is going after government agencies, many dealing with national security. You can check out all the details here. This week’s episode of the Beers with Talos podcast also discusses Sea Turtle.

And while it didn’t grab as many headlines, we also wrote this week about HawkEye Reborn, a variant of the HawkEye malware. The keylogger recently changed ownership, and the new actors behind the malware have recently made a sizable push to infect users.

Also, take a look below to find out new information regarding LokiBot.

Finally, we also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos


Location: Salt Lake City, Utah
Date: April 25
Speaker: Nick Biasini
Synopsis: Join Nick Biasini as he takes part in a day-long education event on all things Cisco. Nick will be specifically highlighting the work that Talos does as one part of the many breakout sessions offered at Cisco Connect. This session will cover a brief overview of what Talos does and how we operate. Additionally, he'll discuss the threats that are top-of-mind for our researchers and the trends that you, as defenders, should be most concerned about.  

Cyber Security Week in Review

  • Law enforcement agencies are increasingly using location data from Google to find crime suspects. A new report says the company scans mobile devices to create a "net" of people who were in the area of a given crime.
  • Ecuador says it was targeted by nearly 40 million cyber attacks last weekend after the arrest of WikiLeaks' founder Julian Assange. Assange was being held in Ecuador's embassy.
  • Several phony apps on the Google Play store are stealing users' Instagram logins. The apps have been downloaded hundreds of thousands of times and claim to help users boost their number of followers.
  • Oracle's latest quarterly security update includes fixes for nearly 300 vulnerabilities. Forty-two of the bugs could be exploited by attackers with no user credentials.
  • WhatsApp will soon add a new feature that will allow users to block others from taking screen captures of their messages. However, the feature will only be blocked at the local level, not the conversation level.
  • Cisco patched a critical vulnerability in its ASR 9000 line of wireless routers. The most serious bug had a severity score of 9.8 out of a possible 10. An attacker could exploit this flaw to launch denial-of-service attacks against the router's owner.
  • Attackers may have been able to read users' emails in Hotmail, MSN and Outlook. Microsoft confirmed earlier in the week that some of the company's email services were targeted in a cyber attack. But one employee who was witness to the attacks says the attackers were able to read some emails.
  • The fallout of Julian Assange's arrest continues. Some critics say that the indictment against him could have wide-reaching consequences, especially for journalists who publish classified government information.

Notable recent security issues

Title: Formbook, LokiBot attacks target Middle Eastern energy companies
Description: From mid-February through mid-March, Talos monitored phishing campaigns purporting to be sent from a legitimate domain registered to a large organization in the oil and gas industry. Cisco Talos recently discovered yet another campaign using specially crafted, malicious — yet persuasive — emails to target a legitimate organization in the oil and gas industry in the Middle East. The campaign deploys malware that exhibits similarities to the data-stealing malware families of LokiBot and Formbook. At the end of this newsletter, you’ll see a list of IOCs related to these attacks.

Title: Zero-day in Internet Explorer could be exploited even if user isn’t running web browser
Description: A vulnerability in the way Microsoft Internet Explorer handles MHT files. If a user were to open a specially crafted MHT file, an attacker could gain the ability to exfiltrate local files and carry out additional spying on locally installed program version information. The interaction could even be carried out automatically without any user interaction.
Snort SIDs: 49799, 49800

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 8f236ac211c340f43568e545f40c31b5feed78bdf178f13abe498a1f24557d56
MD5: 4cf6cc9fafde5d516be35f73615d3f00
Typical Filename: max.exe
Claimed Product: 易语言程序
Detection Name: Win.Dropper.Armadillo::1201

SHA 256: 46bc86cff88521671e70edbbadbc17590305c8f91169f777635e8f529ac21044
MD5: b89b37a90d0a080c34bbba0d53bd66df
Typical Filename: cab.exe
Claimed Product: Orgs ps
Detection Name: W32.GenericKD:Trojangen.22ek.1201

SHA 256: 790c213e1227adefd2d564217de86ac9fe660946e1240b5415c55770a951abfd
MD5: 147ba798e448eb3caa7e477e7fb3a959
Typical Filename: ups.exe
Claimed Product: TODO: <产品名>
Detection Name: W32.Variant:XMRig.22fc.1201

SHA 256: d05a8eaf45675b2e0cd6224723ededa92c8bb9515ec801b8b11ad770e9e1e7ed
MD5: 6372f770cddb40efefc57136930f4eb7
Typical Filename: maftask.zip
Claimed Product: N/A
Detection Name: PUA.Osx.Adware.Gt32supportgeeks::tpd

Indicators of compromise


Domains

plenoils[.]com
sharedrive[.]top
alkzonobel[.]com
web2prox[.]com
office[.]webxpo[.]us

IPs

84[.]38[.]132[.]25
173[.]198[.]217[.]123
37[.]49[.]225[.]195
URLs
hxxps://sharedrive[.]top/?qp
hxxp://sunny-displays[.]com:80/old/lk/fre.php
hxxp://sunny-displays[.]com/secured/lk/PvqDq929BSx_A_D_M1n_a.php
hxxp://modernizingforeignassistance[.]net/wp-content/plugins/projects/we.hta
hxxp://37[.]49[.]225[.]195/hook/logs/fre.php

Emails

3a5d7cd294848302f16c47735fe6342c1811c4d2309ff1a250d9bad267c2e278
1ace02fe46edcff8d775e3e3865813d204b138ab50e3edf6b94fc0c3afd9e883
7a47388b6d66aadeb16cf86cc27bab61006ee33f561a99d2f54f3e8b7652361e
cc63041400a7b39fb0560b1e5ecfe980f0ff4915b473881e203b85a14c192e50
33ae7a8b755786de1e56341449c763fa43861a503937b3de0778188814b0f5f2
7a47388b6d66aadeb16cf86cc27bab61006ee33f561a99d2f54f3e8b7652361e
cc63041400a7b39fb0560b1e5ecfe980f0ff4915b473881e203b85a14c192e50
33ae7a8b755786de1e56341449c763fa43861a503937b3de0778188814b0f5f2
45fd204c881bc2002cba8b58eb8f135c8e8f2b290bcede597ab1bd6647028570
8b6819c03ab993eb21adb59f06cb4476eb6ea869f61004b56df7b3a1ee999e28
46a047e141ed8fa151a9e3cf869ed2c56234d0de0b627d998b247150c8f99984
597cab0edaf0034d7aab7b1ecca1bf0dcd25a094cdaf10bca6f7cb38c7f17daf
d6e4818a63a1dc2a1887135563c0591bdb4d524b6bd4d37aa5e5051935aa7578
Email addresses
Nasser[.]K[.]@plenoils[.]com
g9825@live[.]com
mailer@matterbusiness[.]xyz
inf0-greenhillsports@outlook[.]de
youzs@ropasz[.]ml
punker@biven[.]ml
otaz@viotaz[.]ml
riyanlepine@drylnewby[.]cf
webxpoinc@yahoo[.]com
chosipongs@gmail[.]com

Formbook mMutex 

8-3503835SZBFHHZ

Malware SHA256

d667c0c158786889fafa273d81bce9980bdc6ab54ea58bd2a558e248598158ac maldoc
ae55388db9f39945f3aee9e6c2a66bacfe6483eb83341b0982a6741c83a28a34 maldoc
e27d1d4de73d75968cacc3a581e54f71fef372a8661297c59a8d1a8cea60a51d .hta file
8220331b94a0dc7207246b0a2193ba2335bb70c673a085f52de0bb66786c86ce
3497d5897559c595f1ebd982171d74770dd135973eb6ea62f8fad6fec6438acc
2718ac89d522881522af2fb0b552ef55e25308544b594ed64e7f15f31acdec73

Additional Maldocs
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Files referring to alkzonobel[.]com

b0dc50e22a2c3fe76831f2990dcd7b1b0ca969113c2d0c962d84c5e8b02ae75f maldoc
1365104bee40dc25b0df2e9102961c9fbce10658cce9f15b9f45d0e60e18d3a9 maldoc
c08fafb05053df47f2f830d0c6d7fe34be30b13bd2280ab2db6249d7dae6b5fb maldoc

Files referring to web2prox[.]com

5b3c39e9d85ac947f830ed02988277f6460b991aa050063545cffb147029fd51 maldoc
PO58609.doc
811c32c017d340fe1d198ff441b14d95c7101bd04cd4fdeaaaf03124700bf3ef
PO58610.doc
1c3c62a64dcb66595eb8140fc73a9e0cbfdc9fe5f73f802489c04a460fa6e6ba

[1] https://cysinfo.com/nefarious-macro-malware-drops-loki-bot-across-gcc-countries/
[2] https://antifraudintl.org/threads/marie-louise-el-ammar-seko-lebanon-sarl.105031/
[3] https://www.reverse.it/sample/811c32c017d340fe1d198ff441b14d95c7101bd04cd4fdeaaaf03124700bf3ef?environmentId=4
[4] https://www.reverse.it/sample/1c3c62a64dcb66595eb8140fc73a9e0cbfdc9fe5f73f802489c04a460fa6e6ba?environmentId=1

Threat Roundup for April 12 to April 19

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 12 and April 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Dvee-6943598-0
    Malware
    This generic malware cluster is packed with Kryptik. It persists through the registry and modifies system settings to enable other actions on the targeted machine.
     
  • Win.Worm.Vobfus-6943588-0
    Worm
    Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
     
  • Win.Malware.Trickster-6943552-0
    Malware
    Trickster (aka Trickbot) is a banking trojan targeting sensitive information for select financial institutions. This malware is being distributed through several malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as the VBS Scripts.
     
