Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Vulnerability Spotlight: Two bugs in KCodes NetUSB affect some NETGEAR routers

$
0
0


Dave McDaniel of Cisco Talos discovered these vulnerabilities.

Executive summary

KCodes’ NetUSB kernel module contains two vulnerabilities that could allow an attacker to inappropriately access information on some NETGEAR wireless routers. Specific models of these routers utilize the kernel module from KCodes, a Taiwanese company. The module is custom-made for each device, but they all contain similar functions.

The module shares USB devices over TCP, allowing clients to use various vendor-made drivers and software to connect to these devices. An attacker could send specific packets on the local network to exploit vulnerabilities in NetUSB, forcing the routers to disclose sensitive information and even giving the attacker the ability to remotely execute code.

In accordance with our coordinated disclosure policy, Cisco Talos reached out to KCodes and NETGEAR regarding this vulnerability. After working with KCodes, they provided an update to NETGEAR, which is scheduled to release an update. Talos decided to release the details of our vulnerability after surpassing our 90-day deadline.

Vulnerability details

KCodes NetUSB unauthenticated remote kernel arbitrary memory read vulnerability (TALOS-2018-0775/CVE-2019-5016)

An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory read, resulting in a denial of service or remote information disclosure. An unauthenticated attacker can send a crafted packet on the local network to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

KCodes NetUSB unauthenticated remote kernel information disclosure vulnerability (TALOS-2018-0776/CVE-2019-5017)

An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet containing an opcode that will trigger the kernel module to return several addresses. One of which can be used to calculate the dynamic base address of the module for further exploitation.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that TALOS-2019-0776 and TALOS-2019-0775 affects the NETGEAR Nighthawk AC3200 (R8000), firmware version 1.0.4.28_10.1.54 — NetUSB.ko 1.0.2.66. The NETGEAR Nighthawk AC3000 (R7900), firmware version 1.0.3.8_10.0.37 (11/1/18) — NetUSB.ko 1.0.2.69 is also affected by TALOS-2019-0775.



Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49087


Threat Source newsletter (June 20, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

This week, we disclosed two vulnerabilities in KCodes’ NetUSB kernel module contains that could allow an attacker to inappropriately access information on some NETGEAR wireless routers. An attacker could send specific packets on the local network to exploit vulnerabilities in NetUSB, forcing the routers to disclose sensitive information and even giving the attacker the ability to remotely execute code.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

Cyber Security Week in Review

  • The U.S. is reportedly stepping up its offensive cyber attacks against Russia’s power grid. Sources told the New York Times that the new efforts are a quiet effort to respond to Russia’s meddling in the 2018 midterm elections.
  • The U.S. Department of Homeland Security released an advisory urging Microsoft users to patch all of their products. The government warned users against the potential exploitation of a “wormable” bug Microsoft disclosed in May.
  • A security researcher was able to access and publicly post more than seven million Venmo transactions. The researcher says it was all done to urge users to set their accounts to private on the money-sending app.
  • Several malicious Android apps have been able to bypass two-factor authentication. Once logging into some other apps installed on the users’ phone, these apps attempt to steal Bitcoin.
  • Two new class-action lawsuits allege that Amazon’s Alexa devices unknowingly record small children’s voices. The suit claims this is illegal because minors cannot consent to having their voices recorded.
  • Cisco disclosed several critical vulnerabilities this week in a variety of their products, including DNA Center and SD-WAN.
  • New malware is targeting cryptocurrency exchange employees using Windows and Mac systems. The attacks exploit a zero-day vulnerability in Mozilla Firefox that Mozilla patched earlier this week.
  • The Florida city of Riviera paid $600,000 to hackers who infected their computer system with ransomware. The attack apparently originated from a phishing email one employee opened. 
  • Notable recent security issues

Notable recent security issues

Title: Attackers redirect users to RIG exploit kit, downloads ransomware
Description: A new malvertising campaign in the wild attempts to trick users into clicking on malicious ads, then sending them to a web page containing the RIG exploit kit. Once infected, the kit then downloads the Buran ransomware. Buran is a fairly straightforward ransomware, implementing its encryption process and then displaying a ransom note to the victim.
Snort SIDs: 50457, 50458


Title: New Linux malware believed to use code from past Chinese malware
Description: A new malware known as “HiddenWasp” has been spotted in the wild targeting Linux machines. HiddenWasp contains several methods to avoid detection by antivirus solutions, and the attackers are still actively deploying it. Researchers discovered that the malware contains code that is copy and pasted from other, past attacks from Chinese actors.
Snort SIDs: 548521 - 48528 

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe 
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: wup.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin 
Claimed Product: N/A 
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
Typical Filename: xme32-2141-gcc.exe
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG

Threat Roundup for June 14 to June 21

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 14 and June 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Remcos-6996918-1
    Malware
    Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. Remcos is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
     
  • Win.Dropper.Nymaim-6996892-0
    Dropper
    Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
     
  • Win.Ransomware.Sage-6995951-1
    Ransomware
    The Sage ransomware encrypts files and then demands a payment for the files to be recovered. Sage typically spreads via malicious email attachments, and the encrypted file extensions vary.
     
  • Win.Malware.Ursnif-6995948-1
    Malware
    Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
     
  • Win.Malware.Zusy-6995723-0
    Malware
    Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
     
  • Win.Ransomware.Sodinokibi-6995593-0
    Ransomware
    Sodinokibi is a ransomware family that is frequently spread via attacks exploiting recently patched zero-day vulnerabilities. Most recently, it was observed being spread after an Oracle WebLogic vulnerability was exploited.
     
  • Win.Malware.Dridex-6995476-1
    Malware
    Dridex is a well-known banking trojan that aims to steal credentials and other sensitive information from an infected machine.
     
  • Win.Trojan.Shiz-6994953-0
    Trojan
    Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.
     
  • Win.Virus.Expiro-6994921-0
    Virus
    Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
     

Threats

Win.Malware.Remcos-6996918-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\remcos_gerjisumsvyvegw 25
<HKCU>\SOFTWARE\REMCOS_GERJISUMSVYVEGW
Value Name: EXEpath
25
MutexesOccurrences
Remcos_Mutex_Inj25
remcos_gerjisumsvyvegw25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
185[.]84[.]181[.]9025
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%APPDATA%\remcos25
%APPDATA%\remcos\logs.dat25
%APPDATA%\Machree1.exe25
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Machree1.vbe25
%HOMEPATH%\Start Menu\Programs\Startup\Machree1.vbe24
File Hashes
  • 008d108ecd6f5ddc1a83ddde9a5610dc7c545bafa8d08a5f334cf6c18b8f8c48
  • 0532cb4b98868c1ca8c6679a128649ef4db64ce7aa495c43b43a1c63622e9fb3
  • 05914740255f1e48bd2267145f374d982a6d84a52666a51064f3a4a2d53ca667
  • 061345d5cb07ed337651b14172d5881c7f940225f777e97162d3bb5d13b9f303
  • 061699059a6bb9fe01566d062f1425eab0a8b67f47b088f45f4ac2b44c04bbe0
  • 06cb29e96868854c02e5121d9c72e8ea17ed97a519bc7d2c8cc4fc55d56cb621
  • 0771087cc5d55f25b3ef398fbe3303e46fca47c4b56a84a611f567b5d2999390
  • 08242c0494c9cedf45cb27f447848661ea57f1598734ced8d0ac6e529a52eb0d
  • 09dfabb291531d5d9b5250bce1b0e53a4ac318d9c16712190ff0197f42b05117
  • 0e30994864e21d987ef62a0d26d280c35680c151853c93d7b591dc5b711a859c
  • 0f11daf971e9e8777a01b3892de3cf14d4f2eb8ba3bee6c589832e42e512e23f
  • 15a34dc9368201767521a71133fc51442bbaf87b5f7449895f32e9dd6860e5b9
  • 15fa9cfaaba597d539b6037789bab5817e878c391a684fe24226b085822a5f5c
  • 18e4d4f751a9b0dd98c1d44f5ee6a711850074244b452541a1807bf06dfaebcf
  • 1d608c4f6f5461bd282fa372a7142214aac8581b767f8c961bcfd1e0b67a7773
  • 22586b36679b18e7f560cb3382c4d5b10e173dcce3f9c038d6cb6c0bdb30021e
  • 26952825987d9fa2ecbf59acf74cc46f546acafc9212130b77c66d442a888468
  • 2c707b9f5c691c03a36e0b77b83572abd481197aa9d4ad075a8921b54a0e2ac2
  • 2d1286793d988e5f5fb49857d40ed6fc6626b81a7fc15436611230b03b8cb236
  • 38fb84780fe10c9d89765365cf3a7e96b992a9efb8e049605139fb75da1971d5
  • 3aa207171befd54d8d3e1c4cabd692c6a59c9dfc24e2ad1be15e66cfe972c631
  • 3ae0b911a9934ad510b86b86cb74c891754fdecf26bb537d603869e559cf6f80
  • 3e662b8b705b1d3d6f7d731bf341d0c328cab969d36b9c1d7ed36941f5c1d2e6
  • 3ec95e210408d3e195af15058ea02b93abe0be5d88364da0927921deaced8fdc
  • 3ee483a19e47433b5b36b6df2456d713d9737083652300651b19e5d56d803526
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid

Win.Dropper.Nymaim-6996892-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\GOCFK 26
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
26
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}26
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}26
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}26
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}26
Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}26
Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}26
Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}26
Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}26
Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}18
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
34[.]227[.]185[.]1531
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
olmcehndmyhb[.]in25
thxwvxr[.]pw25
wjztocdw[.]net25
gxmxojjk[.]com25
mmyuf[.]in25
dlycu[.]net25
oxkkvlewktdt[.]in25
hlexdsgcio[.]com25
yayksuheo[.]net25
fjfrix[.]pw25
rqpdg[.]com25
sqbxpxuhgs[.]in25
wmimqpx[.]pw25
nnhquzhcvm[.]in25
clbnstusmu[.]net25
kttasj[.]in1
qthupu[.]net1
bqdkoibgkrw[.]in1
rakacljgisdb[.]in1
nefhn[.]in1
bkbyvpcgbcnc[.]net1
xabzrrutxu[.]com1
yckmgwft[.]com1
deueijrnywe[.]pw1
tazhibvbczf[.]com1
See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\ph26
%ProgramData%\ph\fktiipx.ftf26
%TEMP%\gocf.ksv26
%TEMP%\fro.dfx24
\Documents and Settings\All Users\pxs\pil.ohu24
%LOCALAPPDATA%\7z210
%APPDATA%\s26910
%LOCALAPPDATA%\28706
%APPDATA%\710i5v86
%ProgramData%\05n35
%ProgramData%\0m25
%ProgramData%\pj57siq4
%ProgramData%\02zs4
%ProgramData%\j91z3
%LOCALAPPDATA%\9b83
%APPDATA%\mb313
%LOCALAPPDATA%\lnt03
%LOCALAPPDATA%\uhs3
%ProgramData%\hm94p642
%ProgramData%\9qa32
%LOCALAPPDATA%\4y3432
%APPDATA%\h652
%APPDATA%\30842
%LOCALAPPDATA%\c5a2
%LOCALAPPDATA%\q0n01
See JSON for more IOCs
File Hashes
  • 00e353db4270f10024bfecdb87176625a79fe79c8fc5447c117cf65231df3dc2
  • 0172d0c9b2ea9f408e17941f47aa45e81fb83d15897e2a49c1213abb725387d6
  • 069f16f2659e165ff2b29f2e539af61e986955738187d987b83fe36dd18ce721
  • 082e25b44250cb9eb2771c72ab79acda6bd6846090d4ac3d839e201b0782a2e2
  • 0cc0e127d86659ecf3fcbcdf04fcf72217a3ce12081b48831e739e5001dd2e04
  • 0fac2d86d39cc022dea6a0ba072ac88985fc9f0bd9dcd7246f3395daea9d5c2b
  • 17094de48ed74622c81a08504bc65c32c518784ac791197a8fe40f315a5db41d
  • 1753a38b2c5f994198409c1f706d61a7e3059502a40fe577cc2071e7765ffdd5
  • 1d04d5db2cee469d6a6de02bddb26a0ebd648ecac8a8437e700c448d48f4a4bd
  • 1f8ded1f7ff186d6cf02db9a9fb32837cf32afc2c9cce54862ed8332e8f7afed
  • 3611e930dff5d525411c09b000d4c3f39e4ca3c3de408222e32efeef36f6bee9
  • 388fd291540103637daaca22f40ed1219e60713e01d00943e57b56c50b8bb0af
  • 4cf78bec349135e62405097f3c7ecbc496d9ac82357ba36563cbb0dc77ef73ea
  • 578ac45673bbf7516027b31626390893dc95e9646fd5860f23562c660c23ebf8
  • 6557ecfaa38148a9b4f6652b5f0f0dabe2fb9c27ad44b86e2fe9db38baf2e944
  • 6fd12db488909e16ad2bbfddc8cd1ea8a405e3846a3f08d2ef17b9abce598840
  • 743acd3870df235c506231e1da30d55549b878b950d0a7e31b9a1b2299c2172c
  • 779f163a69ad38fe61dab7bfcea1a2fedaa951c7f957774acf4f3d5e1ed4487a
  • 783ad0bb502ddba1fc42383b34bd8252568fff178dcb387b25984a36f3801ff5
  • 79c279315079c1307b73a49591b441e8ba19f169321d343b129d374b0f10d37d
  • 7a3a5142c6d45c5bbf24a6a841cd494487ab83561a7e3f8221ac1a6f019e3a68
  • 901a670c01ef2f5b81eb5b2914d6f642aa513adae76e7714e5bf49ccd1a4386c
  • 9cd58d1690a4dd35c764097538edd119e5ed4a6ebea2bf08054c7e6fb43b599c
  • ab8eef993a40335c73bd970654e1342a1c0c1e9081b59c45027e6db608971e6f
  • af527cf0ab22c9d7acaf33ceec3996185c0aef59bd9fa2784dd9ac602d85fa19
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Ransomware.Sage-6995951-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A} 18
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
Value Name: CLSID
18
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON 18
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
Value Name: Generation
18
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
Value Name: GlobalAssocChangedCounter
18
<HKCU>\Software\Classes 18
<HKCR>\.sage 18
<HKCR>\sage.notice\DefaultIcon 18
<HKCR>\sage.notice 18
<HKCR>\sage.notice\FriendlyTypeName 18
<HKCR>\sage.notice\shell\open\command 18
<HKCR>\SAGE.NOTICE\shell 18
<HKCR>\SAGE.NOTICE\SHELL\open 18
<HKCR>\htafile\DefaultIcon 18
<HKCR>\htafile 18
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
18
<HKCR>\.SAGE 18
<HKCR>\SAGE.NOTICE\DEFAULTICON 18
<HKCR>\SAGE.NOTICE\FRIENDLYTYPENAME 18
<HKCR>\SAGE.NOTICE\SHELL\OPEN\COMMAND 18
<HKCR>\HTAFILE\DEFAULTICON 18
<HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\FILES
Value Name: Datafile
18
MutexesOccurrences
zHUoNUQ725
Local\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C18
\BaseNamedObjects\PFShggN316
\BaseNamedObjects\adX9ZN6Z16
Local\{3AE0DB4C-C01E-4DAE-8FDC-24ACF3B28941}-Mutex15
Local\{609C30CE-E266-4A73-A27F-BD103B3FA847}-Mutex2
Local\{7C86DD40-D457-4186-A852-0F98388A1834}-Mutex1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
5[.]45[.]6[.]13825
5[.]45[.]159[.]1925
5[.]45[.]140[.]625
139[.]59[.]93[.]18125
5[.]45[.]226[.]23725
138[.]197[.]136[.]19625
138[.]197[.]105[.]6825
211[.]114[.]30[.]725
5[.]45[.]247[.]2225
138[.]197[.]196[.]1925
138[.]197[.]122[.]6825
139[.]59[.]227[.]17225
211[.]114[.]64[.]6325
5[.]45[.]129[.]5225
138[.]197[.]22[.]15125
211[.]114[.]47[.]8025
211[.]114[.]28[.]23525
138[.]197[.]109[.]7925
5[.]45[.]242[.]19725
139[.]59[.]219[.]23725
5[.]45[.]24[.]23625
139[.]59[.]185[.]425
5[.]45[.]238[.]9025
211[.]114[.]135[.]13625
211[.]114[.]84[.]14225
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
mbfce24rgn65bx3g[.]we0sgd[.]com25
mbfce24rgn65bx3g[.]y8lkjg5[.]net25
Files and or directories createdOccurrences
%TEMP%\__config252888.bat25
%APPDATA%\Rj3fNWF3.exe25
%APPDATA%\s1qoaKDO.tmp25
%HOMEPATH%\Documents\!HELP_SOS.hta25
%System32%\Tasks\N0mFUQoa25
\!HELP_SOS.hta22
%TEMP%\f1.vbs22
%APPDATA%\f1.hta22
%HOMEPATH%\Desktop\!HELP_SOS.hta22
%TEMP%\DDx.bmp18
%PUBLIC%\Desktop\!HELP_SOS.hta18
%PUBLIC%\Documents\!HELP_SOS.hta18
File Hashes
  • 002681facd1401892d38d6b2fb8a4a601cb6097e2036807d960088e3a11518bd
  • 07ea28b71fa40819e50c191eeb968029564ea50c1be7f9fa9c60c9e0949c238b
  • 0866e68a80127122197155713e6a88ee77833f5a309ee5a78f172fcda338ad42
  • 0c022132886217e726f6c199a7336da8153b17477740dbbfb381c246253e98b8
  • 0c2c36fb7443677b044a0d9802caced6ef9ed367ad8d22941d22ce5b7c62015b
  • 0d873b512bb9419c70d5d9a173de936a4fb88e78e62cea33f8e7588efb13a986
  • 0f05b4134b3474c2c3f9f715ab625515e4dc74d175f224dbd743034ca7fd5f0c
  • 19c7fa10cdb6af0a317b898fca0c2f8dec17766ee7c486be6d2d4e8151943cc3
  • 277a53be722f0af119fe7ec952391fce2ba5dffe53499b6b066a0a7760c549f4
  • 27f2a66812448c1a9e157d6814c1622a15ef098ddc5bd79c5ed5c0faa1fb683c
  • 2cf2814a79c30a107bf7b765f7fbd8f7f12fd7feceed7d7948c777ef4862a2bf
  • 4264426561ed818abc86cadef408e0501efd8a377d668d5ba08e7634aef1ee4e
  • 484afc576a95445933cdee2304f015758a3f1979460a7fabffdc7680be48f6f6
  • 4c78e95297bd4e39c874b5405db0cabc9543bd586db72d7396a4854e57b4ccf4
  • 5069703a5f06e1ca23ea7ae6cf5b12d1e8a22c38b71712927491633541cae496
  • 54791783603a6ac3e74a6d64276b6f6160da289130d42fc7c6a58632c6b7bccd
  • 5b947d3510afaa28ca3bfe81cb35d3f50e1d0a88960be5ea3da634599337deb7
  • 5dd1cb4b4f8a339024c010d10343093671db5cbac4b9653789488843434a16bc
  • 65a1582b598001becc4c95c429097481b4572d5e012991912a0269db77dad137
  • 6b8921856dfbc5ae21bb2cca0def18769ed855f3d9a2d0e90b2a9776bdb0e709
  • 6cd837db9ee3984c5bbeb23ec892a4fa298cd10d698ebcfbf8379f944fce39f3
  • 73573450b01ab7f8da715315f5bfca23fb80c1c6be629f36a68f0ba70beb7885
  • 7e0aa71c458ed642ed6d210aac13b088bc4e0ab15c73699dc279d0a0c6af0637
  • 805f4e981b4f67c65492734466d6089a44a56cd7555cb7e01513f2a318fd4632
  • 878156061f18393a0889e3fd6eba8138d33f29ac1dc3f39ec3e54e5693c966b6
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Malware



Win.Malware.Ursnif-6995948-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\IAM
Value Name: Server ID
15
<HKCU>\Software\AppDataLow\Software\Microsoft\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC 15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: aclutxml
15
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
Value Name: Client
15
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
Value Name: {D7908994-4AF8-210B-0CFB-1EE5005F32E9}
15
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
Value Name: {344BD002-037D-867E-2DA8-E71AB15C0BEE}
15
MutexesOccurrences
Local\{31F7CC8D-DC06-8BF4-6EF5-D0EF82F90493}15
Local\{73A713E4-3646-1D08-D857-CAA18C7B9E65}15
Local\{C955B29C-9464-E306-E60D-08C77A91BCEB}15
{D647E266-3DDD-787D-776A-C12C9B3E8520}15
{EA4B00BD-410A-AC5E-1BBE-05A07FD209D4}2
{5E33275E-2503-40DA-9F72-297443C66DE8}1
{9AA3B82F-319E-DC81-8B6E-F5D0EF82F904}1
{B2A0D287-6908-B436-8306-AD28679A31DC}1
{16F26DB9-7D02-B8E1-B7AA-016CDB7EC560}1
{2EBBEFAB-B5C8-9042-AF42-B9C45396FD38}1
{6618B948-8DD4-88EC-47FA-113C6BCED530}1
{C6705878-6D91-E8C3-275A-F19C4B2EB590}1
{C6978AC4-6D8C-E882-275A-F19C4B2EB590}1
{F2232C8E-A932-F4DB-C346-ED68A7DA711C}1
{82016989-F9D2-04E0-93D6-3D78776AC12C}1
{F6025C5D-DD1D-9885-178A-614C3B5E2540}1
{2AB58D90-81E2-ECD9-5BFE-45E0BF124914}1
{22C3958C-1968-A432-B376-5D18970AE1CC}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]67[.]222[.]22215
52[.]58[.]78[.]1615
87[.]106[.]18[.]14115
62[.]149[.]142[.]16015
62[.]149[.]142[.]16615
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
schema[.]org15
api[.]w[.]org15
gmpg[.]org15
maxcdn[.]bootstrapcdn[.]com15
resolver1[.]opendns[.]com15
222[.]222[.]67[.]208[.]in-addr[.]arpa15
myip[.]opendns[.]com15
ogp[.]me15
themeisle[.]com15
www[.]addthis[.]com15
atomi[.]org15
www[.]capoverso[.]info15
capoverso[.]info15
cyberplay[.]at15
smashballoon[.]com15
www[.]azzurrabiagi[.]com15
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js15
%APPDATA%\Microsoft\Cicprov15
%APPDATA%\Microsoft\Cicprov\api-draw.exe15
\{5D9E0C27-180C-9720-0AE1-CCBBDEA5C01F}15
%TEMP%\70B2.bi11
%TEMP%\E304\10.bat1
%TEMP%\716D.bi11
%TEMP%\E536\F29B.bat1
%TEMP%\6E32.bi11
%TEMP%\E110\10.bat1
%TEMP%\90EE.bi11
%TEMP%\F56C\FAB6.bat1
%TEMP%\8E8E.bi11
%TEMP%\F490\10.bat1
%TEMP%\A143.bi11
%TEMP%\520C\2906.bat1
%TEMP%\9DD9.bi11
%TEMP%\3F66\1FB3.bat1
%TEMP%\89BD.bi11
%TEMP%\1460\A30.bat1
%TEMP%\99A5.bi11
%TEMP%\3BDC\10.bat1
%TEMP%\81B2.bi11
%TEMP%\B7A1
%TEMP%\B7A\5BD.bat1
See JSON for more IOCs
File Hashes
  • 03acbc64c9b3989a76dd27df76ce1d8cbe73ecb9b44b3573db48dc1f68812009
  • 092491d78943b29e6fd44893c945ff8fc4ac6915288c91e63ea9995fbcbf076e
  • 0a7fdfc7765dc8c7b1b7163ac790eabd225565110ae21ca6459cdae317480237
  • 1673c7630dba0d13ddf37fd41d3df713716636d6e17a0783339688928c0094cb
  • 189a2e65781d3f026a1a8a19b21fbf2e305504e7e8317865ad4e538e055f5571
  • 306c7d52c2c6d02bc243dbdaea2084f9b32346dd48f6bb436b947fed783744de
  • 32b005dbb3c48e6aa483c078b4a67361bf913d6204549f635a8a88e42097d9ea
  • 741a2e9f54703f4b79bae3d2824e0b675817bbdaf3c9863bbe1457584edc2501
  • 7e97b034ba57094f287acac4a02bfa379db09366aed17f0dc12dd63b32e4cb58
  • 85ca78bd8452b966c035a15c9cdad1822f252e4fa89373d249927951c16ac305
  • 8abd4e0b76d245ea7d3f05bb4c51a67aebdbc3acef4d9f2f4724397d9c3cccd9
  • a0f4837e429db7efdbdaa6cdbedd4a8c2af20b995aecfdecaf6438651d6c4a55
  • c139ae8e6b92853d8c2d189ef3bb100782e4bb820cbd16cd6901067d4187ad96
  • c523e34ec9d8af73d08cb1208e31e22f0de9a32c7d0dc57a7fe96311fcbabac4
  • da646594016fbbf3eeaf875fb01c4d35ab8c72837a99152a8cd696eeb32863d7

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella

Win.Malware.Zusy-6995723-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EEFEB657
16
MutexesOccurrences
EEFEB65725
\BaseNamedObjects\4A60888F24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16224
216[.]218[.]206[.]691
104[.]238[.]198[.]1901
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
brureservtestot[.]cc19
qytufpscigbb[.]com3
Files and or directories createdOccurrences
%APPDATA%\4A60888F\bin.exe24
%LOCALAPPDATA%Low\EEFEB65716
%APPDATA%\EEFEB65716
%APPDATA%\EEFEB657\bin.exe16
File Hashes
  • 028d11679340a1b6c63a10553cb3d3eefd898994d8abb6555c2b516976def7af
  • 02cfd52d13be87eb03002bb503650e9039fa30322f43ca6e7df23596b4e79129
  • 0584391d84c0d39e853958be9a3a01d6a2c77513c5731ab50f81a0f7234381e3
  • 0634e2abbcc9e55b84c1f144b381c3e0f7ea5f5f2cff8e5f9a8f07b4407bbd2f
  • 0e12e7bed943fdbffe284ff143034204f1473dccbb3605526988972f88d227e8
  • 0ec0197b47f0585471b4121a1b84dde9c50fcb4265cdf30b4da57a4a408c8543
  • 11e972658b8649e229fcd4272bcf68ee7c52b99ee11b91a08231faef4d554eeb
  • 15ac577f5b198fc6db81c854fb08beabe75f3dbba190375058192c06faa1635e
  • 16be38687d00e7c50c4f6b68d9d52ecdb9b7f195ff7c96250aa54de9b8483a92
  • 177c118622bcd7ce78f740dc7ae6501bed20fa581c9d75b9f183e065badb89b0
  • 1cc2fb4f39d0b5991c9d2a9f85fc61a359d7f53105325b53dfd70ec807be0904
  • 1cc93e8839a9cdc79a9165baa61b43065210b6204fb43e8dd66479d8fe0b5a37
  • 1d34ffabc85ec962b3c2ff8b4107154e7d56debf9723cf6466bfa1552a8035de
  • 20b1b90aa72891d632067d92b5aff513219b46ae0166a275f979f0a8553882de
  • 24a906c73eb7e2fd33ea90f714e0950d267dd852cb38232162a9cfd4bd9b43ea
  • 27a6628ffadf218081c50c05b098956f83c54dfc0820d4216851a9cfb85b7c42
  • 29d7b8cab5b08106a011bc74908638168f91578dec2478b2f245e091eb44c3d9
  • 2a5b2b31e2aca479bff24922f4170a74cfe70914589af4b1f30ac93103933973
  • 2d29e10bad213d8eb768b306d24dc3bc40af3127e39af12934c13b69b2a50cb3
  • 2dc9fcb48596f3660e37b004504dd4cdd147a317f1d91c4f1af0858798ee6350
  • 3d665290548cb0ca8bb65daf166c8fa5781bdccb6854f658749becb84f1de731
  • 3e1d13408d35361b3880ed7081c4cad0cc8af48e3fa72e57c9fd00b33cb3e1d7
  • 477b06ead8877f7b3dfffc7263d2a3740ed978797730cedcbe2274ba783c4c01
  • 47d6ff0d66e8a2aa608682894f37e3fac9504f499eba421ee7f921896b622ffe
  • 48484ab467c9a716ce6d0fbd9cfed614657ff1e7f317bfe40849bcf1f92b2736
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Ransomware.Sodinokibi-6995593-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\Wow6432Node\recfg 15
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: pk_key
15
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: sk_key
15
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: 0_key
15
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: rnd_ext
15
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: stat
15
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
14
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
11
<HKLM>\SOFTWARE\WOW6432NODE\RECFG
Value Name: sub_key
6
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\490A7574DE870A47FE58EEF6C76BEBC60B124099 3
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\490A7574DE870A47FE58EEF6C76BEBC60B124099
Value Name: Blob
3
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\A9CE8E8879AB0CCB17A1FEEED83E720F3D925DF8 3
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\96002650CC3818ADB7BC358B15AF098A0BD0AEB6 3
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\A9CE8E8879AB0CCB17A1FEEED83E720F3D925DF8
Value Name: Blob
3
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\96002650CC3818ADB7BC358B15AF098A0BD0AEB6
Value Name: Blob
3
MutexesOccurrences
Global\206D87E0-0E60-DF25-DD8F-8E4E7D1E3BF06
Global\FDC9FA6E-8257-3E98-2600-E72145612F095
Global\6CAC559B-02B4-D929-3675-2706BBB8CF664
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]35[.]177[.]6412
87[.]98[.]154[.]1467
50[.]116[.]71[.]866
141[.]138[.]169[.]2156
213[.]186[.]33[.]35
52[.]28[.]116[.]694
213[.]52[.]129[.]2484
109[.]73[.]231[.]1004
193[.]124[.]179[.]134
46[.]30[.]215[.]774
188[.]213[.]19[.]1674
109[.]237[.]212[.]704
80[.]158[.]2[.]414
185[.]197[.]130[.]804
159[.]203[.]88[.]134
46[.]45[.]134[.]704
107[.]180[.]57[.]284
185[.]103[.]16[.]1884
188[.]165[.]53[.]1853
213[.]186[.]33[.]243
185[.]52[.]2[.]1543
66[.]228[.]32[.]513
85[.]214[.]26[.]1043
198[.]71[.]233[.]1043
52[.]9[.]200[.]1513
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
apps[.]identrust[.]com13
apps[.]digsigtrust[.]com12
kellengatton[.]com7
ziliak[.]com6
matthieupetel[.]fr4
bd2fly[.]com4
jefersonalessandro[.]com4
silkeight[.]com4
the-cupboard[.]co[.]uk4
lovetzuchia[.]com4
stabilisateur[.]fr4
fskhjalmar[.]se4
atma[.]nl4
naukaip[.]ru4
bundan[.]com4
iactechnologies[.]net4
oscommunity[.]de4
www[.]acibademmobil[.]com[.]tr4
ronaldhendriks[.]nl4
activeterroristwarningcompany[.]com4
acibademmobil[.]com[.]tr4
LSNGROUPE[.]COM3
funworx[.]de3
taulunkartano[.]fi3
energosbit-rp[.]ru3
See JSON for more IOCs
Files and or directories createdOccurrences
N/A-
File Hashes
  • 0aebc3c9dd12779c489012bf45a19310576ec0e767ac67d1c455839302465afa
  • 1501f261a66eefce47dc47cb8a426107c4b694a41b5b9fd000d0ad2ea76d8e34
  • 17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467
  • 1937098609fbbda1b470811a7ffe5fa044058655722d84bd029050d54f2b1496
  • 2ea781140f7e86c63b636249b5fdba9828661bdd846fd95c195c5b986b84a507
  • 36fa3f72afc2dd6f206a295fc618038fef5e241bc48bd5451ac9bab9128734dd
  • 4748e9729f2e0b1bb151950cdaa75d51ad74612a1c12ff124a492a9a67c2f49b
  • 6727edbb5d6abee908851a8c5fd7b4aca6d664634fdcdfc15e04502b960abbc5
  • 6efd9aae5e112418bd43ab48ec4a1fce191c7503fcd11fdb95e89ad0217adb7a
  • 7bafd5de1b6724962ab920f71031978a101055f061ae3cc21db8bb9fa64c5829
  • 861bc212241bcac9f8095c8de1b180b398057cbb2d37c9220086ffaf24ba9e08
  • 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4
  • 9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae
  • a389e24bf0af9bc81b8133a600a2b6c875d32aa0885964d0b9f3ac6db5fee762
  • e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Malware