  • Win.Packed.Razy-6943334-0
    Packed
    Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypt the data, and send it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
     
  • Win.Ransomware.Cerber-6941980-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Malware.Tofsee-6940401-1
    Malware
    Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
     
  • Win.Malware.Ponystealer-6939264-0
    Malware
    Ponystealer is known to be able to steal credentials from over 100 different applications and may also install other malware such as a remote access trojan (RAT).
     
  • Doc.Downloader.Emotet-6938868-0
    Downloader
    Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails.
     
  • Win.Malware.Fareit-6938631-0
    Malware
    The Fareit trojan is primarily an information stealer with functionality for downloading and installing other malware.
     
  • Win.Malware.Ircbot-6938570-0
    Malware
    Ircbot, also known as Eldorado, is known for injecting into processes, spreading to removable media, and gaining execution via Autorun.inf files.
     

Threats

Win.Malware.Dvee-6943598-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 13
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 13
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 13
<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: bikfir
13
MutexesOccurrences
NetRegistry13
NetworkLighter13
OMXBJSJ3WA1ZIN13
OneiricOcelot13
OnlineShopFinder13
P79zA00FfF313
PCV5ATULCN13
PJOQT7WD1SAOM13
PSHZ73VLLOAFB13
QuantalQuetzal13
RaringRingtail13
RaspberryManualViewer13
RedParrot13
RouteMatrix13
SSDOptimizerV1313
SoloWrite13
StreamCoder1.013
Tropic81933113
UEFIConfig13
UtopicUnicorn13
VHO9AZB7HDK0WAZMM13
VRK1AlIXBJDA5U3A13
VideoBind13
VirtualDesktopKeeper13
VirtualPrinterDriver13
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
N/A-
File Hashes
  • 2d5b33a32e4df1169b09c06fe13f98e93cb108cc9163f322001a2db3b8a76519
  • 2d5deb963cf9cef62da59687e75f27ffd4d71db18272add942a93952a8920eb2
  • 33a36a0172595eedf4a682ffe173662b3092bfe71fbdfdf4e5f4dcd365513564
  • 357208a511d7d0277e467719036d801c91ae6b66a9988a5092db9b6af99603b8
  • 45aeda204fa240e37b87d8c183343aa617ba7e8fd42bedbfc4ebcf7e3385e3be
  • 4859cb4bc26d257e2720dacb777895b2541f72a8848dfa554665e1b04e1a9f7a
  • 566e1ee0d6ab08685f722c041c635894d0169f30accf5325d5f0413717c1beab
  • 600b00554ff77da736f199efa7338cabc92307d32dc527f096e00ec718039778
  • 767fab90d7e27102d3208766baa0f5956073c36fc31b93b854c2afbdc25b6c15
  • ad1a5597477817161619ea4b0dbdf92186260947f808ced5e18f60990b229795
  • c3c4acdb0f7164a8c3095df6fa5932d5d8617254856576372b86238c092dac80
  • ef87f15fb3383455cbd86bb5c1c792535d06c334499025ab8c5091c33a722f1c
  • fdf5bae149683eff434f734295693723dd83b3769b63e5317e137c4ac4aff6ae

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Worm.Vobfus-6943588-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 44
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: ShowSuperHidden
44
<HKLM>\SOFTWARE\WOW6432NODE\Policies 44
<HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\WindowsUpdate\AU 44
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 44
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
44
<HKLM>\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU 44
MutexesOccurrences
\BaseNamedObjects\A43
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]11[.]56[.]4843
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ns1[.]helpupdated[.]com44
ns1[.]helpupdates[.]com43
ns1[.]helpupdated[.]net43
ns1[.]helpupdater[.]net43
ns1[.]helpupdates[.]org43
ns1[.]helpupdated[.]org42
ns1[.]helpupdates[.]net42
Files and or directories createdOccurrences
\autorun.inf44
\??\E:\System Volume Information.exe44
\System Volume Information.exe44
\$RECYCLE.BIN.exe44
\Secret.exe44
\??\E:\Passwords.exe44
\??\E:\Porn.exe44
\??\E:\Secret.exe44
\??\E:\Sexy.exe44
\??\E:\x.mpeg44
\Passwords.exe44
\Porn.exe44
\Sexy.exe44
\??\E:\autorun.inf41
\??\E:\$RECYCLE.BIN.exe40
%HOMEPATH%\tuoopiv.exe1
%HOMEPATH%\yeeideg.exe1
%HOMEPATH%\xoaqoz.exe1
%HOMEPATH%\fooucax.exe1
%HOMEPATH%\doohuoh.exe1
%HOMEPATH%\maasie.exe1
%HOMEPATH%\hoila.exe1
%HOMEPATH%\rwfiik.exe1
%HOMEPATH%\luuaj.exe1
%HOMEPATH%\komaq.exe1
See JSON for more IOCs
File Hashes
  • 0825d12566ab439528f23e43a5268df5134fc940a710b9a54327c5369ff1d779
  • 08d7d577fd9e974f243d39882b99c9416da3d8831e6238e2ef106c71a085c302
  • 0956747c94a2b20b1dae5aed1abe13027da1b1f28035bdf93d8d5d8f5f659819
  • 1145bd1a3139aa595289cdeb70cc33cf5bde8a6c2119011047d70be952fbc6d5
  • 11999ae5f6b5b76ac23baeba3bbcae5e4221fe668fb1c49d682ba1443cb9259a
  • 154a71548012d1e77bebdd8d281065e30674e9baa11ef4c5329e152531d2327f
  • 18c99727bdf696c45c0ba482a0c6cb79b73db287ab22f8df80fec32a2f1058b1
  • 20eaee1add9c704bf9f371bb8fee3c1a2a5038cd30092a99fc0a106fdf6183b5
  • 2144a184f0b1a3ef768942be09775cbdfd84c467a4bd397165a18d7a5ae8e267
  • 236572e8b2d5319387857ecdb6b4ba967fe5e981c68af50bee606ccb539c434c
  • 24515511e533db6e0e92aec65514245f4e406fe627dc3b913d8726f82d9af7fc
  • 266379bcf89611d7d42aa3226b02f7184f2feac15112574586ceeb2611ddf211
  • 2808712ea60de5e30f5106e69bef8a536f42c712d9c98ae0ebbc6fc1f44fbcd7
  • 28eeb9fcb82a4063d33cb67cdda99b9b253d7b0f5cdb4970dba6ab823dca0c6f
  • 2c61c72f6244f95c47ed4322724341584f52935af862d12fca3f59392a229b97
  • 30bc3619ccb44ee0bcadfd87c8df627404f4d550974f0a16bdd6d77fa5d608bd
  • 317081b5d0d9097985f8682d1433633fc7ac4a26dd2be1b4c60c67f282ca87f9
  • 4adb34d87cdfae0d680ad483f94a809165151d3f0dbb3943dd0851038e40b9ac
  • 4ee4b51be1b2333b8e75608db3401b5f30f18b4ce805fd1291caa11660e2e8f2
  • 4ffd7a68634b4e0a28407e6755d288cb29e19780b10e874aff0286dee745427a
  • 5e785cf0e1bba5392c31815cf1f8e46f5f5757f0a0364dc4ef949bf30c97dc91
  • 631e4dd3820d5ff217e521ea60af0e886846d38a576b1e1a2b9a34d6c0218bc1
  • 642d7d5280ca3ac5e18f1c2b9a9de7e5137fb477b5dac9299cd54d76752fcae4
  • 6e660d002f74fb282d2913c0cb340e3c9adc607a2b6b6d24aff0b625c0ce014a
  • 731c3e7ca6703700fefd3461f6191bf69808adac97274fe15f83a5a48ed3f415
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella



Win.Malware.Trickster-6943552-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: DeleteFlag
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
25
<HKLM>\SOFTWARE\Wow6432Node\ODBC\ODBCINST.INI\ODBC Connection Pooling 25
<HKLM>\SOFTWARE\WOW6432NODE\ODBC\ODBCINST.INI\ODBC CONNECTION POOLING
Value Name: Retry Wait
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: DefragWinSysTask.job
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: DefragWinSysTask.job.fp
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\DEFRAGWINSYSTASK
Value Name: Id
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\DEFRAGWINSYSTASK
Value Name: Index
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\DEFRAGWINSYSTASK
Value Name: Id
25
<HKLM>\SOFTWARE\ODBC\ODBCINST.INI\ODBC Connection Pooling 24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{63696C4F-E894-414D-8EDD-EC59133E665B} 12
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F95BF9F7-D3F3-4AC5-8A3F-4B59850DD369}
Value Name: Path
12
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{C6E23691-91D5-4EF1-9A0F-35831712CA4D} 5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{6FBD3206-3711-4788-B386-E054AB1B035A}
Value Name: Path
5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{A2E3CD1A-FC1F-429E-AE42-F10FC0FE5F62} 4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{DD4D0EA2-1AA6-4E9E-8929-8DA13093B023}
Value Name: Path
4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{B78E9CED-C151-484D-9668-62B5883DF1B7} 3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{39B6E100-0C7A-4C93-B02D-9BC71BBE7971}
Value Name: Path
3
MutexesOccurrences
Global\316D1C7871E1025
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%APPDATA%\SysDefrag25
%System32%\Tasks\DefragWinSysTask25
%APPDATA%\SysDefrag\151d29112be976edc69713a9269b5562e18a31ade8c9b98a5ae60f09cb2f858b.exe1
%APPDATA%\SysDefrag\3f87dc3b929d5e58c30e15da96dd77c21fa9aefb3ddc087f109d6680bf997f3a.exe1
%APPDATA%\SysDefrag\53c7b976b0d39d8dd909a9038e677ac2d7cb970a721565fbdcfbb30d97830a1a.exe1
%APPDATA%\SysDefrag\57c93c6821a88699c08a1929fcd808b1da5b80a569216763c9c9d3a06bed1df1.exe1
%APPDATA%\SysDefrag\62aedc09e819fea0f5319805cba90ce295053770ea3235393109c5ebcdb76589.exe1
%APPDATA%\SysDefrag\9e1707e022f96e7bb30ec79e7703bcb8b1007ca9da320533290a95021a36399e.exe1
%APPDATA%\SysDefrag\e91f21aa3b75d5c3aae321e81005199f85722179aa16921afb8fc12b30558d3d.exe1
%APPDATA%\SysDefrag\8c2ae5c96c7e6e895b618260bab3eba68a02a7363dc712eff67939a0fa7839dd.exe1
%APPDATA%\SysDefrag\96fe099171c5f9fb6982cb999b2becc60920c1d03308ee70680dd28e0a97d92d.exe1
%APPDATA%\SysDefrag\29116de521ff86e6a59e92399b19a99f6e053b85b962e1b816c8c727c890a397.exe1
%APPDATA%\SysDefrag\32a0138dad1d09a3cf8b697788bd3393e37d6f6a95383ac7d91885987990f29e.exe1
%APPDATA%\SysDefrag\69275638617690fc15a678c89d00eb3611660b95e653ff7c72686209ffff2b5b.exe1
%APPDATA%\SysDefrag\8957796c69be68666c6fb97ca9dce0c22b7b9ca1f6efe02fd196cb12f55f07ad.exe1
%APPDATA%\SysDefrag\9889c90b3091da0fdd1e071bcd9f2797cb38619fde119707ab260852ae50eb65.exe1
%APPDATA%\SysDefrag\caa17a1902c1eaac7d569a772237ae18e968c1cf87a9599e6578982ccc0bf05d.exe1
%APPDATA%\SysDefrag\f288eaba7c1f39f12bd260056b2cde93c93cc26750039e788ae128382ea2fb38.exe1
%APPDATA%\SysDefrag\35e93b5912e9b821eac37a208cb6d3aa2d68d9ff8ab886e1ee80f7673b1e16e1.exe1
%APPDATA%\SysDefrag\07611835c7de0d9a33e818d9f18d863cde06a0f135d36f87d2bf698db0092ff7.exe1
%APPDATA%\SysDefrag\017ee1979fd82e3b35b79cf6e856a698eb20e9b8eea8979960651dbb6138f9d2.exe1
%APPDATA%\SysDefrag\2518d5b9b191b697770b317a9eed51e193b6bf6d9cdf0e92ec165ef80e80a519.exe1
%APPDATA%\SysDefrag\39858ba2395da39a12c59cd8653e80179f65b53b7216c278da215989ea922a9d.exe1
%APPDATA%\SysDefrag\51916f6519d320dceb1fe899cf93279ba9b5d2a896bdc9fdb7692969a62b9fa3.exe1
%APPDATA%\SysDefrag\66d3703ef85b217fd5af05b99eb87e0930d8bef9a9261b51e183a5ee9c3d7997.exe1
See JSON for more IOCs
File Hashes
  • 016ee1969fd72e3b34b68cf5e745a597eb20e9b7eea7968850541dbb5137f8d2
  • 06511734c6de0d8a33e717d9f17d753cde05a0f134d35f76d2bf597db0092ff6
  • 141d28112be865edc58613a8258b4452e17a31ade7c9b87a4ae50f09cb2f747b
  • 2417d4b8b181b596660b316a8eed41e183b5bf5d9cdf0e82ec154ef70e70a418
  • 29115de421ff75e5a49e82389b19a88f5e043b74b952e1b715c7c626c790a386
  • 32a0137dad1d09a3cf7b586677bd3393e36d5f5a84373ac6d81774976890f28e
  • 34e83b4812e9b721eac36a207cb5d3aa2d57d8ff7ab775e1ee70f6563b1e15e1
  • 38747ba2394da38a12c48cd7543e70168f54b43b6215c267da214878ea922a9d
  • 3f76dc3b828d4e47c30e14da95dd66c21fa9aefb3ddc076f109d5570bf996f3a
  • 41915f5418d320dceb1fe798cf83268ba8b4d2a795bdc9fdb6582958a52b8fa3
  • 43c6b865b0d39d7dd808a8037e566ac2d6cb960a621454fbdcfbb30d86730a1a
  • 46c83c5721a77598c07a1828fcd707b1da4b70a458215653c8c8d3a05bed1df1
  • 52aedc08e719fea0f4318704cba80ce294043660ea3234393108c4ebcdb65479
  • 55d3603ef74b216fd4af04b98eb76e0830d7bef8a9251b41e173a4ee8c3d6886
  • 59264537516580fc14a567c79d00eb3511550b94e543ff6c62575208ffff2b4b
  • 7846685c58be57555c5fb86ca9dce0c22b6b9ca1f5efe02fd185cb12f44f06ad
  • 7c2ae4c85c6e5e784b517250bab3eba57a02a6353dc612eff56838a0fa6738dd
  • 8779c80b3081da0fdd1e061bcd9f2686cb37518fde118606ab250742ae40eb54
  • 8f033f102dc0118bbd47521a8ccd7726434d48efb335de3e35deeaabc33432f8
  • 95fe099161c4f8fb5872cb898b2becc50920c1d03307ee60570dd27e0a86d92d
  • 9e1606e022f95e6bb30ec68e6603bcb7b1006ca9da320433280a94021a35399e
  • ae65a52a9a6300794ef837776a979abeaf9901d6250ac6531a50c0668dac1213
  • caa16a1902c1eaac6d459a662236ae17e857c1cf76a9489e5467972ccc0bf04d
  • e81f21aa3b64d4c3aae321e71004188f74622168aa15921afb7fc12b30447d3d
  • f277eaba6c1f39f12bd250045b2cde83c93cc25640038e677ae127372ea2fb37
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Packed.Razy-6943334-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: LoadAppInit_DLLs
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: aybbmte.job
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: aybbmte.job.fp
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
Value Name: Index
18
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: AppInit_DLLs
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AYBBMTE
Value Name: Id
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{F2B28AC6-1443-43F4-9832-8315397F35E8} 14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
Value Name: Path
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
Value Name: Hash
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
Value Name: Triggers
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{F2B28AC6-1443-43F4-9832-8315397F35E8}
Value Name: data
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FF46FC7D-1E0D-46F8-87EC-94D0FDA83668}
Value Name: DynamicInfo
14
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F95BF9F7-D3F3-4AC5-8A3F-4B59850DD369}
Value Name: Triggers
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{088B2EE3-A639-491E-B1E6-84AE447D785F}
Value Name: DynamicInfo
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{94669170-5F40-43E0-9D77-69BC9146DF72}
Value Name: data
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9C9693B0-E894-414D-8675-6B58133E665B}
Value Name: DynamicInfo
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{6E1FF505-4705-412B-825D-ECE026885614}
Value Name: data
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{ADB65317-3AC3-40D4-B863-464193D5CE9A}
Value Name: data
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F95BF9F7-D3F3-4AC5-8A3F-4B59850DD369}
Value Name: DynamicInfo
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\HANDSHAKE\{63696C4F-E894-414D-BED2-EC59133E665B}
Value Name: data
1
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%ProgramData%\Mozilla\thfirxd.exe18
%System32%\Tasks\aybbmte18
%ProgramData%\Mozilla\lygbwac.dll18
%HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll18
%HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe18
%SystemRoot%\Tasks\kylaxsk.job18
File Hashes
  • 35710fe9a0ec701c957212d177d324fdd050832eac5cb442e436b7bdcb26f392
  • 77fd8af54d16227311e6ca62676bf962af369f6d075e5a6a3dedc265af0bab0c
  • 83ea8be6378a758ec38762fe40592c84239e4ebe3b510ab1df01ec921dfe8b07
  • 9ffc7b464bf4765508d05add71f1f10dfc66e517559d8363921aa57fbe7696b6
  • b892d7bb57e4ee61445909254f25572c610bafd2cdf3408fa9f8ea236791dae3
  • be5b92a7e91b011a21c17c3c32129a54af5230b23d1f1ad2a775501e322fa775
  • d902082b5f30414b39ef79518073f8773d0bfaca11ba9beba6441ee4ffe21aba
  • db5d2eced0976f4197f8758a1691c114085d53dd5385750435e45327c2516ea0
  • dec4f733431b69f73148544a081af866fd9a03cf0ff5f65c348c7d8dbcc47289
  • e25612c0c5772ccf29413be32a6b01e41bd631c4b184f04b47c0ba086aee17d1
  • e3286f3d9925e28013ecaa3d5ccda334334f459419a1bd059d86ed8ffc2fb23c
  • e36e6d8efe3baf2a42b195b59088c0344381047d90d4f01d992d502b49ff0a38
  • e75ffd7b1bd0b66bd2ebe13c700968347992b4660155eab5f4013076ae6d86fd
  • e8a7ff6379cd66dfb2da571b3cd44e2949ed96cefa033159405cea7a37c0f9fb
  • eec0bbaf2fd315ffa23175f0e1825b57e9770bd212406efd0fa288d5f37853c9
  • f3522c4d6ce273c536daef88b0d7700f24a311a5a03670b6524f341beb42dbaf
  • f6e6a821eba38e8aed36ad58e628b1aae848bb5ef0397298705e3fc98a77ae08
  • fd7540d177ec11cfa63ba3d2328a57b53d614d91f63fc10be65f93360df8aa81