Win.Malware.Dridex-6995476-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: trkcore
21
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableTaskMgr
21
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
Value Name: CheckSetting
21
MutexesOccurrences
onXWzc331S1
x1I78jI7dI1
3BudAKaa5l1
IY1oUapMVy1
LAme40hNU11
PqPmiKaxbT1
VlpnDSgg3g1
oW2bMc607G1
rzHJChsIaJ1
uKmWBwWy5R1
2kGkONAtb21
GPTOF7ZR0p1
JRfp790lHH1
K4EN0HOyBN1
QiWTz8nBr01
hvUL9X1ymZ1
kaqW5ROCus1
w4Ith2QyiY1
7flTFqBJ2g1
A7OrpJ4YZw1
Jjcx5gKyG41
SV3OytSaAP1
kKOjeZFyh31
lBeTaukWiI1
p74m9DtouU1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]12[.]17421
104[.]20[.]208[.]2117
104[.]20[.]209[.]214
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
pastebin[.]com21
www[.]0kgr0svsdw[.]com1
www[.]11exvnzpds[.]com1
www[.]tqzvsormbw[.]com1
www[.]egntxfch2f[.]com1
www[.]p8o6adliq7[.]com1
www[.]1di9yqmr4e[.]com1
www[.]ahzu9hhyqj[.]com1
www[.]x6n5szq1jb[.]com1
www[.]0hox6fnkju[.]com1
www[.]ahy9qgaqjw[.]com1
www[.]uxnyhqblpm[.]com1
www[.]1ohvaomcea[.]com1
www[.]v2xeifg35d[.]com1
www[.]wzykyninkd[.]com1
www[.]tkhrjexxyn[.]com1
www[.]u6vpjfufqz[.]com1
www[.]05p60clujw[.]com1
www[.]ijzuyfo6m9[.]com1
www[.]nnd9bsodkx[.]com1
www[.]ikzjlvrxat[.]com1
www[.]ejglgrlsfv[.]com1
www[.]49jucwch3k[.]com1
www[.]dpnrq4kpe7[.]com1
www[.]3rw4hwziej[.]com1
See JSON for more IOCs
Files and or directories createdOccurrences
\388987352.exe1
\old_388987352.exe (copy)1
File Hashes
  • 147861778f0693429684b6d52fddf6e8b5f1c09901aecf8da095d4e011813d61
  • 2fcd0b9a9bd223ba0a04490a631b3bf92b537a006e060fbf4a0bb0541573c3ae
  • 450e7f78b43b060e3b55fb82ad75a914ce440ed365a3c74c5d9905bca3871f1e
  • 4b8384d3b9ba817e2c139fff74f289a2f9c75af1fb805d85d5fc798e8546a0f0
  • 51e29a5685b27518cfc295d6f978c38d4c8a035f87f09d3c65a6e0c3ef8a5cf9
  • 59397962406f67de80d7c4c98caf8253541b0707504facdc752bd1f1a35a834b
  • 6c9b8580f46ce7548254f1aa2e809a2e94cf41be58921c19f8d08a431c12ff3a
  • 6f8329e22dfeecb70fbe230e66cb4007e88e1dc3ef225d3207fff8046b26e3bf
  • 713a7b0b36eba38c569c59f337198d21860e04fd8277b7f2eb27cc071c97d6e2
  • 88ed47a4401efef21a0f4168a04912f5577a2edb2ee14c4e8f77a9618e42d928
  • 96b4d6688b0d482ba1230fb3198bd9c79a43faea6f861e430f52b250da2745d2
  • a2eb8d64d5dc33f8f89345b8574eb12d3122f6a32ee87d0935288e9650c76a37
  • a8329c903e0d9d3f41301e110b490a3986260169c73adc539eaea21b155d3346
  • af9428d1830d0e4b676000732ea0d99284f1db6a972ee6f776709491b85b5c16
  • b64e8a3d377c8e16581540721c068c2d65d78e33254475a848fe23f1d6646c23
  • bee09de2744b8ce8e11ab8d0eba4668d22a7083e4648835cc77f3742f3d4d8bc
  • cea99fa3855ef7bfe2651bd1e2ba1ab9725b2af7d07a70f70848348ad0993a71
  • d3515980b07364781e8105a155009bcd7902380a74a9a4c81ed7f429c53b2074
  • dd0bb344ab3e9de4812af9bc80c32fac182a31a6d144bb6c193bcc91628ee53b
  • df342abf5940fb9a6dfb7013b3766af13899873c7725fd43f8f4b115550eb8fb
  • ed9f38d2128c8d621140760571953d9d26bfba041309491cd6bc08d477f9326a

Coverage


Screenshots of Detection

AMP



ThreatGrid

Win.Trojan.Shiz-6994953-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT
Value Name: 67497551a
27
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: 98b68e3c
27
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: userinit
27
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: System
27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: load
27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: run
27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: userinit
27
MutexesOccurrences
Global\674972E3a27
Global\MicrosoftSysenterGate727
internal_wutex_0x0000012027
internal_wutex_0x0000042427
internal_wutex_0x0000047424
\BaseNamedObjects\Global\C3D74C3Ba21
\BaseNamedObjects\internal_wutex_0x000005b86
internal_wutex_0x000004a05
internal_wutex_0x000002104
\BaseNamedObjects\internal_wutex_0x0000069c4
\BaseNamedObjects\internal_wutex_0x000003844
internal_wutex_0x000006203
\BaseNamedObjects\internal_wutex_0x000000e03
\BaseNamedObjects\internal_wutex_0x000000dc3
internal_wutex_0x000003b43
internal_wutex_0x000001383
internal_wutex_0x000006a82
\BaseNamedObjects\internal_wutex_0x000006a02
\BaseNamedObjects\internal_wutex_0x000005b42
\BaseNamedObjects\internal_wutex_0x000005b02
\BaseNamedObjects\internal_wutex_0x000000ec2
internal_wutex_0x0000017c2
\BaseNamedObjects\internal_wutex_0x000000f41
\BaseNamedObjects\internal_wutex_0x000002d41
\BaseNamedObjects\internal_wutex_0x000003e41
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]253[.]126[.]5827
208[.]100[.]26[.]25127
104[.]239[.]157[.]21027
198[.]187[.]30[.]24927
35[.]229[.]93[.]4618
204[.]79[.]197[.]20015
13[.]107[.]21[.]20012
35[.]231[.]151[.]78
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
TUFAMUGEVIH[.]EU27
tupazivenom[.]eu27
qeburuvenij[.]eu27
rytahagemeg[.]eu27
tunarivutop[.]eu27
GANAZYWUTES[.]EU27
KERABORIGIN[.]EU27
nojepofyren[.]eu27
LYKEMUJEBEQ[.]EU27
XUXETIRYQEM[.]EU27
nozapekidis[.]eu27
CILYNITISEG[.]EU27
NOVACOFEBYZ[.]EU27
lyvoguraxeh[.]eu27
xubifaremin[.]eu27
DIKUVIZIGIZ[.]EU27
JENUPYDACES[.]EU27
QEGEFAVIPEV[.]EU27
NORUMIKEMEM[.]EU27
xukafinezeg[.]eu27
FODAVIBUSIM[.]EU27
PUPUCUVYMUP[.]EU27
vocupotusyz[.]eu27
gaherobusit[.]eu27
MAGOFETEQUB[.]EU27
See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\NTUSER.DAT27
%HOMEPATH%\ntuser.dat.LOG127
%TEMP%\C.tmp3
%TEMP%\1F.tmp3
%TEMP%\E5AB.tmp2
%TEMP%\E689.tmp2
%TEMP%\5702.tmp2
%TEMP%\D26E.tmp2
%TEMP%\C6C5.tmp2
%TEMP%\C6D6.tmp2
%TEMP%\5742.tmp2
%TEMP%\BB8D.tmp2
%TEMP%\E56C.tmp2
%TEMP%\EAA7.tmp2
%TEMP%\6021.tmp1
%TEMP%\BA52.tmp1
%TEMP%\6920.tmp1
%TEMP%\D079.tmp1
%TEMP%\BEA3.tmp1
%TEMP%\E11F.tmp1
%TEMP%\D59F.tmp1
%TEMP%\CBAF.tmp1
%TEMP%\4915.tmp1
%TEMP%\214C.tmp1
%TEMP%\5EBA.tmp1
See JSON for more IOCs
File Hashes
  • 056d3a8dae02d04ba1312003791e46fe1ddaf1e850d1b847ad736637367fc718
  • 071b2028f9ddc54cf5bd04b3439c3937fd05d62c5ef70e6b5b07f81579e5806d
  • 0877c2c5e086884cd5654375483d6944286cb6351b0de2b2b8115daede3a440a
  • 09302a98d751e7b8097e2f98be7e747c42ae54e7906e8e7cbc1e5f273d793d12
  • 0c214a0484f1e1d9197ca13159f71248dcf5f2576a93a6326471f2d02f9944de
  • 14ec15d83bb6ec592a7ef19d8b6d8d6e1a56475c512200721af9214c765f4b05
  • 16f65725e09cf3d55347eab4252481e65db4bbfae3113fac140f724c6eb94a1f
  • 182b84454c4674dc61e3215c6f07d0f546c4197ae688987e30a2fadb77898f75
  • 1f10bb3822d7bf6dbe6cc2dfd72bc60e00197db5819d098e0e75c3ac2b4baaf6
  • 214ead8b6a5ba4205258abd256934c05316b4c02a0ec20f92e4415f36ca4f723
  • 24f43e78a195f256f4802e02851cc4dd69e912d92dcd7d2e33d6590716c86f03
  • 271f96ac65a9b97c4aecc1eee799a29a6244306e1e027df541f277a03fc66b7e
  • 32abd7d95eb9018ce1618fa0e48c3173dae0d0590c73b3200641b01d2897bf9d
  • 33bc6b06e7d06133c1872fc9fe3d734e382bc6577f2094ec60ab00d456a9ed44
  • 3424ab4d70f930cd177b2ccdd96d81601efb6b51bb9bc51d64f913f8af5e960e
  • 34bebadd666db3fcfac273330324da52f1ac0c4fc794139be0e4d96504c34715
  • 353bb53dbcf5965e2d3afb933564dfb97b404327ad38a57d7cecbbd2013f3576
  • 36d6f0252c5b39edd7784c048b14cc4e8b890274f9583bc91b79f2d45ca14128
  • 3cee73fa5fb4bfe11d8eb751476a68e49222763b22dc3e35a13eaaf6af855ede
  • 3e4007511f5cd14c58fe373e3d78cb3c34e5cd5a16cce5a6aae1b8db373bfd0d
  • 41a4e635fb0542ebff2a9e533f3f7b10a6b6bed30dd7a67199d285e90bcd3a83
  • 431755f57af0005b3a27561c423cdbbfdcad11c18c709c2dead91a29b3a45f28
  • 4332e8161e092aa143ac96b0e40241ba332fa300469f74329f43e7f83bbbd2e4
  • 44671196bb73250589214bea72307d928d62cdef74877113e550b5fbdf59b958
  • 48117ef8d2fc9fc72e9529012eff094a1792915fd7e3147d52d4fedc7d596514
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Virus.Expiro-6994921-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Type
23
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Start
23
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Type
23
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Start
23
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
Value Name: Type
23
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
Value Name: Start
23
<HKCU>\Software\Microsoft\Osk 23
<HKCU>\SOFTWARE\MICROSOFT\OSK
Value Name: Setting
23
<HKCU>\SOFTWARE\MICROSOFT\OSK
Value Name: Stepping
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
23
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
23
MutexesOccurrences
kkq-vx_mtx123
gazavat-svc23
kkq-vx_mtx7523
kkq-vx_mtx7623
kkq-vx_mtx7723
kkq-vx_mtx7823
kkq-vx_mtx7923
kkq-vx_mtx8023
kkq-vx_mtx8123
kkq-vx_mtx8223
kkq-vx_mtx8323
kkq-vx_mtx8423
kkq-vx_mtx8523
kkq-vx_mtx8623
kkq-vx_mtx8723
kkq-vx_mtx8823
kkq-vx_mtx8923
kkq-vx_mtx9023
kkq-vx_mtx9123
kkq-vx_mtx9223
kkq-vx_mtx9323
kkq-vx_mtx9423
kkq-vx_mtx9523
kkq-vx_mtx9623
kkq-vx_mtx9723
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{33EC2C09-9668-4DE7-BCC0-EFC69D7355D7}.crmlog23
%SystemRoot%\SysWOW64\dllhost.exe23
%SystemRoot%\SysWOW64\msiexec.exe23
%SystemRoot%\SysWOW64\svchost.exe23
%SystemRoot%\SysWOW64\dllhost.vir23
%SystemRoot%\SysWOW64\msiexec.vir23
%SystemRoot%\SysWOW64\svchost.vir23
%SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{9161210E-9C65-434F-8957-2AD799206FF1}.crmlog23
File Hashes
  • 0a5bc7465c0efc59aee85312a1abba14d691b3345d4b6630c3bb83dbae749dc7
  • 12bd3e823cbb4a3e56ec5c17f69e28261f8cb39212c89e910780e7372a018c36
  • 17c037d9e0cbf4f6e11dc5f61c341484abcc28f9bb86e9052b6504af9d6dd5ae
  • 1f8a91163a60b9969ab43b6229c3715373f3a3974d74a74c08457a2af25d5ccb
  • 203ee856844e57afef69c3be268efb92ce466ba0ec541b0f56b8bdb336bdefc1
  • 2a5ebd020ca217c6062d94212f3a47f229d24eb39a8b538795b04bba67499631
  • 41d9bb9c11ecadd28283770fc6a8580bd5ad9ba86df2e58e72672bced2a558f7
  • 445086ca6b9015865a25d5fb21d651153cab0e80b4b8958ee927803f7100417f
  • 4df7f7733ba6cc1d43683d036f2107eb909d07fb1f074ec6a8ebf595daedda18
  • 560ef4c5743def36e9b820378ad8dbf1f50d1cba83e1803db8931b734786de08
  • 5ab01f91a3fe2c14e6a91098ac901502ddf68d676ed8317608c8f774c9df093e
  • 684f5c54d43bd1ef6bbd5b4781238e7d4d2411df9891240f5ec0a6e78d492191
  • 7aa38eac44171d5f764b58b1a5fe92334b5de3f8e187389405526362ee7f80be
  • 8d8b6d6b7269115b1aa4ab705b23a0fe890a75de5c56e91100d97bff1aaf885e
  • 90a43627c9897dd6f6e4ddc43bf2c911911f97dc7815955dd83855d0077862f5
  • bb7cce3ef02d2a64fd37406f9e23975a7ac6fafab26669c908e369d872664010
  • bfda0bc4f6756125e4a6fc0f3395bf1571ec00f2076a0480fcae7ba9a840c7dc
  • cab81316437f0ae434102ca0c5468688ed96cb802dc7db6f7d0786ff4824d57d
  • d0e57c67a026d8d3e88997fff1e763b0747f1e770e19deabb3c52580213558d2
  • e282f45eeac6018884c47130708572f962452e5c3db37dade2b8f2e292ad0276
  • ea062e5dd432ffd64454bbb56566ea196d16df63ace79a59b59b727bae9eae63
  • ebe6a5d9838b97702e6bd5c26bed23856f606514403e2d9cf8464f929fd10b87
  • faebeeed682999de6f01135e8032fa377b6f1e54bd965ea79fb91d1590743b11

Coverage


Screenshots of Detection

AMP



ThreatGrid

Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Excessively long PowerShell command detected (2608)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Madshi injection detected (2504)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Kovter injection detected (1026)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • Process hollowing detected (952)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Dealply adware detected (264)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Atom Bombing code injection technique detected (262)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Gamarue malware detected (188)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • PowerShell file-less infection detected (153)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Fusion adware detected (64)
    Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Installcore adware detected (50)
    Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

Beers with Talos Ep. #55: Live from San Diego!

$
0
0


Beers with Talos (BWT) Podcast Ep. #55 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded June 12, 2019 — God knows why, but we bring you another live episode from the Talos Threat Research Summit at Cisco Live U.S. in San Diego, California. We are joined by TTRS keynote speaker (as is tradition) Liz Wharton.

Catch the highlights of the show and stick around for hot takes from the live audience. Thanks to everyone who showed up to the recording, especially those brave enough to step up to the mic at the end.

This is our annual reminder of why we don’t do this more often. We think you'll whole-heartedly agree.

The timeline:

  • 01:00 — Roundtable: The Dark Time delusion, Matt has a fit with an important lesson, UrbanSimulator 
  • 11:00 — Talos Threat Research Summit recap: It’s live, we wander. I think someone mentioned biomes?
  • 38:00 — Parting shots and closing thoughts
  • 44:00 — Parting shots part 2: WITH THE AUDIENCE

Some other links:

  • Nah
==========

Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

Hosted by Mitch Neff (@MitchNeff) with special guest Liz Wharton (@LawyerLiz).

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Source newsletter (June 27, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

You never want to fall behind on Beers with Talos. So make sure to listen to the latest episode on your commute home today. This episode — featuring special guest and Talos Threat Research Summit keynote speaker Liz Wharton — was recorded live in San Diego as part of Cisco Live. So yes, there’s audience participation, and no, you are not prepared for it.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

Cyber Security Week in Review

  • For the second time this month, a Florida city agreed to pay roughly half a million dollars to the hackers behind a ransomware attack. The government of Lake City, Florida agreed to pay $460,000 in exchange for the return of its email services and several servers attackers had seized. 
  • The U.S. Department of Homeland Security warned American users of an uptick in wiper attacks originating from Iran. The advisory came as military tensions continue to rise between the two countries. 
  • Dell warned of a critical vulnerability in its pre-installed SupportAssist software on millions of its PCs. The bug could allow an attacker to trick the machine into running a malicious DLL file. 
  • Hackers stole roughly $4.2 million worth of cryptocurrency from Sigaporean exchange Bitrue. The attackers exploited a vulnerability in the exchange’s site and accessed the personal funds of 90 users. 
  • Attackers tracked roughly 20 global officials with ties to China by infiltrating 10 cellphone carriers’ networks. A recent report states the attackers stole text messages, location data and call logs. 
  • The head of the U.S. House Homeland Security cyber subcommittee says he will introduce a bill to create two new security grants. Both funds would grant money to state and local governments to prepare for cyber attacks and secure election technology. 
  • The European Union plans to run new military exercises to plan for potential major cyber attacks from Russia and China.  

Notable recent security issues

Title: Netwire malware delivered through Firefox vulnerability  
Description: Attackers are exploiting a now-patched Mozilla Firefox vulnerability to deliver the Netwire malware. At the time of first exploitation, there was no fix for the bug. Netwire uses two separate functions to persist — once as a launch agent and again as a login item. New Snort rules prevent the malware from downloading its final payload.
Snort SIDs: 50498, 50500

Title: Cisco patches critical bugs in DNA Center, SD-WAN  
Description: Cisco has patched a slew of critical and high-severity flaws in its DNA Center and SD-WAN. In all, the company issued fixes for 25 vulnerabilities last week across a variety of its products. Two of the most severe bugs exist on access ports necessary for Cisco Digital Network Architecture (DNA) Center. There is another critical vulnerability in SD-WAN's command line interface.
Snort SIDs: 50467, 50469 – 50472, 50485 – 50489, 50492 

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe 
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: Tempmf582901854.exe
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin 
Claimed Product: N/A 
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: wup.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: f118e52a73227b85fbb0cb7d202c3753916e518c516286c441a2dc92ede1f023
MD5: 4f551cb9a7c7d24104c19ac85e55defe
Typical Filename: watchdog.exe
Claimed Product: N/A
Detection Name: W32.Trojan:Trojangen.22hu.120

Welcome Spelevo: New exploit kit full of old tricks

$
0
0
Nick Biasini authored this post with contributions from Caitlyn Hammond.


Executive summary

Exploit kits are an ever-present and often forgotten threat on the landscape today. Their popularity seemed to peak several years ago with the success and eventual downfall of some of the best compromise platforms ever created, including the Angler Exploit Kit. These kits generated millions of dollars from their victims and they are still effective. One of their biggest appeals today is the removal of reliance on user assistance. Increasingly, on the crimeware landscape today, user assistance is required, whether it's through blatant social engineering attacks like ongoing sextortion campaigns or through the countless malspam messages traversing the globe daily, users are required to help achieve infection. That is where exploit kits stand alone as an effective web-based platform for compromise that only requires users to surf the internet.

Today, Cisco Talos is unveiling the details of a new exploit kit campaign that proves exploit kits are still a threat and should be taken seriously by defenders: Spelevo. This recent campaign leveraged a compromised business-to-business site to deliver Spelevo, one of the first new kits we've seen in months.

Spelevo illustrates many of the challenges associated with protecting against these threats and preventing their spread. In compromising this particular website, the attackers did little more than add four lines to the code rendering the webpage — but those four lines did a lot of damage and can compromise all visitors that have poor security hygiene. Even though Angler did make use of a zero-day in Adobe Flash Player years ago, exploit kits largely depend on existing, patched exploits. However, all it takes is one missed patch on one system to lead directly to compromise. That's why you need things like a thorough defense-in-depth approach with various technologies in place to help mitigate any residual risk that comes with running an enterprise.

Background on exploit kits

Exploit kits are something Talos has covered in the past, including some more memorable deep dives. The goal of exploit kits is fairly straightforward: compromise random victims on the internet using disclosed vulnerabilities to deliver a malicious payload. It achieves this through a couple of components: a traffic direction system (TDS) or gate, landing page and exploit page. The challenge for most adversaries is getting traffic to their kits — and there are a couple of different methods to get it there.

Today, most exploit kit activity Talos observes is powered through malvertising, or the use of malicious ads. These ads are usually hosted on a variety of different web pages and platforms, but most commonly is associated with illicit streaming services and adult content. However, this is not the only way users can be directed to exploit kits, as Spelevo shows. Spelevo leveraged compromised websites, another popular method, to infect victims.

Exploit Kits have one large limitation: Internet Explorer. For exploit kits to operate effectively, adversaries need to take advantage of an antiquated web browser that lacks many of the modern protections designed to defeat this specific type of attack. But the amount of people actively using Internet Explorer continues to dwindle as they migrate either to modern Windows-native web browsers like Edge or to some of the other open-source solutions like Mozilla Firefox and Google Chrome. However, Internet Explorer remains somewhat popular, and exploit kits will always be there to take advantage of its users.


Spelevo details

Cisco Talos began observing an increase in exploit kit activity and started looking into one campaign in particular. It was during this investigation that one of the compromised web servers was identified and the full campaign came into focus. The activity appeared to originate from a business-to-business (B2B) contact website. This website initially appeared to just have a single page compromised, but as the investigation continued, it appeared that the compromise was more significant with multiple pages, including the main homepage redirecting to the gate used for the campaign. To their credit, while the investigation was ongoing, the site was already dealing with the compromise. The actual compromise is subtle, adding only a few short lines.
There are actually two different connections that these couple of lines establish and start the infection process. One thing to note is that this particular kit opens a new tab when they are compromising the system. In this case, the actual gate is being hosted at ezylifebags[.]com[.]au with a 302 cushion.
As you can see, this isn't the only additional script dropped on the compromised website. There is also a request for another JavaScript file being hosted at your-prizes-box[.]life. However, this request doesn't result in anything but additional requests for the same file via 301 redirect and could be used as an additional tracker to ensure the victim is getting to the gate via the proper channels, a compromised website, and are not direct connects from researchers.
It's at this point that the exploit kit itself becomes involved. This starts with a request for the landing page. The landing page is typically where an initial vetting of the system occurs and some level of reconnaissance is done. This will include things like the operating systems being used, the type and version of web browser, and type and versions of applicable plugins, most notably Adobe Flash. This reconnaissance phase wasn't easily identifiable when initially looking at the landing page. As shown below, at the top of the document there appeared to be a base64-encoded blob that was assigned to a variable. However, there was a failed attempt at decoding, which led to the discovery of an extra effort by the attackers.
When we began analyzing the code on the page, we found why the decoding was failing: The actors used rot13 encoding first, as highlighted below.
Once we decoded the rot13 and then decoded the resulting base64, we found the code needed to probe the system to determine vulnerability.
This code will probe the operating system, web browser, and plugin information. As the try statement found below shows, after this is done a decision tree exists. If a vulnerable version of flash is found, the first path is taken which likely leads to CVE-2018-15982, which has been widely abused by exploit kits including Spelevo. If a match isn't found, the second path is followed, which delivers another exploit.
The specific infection path we are following did not go down the Flash path, and instead served the other exploit. We began to analyze the exploit, and after some investigation, determined that CVE-2018-8174 is being exploited — another use-after-free vulnerability in the VBScript engine of Internet Explorer. This particular exploit has been widely abused and can be found in several other exploit kits, most notably the Fallout Exploit Kit.

It's not surprising to find this exploit being added to multiple exploit kits, as most kits copy one another and once an exploit is available in one, the others typically are not far behind. This particular vulnerability still requires the use of Internet Explorer and relies on the user being behind on updates, since the patch for this particular bug has been available since May 2018.

Once the system has been compromised and the payload is delivered, Spelevo does something a bit novel for exploit kits: It redirects to Google, post compromise. The practical effect of which is that a user would see a tab open which loads the gate, followed by the landing page, an exploit page, and then finally to Google.
This could lead the user to miss the fact that they've been compromised and assume they were opening up a normal web page.


Payload

The payload that exploit kits deliver varies. In the instances that Talos observed banking trojans as the primary payload — specifically both IcedID and Dridex have been observed being delivered from Spelevo during this campaign. These types of payloads are common to exploit kits since this is a purely financially motivated attack and banking trojans are an attractive avenue for monetization.


Familiar Techniques

Spelevo is a relatively new exploit kit that was first seen a couple of months ago. Since its discovery, it has gone through some minor changes, including modification of URL structure and some obfuscation changes in the landing and exploit pages themselves. It makes use of a lot of common techniques for exploit kits that we've seen over the years.

Unlike the Rig exploit kit, Spelevo is being hosted using domains instead of hard coded IP addresses. Additionally, they appear to be leveraging domain shadowing, a technique Talos discovered several years ago, leveraging compromised registrant accounts to host malicious activity using subdomains. Talos also found several instances of 302 cushioning where the gates and exploit kits will leverage a series of HTTP 302 redirects to eventually point to the landing page. The core functionality remains the same: Compromise anyone who interacts with it.


Spelevo Exploit Kit Video


Conclusion

In much the same way that we see old threats like MyDoom and Stuxnet circulating on the internet today, exploit kits will be a permanent part of the threat landscape. They are still incredibly effective at leveraging existing vulnerabilities to randomly compromise victims on the internet to deliver a malicious payload. However, in today's world, systems that utilize Internet Explorer and have unpatched vulnerabilities are continuing to become harder and harder to find. As such, adversaries have many other attractive routes to try and get malicious software onto end systems. Increasingly, we see the Traffic Direction Systems (TDS) point to other monetization routes. These commonly include threats like tech support scams and fake Flash players. The common difference is both of those attacks require the user to interact to earn money off of the attack, rather than leveraging a vulnerability. Regardless, the majority of the traffic redirection we see lands in these two buckets, leaving exploit kits as the odd man out.

We expect this trend to continue as the amount of systems vulnerable to these types of threats decreases daily. Talos recommends removing Internet Explorer as the default web browser on most machines, especially for users who may not be as tech-savvy as a security researcher. Additionally, in today's internet, there is little need to have a plugin like Adobe Flash installed. Soon, it will even be deprecated completely. Taking small steps like these will help protect that increasingly small amount of users that are still being terrorized by this small yet extremely effective attack platform that still lurks on the internet today.


Coverage

To detect this new exploit kit, Cisco Talos released SNORTⓇ rules 50509 - 50511.

Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


Indicators of compromise

Domains:
open[.]nylonsneak[.]top
hailey[.]nylonsneak[.]top
goddess[.]nylontruth[.]top
calientes[.]nylontruth[.]top
clasica[.]santarough[.]top
famili[.]clearnubile[.]top
colombia[.]clearnubile[.]top
swallowing[.]flavorideal[.]top
diary[.]motoribyron[.]top
bologna[.]vediocorset[.]top
54[.]armlessdance[.]top
perv[.]armlessdance[.]top
homosexual[.]armlessdance[.]top
clara[.]awesomeablam[.]top
different[.]beestkilroys[.]top
race[.]belarusapple[.]top
charmane[.]belarusapple[.]top
katsumi[.]carmanexteme[.]top
bww[.]cosbyfunnies[.]top
arnold[.]cosbyfunnies[.]top
vodeos[.]galeriebeths[.]top
veronica[.]galeriebeths[.]top
lithuania[.]galeriebeths[.]top
get[.]guerradanger[.]top
name[.]preitymutter[.]top
the[.]sandeerugrat[.]top
marge[.]sandeerugrat[.]top
emule[.]unicornbrune[.]top
candye[.]brunetbebitas[.]top
adora[.]dailysexpress[.]top
famose[.]dailysexpress[.]top
trailery[.]dailysexpress[.]top
mulatas[.]damitahustler[.]top
chaild[.]denizprivatne[.]top
combustion[.]denizprivatne[.]top
talent[.]denudaskalani[.]top
abu[.]fightingsatan[.]top
anziane[.]fightingsatan[.]top
world[.]italyalemanes[.]top
converted[.]minorikeibler[.]top
beastyality[.]minorikeibler[.]top
gore[.]natachafetish[.]top
binary[.]playingactive[.]top
tes[.]satanicenanos[.]top
window[.]aphroditedrink[.]top
breitny[.]barbiereallity[.]top
dyre[.]bloggerlolicon[.]top
filmmaking[.]bloggerlolicon[.]top
asturias[.]freakylanguage[.]top
delco[.]graffitoandnot[.]top
tanto[.]ingyenesrusian[.]top
punker[.]militarymagyar[.]top
break[.]periodherstory[.]top
chantelle[.]periodherstory[.]top
tes[.]teannapostales[.]top
absolutely[.]caballerosricky[.]top
pete[.]clothedcalcutta[.]top
foley[.]clothedcalcutta[.]top
natural[.]fantasygisselle[.]top
copii[.]gratuitekrystal[.]top
bailey[.]gratuitekrystal[.]top
dating[.]leilanihardcord[.]top
powerpuff[.]mancicdreadlock[.]top
adina[.]teasingfreehome[.]top
animay[.]tranniefotologs[.]top
qwerty[.]virusemoticonos[.]top
erotic[.]bridgettepromise[.]top
socal[.]carmellanightelf[.]top
ameuter[.]carmellanightelf[.]top
high[.]cartoonseverinin[.]top
sample[.]cartoonseverinin[.]top
groups[.]chabertcigarette[.]top
book[.]emblemliterotica[.]top
diary[.]ghanaiansorority[.]top
taylors[.]ghanaiansorority[.]top
spit[.]natashayoungster[.]top

IPs:
95.211.5[.]242

Threat Roundup for June 21 to June 28

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 21 and June 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Trojan.Zeroaccess-7002138-0
    Trojan
    ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
     
  • Win.Packed.Blackshades-7002008-1
    Packed
    Blackshades is a prevalent trojan with many capabilities including logging keystrokes, recording video from webcams, and downloading and executing additional malware.
     
  • Win.Malware.Gamarue-7001972-0
    Malware
    Gamarue, also known as Andromeda, is a botnet used to spread malware, steal information and perform activities such as click fraud.
     
  • Win.Trojan.Lokibot-7001391-1
    Trojan
    Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
     
  • Win.Malware.Ponystealer-7001707-0
    Malware
    Ponystealer is known to be able to steal credentials from over 100 different applications and may also install other malware such as a remote access trojan (RAT).
     
  • Win.Malware.Upatre-6997681-0
    Malware
    Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.
     
  • Win.Virus.Ramnit-6997840-0
    Virus
    Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
     
  • Win.Dropper.Kovter-6998646-0
    Dropper
    Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Dropper.Gh0stRAT-7003005-0
    Dropper
    Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
     

Threats

Win.Trojan.Zeroaccess-7002138-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: DeleteFlag
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\Epoch 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
Value Name: Start
25
<HKCU>\Software\Classes\clsid 25
<HKCR>\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 25
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\InprocServer32 25
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32
Value Name: ThreadingModel
25
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32 25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
25
<HKLM>\SOFTWARE\CLASSES\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\INPROCSERVER32 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: DeleteFlag
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000010
Value Name: PackedCatalogItem
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000009
Value Name: PackedCatalogItem
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000008
Value Name: PackedCatalogItem
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000007
Value Name: PackedCatalogItem
25
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
88[.]254[.]253[.]25421
92[.]254[.]253[.]25421
71[.]254[.]253[.]25421
87[.]254[.]253[.]25421
180[.]254[.]253[.]25421
166[.]254[.]253[.]25421
135[.]254[.]253[.]25421
117[.]254[.]253[.]25421
119[.]254[.]253[.]25421
115[.]254[.]253[.]25421
134[.]254[.]253[.]25421
206[.]254[.]253[.]25421
222[.]254[.]253[.]25421
182[.]254[.]253[.]25421
190[.]254[.]253[.]25421
184[.]254[.]253[.]25421
83[.]133[.]123[.]2016
130[.]185[.]108[.]1329
68[.]43[.]104[.]319
143[.]106[.]5[.]2428
69[.]73[.]14[.]568
65[.]25[.]8[.]2387
174[.]50[.]46[.]177
50[.]4[.]85[.]697
198[.]91[.]176[.]537
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
j[.]maxmind[.]com25
Files and or directories createdOccurrences
%System32%\config\AppEvent.Evt25
%System32%\config\SysEvent.Evt25
@25
L25
U25
\$Recycle.Bin\S-1-5-1825
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f25
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f25
n25
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\@25
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\n25
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\@25
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\n25
\systemroot\assembly\GAC_32\Desktop.ini25
\systemroot\assembly\GAC_64\Desktop.ini25
%System32%\logfiles\scm\e22a8667-f75b-4ba9-ba46-067ed4429de825
%SystemRoot%\assembly\GAC_32\Desktop.ini25
%SystemRoot%\assembly\GAC_64\Desktop.ini25
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\@25
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\n25
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\@25
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\n25
%SystemRoot%\assembly\GAC\Desktop.ini25
File Hashes
  • 076954251dae552c90215a067aac007bf0ad679029fbb1b82a698d3de09e7300
  • 08d7b4f347a16b79a62d245459cf9ab131c2df9fc1838e02802bfb9a6aca6112
  • 1181cc286159851699c0e9c1390dfca7006c8d6d4c92108c34c082941f848129
  • 1ebcb2ef3bf9c2ed7375b7948e3a0dec8b0ff0be6e059e8922c4b1547bb52e18
  • 51fdc7e0e25ecf5d90ae3c95c1c16187f2dfda8491bdd0ab9ef1378c2150c764
  • 58d8666816aad58ab24ef3ec21216266f96a3173ee8e3113ba7844b70bdd8d0d
  • 7738ac853462f4e1ed29d9d3a55319be75b952feacbb68ce1ecc21e5e3c3351e
  • 813358d1ceafa1065613f42c7f78a432c4a72f267d7a0340090d7651785bc32e
  • 84b1758b4545308192ce7ef2ea44b808fdc208bfe0d119e46e3c9a2e2a492c35
  • 9a93a769b759fd3e562b7dbd6c981e8c70942b5b9216589e57f11362af662fd0
  • a00d8e76a72f9ff877de789727c1e95b356e4fd2191445fcfc039903bd3e88d1
  • b7c20720b36e4c882c933ebb02793d40da26fa31a81b34b2ddc888c9ede3ae97
  • ba957b265fd5c148f3bbb6f8bdbbdd1a4f0559d3dd9bf35d31f1d3a4d4f7a5ef
  • bf4e99cdf812b134bba7a56bca65f17916eb8fff3b9827f71c7de8d00bc37e4e
  • c16a37d1a3f20d45179658151aacecec34708951c0de088d2038f7e5f9543f5e
  • c74110419cab5a72722b929492a9df2a236d71053b5d2198f7da1084fa50b1c8
  • ccdf01be4f8b32eb501ca6a521ae08275cc10391b0d653b4cfc2e0ddbd105df6
  • d6a15841b35a33683e7d47e9237a5011a1d66d08900b9238e2352bcc4d361fe4
  • dc2e56ce69095d93fb0a64f6c337572136dd90325908b1d273a6fda47a155047
  • df6455604ab4475f164609b573cdc60bf0f0cc0df507a2101b764b15113193c6
  • e30a7c87a93dcf2d1620e0e96fe8d4c419df59bc35ec00b5da835281546015ec
  • e52780b7e43765cff93f396b7a6721f5d41e30a169cc2beff2c0e33814a51594
  • ea07d6c283c6230f60ba73481c6304b42435a129814bbe28ad22d413af23db02
  • ea2aef3063a846658ab0e44cc2061117a9253e4d2f450f484660d671b162cce2
  • ebe860b9c6041c0704c54da28f09d82f86fd6af142c3db365fb380c54a706aa6
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Packed.Blackshades-7002008-1


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
15
<HKLM>\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 15
<HKLM>\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 15
<HKCU>\Software\VB and VBA Program Settings\SrvID\ID 15
<HKCU>\SOFTWARE\VB and VBA Program Settings 15
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SrvID 15
<HKCU>\Software\VB and VBA Program Settings\INSTALL\DATE 15
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL 15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Users\Administrator\AppData\Roaming\svchost.exe
15
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\policies\Explorer\run 15
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB} 15
<HKCU>\SOFTWARE\Microsoft\Active Setup\Installed Components\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB} 15
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Manager
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Manager
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Manager
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB}
Value Name: StubPath
15
<HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB}
Value Name: StubPath
15
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID\ID
Value Name: BRQY4LY7WY
15
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL\DATE
Value Name: BRQY4LY7WY
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\b426eed44205d22b31ddc9bba93777d66418725cc7389e33e94eaf82ed5a9eb5.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\93fdc3817676fae502836a274aa2444aac753f0295324c6ee1a6ba9456122323.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\f488d4abe7e53940581174ee39fa0bba3e101dcd1014e17b83eaf46ef524cd3a.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\c35c172e3ec61d1c9295eefc369e6364071b3e242bd0b7e3fe1d53e8598e5267.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\cbdc183665f526d08d30f2b9d58ecb9263d896ef89bf350354436e4ac9e084b1.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\e514982ad751e1c4d206e29300afa21d80ec2d4ab9975ef1e4fe4a0282ad1d7a.exe
1
MutexesOccurrences
\BaseNamedObjects\BRQY4LY7WY14
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
212[.]117[.]50[.]22814
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
8synnanonymous[.]no-ip[.]info15
9synnanonymous[.]no-ip[.]info15
3synnanonymous[.]no-ip[.]info14
synnanonymous[.]no-ip[.]info14
2synnanonymous[.]no-ip[.]info14
4synnanonymous[.]no-ip[.]info14
5synnanonymous[.]no-ip[.]info14
7synnanonymous[.]no-ip[.]info14
6synnanonymous[.]no-ip[.]info14
1synnanonymous[.]no-ip[.]info14
4synnanonymous[.]no-ip[.]info[.]example[.]org1
1synnanonymous[.]no-ip[.]info[.]example[.]org1
5synnanonymous[.]no-ip[.]info[.]example[.]org1
7synnanonymous[.]no-ip[.]info[.]example[.]org1
2synnanonymous[.]no-ip[.]info[.]example[.]org1
synnanonymous[.]no-ip[.]info[.]example[.]org1
6synnanonymous[.]no-ip[.]info[.]example[.]org1
Files and or directories createdOccurrences
%APPDATA%\svchost.exe15
%APPDATA%\sysinfo15
%SystemRoot%\Temp\scs1.tmp11
%SystemRoot%\Temp\scs2.tmp11
%TEMP%\6JUNY.exe1
%TEMP%\IC12M9RR.exe1
%TEMP%\FJR17ZE.exe1
%TEMP%\2A7HNDZJJJ1Q15.exe1
%TEMP%\CVFV5OH.exe1
%TEMP%\IH53AYOW.exe1
%TEMP%\DWWWW46.exe1
%TEMP%\MJXXI5LRM.exe1
%TEMP%\YB5JQ8UA2LW2C.exe1
%TEMP%\GGZD9TW0.exe1
%TEMP%\WUHWJ6WIC603.exe1
%TEMP%\04RP9MOSL3GEBE.exe1
%TEMP%\Q9JX06QPQW7.exe1
%TEMP%\EJ1ENZ6.exe1
%TEMP%\EO4KXVJ.exe1
%TEMP%\SBK2S44SS10.exe1
%TEMP%\21T4BJS31T30T0.exe1
%TEMP%\GBST7SCK.exe1
%TEMP%\840AG7.exe1
%TEMP%\XYNVF6Z8GZ52.exe1
%TEMP%\DRSSEYO.exe1
See JSON for more IOCs
File Hashes
  • 89cec5949ed0d34c5e4acdff49fd25899aa99935fab559007b5e7f74eea11449
  • 8eeb0e3d9cce9b3cd1d3cff8747905d083ae4e8c3139b8b48fbcee00289960b1
  • 923a9f3de724c4b19dfd4915d65cb7e185e2b6e3174a6d60839b456bc87f4aa6
  • 93fdc3817676fae502836a274aa2444aac753f0295324c6ee1a6ba9456122323
  • ae44c2d406dd0d76dfb26776ba7e085a34d57b1565ac81c78fa0f0d3c1de55df
  • af5e730507faf8fa7d8f14fc2daa6d253a1a947e8227cb46fb0549cba5bd1483
  • b426eed44205d22b31ddc9bba93777d66418725cc7389e33e94eaf82ed5a9eb5
  • b8be6562a523ed101548cee88735f16778294ac8f8404d2fdf84c0353cf39987
  • c35c172e3ec61d1c9295eefc369e6364071b3e242bd0b7e3fe1d53e8598e5267
  • c4611e26199efce41b4a3daced46fbdc8e6f6cd19163f401334dc7d0086c900f
  • cbdc183665f526d08d30f2b9d58ecb9263d896ef89bf350354436e4ac9e084b1
  • e3306af770fd17f779fa3579656ffc1279e4c6a4ffb4fb317d5257070f25c39b
  • e514982ad751e1c4d206e29300afa21d80ec2d4ab9975ef1e4fe4a0282ad1d7a
  • f488d4abe7e53940581174ee39fa0bba3e101dcd1014e17b83eaf46ef524cd3a
  • ffe5d67e939edc9ff1543f61e395451af223654dd14eb33b9d6a3b106ebfa5d0