Coverage


Screenshots of Detection

AMP




ThreatGrid



Win.Ransomware.Cerber-6941980-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 15
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 15
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 15
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASAPI32 15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableFileTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableConsoleTracing
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: ConsoleTracingMask
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: MaxFileSize
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileDirectory
15
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 15
<HKCU>\SOFTWARE\Microsoft\Speech\Voices 15
<HKCU>\SOFTWARE\Microsoft\Speech\CurrentUserLexicon 15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\AppLexicons 15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A} 15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\Files 15
<HKCU>\SOFTWARE\Microsoft\Speech\AppLexicons 15
<HKCU>\SOFTWARE\Microsoft\Speech\PhoneConverters 15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\VOICES
Value Name: DefaultTokenId
15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
Value Name: CLSID
15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON 15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
Value Name: Generation
15
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\PHONECONVERTERS
Value Name: DefaultTokenId
15
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb715
Local\MSIMGSIZECacheMutex15
shell.{381828AA-8B28-3374-1B67-35680555C5EF}15
Local\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C15
Local\HKEY_CURRENT_USER_SOFTWARE_Microsoft_Speech_CurrentUserLexicon_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Chinese_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_English_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_French_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_German_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Japanese_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Spanish_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_TraditionalChinese_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Universal_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Lex_Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Mutex15
Local\{12F67A48-DB8F-46C1-A266-4AD55A97951D}-Mutex15
Local\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_AudioOutput_TokenEnums_MMAudioOut_Mutex1
\BaseNamedObjects\shell.{E34ADEF1-7E97-F83F-B563-5CB2AEB03228}1
\BaseNamedObjects\shell.{5ED88314-B21B-6A1E-9E28-1194C46E655A}1
\BaseNamedObjects\shell.{009333F1-551C-9DAC-1759-5B4919375F70}1
\BaseNamedObjects\shell.{AC607669-1359-523E-095D-A88DA96FD1D1}1
\BaseNamedObjects\shell.{5D9CA089-73FE-FB93-A29C-5A0F541ABED9}1
\BaseNamedObjects\shell.{1095E0BC-41F3-CF2A-1232-3CB5F90C4677}1
\BaseNamedObjects\shell.{573F0F01-C284-E3E4-B166-E3C39544ED56}1
\BaseNamedObjects\shell.{18D0266F-2D74-3F5C-79BE-40E45584D13C}1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
149[.]202[.]251[.]6514
149[.]202[.]251[.]6414
149[.]202[.]251[.]6714
149[.]202[.]251[.]6614
149[.]202[.]251[.]6914
149[.]202[.]251[.]6814
149[.]202[.]251[.]6114
149[.]202[.]251[.]6014
149[.]202[.]251[.]6314
149[.]202[.]251[.]6214
149[.]202[.]251[.]7614
149[.]202[.]251[.]7514
149[.]202[.]251[.]7814
149[.]202[.]251[.]7714
149[.]202[.]251[.]7914
149[.]202[.]251[.]7014
149[.]202[.]251[.]7214
149[.]202[.]251[.]7114
149[.]202[.]251[.]7414
149[.]202[.]251[.]7314
149[.]202[.]249[.]20714
149[.]202[.]249[.]20814
149[.]202[.]249[.]20914
149[.]202[.]250[.]814
149[.]202[.]250[.]714
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
p27dokhpz2n7nvgr[.]1j9r76[.]top15
api[.]blockcypher[.]com14
chain[.]so14
bitaps[.]com14
btc[.]blockr[.]io14
crl[.]comodoca4[.]com9
crl[.]usertrust[.]com9
w3z5q8a6[.]stackpathcdn[.]com9
Files and or directories createdOccurrences
%APPDATA%\Microsoft\OneNote\14.0\Preferences.dat15
%TEMP%\d19ab98915
%APPDATA%\Microsoft\Speech15
%APPDATA%\Microsoft\Speech\Files15
%APPDATA%\Microsoft\Speech\Files\UserLexicons15
%TEMP%\d19ab989\4710.tmp15
%TEMP%\d19ab989\a35f.tmp15
%LOCALAPPDATA%\Microsoft\Office\Groove\System\CSMIPC.dat15
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\6YL4T24G\1016d7ceff188e9fe32e68e9761bd811f354cfb31d7d106ec3c4f3ebce7f7a50[1].json15
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\all[1].json15
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt[1]15
%APPDATA%\Microsoft\Outlook\Outlook.srs15
%TEMP%\8f793a96\4751.tmp14
%TEMP%\8f793a96\da80.tmp14
\I386\DRVMAIN.SDB14
\I386\EULA.TXT14
\I386\HWCOMP.DAT14
\I386\SECUPD.DAT14
\I386\SETUPLDR.BIN14
\I386\WIN9XMIG\ICM\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB14
\I386\WIN9XMIG\ICM\SYMBOLS\RETAIL\DLL\MIGRATE.PDB14
\I386\WIN9XMIG\IEMIG\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB14
\I386\WIN9XMIG\IEMIG\SYMBOLS\RETAIL\DLL\MIGRATE.PDB14
\I386\WIN9XMIG\PWS\SYMBOLS.PRI\RETAIL\DLL\MIGRATE.PDB14
\I386\WIN9XMIG\PWS\SYMBOLS\RETAIL\DLL\MIGRATE.PDB14
See JSON for more IOCs
File Hashes
  • 065ac3b439cf9dfb68574e401b22b854cdded61d57ae9894b0a99915e8f76ee5
  • 308c49353001e49e9fbeca1718de74fa0a53d060685f5eeb38fcc0f7c92aac86
  • 47e1595cd742e27fa1d89d3bf0de13a1063a44fda27c18fa163da61305953c77
  • 4afe49d7696926c71f2a702b16fab4525b19eacfa533deff7c7a6222b25b1cc0
  • 608a69274b844a4917b03476b84253fbb4dbf98b6f78fd04bb184fc8155fcc50
  • 611f4163f797a393b0820f38b72f0ccd4a3d4d2f2606c3bc444f5d850f1b4a58
  • 7cd8be5830f54b0ac9edf6ef52bcb1aec00527470c615b2eb789085dcadf24e7
  • 956ecfd8da6da76db5fd5d3cf0cfdbe9713ee420bcf4d95252e74a834c1b6f04
  • a217aea41ad86b341541765ae803df9bcc4dfda4152eceb576faeb697ebbe970
  • a4573c6717b09a88b1e96037778d1744012990520f26deefd75770a2505b4d4c
  • ad8293b33649f28b8d0557ec8ef250d10e1879d20d8ca12bb06f1cd7f18f20e2
  • b276202d46ee89c90e0accfa1998666b0960aa8dc44689ff065d8343698b7ad2
  • c4b25bcea6a8abf8bdff79259c70f7618343550f1d89dd5181467a694e1dc299
  • e16be5f2bc24c321b206ad34563a6f69987dd2ed6884763d01c95cccf66f8ca6
  • eb332302914a3e098767fcca4a9836cab1d87947e56c946301bc0605dbf003f9