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Gamarue-7001972-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\software\Wow6432Node\microsoft\windows\currentversion\Policies\Explorer\Run 25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: 36412
25
MutexesOccurrences
256210079625
\BaseNamedObjects\100929968424
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
64[.]95[.]103[.]18425
71[.]209[.]210[.]6425
71[.]209[.]248[.]20125
52[.]249[.]24[.]1037
104[.]45[.]185[.]1756
40[.]91[.]94[.]2035
52[.]230[.]217[.]1954
20[.]186[.]50[.]834
40[.]81[.]11[.]1944
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
amnsreiuojy[.]ru25
morphed[.]ru25
www[.]update[.]microsoft[.]com[.]nsatc[.]net24
Files and or directories createdOccurrences
%ProgramData%\Local Settings25
%ProgramData%\Local Settings\Temp25
%TEMP%\ccudefqw.com2
%TEMP%\ccpaittr.scr1
%TEMP%\ccvcbrqp.scr1
%ProgramData%\Local Settings\Temp\ccaohaqb.scr1
%ProgramData%\Local Settings\Temp\ccioodfy.pif1
%ProgramData%\Local Settings\Temp\cccyokze.exe1
%ProgramData%\Local Settings\Temp\ccfahy.exe1
%ProgramData%\Local Settings\Temp\ccceirah.exe1
%ProgramData%\Local Settings\Temp\cckyaew.com1
%ProgramData%\Local Settings\Temp\ccauqse.scr1
%ProgramData%\Local Settings\Temp\cclrzzfm.pif1
%ProgramData%\Local Settings\Temp\ccokzu.com1
%ProgramData%\Local Settings\Temp\ccablfq.scr1
%ProgramData%\Local Settings\Temp\ccidop.cmd1
%ProgramData%\Local Settings\Temp\cceazb.exe1
%ProgramData%\Local Settings\Temp\ccraqi.exe1
%ProgramData%\Local Settings\Temp\ccipousa.scr1
%ProgramData%\Local Settings\Temp\ccacqvoes.pif1
%ProgramData%\Local Settings\Temp\cciacuqeh.exe1
%ProgramData%\Local Settings\Temp\ccyaykc.com1
%ProgramData%\Local Settings\Temp\ccfayx.exe1
%ProgramData%\Local Settings\Temp\cclygipzk.pif1
%ProgramData%\Local Settings\Temp\ccuqhey.com1
See JSON for more IOCs
File Hashes
  • 88b83d7940351d57a7415257a5c764c250796735b84dac723227090cd1583604
  • 90de0eb62d02f63a793ee83399dca3a0a26ef5778561127cdc3b7a12fdd14c20
  • 9a557649beffab5fa440fe296b033302019f588fd2a2a55f96424247ab503d5a
  • 9dbfc5901b71f9329d1df2304c04a5dc23f841fbc23ab93f1b5162bbfbd17d19
  • a5b91c4a675620e083a2469ec7e6835f4f0aeb5f8080fc86e06acf51c46af45f
  • a6e33529f62b1a06b6ebb82d262b7c271db69436cd0147bbe78b668046f14c0b
  • ae51fd15c7b341e451607a0c451b8dc202b20a4f07f9698ae03db3fc10a9b7b8
  • aeb375b2ec7bedb7cd130419135de45182b2472c854315142b237b7f458b5a3a
  • b6e98593c8e5bcafaffc7d08f59f5dce7e31248f44901a5b96977e0a93a5cf9e
  • bf272f51af40e07225731aa1ef5b558a92eca5a170b27d6830d096a10dbe5387
  • c06e2844838c870cab80f096ec83674a94a3630232eae7fd7094b83c944aad1c
  • c4968a5878f0ca3c5486b46b02ee12bb162070771acd199c1c0ae153a8b5f893
  • c50836bcdb9bd118afa149c9fa69f522cb5cd73cfafca6e39dee9c0da9fc041b
  • c543cbb30540aa3fb12bc61d2c389e0243e0cb71209e5737200403888c6c4170
  • c5dc3ca6227c7cba83899d74f040de24a681a5e4ae14563a22e3575ca26782dd
  • cd31b2573b597e43cfb6a5d83083457d01d260326d5ff50649cf7fb7facebc98
  • d26052594814c437cdef01ba6ae431f6dddb03d0e091498b4a724f555b883796
  • db657ca04f33f4a4923663d90e0b53bfab9616fea6c1b023170ac4eb2437f145
  • e4030fe726df1c3b36b5819d8189eba5ceca082d6768349d97d0f9a89ec63d3c
  • e6ba8ddeb72c376ac8bdb707fa1cf1d7afa3783f040e7ff186d3ddf2e73214ab
  • e70ed5d11dc4820b873be149df9ba68a884b03631e4b5c931698d4eb11e51213
  • ecbce2866468b9d94c979a8b947d943682846c439f76b65880f6606bd6f8141e
  • edf58c5f3dc245b7f12ecfb376f30e2be4dffaa8e4e7cfe519d521d12d70d80b
  • efc850ea39ff6f82b21d1a1036c065bd65ee251e6ef66134be6cf6aab3b27aa6
  • f054a006bb89514411ae9e9611c9acf8979e9d3ab2365d059e61eb59f6c04440
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid




Umbrella



Win.Trojan.Lokibot-7001391-1


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\VB and VBA Program Settings 13
<HKCU>\Software\VB and VBA Program Settings\yl6S81871663781\Cm4RF771904693 13
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\yl6S81871663781 13
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\YL6S81871663781\CM4RF771904693
Value Name: dvQ6A283412628
13
None 3
None 3
<HKLM>\http://tmjchange.com/Aw_/Panel/five/fre.php 2
MutexesOccurrences
3749282D282E1E80C56CAE5A13
\BaseNamedObjects\3BA87BBD1CC40F3583D4668013
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
212[.]1[.]211[.]484
193[.]29[.]187[.]293
85[.]187[.]128[.]82
78[.]135[.]65[.]201
161[.]117[.]85[.]2071
47[.]52[.]60[.]1501
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
stcatherinescollegeug[.]com4
theoutlookglow[.]co[.]ke3
matbin[.]com2
api[.]w[.]org1
tmjchange[.]com1
bteenerji[.]com1
Files and or directories createdOccurrences
%APPDATA%\D282E1\1E80C5.lck13
%ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol13
%LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol13
%APPDATA%\D282E113
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c513
%SystemRoot%\win.ini13
%APPDATA%\D1CC40\0F3583.lck13
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-1258710499-2222286471-4214075941-500\a18ca4003deb042bbee7a40f15e1970b_8f793a96-da80-4751-83f9-b23d8b735fb113
%APPDATA%\D1CC40\0F3583.hdb11
%APPDATA%\D1CC40\0F3583.exe (copy)4
%APPDATA%\Microsoft1
%System32%\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx1
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-5001
File Hashes
  • 0accf0fcb86d4fb3367ac3f7c70665a67ce8c83f564db604759cb3836b7f4ac8
  • 18723bb19eebe8e4e6e01c1a652b85e7359aaadcbd0ec0c57d073426b26b036d
  • 1fd0f0bb055544d562e8f44675ff0e8205149af12ce68d4ab74e2800e84618d5
  • 3f589cd475b1211115dd0acea7483819d6e6d78f3d9a9e9b389374c9afdbaad0
  • 42af756837b1c4213219b7deda4c4432dff3b35e09483f63a3acc9211e08cae6
  • 51d37cda477215a5da7872f8a178d82279f652023be289c70cd2ae983e6a2460
  • 9c71815e65a5717ab07352f76960cebd49a16c376c0853d6ac7685fbfca8e38e
  • 9c9b0cfbd7a7b04f11611f60c7f2defdbe5db81e30a7cc01cfd123f0a6b97174
  • b3c350aaeae1b1b066fd23002a3732130b3cfdf57d39a11f04112382a0594d7f
  • d0fe5eee1cfe7b595c9d69362de5d4b823ef35933f5bfbe38b19d3488a040220
  • d110960c25e29d8b687ef5000aa3761721af5510d1d7c8a72355485d82c5ce89
  • d8c181a8be250796f8ad9583393b326c3d76f6e86a81c89225660cc7bed38e61
  • ef69508adf938a083db4f91b3c40c67338623dc192983f03385a4510d3826e58

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Malware.Ponystealer-7001707-0


Indicators of Compromise


Registry KeysOccurrences
N/A-
MutexesOccurrences
MUTEX_s2azEwonPXfon4JrAD25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]195[.]146[.]13025
213[.]183[.]40[.]3125
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ip-api[.]com25
Files and or directories createdOccurrences
%System32%\Tasks\svchost25
%APPDATA%\Logs25
%APPDATA%\SubDir25
%APPDATA%\Appelinstansen0.scr25
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Appelinstansen0.vbe25
%APPDATA%\SubDir\svchost.exe25
%APPDATA%\Logs\06-26-201925
%HOMEPATH%\Start Menu\Programs\Startup\Appelinstansen0.vbe24
File Hashes
  • 176d0695e5f9bba1761b1288d40c70381a607474edefa4b96bfdae58097775a5
  • 1f44ab287b2068f0cd7f179ae8a9fc749f54a4b75c02c1a19289820a4c5abfde
  • 20e65a6e2ef74c18fd2ec2c0df19c972cfe5271b53fbaca72f2b276e07f4c9b3
  • 30ff31bdea7abfada4022dfc4a7ff283d8d280d1778229d994924df95edf6db2
  • 3140b0c479fd50ccabe59d2a687bcd30c8d8c358e8097a3ae74b97510cc33c86
  • 321bc48ccceaa8fd3492c9713d457db00670f336e26857055e0e2c1009069032
  • 329d9e96a9dd0b45592e948cc691eee9a5b0d55f6129f25507e1f5fb40a3e02c
  • 36018abd322d8b0cf3a2e9264046a544b6ef58fe48ebd22f7df0db20b9a40ab6
  • 45e8bc09f684e9d83abab87b8f8cc6d1a498968d0aca65f0ef668f8541f8a826
  • 47d1a8a70c173cba1dcc36e26bf38b206b738eb93493a0c9d9a3d09b235e9740
  • 4dda62fdee6cdb3b592956fba1326f1b418c9d81ba2577a3ec00011fa17487e4
  • 4df99361addca5c1c414fbddf48181ff65db954bd940fd0f6a1c87fa9961edf5
  • 5143e2500885ee10fa43369052dcc02576210e566e7d26102307f554b348d231
  • 53a0d0a143bf9c4e6fa96873643d1c3d148a02180664bfe575ffaabccb9ac45c
  • 61b2848c773403ccee8ebaf8b3e72ded01728ea958f1461c72442dd84fcf29a7
  • 65bb863b0e339f8f5d97e40f0ff2883bbb3d5fc9fe8b31c1d712384da7eb7aec
  • 6730bba3452b7b977186d80c34abd839dcaf731ff0b9befdb8323254c22c4fc2
  • 707d60c52242ddb3676a351faf3f96af40b547e548b32ef4c8f6751ab3cb5ffb
  • 7117534af19394d2d394c0d39005c2a06b97326b0e51f75ec53fab2f9b76c963
  • 71708c36ae65505b44dd9bdf9e7a01a3899eb5a68015c584474bc1888d2badfe
  • 7d51854e8e23a3458d9babe9f30395161256e614c0083e9adc9da561432f837f
  • 859c8e53eeba8e4ea3721673e7beefdfff3139fcc248b118a8a6c06c17594d03
  • 937ec4452c22ae6e45ea0b2d6d75442984dc2fcf2f087ba9c7d082639ee39951
  • 9ca2236b18368afca7c75b8eebda5b64eb0d98f30351ad9eb49210a63dbb12d7
  • 9df66dd5010ff85999d78be0345b529dc1ca197fb327b42e1d6d9593f708177b
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Malware.Upatre-6997681-0


Indicators of Compromise


Registry KeysOccurrences
N/A-
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]239[.]157[.]2109
23[.]253[.]126[.]587
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
rockthecasbah[.]eu16
electriciansdublinireland[.]com3
dcmsservices[.]com3
Files and or directories createdOccurrences
%TEMP%\budha.exe19
%SystemRoot%\SysWOW64\secur32.dll14
%SystemRoot%\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll13
%SystemRoot%\SysWOW64\webio.dll10
%SystemRoot%\SysWOW64\winhttp.dll10
%SystemRoot%\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll2
%SystemRoot%\SysWOW64\dnsapi.dll1
File Hashes
  • 05e4fbd158d8b712eb2293bd7a8586ff451d50a4336de23277837e94ba56e8e1
  • 1dd50c279fa213938cc50b7e8d52b74598c86edcc33fdcbf7555eb529f35d7cb
  • 3198e6958489e008a41f72821b311d9e6611f33ce387f1114d6ad82bf85e25bd
  • 3d9fa6ff93769c89a6bd7cf0ab136eefe350231f433a16289f21edd1bb6adcb0
  • 5d38cb5ad7bbee701da5987a516d446ec6664e91c6f24ca01a94b19a6ecc60dd
  • 65378641d80eeec0caf4a616d2526ecdf8013c521d3f80fabceb0bbd11588da8
  • 668c8706dd4a85a2a92a04e47034faf3627a68985c2017ad76c3261c38f98cab
  • 6b78d89491561dc032767651a7fd7e4fc365ddbb3f30a61247160c5ccac56982
  • 6d61d43ea9fbb883c0eb2b18a4fdba086dc74946af12947f9cfdbddb0cbbaef6
  • 6ee66ed2e08789b99387238c1a96306e8ee9d18c16e4a3e64258ed5e03da6634
  • 810e29feb32471fb3b003f719ecf4332ac155ad4ad915a7cf78499cdc05cb85b
  • 8a18b650ec0d0dfb38d93b0504ac777a794de50b83d702b381906dd2b91c2055
  • 8e8214b61c2f9b5146541703c7c7fb176701f70bf7797d5be3202892268f8174
  • 95c3d556aa3cc4ce02a64457e948434b66727b85379b7f575e45a936420833a4
  • a0762390da8246251848bb0bddae2cfdea3b1511cba5b428b74073809c67c42d
  • a893d80022e464d48589d7a76f94108e42ac583c235ea3abd18cc6202fb15357
  • cb9857baaba1d49fdff5a644acc7bd0781d69fb3d74b3d62a17e3e9e3cdbf1da
  • e144eaf549ee6641f2689917057b6d8acf44179c0b7606961a157dd136edb715
  • e333d13bb84a89a53c7f69ebb4c435558291ead7df9acdd17ff12f5017771ec3