Coverage


Screenshots of Detection

AMP



ThreatGrid



Malware



Win.Malware.Tofsee-6940401-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 29
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 29
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 29
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 29
<HKU>\.DEFAULT\Control Panel\Buses 29
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
29
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: DisplayName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: WOW64
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: ObjectName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: Description
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\haoutbhw 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: ErrorControl
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: DisplayName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: WOW64
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: ObjectName
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HAOUTBHW
Value Name: Description
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\jcqwvdjy
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\jcqwvdjy 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\JCQWVDJY
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\JCQWVDJY
Value Name: Start
3
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb729
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25029
69[.]55[.]5[.]25029
5[.]9[.]32[.]16629
46[.]4[.]52[.]10929
176[.]111[.]49[.]4329
85[.]25[.]119[.]2529
144[.]76[.]199[.]229
144[.]76[.]199[.]4329
43[.]231[.]4[.]729
65[.]20[.]0[.]4929
192[.]0[.]47[.]5929
64[.]98[.]36[.]429
172[.]217[.]12[.]16428
96[.]114[.]157[.]8028
74[.]208[.]5[.]2028
74[.]208[.]5[.]428
207[.]69[.]189[.]22927
208[.]89[.]132[.]2725
148[.]163[.]156[.]125
213[.]33[.]98[.]14925
117[.]53[.]114[.]1524
213[.]209[.]1[.]12921
47[.]43[.]18[.]921
212[.]54[.]56[.]1120
64[.]136[.]52[.]3718
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa29
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org29
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org29
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net29
whois[.]iana[.]org29
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net29
whois[.]arin[.]net29
mx[.]bt[.]lon5[.]cpcloud[.]co[.]uk29
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org29
cxr[.]mx[.]a[.]cloudfilter[.]net29
microsoft-com[.]mail[.]protection[.]outlook[.]com29
gmx[.]net29
mx[.]lycos[.]com[.]cust[.]b[.]hostedemail[.]com29
btinternet[.]com29
lycos[.]com29
cox[.]net29
earthlink[.]net29
mail[.]com29
ntlworld[.]com29
victoria1999[.]hotrusgirls[.]cn29
irina1993[.]hotlovers[.]cn29
hot-beauty[.]cn29
hotladies[.]cn29
mx1[.]comcast[.]net28
comcast[.]net28
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile:.repos29
%SystemRoot%\SysWOW64\config\systemprofile29
%SystemRoot%\SysWOW64\IPHLPAPI.DLL7
%SystemRoot%\SysWOW64\dhcpcsvc.dll5
%SystemRoot%\SysWOW64\nlaapi.dll5
%SystemRoot%\SysWOW64\winnsi.dll5
%SystemRoot%\SysWOW64\dhcpcsvc6.dll5
%SystemRoot%\SysWOW64\NapiNSP.dll5
%SystemRoot%\SysWOW64\mswsock.dll5
%SystemRoot%\SysWOW64\pnrpnsp.dll5
%SystemRoot%\SysWOW64\dnsapi.dll3
%SystemRoot%\SysWOW64\ibpvucix3
%SystemRoot%\SysWOW64\haoutbhw3
%SystemRoot%\SysWOW64\jcqwvdjy3
%SystemRoot%\SysWOW64\mftzygmb3
%SystemRoot%\SysWOW64\winrnr.dll3
%SystemRoot%\SysWOW64\wpdjiqwl2
%SystemRoot%\SysWOW64\zsgmltzo2
%SystemRoot%\SysWOW64\buionvbq2
%SystemRoot%\SysWOW64\yrflksyn2
%TEMP%\npkbsmtm.exe2
%TEMP%\wdqqtewr.exe1
%TEMP%\fvbuvdtc.exe1
%TEMP%\resvxxvi.exe1
%TEMP%\wngjqdpo.exe1
See JSON for more IOCs
File Hashes
  • 04ad7dc786eee3e32597af6e50c2305f8b47dedd301d2b9fb721a3419c20125e
  • 0eabacede3f60e0d1b08c067d12235f47aa610430e47942f570384204d628ce5
  • 168db0956ca974da7a3bea33079602dc86341864e7e035a759809a3876544a11
  • 2934437617803ab26d7e3c836dd1f86c2239302858dbd4cea975dc16932cb530
  • 31f71a927a3121b3708e882fe7d7b464abd72ac9833e6a73aade0c2dffe764fb
  • 33b9a9b19767a412b37562a9afa071fd6f5590bd4c5c4f25601ac7f7f7aeae21
  • 34ab18dbba7d262495b87c114771c62cfe0bdfcb2a70a97a44518280755393e9
  • 40cc91ab3a8622bca860e93c1048708db75adfc3ceb599e94976115e42f65015
  • 43d0885a552ae3eef56ea141745368119a8532577c9c83004c68a03f89c7d27c
  • 5257a586503417963b3191e628a4031e9f6c0898310f4c249aa0f3225279e429
  • 54234890364c48ea705b30e13e259190259ee4f576e5398e817d6da1fe3fa963
  • 59270c4ff4bf0587dc14b4f4430d6d6992e812d966cfa5501af0ca2aaf49c162
  • 5b57bf741ac611232855c94a3bae104606940df4f44790178f14e8c3561b7a5a
  • 5ce7c6c51748e96f7e233ba3d5bd5a9739a55ca39b86e5c8de41d835c91e3b6c
  • 5eda0d87fb85b91dc15c23aecb339cfa8bffefee25b634fe7101d8783a6e99a5
  • 61a0c30166cab5d8786e060c44c683377f8e94feb66ccd79416c64e8c5a4e931
  • 6481910b15bfaee39bc53aa2cb3058e8f93eb40ba1b7f9a63672b7486c0306eb
  • 649954ed70b3840321ac3414bdbd8b855c1871d466550d51c9c86bcd8e208c45
  • 65279c4a75937f653d2c0085eba669da128d354770c88e50281a583caa8418f3
  • 65410da84d1f3e53d6f79b15f20ebada17bcbf3c33712c7c7031b807c85e45c3
  • 6aa1731105b6c97e17511811233db5d76ba52b814a73725412af8076d3f921df
  • 6ea680d3d212e30b3e7980643c928aee25acd508cca40191bafcd0db4804a13d
  • 75704499b50651600e0df6451e1347bd306d623eed175f64c9e35f77b9b9ee9e
  • 7a74f27ca0c5448590d25125d3cf8b5cc2229295a26200fcf3e9144b1d2f9a9b
  • 7ae435cdd61433c743865c8e6c042fc9f5e7c1b896faaf7cf0d02d6fa397748a
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Malware.Ponystealer-6939264-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Remcos-2EVC58 25
<HKCU>\SOFTWARE\REMCOS-2EVC58
Value Name: EXEpath
25
<HKU>\Software\Remcos-2EVC58 1
MutexesOccurrences
Remcos_Mutex_Inj25
Remcos-2EVC5825
\BaseNamedObjects\Remcos-2EVC581
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]58[.]218[.]2381
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
sammorisok55[.]ddns[.]net25
Files and or directories createdOccurrences
%APPDATA%\remcos25
%APPDATA%\remcos\logs.dat25
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\notepad.vbe25
%APPDATA%\notepad.exe25
%HOMEPATH%\Start Menu\Programs\Startup\notepad.vbe1
File Hashes
  • 3df9897978b990410d530cebb46dca6b9acebfe6d25c89ca5ccadded65382bee
  • 402c2d2e333274e70fe04c5a3784b122d11115a37125a2726a5150baceb83b9d
  • 4b5996517061fc375ed46ee7ac47a2b562fa15b0a27394cc3eaa5957d3129515
  • 4ba609c949ff60a4cb2745733dd910f12cac8c4a5c70949a3494d1aae5cfae06
  • 4f032372da2e85f0d8ab81544dcdb83dc86939b351cffbaea4f430ceac9ca585
  • 55db966fb0bb785b70b9fe8ddf85884f21078df2390b1753eaafd8db5cad4192
  • 5b732616e7563a3053b4e239300e5bcc23806eb34edf2f3a36f858cabd60baf9
  • 67048f4248d2a7ca781df81d1a1805edcea02997f2b669ae59e12020548ab89a
  • 6aabfba3cc6a28b5e8d1ef2d6fdaf1baf2aa8b4ea5e50e1497b393cf7abdbf42
  • 86abc8ddb3c2ee5d144f19fd5136e7204406b623ff62d62000fc02b23940bd4e
  • 93cf058391c6f9a1c08f4e6e3dcc3cf8ffffbdf8ccc53c6f96f1216565f254dc
  • ab9f396fe8f8f95ead229a868ca8bd4759cda466631b5875aff23947f11af642
  • b3f8290ab9931c9bc66087ba675090f929ed10a08406e4e777c7510139ff873f
  • b5e265d77dbbb68dc78e3af0424fc08e557d73b7b7606c74045275cddabf5c1b
  • b9ba42465c13db17773063cfc38e1af8ae2432f076eb636c2198abb808095531
  • c35ce41bb8126e2939f6d2e48700cd3c0693ec8c63c320dbd88497e6396981e4
  • d21e953d19cfd0c341d20a69ab8e0d8c8065d6f8b25a183af68ea15da7179a61
  • dd19360d5d44f2d11f7d49a6199d3574a59c84b181273f00a98019bc5cc5cb7d
  • eaffe74478f09ab236b8b2947bc9922b61735bf5aef9bbc3502d1b8349f0b2d3
  • f3b9f50bb71c876d1d1d0c699e9d6de33c2e72bf43e2737b0f832dae4a869414
  • f42f148da1774e2a94a281e7f5ccbd1d9acae7e6daad8fee93ee56a53ea3e3d4
  • fa29a663720797cb031e1edd64879f1841bb90082976c4456d011df4b30037d5
  • fd51df072b783b2614c811d4915c8ed17ef5f4d45310189a5953ccd77e7737ce
  • fda04458f2c2aa2da575f8ee68801398d2a1ca8753ef47f21187c49686bdf558
  • ff6138f7829b95f1d545f3d361a98c1f494fd4c7915ccbc19392d074ae47fda7

Coverage


Screenshots of Detection

AMP




ThreatGrid



Doc.Downloader.Emotet-6938868-0


Indicators of Compromise


Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
25
<HKCR>\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 25
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 25
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 25
<HKCR>\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 25
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 25
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 25
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} 25
<HKCR>\INTERFACE\{5CEF5613-713D-11CE-80C9-00AA00611080} 25
<HKCR>\INTERFACE\{92E11A03-7358-11CE-80CB-00AA00611080} 25
<HKCR>\INTERFACE\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} 25
<HKCR>\INTERFACE\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} 25
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
Value Name: DefaultConnectionSettings
25
MutexesOccurrences
Global\I98B68E3C25
Global\M98B68E3C25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
103[.]18[.]109[.]16125
190[.]8[.]176[.]14625
187[.]188[.]166[.]19225
88[.]215[.]2[.]2924
187[.]137[.]162[.]14519
65[.]49[.]60[.]16315
72[.]18[.]130[.]1281
50[.]87[.]144[.]1371
169[.]61[.]113[.]801
74[.]124[.]214[.]2281
195[.]186[.]120[.]531
23[.]229[.]190[.]01
200[.]147[.]41[.]2451
177[.]70[.]110[.]1191
192[.]185[.]223[.]551
200[.]68[.]105[.]321
217[.]26[.]49[.]1991
195[.]186[.]198[.]2171
158[.]69[.]189[.]2041
190[.]183[.]222[.]1391
200[.]58[.]120[.]21
167[.]250[.]5[.]21
85[.]10[.]205[.]91
138[.]118[.]172[.]2531
192[.]185[.]148[.]2081
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
aussiescanners[.]com25
fumicolcali[.]com25
smtp[.]vendwidias[.]com[.]br1
smtp[.]cl-seguros[.]arnetbiz[.]com[.]ar1
mail[.]bhz[.]terra[.]com[.]br1
imap[.]nazaria[.]com[.]br1
pop[.]jfwtransportadora[.]com[.]br1
mail[.]agroconsultsrl[.]com[.]py1
pop[.]naqua[.]com[.]br1
mail[.]jroveda[.]com[.]br1
mail[.]totalms[.]co[.]uk1
mail[.]haciendachiapas[.]gob[.]mx1
mail[.]dieselwheels[.]com1
mail[.]amaralvidros[.]com[.]br1
smtp[.]vivaceramica[.]com[.]br1
smtp[.]umbler[.]com1
mail[.]comerciallyb[.]cl1
mail[.]negociosinternacionales[.]com1
mail[.]procegas[.]com1
smtp[.]sor[.]terra[.]com[.]br1
pop[.]avante[.]com[.]mx1
mail[.]abatsa[.]com[.]mx1
gator4113[.]hostgator[.]com1
dtcwin055[.]ferozo[.]com1
uscentral434[.]accountservergroup[.]com1
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat25
%APPDATA%\Microsoft\Forms25
%APPDATA%\Microsoft\Forms\WINWORD.box25
%HOMEPATH%\480.exe25
%SystemRoot%\SysWOW64\version.dll1
%SystemRoot%\SysWOW64\wtsapi32.dll1
%SystemRoot%\SysWOW64\cryptsp.dll1
%System32%\en-US\tzres.dll.mui1
%System32%\WindowsPowerShell\v1.0\DotNetTypes.format.ps1xml1
%System32%\WindowsPowerShell\v1.0\HelpV3.format.ps1xml1
%SystemRoot%\SysWOW64\aY7vprZGHT2Qh.exe1
%SystemRoot%\SysWOW64\8aP4tvN3RT8.exe1
%SystemRoot%\SysWOW64\H1r53NRGp.exe1
%SystemRoot%\SysWOW64\HjMdJgmjW15bz.exe1
%SystemRoot%\SysWOW64\2E60ntwKpo.exe1
%SystemRoot%\SysWOW64\OGnsYK.exe1
%SystemRoot%\SysWOW64\ZH6MNgKJytF.exe1
%SystemRoot%\SysWOW64\tgRT5a3mCza.exe1
%SystemRoot%\SysWOW64\Ne3EjNKGuuhmY6jFW.exe1
%SystemRoot%\SysWOW64\TfGf.exe1
%SystemRoot%\SysWOW64\rK4xjEqhKGACuL.exe1
%SystemRoot%\SysWOW64\xmASsy4Qf.exe1
%SystemRoot%\SysWOW64\4C3Cp6cy40lUnD2SKBU.exe1
%SystemRoot%\SysWOW64\T5klBSN2QHk.exe1
%SystemRoot%\SysWOW64\vkU5YM.exe1
See JSON for more IOCs
File Hashes
  • 061fd00e92e9bc6a34db2a6ab27dad3ec9f759b34c72146c1f0aa2adc3413de7
  • 112278e446cc3c7f538089cae3eaf962b06218cae4bcd8fb9a0b493bc380507f
  • 17a8cd33792dff1c0b4b8cfac6b53461fa2d4f5936215e47897ea73103666c83
  • 1cb1730670ec3dce6db6afa0762f9bfa74d06df041829c68a6f161ec6cf6bdf5
  • 1eb3cc2781765f1c81bdef0390ba79fc2066fd1bd8ff5571baa64f4b0ca3441f
  • 24851bfbaf8226566a06e642ecf7ea697b93a492d0022f82ba7d140ae0378930
  • 3044f43b040d476ac859f7f55a35f0e2332c86b60ae6703054b811e28ac61ed6
  • 38caefbe8cf358d241edef7d33775c6825699282a79bc1eb9691b1f918f277dd
  • 4558edbe3b57be5c595405ba601a13ae09c679a01f851ae43f8c34e6d3c34be0
  • 5017ececeb4d4f7c8483dd8178df693760ad227e94053b560ac60cd81870b199
  • 609fffab37310c162348ebbf3b967e490753d85d08ad725863f98d9cc87582c6
  • 636c93930f056e403a2bdb2298f18c0b14542c0224fd0ba6ba3056d1367f9c75
  • 6962bc3a08ec27c0012e28caea3c39da8e89bd67d8baf383a940b17d6ada848f
  • 69a5f2c702ee4b623edca48860362335c590b4ae3ef2af6aaf3d66875f00461a
  • 7bfa97ac3d0200757d0ea1aa8ef25e6d8babf1d5549e4e1bb269fd08139c5360
  • 8fa2a91359b44c86c77775b3227c8ae0ccf1f882dafaa3309d0b8fb315437274
  • 92e7309c19b46a017c46f81c0d423a581c28e41e3b956b223c3be6834c0251be
  • 96786504ad52978d682b65996187b87e60297bf202a1ef9a9c150a06f0b87e4c
  • 9bb3d3a40c0a57ee9a52bab10b2ec0efbf7d665238c421a68c266d356b81a671
  • ab80799e4eb0b2f4f44a4ea326b87ca16e2ffd1fb7ca60691cb2e338fca8c147
  • ac3eb7028c680b1e8810b55350e64a8f30f4de2135fcd6b18ad55a779fd4619d
  • af77939a3206c6beeb32606423daeb8236413630ddd3846ac300d741d8809108
  • b9a0e0d4946ccf898e50182d2fd64fb05abfb37aa19b9d66288db57d6a6f8a8c
  • bb96f404b090c1e4c7853dadaad4846d135969a401747c87ee93b760fc844331
  • be2ce66817fc6408bbbdfd5d9207a57acb66c190308b5a4a21eab7c1f3846193
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid



Umbrella

Win.Malware.Fareit-6938631-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\WINRAR
Value Name: HWID
9
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
Value Name: F
9
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
Value Name: F
9
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
Value Name: F
9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
1
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\59af6fd2267a663fcc7f2a9e1e4bc131_RASAPI32 1
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\59af6fd2267a663fcc7f2a9e1e4bc131_RASMANCS 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\59AF6FD2267A663FCC7F2A9E1E4BC131_RASAPI32
Value Name: FileDirectory
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\59AF6FD2267A663FCC7F2A9E1E4BC131_RASMANCS
Value Name: FileDirectory
1
<HKCU>\Software\windowupdate2-4UUS6W 1
<HKCU>\SOFTWARE\WINDOWUPDATE2-4UUS6W
Value Name: Inj
1
<HKCU>\Software\Remcos-EEMFAJ 1
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7616H3MP-B552-KB3O-PIO3-3PP888E55KW5} 1
<HKCU>\SOFTWARE\REMCOS-EEMFAJ
Value Name: licence
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{7616H3MP-B552-KB3O-PIO3-3PP888E55KW5}
Value Name: StubPath
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: BOOKS
1
MutexesOccurrences
Remcos_Mutex_Inj3
A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A3
Global\LOADPERF_MUTEX1
A16467FA-7343A2EC-6F235135-4B9A74AC-F1DC8406A1
DSKQUOTA_SIDCACHE_MUTEX1
-1
.NET CLR Data_Perf_Library_Lock_PID_6401
.NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_6401
.NET CLR Networking_Perf_Library_Lock_PID_6401
.NET Data Provider for Oracle_Perf_Library_Lock_PID_6401
.NET Data Provider for SqlServer_Perf_Library_Lock_PID_6401
.NET Memory Cache 4.0_Perf_Library_Lock_PID_6401
.NETFramework_Perf_Library_Lock_PID_6401
ASP.NET_1.1.4322_Perf_Library_Lock_PID_6401
ASP.NET_4.0.30319_Perf_Library_Lock_PID_6401
ASP.NET_Perf_Library_Lock_PID_6401
BITS_Perf_Library_Lock_PID_6401
ESENT_Perf_Library_Lock_PID_6401
Lsa_Perf_Library_Lock_PID_6401
MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_6401
MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_6401
MSDTC_Perf_Library_Lock_PID_6401
Outlook_Perf_Library_Lock_PID_6401
PerfDisk_Perf_Library_Lock_PID_6401
PerfNet_Perf_Library_Lock_PID_6401
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
62[.]173[.]140[.]441
2[.]59[.]41[.]1991
80[.]90[.]39[.]21
178[.]124[.]140[.]1341
95[.]167[.]151[.]2461
213[.]226[.]126[.]1181
89[.]223[.]91[.]2111
195[.]133[.]144[.]1691
213[.]226[.]68[.]931
167[.]88[.]160[.]1461
77[.]221[.]144[.]1221
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
wellgam[.]com6
WELLGAM[.]COM4
frupidgi[.]cn3
silfa[.]pw3
SILFA[.]PW3
wttiredfc[.]com1
arispedservices[.]eu1
Files and or directories createdOccurrences
%ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol4
%LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol4
%TEMP%\37FFCBBC\api-ms-win-core-datetime-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-debug-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-errorhandling-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-file-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-file-l1-2-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-file-l2-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-handle-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-heap-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-interlocked-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-libraryloader-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-localization-l1-2-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-memory-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-namedpipe-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-processenvironment-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-processthreads-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-processthreads-l1-1-1.dll2
%TEMP%\37FFCBBC\api-ms-win-core-profile-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-rtlsupport-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-string-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-synch-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-synch-l1-2-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-sysinfo-l1-1-0.dll2
%TEMP%\37FFCBBC\api-ms-win-core-timezone-l1-1-0.dll2
See JSON for more IOCs
File Hashes
  • 073cb94ad50991e82bfa04d55bc03afdf3a56962ee5dd750dae0719250e8ae65
  • 1f4b210d95c8579399cd740a2887ad5dcdeceb97833a0be187815b1404cca34a
  • 243079480c0b1b3738c95610a384faf49bf4da2d206938570814d1f7d0a48447
  • 384ccd374a7b0ad96c05c598a8805af2c0171554a8caa56b383b60f7a847e26f
  • 3970c631a11302aa2769cf03e54b7f58fc09f7d8ed1590b48efcdef468cc7af7
  • 3cded376ba5039cedca137403ea8abeae60a98ee666954e2d148f4cd13f446df
  • 6d3088bc9c809f752614aca0bd966758e0bde32ec5e1a7b75d4bbc544ed13cda
  • 79a9506b375a4728a84203ca601f4e561973de51421e28b37d7e56625134d6df
  • 87ae6f32cea09d6664c923e32aa24041fef9787e74a5cd6f5e20c058c16c7ffe
  • 9475131e5c57dbc60beb45669b58a26ee28af7aa65b90bb53b2646a86f4aad39
  • 9b9e07d8b709b5257125bfdc04848d1d28232fcfcc0caf22bb58b9ddb1c3d3ae
  • a1c1ed52d04468d58c5d51f35718ada1b1f1d7ddb4c637bdb7c887dc0966b407
  • a552f5070d93037fffaec488750b3f000d46fedc7f70e42c0b0cdd42d4ae4805
  • b47dd06ed3f8512f0a7dfddd76d6ebce52be75d4bdf7350aa625ae441efe9637
  • b89daf58637c8023e41b6bac95969df87a2d259187436ba64023a97b8bf2085c
  • bc6d99b1311f8ecb6b60ba7379c4ab9e568bc4f232d214eb23abfef555929efc
  • c6d76a61f441862a7b6880c7faf093a185a723825e22ef8df5a772889f7302a7
  • cd476668e2348c443630d7c52b75f67e8d7ec1b86a5a65a614b52fb62e019928
  • cf7c5ad0aee65aae567e53cceb53c954712377d4958da6f0a45983b279d279a0
  • d6996f7c5e6db6805bf893a5d5b1259cf9acf9c30cdca120d25416063c46bd68
  • e739c021bdd5165827e4c5e2c118bd9a7107487515e4ab182e4b99d03c3701cf
  • eac79f944bdbd92c73cb179b61d2e34495d050e929e5068143e22bf0d31fa693
  • ebd9171d7fd10bb3c5234458f33df42a5d4a652a3a1c6bb5a045d94a29c40529
  • ec681af368a0a3cbbdfea9744ed80ad37bc9166be9a8698310ba18276450047f
  • fb77150a54a4f0cb5b495bd24927e70cd6a0dd519d9e8192a729d08753a48eef
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP