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Virus.Ramnit-6997840-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
Value Name: Generation
5
<HKLM>\SYSTEM\CONTROLSET001\ENUM\PCIIDE\IDECHANNEL\4&A27250A&0&2
Value Name: CustomPropertyHwIdKey
5
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{509d0dca-5840-11e6-a51e-806e6f6e6963} 5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\shell\Autoplay\DropTarget 5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\shell 5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\SHELL\Autoplay 5
MutexesOccurrences
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}24
{79345B6A-421F-2958-EA08-07396ADB9E27}24
\BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}20
\BaseNamedObjects\{137A1A2C-4964-635A-544B-7A4CB2C11D0D}20
\BaseNamedObjects\{137A2419-4964-635A-544B-7A4CB2C11D0D}20
\BaseNamedObjects\{137A1A2D-4964-635A-544B-7A4CB2C11D0D}20
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB3B51D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9291D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB61D1D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4BD1D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB5111D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB58D1D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB91D1D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7391D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7211D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9411D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB3751D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBA451D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4711D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9A51D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBFD91D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBA691D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4911D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9F51D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9351D0D}1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]100[.]26[.]25122
172[.]217[.]12[.]17422
87[.]106[.]190[.]15322
46[.]165[.]220[.]14522
89[.]185[.]44[.]10021
172[.]217[.]164[.]14217
35[.]224[.]232[.]2394
172[.]217[.]7[.]2381
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
wstujheiancyv[.]com22
kbivgyaakcntdet[.]com22
yrkbpnnlxrxrbpett[.]com22
qislvfqqp[.]com22
bungetragecomedy9238[.]com22
oeuwldhkrnvxg[.]com22
kbodfwsbgfmoneuoj[.]com22
wdgqvaya[.]com22
ypwosgnjytynbqin[.]com22
jlaabpmergjoflssyg[.]com22
ausprcogpngdpkaf[.]com22
fmsqakcxgr[.]com22
OAWVUYCOY[.]COM21
GFARONVW[.]COM21
dvwtcefqgfnixlrdb[.]com21
citnngljfbhbqtlqlrn[.]com21
Files and or directories createdOccurrences
\Boot\BCD24
\Boot\BCD.LOG24
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat24
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat.LOG124
%HOMEPATH%\NTUSER.DAT24
%HOMEPATH%\ntuser.dat.LOG124
%LOCALAPPDATA%\bolpidti24
%LOCALAPPDATA%\bolpidti\judcsgdy.exe24
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe24
%SystemRoot%\bootstat.dat24
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\e6944fe95a45c918aa3f2953cd29d8f6_d19ab989-a35f-4710-83df-7b2db7efe7c524
%TEMP%\yowhywvr.exe21
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-1258710499-2222286471-4214075941-500\e6944fe95a45c918aa3f2953cd29d8f6_8f793a96-da80-4751-83f9-b23d8b735fb121
%TEMP%\guewwukj.exe20
%HOMEPATH%\Local Settings\Application Data\hmqphkgx\pseqpmjy.exe20
%HOMEPATH%\Local Settings\Application Data\jpnfmrvn.log20
%HOMEPATH%\Start Menu\Programs\Startup\pseqpmjy.exe20
%ProgramData%\wtvakgao.log20
\nBm4h9I4
nBm4h9I4
\TEMP\nBm4h9I4
oTKCR233
\TEMP\oTKCR233
\oTKCR233
\Device\HarddiskVolume32
See JSON for more IOCs
File Hashes
  • 020eb6da1196582c52e823a5bb222b4bfeff859c1007404e146694be17b79c0a
  • 15d31a8b30de2cc620bfaee8377fb8c2542e1fc8b3ad3ab8a19ee6d12dd0d7e8
  • 227a7a24686b80036eb0bbb6d42dc8f22c629889284dbc086c43a375b8aa4bcc
  • 2904815a1c7eccacf480673b7deb8e4f5fd0a6bd4dcc69fc2ef42e9059595b73
  • 2e324aa5b5c88f484ec89457a3d586ee17291249a053342252327876322f7ea5
  • 38dbc28e1a410c4d5b7740c2c5ad12abc72c5c4eb26961365313edee3808dc2d
  • 3e939542ad68cf7d18c4638b4ebc8f721f5d1357f8fa6068f03a5dd2f1c15a39
  • 4052f05c6345ef6306d1122f478d241ce395b6abec43af1230ad110a1fde5333
  • 4ce65aba2b6f06cb625374eb55eab94391f44f98acae5e62d38676312fb9fd23
  • 5e9441f982564e65ec1b0ddde1a164ba5d72ed18d93c28bc91d909f31134fc6c
  • 6503c9a444c480014378fc6dcc0d2bade62d0ee0a6dc9af2f8fa4e4261e5f7c1
  • 6d39754a92431ff4462ef5f4355b8f06aa371be911159507b774ee3dbfdf4bc2
  • 8b80167746d58c26a133e5f30ab82d4c295b6c2332d72b25dafedf61243e6a5b
  • 90d91197518a0e66012b8dfa52583f49968736187018ae7c821d0014184be0b5
  • 9a60fb85f32d6c9adfeaa27e2cd07752109aeaab22f9745f74de26f0eeda3cf2
  • 9e65eb141fd680acb220134c3ba615c83cc4a8d4368f0d5e659b17d5fdf3c102
  • a847ef0c0091cc8c75336551dc64bd02e21f2bcc843df68bcaeb1cfd7051e0f0
  • d58f75aa97d0bb3e3d8933f6b568bd28775f7a315d1d9f4e86fa233b3abbf32a
  • dab8c5868ad964e90df10ea1470f660076ec93532a0d5bb2e31310669c799e05
  • e7c461cba22f92a1082995142d9371d062a1788f587075c6ec3358a03f32dba9
  • e8e5366efa6d00f9a21620a3f74d65ee9eb68bced11461886c789392627ef1cf
  • f0827924286a0aaf731f2c0b8734798c42601250c12364878661d9cc8ccdc47e
  • fad70a7a283976a5409bf17038c091947bfdaa45e17e83302a1fc843c5f75f27
  • fb94f2d201e2eeaae73c43f6299225eb31d888018d2931d7385023385f455dab

Coverage


Screenshots of Detection

AMP



ThreatGrid



Umbrella



Win.Dropper.Kovter-6998646-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
10
<HKCU>\SOFTWARE\07771b47 10
<HKLM>\SOFTWARE\WOW6432NODE\07771b47 10
<HKLM>\SOFTWARE\WOW6432NODE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 10
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: explorer.exe
10
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: iexplore.exe
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: explorer.exe
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: iexplore.exe
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: 956299e5
10
<HKCU>\SOFTWARE\07771B47
Value Name: 956299e5
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: 18f8f764
10
<HKCU>\SOFTWARE\07771B47
Value Name: 18f8f764
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: 8de2c2e8
10
<HKCU>\SOFTWARE\07771B47
Value Name: 8de2c2e8
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
10
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: dllhost.exe
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
Value Name: dllhost.exe
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: 412841e8
10
<HKCU>\SOFTWARE\07771B47
Value Name: 412841e8
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
10
<HKCU>\SOFTWARE\07771B47
Value Name: e1616c62
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: e1616c62
10
<HKCU>\SOFTWARE\07771B47
Value Name: 921a72e2
10
<HKLM>\SOFTWARE\WOW6432NODE\07771B47
Value Name: 921a72e2
10
MutexesOccurrences
C77D0F2510
Global\07771b4710
244F241810
906A266910
\BaseNamedObjects\A146B82F9
\BaseNamedObjects\20D5C1BD9
\BaseNamedObjects\Global\7df04eda9
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
96[.]17[.]191[.]12110
23[.]218[.]40[.]1619
23[.]196[.]65[.]1939
104[.]215[.]148[.]634
40[.]113[.]200[.]2012
40[.]76[.]4[.]151
110[.]19[.]64[.]91
46[.]17[.]33[.]571
192[.]79[.]201[.]181
110[.]165[.]194[.]2021
75[.]129[.]131[.]2451
14[.]252[.]183[.]41
43[.]234[.]203[.]2461
51[.]202[.]78[.]2271
64[.]43[.]110[.]1601
102[.]186[.]146[.]1071
220[.]120[.]41[.]191
105[.]10[.]131[.]341
40[.]39[.]16[.]1041
33[.]239[.]167[.]1361
79[.]87[.]240[.]451
101[.]144[.]113[.]421
176[.]37[.]192[.]1061
64[.]128[.]116[.]361
171[.]137[.]160[.]1841
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
fpdownload[.]macromedia[.]com10
e13678[.]dspb[.]akamaiedge[.]net9
clipsource[.]com1
Files and or directories createdOccurrences
%TEMP%\install_flash_player_18_active_x.exe10
File Hashes
  • 0405d046f18b12fa283aae775dfc86b7f37b3c9187c478b408b1d1df56e4946e
  • 0f7d26164358095c5e09500102a4fffd4bcabd86f8a8da20ce6d4b1257c6cfe7
  • 3579e91f3bbe9c7f0930e1ae804ed334d7cc7e5edea3477cc1d725cfc9721e6a
  • 4ae693d59ba77b5de104649fa4b0fbfcd4863910253219358e0b60534373d736
  • 62190bdab2b81d6af487289107c0ae880b6f4ac005c81feeefad042fd5cdd864
  • 63ab82c5bb8e3105847973879c43fc754c886bf713a3d2377efd2832ee103e99
  • 7fc0a306813ca939ecb32640b534a3686cad7146930edd8f0b947b490e976419
  • 99f3b3710f26b15d3b9e1363bd12de968651c4a6266838a0d51212dcfd80898a
  • b2859d76620c0dabaed848832f08be73e78cd4deddf9bf34c80ddd243c887f87
  • f3f4621e74ef38c9c05f34fb33fe092db859f16efbff734022617ad72ed2ddf0

Coverage


Screenshots of Detection

AMP



ThreatGrid



Win.Dropper.Gh0stRAT-7003005-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SYSTEM\CurrentControlSet\Services\BITS 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
Value Name: InitTime
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
Value Name: Group
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
Value Name: Version
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\Stuvwx Abcdefgh Jkl 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: ErrorControl
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: ObjectName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DirectX jrq 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ErrorControl
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: WOW64
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ObjectName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Description
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: Description
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SVCSHOST
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ImagePath
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
Value Name: ImagePath
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NQUFHIVF
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NQUFHIVF
Value Name: ObjectName
1
MutexesOccurrences
C:\Windows\SysWOW64\hevtam.exe3
wenxiaoyan.3322.org2
xiaocheng780.3322.org2
sjj184901537.wicp.net2
a009188.f3322.org2
C:\progra~1\Common Files\svchost.exe2
tcjzzf.f3322.org2
xinshoutouliezhe.vicp.net1
\BaseNamedObjects\944413269.3322.org1
104.194.20.121
wytcn.com1
liwtao.f3322.org1
182.92.223.281
C:\Windows\SysWOW64\akqukc.exe1
C:\Windows\SysWOW64\lijlio.exe1
103.40.100.1911
C:\Windows\SysWOW64\wgccga.exe1
C:\Windows\SysWOW64\eoemoe.exe1
C:\Windows\SysWOW64\scokyy.exe1
mama520.f3322.org1
108.171.243.191
23.94.244.171
23.94.244.181
C:\progra~1\Common Files\SVCH0ST.EXE1
125.46.39.661
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
61[.]142[.]176[.]233
123[.]249[.]34[.]1722
125[.]109[.]109[.]302
27[.]54[.]252[.]2522
174[.]139[.]226[.]1781
42[.]236[.]77[.]1851
104[.]194[.]20[.]121
182[.]92[.]223[.]281
103[.]40[.]100[.]1911
198[.]13[.]108[.]2451
108[.]171[.]243[.]191
23[.]94[.]244[.]171
23[.]94[.]244[.]181
125[.]46[.]39[.]661
154[.]95[.]54[.]461
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
sjj184901537[.]wicp[.]net2
wenxiaoyan[.]3322[.]org2
xiaocheng780[.]3322[.]org2
tcjzzf[.]f3322[.]org2
a009188[.]f3322[.]org2
xinshoutouliezhe[.]vicp[.]net1
944413269[.]3322[.]org1
wytcn[.]com1
liwtao[.]f3322[.]org1
lbaabb123[.]f3322[.]org1
sjj184901537[.]xicp[.]net1
mama520[.]f3322[.]org1
westexpired[.]dopa[.]com1
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\hevtam.exe3
%System32%\tgvbgq.exe2
%CommonProgramFiles%\svchost.exe2
%System32%\ggiogq.exe1
%System32%\jwzvwy.exe1
%System32%\hufzuk.exe1
%System32%\kkwgks.exe1
%SystemRoot%\SysWOW64\totbau.exe1
%System32%\ycuuyi.exe1
%SystemRoot%\SysWOW64\akqukc.exe1
%SystemRoot%\SysWOW64\lijlio.exe1
%SystemRoot%\SysWOW64\wgccga.exe1
%SystemRoot%\SysWOW64\eoemoe.exe1
%SystemRoot%\SysWOW64\scokyy.exe1
%CommonProgramFiles%\SVCH0ST.EXE1
%SystemRoot%\SysWOW64\wgccca.exe1
%System32%\dqrhqi.exe1
File Hashes
  • 0403e7f8d9892722756918c24801cad3d661815f5c306c8c5391f1ab8a630ec4
  • 04d45c30a242afecf9a8d9e6cbf583029f794f13b22c22108cc0f5a6d79aff1f
  • 0a18fd63c2489ee27c7f4802ef60011cf270fd035ca3153ff0587fb201683c07
  • 0b88e2e952e057d1e67eb9aced20ed79cdb4ec00b4de5c306394d5996f6c1cb3
  • 0d9854cb571a8ef781ef4ebfd82bd461b47273fb637e80b8863388eaa7325c37
  • 19268cf4f3d3e6f37cea8d3eb6c67bd4f9abbe0dee6cba4c5ee623904e781574
  • 3464e90e1b93df7d1bf837fa799be811665b1d12d5320a2419d5cdb354cfe6c8
  • 429cca47e464202273ccf9a33f2e08aa366fe1bb59cee9ebbb1735b401b72be3
  • 4675518e7355804e0134dbb26889ae2fa0e3857110645076082087fd0c9d7517
  • 4f64ef87e5b5094f0f3b501f46f8029f0ddb47054a2d1810b50b149d6f179ae6
  • 4fcfea79eaf6fcb55cf0fdf5feab7217f949af742f52a6e12ed8e6590b19494b
  • 51b8854b75c9c928ef77a2d76ecdab13ff6aab4399960005acd4a9dd8ed4df18
  • 526e31726b1a3109312721f5d210db6e384a799951fbb9b2170a34672cd15f18
  • 553d09ad92a5abcb4987335fba0ca0fda30ceef2c33e8f72747dcc1de969ae32
  • 5ba1e4767e5e9f9d0c10d64d5399e13f83e727b96d68c68413a40773f11d1690
  • 5c2d5a7e9fe0721c8c00bc61b8b32db9bdfdd874cf2cdc3542c719b289535f87
  • 5c9a6cded235870fc95ca7e3a2aea98d642da688a7fdef40391bcd52435723ca
  • 5fb34b0666b3e21e5835c2f7d05ccab2b076e462c6982175eb638d9c08b9f138
  • 64f8a4a03ed33a6ce0b19e52411ecb58a834840db6f1fbaa46ee815a667cd362
  • 681e1d899c9342f6cf5a2600b1af723f1ea0216467050f023ed7f33da078ec72
  • 6cf9e25edd01d958328923af88edfc9224d26e1ce72a677f6f0f4c64cff11600
  • 70bb286abdffddf3137e5f8c2f3fde94fbb3c58dacc9bd7ac5c2e816829429a6
  • 712e9f3f962722317243c52aec1edeaecc59d53180873b67b108eeacc27ba84c
  • 7433255788cf4f6761369a89313ed5786b32049c7bd48c50fb8f62328744f5aa
  • 77e44b92cd3403248e82b31b16efa7b4114e872c5c1206600c2222d8020cc2b7
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP



ThreatGrid



Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Atom Bombing code injection technique detected (10876)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Madshi injection detected (1932)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • Trickbot malware detected (1694)
    Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
  • Process hollowing detected (941)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Kovter injection detected (727)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • Dealply adware detected (605)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Gamarue malware detected (231)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • PowerShell file-less infection detected (61)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Fusion adware detected (45)
    Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Excessively long PowerShell command detected (43)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

Vulnerability Spotlight: Google V8 Array.prototype memory corruption vulnerability

$
0
0

The V8 JavaScript engine in Google Chrome contains a memory corruption vulnerability that could allow an attacker to gain the ability to execute arbitrary code on the victim’s machine. V8 is the core JavaScript engine that runs in the Chrome browser. As part of Chrome and node.is, it is the most popular JavaScript engine currently available.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers. Google initially fixed this vulnerability in March and merged it in April. However, the company just publicly disclosed it on June 26, per its vulnerability disclosure policies.