ThreatGrid




Umbrella



Win.Malware.Ircbot-6938570-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: *-334428029
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: *-334428029
1
MutexesOccurrences
gcc-shmem-tdm2-fc_key16
gcc-shmem-tdm2-sjlj_once16
gcc-shmem-tdm2-use_fc_key16
UPDATE__16
BACKUP_12956902631
MAIN_12956902631
BACKUP_-9596419631
MAIN_-9596419631
BACKUP_9538153191
MAIN_9538153191
BACKUP_20708102291
MAIN_20708102291
BACKUP_8954215981
MAIN_8954215981
BACKUP_15821405821
MAIN_15821405821
BACKUP_-19130707381
MAIN_-19130707381
BACKUP_-3344280291
MAIN_-3344280291
BACKUP_8390363461
MAIN_8390363461
BACKUP_-8132879231
MAIN_-8132879231
BACKUP_1754900031
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]200[.]23[.]951
153[.]92[.]0[.]1001
204[.]74[.]99[.]1001
88[.]99[.]150[.]2161
185[.]53[.]178[.]61
141[.]8[.]197[.]421
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
3ASH2[.]COM2
3ash2[.]com2
www[.]mydomaincontact[.]com1
iyfsearch[.]com1
site[.]com1
www[.]bplaced[.]net1
bociklocik[.]ye[.]vc1
f0164361[.]xsph[.]ru1
wolfayoub[.]3eeweb[.]com1
MARSON42[.]COM1
marson42[.]com1
mydankmemes[.]club1
myfreedomainlol[.]tk1
vitusend[.]net84[.]net1
time-by123[.]esy[.]es1
argenfull[.]com1
ARGENFULL[.]COM1
WWW[.]TOR4FUN[.]FR1
www[.]tor4fun[.]fr1
update-sam[.]square7[.]ch1
urminenow[.]0xhost[.]net1
holdbet[.]ru1
HOLDBET[.]RU1
Files and or directories createdOccurrences
%System32%\config\SOFTWARE.LOG116
%HOMEPATH%\NTUSER.DAT16
%HOMEPATH%\ntuser.dat.LOG116
%APPDATA%\12956902631
%APPDATA%\1295690263\unsecapp1
%APPDATA%\-9596419631
%APPDATA%\-959641963\realsched1
%APPDATA%\9538153191
%APPDATA%\953815319\unsecapp1
%APPDATA%\20708102291
%APPDATA%\2070810229\winsys1
%APPDATA%\8954215981
%APPDATA%\895421598\ctfmon1
%APPDATA%\15821405821
%APPDATA%\1582140582\spoolsv1
%APPDATA%\-19130707381
%APPDATA%\-1913070738\realsched1
%APPDATA%\-3344280291
%APPDATA%\-334428029\BCU1
%APPDATA%\8390363461
%APPDATA%\839036346\winlogon1
%APPDATA%\-8132879231
%APPDATA%\-813287923\csrss1
%APPDATA%\1754900031
%APPDATA%\175490003\winlogon1
See JSON for more IOCs
File Hashes
  • 1a8935840e4fa3db5ef5945efdccffcbbb92d569955ee3c0076d41da33845d55
  • 45e7c5547dcb5181ad47ca2e8690e2cb9a024744c3da6159ab3ed1ea39d46013
  • 4a5d82ef0f2ecc204d6c83f837fe6be561a36b58c077e444b9525e42bcf6cb08
  • 4e02e5fc44bba1091e0768b74f551c0a6af232ac0458c5a21006fff81e49bffd
  • 52793b260576e44014dc48d2ef2d8f517b0460542b35070d71b3d12cecbb468e
  • 956936346a4be7bd07369448077a059ae70d270c04e9b3c019e5d7997c084fa6
  • 98be103bf04ceed1678baca10755c149df93c57185c5c387ecd27f3ebb2242cb
  • a20fb11ec04d7bfadfd1758fa6d6103522fa60b6a590217d48d093655f6ec132
  • a2da28c09898396c073b3e7078b2bcad1f16b0b22ec8c0727936ffedb45027a4
  • d8bce14120c6cc44e057a6ef8986fd5cd5a647f2c720051cce7ce6704fef3a56
  • db2199becac0af02a28f968555d78a6699cf2f13660774616995a08428eba89e
  • dbd2ea95e8a86edf7ef5b62c266b1746dc9e4936754d7fdd867184c6f13a53da
  • ea3eb5b6e80c6b3ab6aaa65677ae28426f8bf92439a3f6820ed7ec57f71efebc
  • ed045c078e29caa8cd44174965c2d5470cbe84a46751bfd7d45a6264d3d59eba
  • f23f0cf834d3b8d97cb707fae3296787f665c35dd1e7abf27c007e9a50697381
  • ff7ca213e6af53e15883fc8fd07ec6a1d9b9bc3a99554d7888558680e2238710

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Madshi injection detected (4097)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Kovter injection detected (2923)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • PowerShell file-less infection detected (1334)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (494)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Dealply adware detected (193)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Gamarue malware detected (173)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Atom Bombing code injection technique detected (168)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Trickbot malware detected (137)
    Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
  • Suspicious PowerShell execution detected (114)
    A PowerShell command has attempted to bypass execution policy to run unsigned or untrusted script content. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Excessively long PowerShell command detected (87)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

DNSpionage brings out the Karkoff

$
0
0

Warren Mercer and Paul Rascagneres authored this post.

Update 4/24: The C2 section below now includes details around the XOR element of the C2 communication system.


Executive summary


In November 2018, Cisco Talos discovered an attack campaign, called DNSpionage, in which threat actors created a new remote administrative tool that supports HTTP and DNS communication with the attackers' command and control(C2). Since then, there have been several other public reports of additional DNSpionage attacks, and in January, the U.S. Department of Homeland Security issued an alert warning users about this threat activity.

In addition to increased reports of threat activity, we have also discovered new evidence that the threat actors behind the DNSpionage campaign continue to change their tactics, likely in an attempt to improve the efficacy of their operations. In February, we discovered some changes to the actors' tactics, techniques and procedures (TTPs), including the use of a new reconnaissance phase that selectively chooses which targets to infect with malware. In April 2019, we also discovered the actors using a new malware, which we are calling "Karkoff."

This post will cover the aforementioned DNSpionage updates, the discovery of the Karkoff malware and an analysis of the recent Oilrig malware toolset leak — and how it could be connected to these two attacks.


DNSpionage update

New infection document, same macro

In our previous post concerning DNSpionage, we showed that the malware author used malicious macros embedded in a Microsoft Word document. In the new sample from Lebanon identified at the end of February, the attacker used an Excel document with a similar macro:



Instead of using the .oracleServices directory, which we had previously observed, the attacker uses a .msdonedrive directory and renames the malware "taskwin32.exe." The scheduled task was also renamed to "onedrive updater v10.12.5."

Payload

Overview

This new sample is similar to the previous version disclosed in our previous post. The malware supports HTTP and DNS communication to the C2 server. The HTTP communication is hidden in the comments in the HTML code. This time, however, the C2 server mimics the GitHub platform instead of Wikipedia. While the DNS communication follows the same method we described in our previous article, the developer added some new features in this latest version and, this time, the actor removed the debug mode.

We also discovered that the actor added a reconnaissance phase, likely in response to the significant amount of interest in the campaign. This new phase, which is discussed in greater detail below, ensures that the payload is being dropped on specific targets rather than indiscriminately downloaded on every machine. This new tactic indicates an improved level of actor sophistication.

New reconnaissance phase

On the initial execution, the malware drops a Windows batch file (a.bat) in order to execute a WMI command and obtain all the running processes on the victim's machine:

  • wmic process list

The malware also identifies the username and computer name of the infected system. Finally, it uses the NetWkstaGetInfo() API with the level 100 to retrieve additional info on the system (this is the 64th number, hex 64 is 100 decimal).



This level returns information about the workstation environment, including platform-specific information, the name of the domain and the local computer, and information concerning the operating system. This information is key to helping the malware select the victims only and attempts to avoid researchers or sandboxes. Again, it shows the actor's improved abilities, as they now fingerprint the victim.

API and strings obfuscation

In this latest version, the developer split some strings into two parts. The actor attempts to use this technique to "hide" API call and internal strings. This would prevent static string analysis processes.

Below is an example of an API call split. It is in reverse order starting with "rNameA," followed by "GetUse," and the offset is also named incorrectly "aRnamea" and "aGetuse" (GetUserNameA()):



Below is an example of an internal string split (.\\Configure.txt):



This approach is not particularly sophisticated compared to what we usually observe. However, it is enough to break a Yara rule based on these strings. For example, the following rule would no longer alert due to a failed pattern match:

rule DNSpionage {
strings:
$conf="Configure.txt"
condition:
All of them
}


Let's check your anti-virus


The malware searches for two specific anti-virus platforms: Avira and Avast.



If one of these security products is installed on the system and identified during the reconnaissance phase, a specific flag will be set and some options from the configuration file will be ignored.

DNSpionage Excel maldoc

This new sample of DNSpionage has some oddities which we believe might be the actor's attempt to taunt or poke fun at the research community. We occasionally see this in cases where actors are disclosed by researchers or vendors. In DNSpionage, upon opening the Excel document, users are greeted with the insult, "haha you are donkey [sic]." The broken English suggests the actor is unlikely a native English speaker.



The domain used for the C2 is also bizarre. The previous version of DNSpionage attempted to use legitimate-looking domains in an attempt to remain undetected. However, this newer version uses the domain "coldfart[.]com," which would be easier to spot than other APT campaigns which generally try to blend in with traffic more suitable to enterprise environments. The domain was also hosted in the U.S., which is unusual for any espionage-style attack. This type of behavior will likely continue to distinguish this actor from more concerning campaigns like Sea Turtle, a separate DNS hijacking campaign we wrote about last week.

Along comes a Karkoff

Payload analysis

In April, Cisco Talos identified an undocumented malware developed in .NET. On the analyzed samples, the malware author left two different internal names in plain text: "DropperBackdoor" and "Karkoff." We decided to use the second name as the malware's moniker, as it is less generic. The malware is lightweight compared to other malware due to its small size and allows remote code execution from the C2 server. There is no obfuscation and the code can be easily disassembled. The malware is a Windows service named "MSExchangeClient:"



From an incident response point of view, it's interesting to note that the malware generates a log file: C:\\Windows\\Temp\\MSEx_log.txt. The executed commands are stored in this file (xored with 'M') with a timestamp. This log file can be easily used to create a timeline of the command execution which can be extremely useful when responding to this type of threat. With this in mind, an organisation compromised with this malware would have the opportunity to review the log file and identify the commands carried out against them.



C2 communication

The C2 servers are hardcoded in the analyzed samples:


The malware uses the domain or the IP address. Karkoff supports HTTP and HTTPS communications.

Karkoff uses base64 encoding to initially obfuscate the C2 communications. This is then further obfuscated by carrying out a XOR function, with a XOR key 70 (decimal).

This is derived from the “DropperBackdoor.constants” value “Constants.k__BackingField = 70;”.







The JSON .NET library is embedded in the malware. This library is used to handle messages from the C2 server. The answer is first decoded (base64) and the commands match the following pattern:

[{"ID": "123", "Data": "filename.exe|base64PEContent", "Type": "101"}, {"ID": "124", "Data": "filename.exe arg1 arg2", "Type": "102"}].

The command type 101 means that the data will be a base64 encoded file. The file will be stored with the filename placed before the pipe (filename.exe in our example). The command type 102 is the command line to be executed is stored in the data field.

Links between DNSpionage and Karkoff

We identified infrastructure overlaps in the DNSpionage and the Karkoff cases. One of the Karkoff C2 servers is rimrun[.]com. Here is the history of the IPs behind this domain:

  • 108.62.141[.]247 -> from 12/19/18 to 4/13/19
  • 209.141.38[.]71 -> on 12/26/18
  • 107.161.23[.]204 -> on 12/26/18
  • 192.161.187[.]200 -> on 12/26/18

The following IPs have links to our original DNSpionage blog post:

  • 107.161.23[.]204 was used by 0ffice360[.]com on 9/21/18
  • 209.141.38[.]71 was used by hr-wipro[.]com on 9/26/18
  • 192.161.187[.]200 was used by 0ffice360[.]com on 9/21/18

These dates also match the timeline of observed attacks during the DNSpionage campaign. Based on these overlaps in IP usage during the same time period, we have high confidence the same actor uses the Karkoff and DNSpionage samples.

Alleged Oilrig leak links

An alleged Oilrig leak appeared online on April 18. Information from the leak provides a weak link between Oilrig and the DNSpionage actors based on similar URL fields. While not definitive, it is an interesting data point to share with the research community.

The leak contains a webmask_dnspionage repository. This repository contains scripts used to perform man-in-the-middle attacks, but nothing about the DNSpionage or Karkoff C2 panels. However, the screenshots showed a URL that attracted our attention:



We identified the C2 panel as "Scarecrow," but we did not identify references to this panel in the leak. The victims in this screenshot are mainly from Lebanon, which is one of the areas targeted by DNSpionage and Karkoff. The URL provides some other relevant information:



The URL contains the /Th!swasP@NEl directory. After our first publication, LastLine published a blog post explaining that the actor made some mistakes in their Django configuration:



You can see the content of the PANEL_PATH variable of the DNSpionage C2 server: /Th!sIsP@NeL. The panel path of the leak and Django internal variables of the DNSpionage C2 server are very similar: /Th!swasP@NEl and /Th!sIsP@NeL. While this single panel path is not enough to draw firm conclusions, it is worth highlighting for the security research community as we all continue to investigate these events.

Conclusion

The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. The oddities we mentioned are certainly not normal, but the payload was clearly updated to attempt to remain more elusive. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs. DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate. The discovery of Karkoff also shows the actor is pivoting and is increasingly attempting to avoid detection while remaining very focused on the Middle Eastern region. Cisco Talos will continue to monitor for activity from this actor and ensure our protection and detection capabilities continue to prevent such advanced attacks on our customers.

Coverage

Additional ways our customers can detect and block this threat are listed below.



Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Below is a screenshot showing how AMP can protect customers from this threat.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOCs)


The following IOCs are associated to this campaign:

DNSpionage XLS document

2fa19292f353b4078a9bf398f8837d991e383c99e147727eaa6a03ce0259b3c5 (SHA256)

DNSpionage sample

e398dac59f604d42362ffe8a2947d4351a652516ebfb25ddf0838dd2c8523be8 (SHA256)

Karkoff samples

5b102bf4d997688268bab45336cead7cdf188eb0d6355764e53b4f62e1cdf30c
6a251ed6a2c6a0a2be11f2a945ec68c814d27e2b6ef445f4b2c7a779620baa11
b017b9fc2484ce0a5629ff1fed15bca9f62f942eafbb74da6a40f40337187b04
cd4b9d0f2d1c0468750855f0ed352c1ed6d4f512d66e0e44ce308688235295b5

C2 server

coldfart[.]com
rimrun[.]com
kuternull[.]com

Vulnerability Spotlight: Symantec Endpoint Protection kernel memory information disclosure vulnerability

$
0
0


Marcin Noga of Cisco Talos discovered this vulnerability.

Overview

Cisco Talos is disclosing an information leak vulnerability in the ccSetx86.sys kernel driver of Symantec Endpoint Protection Small Business Edition. The vulnerability exists in the driver’s control message handler. An attacker can send specially crafted requests to cause the driver to return uninitialized chunks of kernel memory, potentially leaking sensitive information, such as privileged tokens or kernel memory addresses that may be used to bypass kernel security mitigations. An unprivileged user can run a program from user mode to trigger this vulnerability.

In accordance with our coordinated disclosure policy, Talos worked with Symantec to ensure that a patch is available for this vulnerability.

Vulnerability Details

Symantec Endpoint Protection Small Business Edition ccSetx86.sys 0x224844 kernel memory information disclosure vulnerability (TALOS-2018-0693/CVE-2018-18366)

The kernel memory leak is located in the IOCTL handler for the `0x224844` control code of the driver version 16.0.0.77. An attacker could trigger this vulnerability by sending malicious IOCTL requests to the ccSet_{F7A725B7-8267-494C-9647-F4FC1D53C6A3} device. The default access control for the device allows any user on the system to send IOCTL requests to the driver. 

A full technical advisory, including proof of concept code, is available here.  

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date, and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48209, 48210

Viewing all 1925 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>