Vulnerability details

Google V8 Array.prototype memory corruption vulnerability (TALOS-2019-0791/CVE-2019-5831)

A specific JavaScript code can trigger a memory corruption vulnerability in V8 7.3.492.17 which could potentially be abused for remote code execution. In order to trigger this vulnerability in the context of a browser, such as Google Chrome, the victim would need to visit a malicious web page.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Google V8, version 7.3.492.17 is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49442, 49443


RATs and stealers rush through “Heaven’s Gate” with new loader

$
0
0

Executive summary

Malware is constantly finding new ways to avoid detection. This doesn't mean that some will never be detected, but it does allow adversaries to increase the period of time between initial release and detection. Flying under the radar for just a few days is enough to infect sufficient machines to earn a decent amount of revenue for an attack. Cisco Talos recently discovered a new campaign delivering the HawkEye Reborn keylogger and other malware that proves attackers are constantly creating new ways to avoid antivirus detection. In this campaign, the attackers built a complex loader to ensure antivirus systems to not detect the payload malware. Among these features is the infamous "Heaven's Gate" technique — a trick that allows 32-bit malware running on 64-bit systems to hide API calls by switching to a 64-bit environment. In this blog, we will show how to analyze this loader quickly, and provide an overview of how these attackers deliver the well-known HawkEye Reborn malware. During our analysis, we also discovered several notable malware families, including Remcos and various cryptocurrency mining trojans, leveraging the same loader in an attempt to evade detection and impede analysis.

Technical overview

First, let's go through a high-level overview of the loader that's used to hide and execute HawkEye Reborn. The "technical details" section will describe these stages in detail. Even if the final malware is packed and coming with its own obfuscation, it is never written to the disk. It's always hidden inside the loader, so it's difficult for antivirus systems to detect it.
  1. Find and resolve some basic API calls by CRC32.
  2. Decode encoded code from the .data section.
  3. Jump to this code.
  4. Perform some anti-debug/anti-analysis checks.
  5. Load two resources (in this case, UDXCUSCK and SCCJZ) from the loader's PE file.
  6. Decode the configuration stored in the UDXCUSCK resource.
  7. Copy loader to %APPDATA% folder and make it persistent via StartUp link.
  8. Decode the malware payload (in this case HawkEye) stored in SCCJZ resource.
  9. Start the legitimate RegAsm.exe process.
  10. Inject and execute malware payload (HawkEye) into this process via process-hollowing.
  11. Protect injected malware code.
  12. Exit loader process.
The majority of API calls are executed by a function we called "Exec_Function":
  • This function takes a custom hash value for the wanted API call as one of its arguments.
  • It finds the kernel.dll address via its CRC32 checksum.
  • Then, it resolves the addresses of basic API calls by name by iterating over the InMemoryOrderModuleList in the PEB_LDR_DATA structure.
  • Next, it resolves the address of the wanted API call by using a custom hash
    function.
  • Finally, it uses CallWindowProcW to execute the resolved API call.
Besides the aforementioned obfuscation techniques, some API calls are additionally obfuscated by using direct syscalls via the sysenter instruction on 32-bit systems and the Heaven's Gate technique on x64 systems. The latter means the code switches between 32- and 64-bit systems. Some antivirus applications and debuggers are missing these calls as far as they are not expecting a 32-bit application running under the Microsoft WOW64 technology on a 64-bit system to use 64-bit calls directly.

Technical details

The sample starts with some interesting calls to sub_401000.

_main - Function


This function is iterating through the function list names in the export table of the PE header in memory. Then, it generates the CRC32 checksum for the function name string and compares it with the given argument arg_4 (see 1881CADEh above). Finally, it returns the address for the exported API function. We renamed this function "Find_API_Function_by_CRC32."

Sub_401000 (Find_API_Function_by_CRC32) function.

The returned API function address is then stored in a register or local variable, which is called when the sample needs the API function. The sample is using this and similar API call obfuscations for most of its API calls. This makes it more difficult to understand what the sample is actually doing during static analysis. The bad news is, this is the simplest one of the obfuscation techniques the sample is using.

After some initialization and decoding of the data at 415DB0 (upper right part of the picture below), the next notable call is 'call eax,' which calls the formerly decoded code at 415DB0 (see below).

Beginning of the second stage.

The function arguments aUdtizdmfiv and aSccjz are pointing to the names of two resource sections in the PE header of the sample file and DTIZDMFIV is their resource type. This makes it even more interesting. So let's look into this function. Unfortunately, we can't in our static analysis, because the data is encoded and then decoded at runtime.

Encoded next stage of the dropper.

We wrote an IDA Python script which decodes this data for us.

addr = 0x415db0
end = 0x5A05

magicval = [ 0x34, 0x39, 0x38, 0x37 ]

for j in range(0, end):
    a = idc.GetManyBytes(addr+j, 1)
    b = int(a.encode("hex"),16)
    b ^= magicval[j % 4]
    patch_byte(addr+j, b)

The script decodes the bytes and allows us to convert it into code.

Jump to main malware function.

The code at 415DB0 is actually a jump to the start of the main malware function at 415DF5.

String obfuscation.

The sample stores all characters of its strings, such as "kernel32.dll" in local variables (see above). It does this in many other locations, too. The next call at 416C74 is also worth breaking down.

Call to sub_41B285 (Exec_Function).

Following the call into the function, we see another call at the beginning (41B28B).

Call to sub_41AF15 (FindKernel32DLL).

After analysing it, we see it resolves the address of the loaded kernel32.dll. It uses a typical shellcode technique by parsing the PEB and some underlying structures. By finding the InMemoryOrderModuleList in PEB_LDR_DATA, it can iterate through all loaded module names and find kernel32.dll by comparing the generated checksum (6A4ABC5B).

FindKernel32DLL function.


Now, let's go back to the upper function, the one which has called "FindKernel32DLL_addr." After storing the kernel32.dll address and initializing more local variables with some strings (not shown in the picture), the code resolves a bunch of API function addresses (ex. LoadLibrary, CallWindowsProcedure, etc.) by using the function Find_API_function_addr_by_name (see below).

Exec_Function find API call address.

Then, it uses the given third argument (arg_8 - 7554284Ch, the custom hash of the API function) to find the corresponding API function address. The used custom hashing function is based on the following pseudocode algorithm:

i = 112186;
while ( *a1 )
    i = (char)*a1++ + 33 * i;
return i;

Finally, it uses CallWindowProcW to execute the resolved API function (see below). The latter is also an old shellcode trick used by many exploits to execute position independent code stored in some buffer. It misuses the CallWindowProcW function and leverages the fact that CallWindowProcW is simply executing the function pointer in the first argument, assuming it is either the address of a window or dialog box procedure. From an obfuscation point, this makes the static analysis more difficult and might also confuse weak antivirus products.

Exec_Function (sub_41B285).

We can rename the sub_41B285 function "Exec_Function." The picture below shows how it works. It can be used to execute most of the important Windows API calls. It is no surprise that the sample is leveraging it for most of its API calls.

Exec_Function parameters.

As far as "call Exec_Function" doesn't tell us which API function is called, we wrote another small IDA Python script, which parses all XREFs to this function, checks arg_8 (e.g. 7554284Ch) and resolves the given hash to an API function call name (e.g. VirtualAlloc). Then it writes a comment to the call Exec_Function, which names the API function name that is going to be executed.

Next, the sample executes some anti-analysis checks. This includes a function, which is checking for certain processes by parsing the processlist and comparing the names against a CRC32 checksum. We called it "Scan_ProcessList_byCRC32." These checks are not only done at this location, they are distributed all over the sample and looking for the following names:

  • 0x388f3adb = mple.exe
  • 0xe84126b8 = sample.exe
  • 0x6b68c4c6 = avastui.exe
  • 0x923d5594 = avgui.exe
  • 0x6b68c4c6 = avastui.exe
  • 0x923d5594 = avgui.exe
  • 0x6b68c4c6 = avastui.exe
  • 0x923d5594 = avgui.exe
  • 0x958e9b43 = extsszf.exe


We haven't checked every location, but where we did, the sample kills itself if those processes are found.

Debug checks.

After the debug checks, the sample is extracting the two resources UDXCUSK and SCCJZ from the PE resource section and stores them in two buffers for later use (see below). Then, it decodes the configuration stored in the UDXCUSK buffer. The function DecodeConfigFromResourceUDXCUSK stores pointers to the decoded data blobs on the stack. It finds them later via dword ptr ss:[ebp+eax-2C8], where eax is the offset to the different data blobs/config parameters. Later on, these parameters help to decrypt the actual final malware embedded in the SCCJZ resource.

Load resources and decode configuration.

Then, makes itself persistent by copying over to <%APPDATA%>/kgehorzlnr/zqwlnpeijybtmkv.exe and placing a link to the file into the Windows startup folder.

Copy loader and make it persistent.

CopyFilesAndCreateStartupLink is a complex function with a few sub functions. It is mostly using the obfuscation techniques that we've already seen, but it is also uses Heaven's Gate for some of the API calls, such as CloseFile.

Leveraging syscalls for obfuscation.


If we dig into the CloseFile_Via_syscall_SysEnter function, we see that it is checking if it is running as a 32-bit process on a 64-bit system under the SysWOW64 technology. Depending on this check, it either uses the 32-bit sysenter instruction or the Heaven's Gate trick to execute the API call directly via the 64-bit syscall instruction. If it is using the 64-bit world, it is getting the syscall number in a similar way to what we've seen before with the API calls. It is parsing ntdll.dll for the hash of the function — such as NtCloseFile = 0D09C750h — and then it finds the corresponding syscall number.

WOW64 check and syscall resolution.

We can see the switch from 32-bit to 64-bit code inside of the SysCallwrapper_SwitchTox64_HeavensGate function. First, it pushes 33h onto the stack. Then, it performs the call $+5 trick, which means it just calls the next instruction at 419D59, but the call instruction is also pushing the instruction pointer address to the stack (419D54). The 'add' instruction adds five to this value. In other words, we have the values 419D5E and 33h on the stack. If the CPU executes 'retf,' it is jumping to 419D5E and changing the CS register to 33h (far jump). The latter means switching to 64-bit mode. You can read the details here.

Heaven's Gate


Unfortunately, this means we need to switch to the 64-bit version of IDA for the code starting at 41D55E. In 64-bit, we can see that it is simply preparing the function arguments and then calling the syscall instruction. The sample uses this for calls listed in the disassembler comments in the picture below.

64-bit code — syscall execution.


Executing 64-bit calls in a 32-bit application can also cause certain antivirus products to miss these calls, thus missing the real behavior of the application.

Now we are going back to the main malware routine. Remember that the malware has already extracted the SCCJZ resource into the res_SCCJZ_buffer. It has also already decoded the configuration that includes the "089377328364273...981972063544" string to decode the SCCJZ resource. It is stored in ebp+eax+var_2c8_config_base, where eax is 0x18 (-> "089377328364273...981972063544").

Decoding the dropped malware.
The next step is starting the legitimate RegAsm.exe process and injecting the decoded data from the resource section via the typical process-hollowing technique. Using the same obfuscation tricks previously described, we called this function "InjectIntoRegAsm" below.

InjectIntoRegAsm


In this case, the final malware injected into RegAsm.exe is our old information-stealer friend HawkEye Reborn v9, Version=9.0.1.6. As usual, it is obfuscated with ConfuserEx described in our previous research. The stolen data is exfiltrated via the email account sartaj@jaguarline.com to the mail server mail.jaguarline.com. The HawkEye Reborn configuration decryption password is: 0cd08c62-955c-4bdb-aa2b-a33280e3ddce.

Hawkeye password

Distribution activity

After analyzing the previously described loader, we began to analyze what malware families may be leveraging it to infect victims. The most widely observed malware family at this time is HawkEye Reborn, version 9.0.1.6. Talos already broke down this malware in a previous post. We also observed several other commodity malware distribution campaigns leveraging the same loader to infect victims with Remcos, as well as cryptocurrency mining malware. This activity demonstrates how advanced techniques such as Heaven's Gate can be quickly integrated across large portions of the threat landscape. In many cases, the cybercriminals leveraging these kits lack the expertise to implement this type of functionality natively, but can instead leverage available loaders to achieve the same goal.

Email distribution

In all of the malware distribution campaigns we observed, the infection process starts very consistent with what we previously observed from threats like HawkEye Reborn, Remcos, Agent Tesla, and other commodity malware. The attackers send emails to victims disguised as invoices, banking statements and other financial-related topics.

These emails typically contain Microsoft Excel spreadsheets or Microsoft Word documents that leverage CVE-2017-11882, a vulnerability affecting Microsoft Equation Editor. When opened by victims, these malicious documents function as malware downloaders, reaching out to web servers on which the attacker is hosting their malware payload. The contents of the documents varies, but one example is below:



These campaigns are ongoing, with new binaries being hosted and new emails being sent on a regular basis.



Below is a graph showing DNS resolution activity associated with one of the domains that is being used to host the malicious PE32 executables, and is reflective of the consistent, ongoing nature of these campaigns.



Conclusion


This campaign is the latest example of what modern malware uses to fly under the radar. With the described process, the actors are able to hide the original malware inside the loader. The Malware is only decrypted at runtime and injected into memory — it's never unencrypted on the hard drive. This means, if any antivirus tools scans the malware, it has no chance to identify the malware on the disk.

The adversaries in this case used sophisticated loaders that leverage several different low-level operating system techniques to make it as hard as possible for antivirus programs to detect the malware. By using these loaders, they can quickly and easily change the final malware or in other words the payload of the loader. 

Coverage

Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOCs)

The following indicators of compromise can be used to identify malicious activity associated with these malware distribution campaigns.

Domains:

www[.]kemostarlogistics[.]co[.]ke
www[.]terryhill[.]top
mail[.]jaguarline[.]com

IP Addresses:

173.254.126[.]115
164.160.128[.]110

Email:

Email: sartaj@jaguarline.com
Mailserver: mail.jaguarline.com

Link in Windows Startup folder:

L"[InternetShortcut]\nURL=file:///C:\\Users\\Dex Dexter\\AppData\\Roaming\\kgehorzlnr\\zqwlnpeijybtmkv.exe"

Malicious Document Hashes (SHA256):

cf0a3dadba03f32d90e84401451c9acc1a1d2378d5bdae8e87fc2ab9c6ff0f12
e23d16a5b770a04664dd42f8d2153ad62ce5fbf65af2a6dfd791ad70deef61b0

PE32 Hashes (SHA256) analyzed:

01349f0b7a30d36f2171145548602451643d670870f8863f8baeec4f76cf83a0
10149bf87feb3276a7d6bfb864864c655b4e11aa2ed6d677c177353dbffdfc25
c2e98978063f02f9769d8372d10abc3fe734cd7e686c6ab5dedb08dd57076b17
fc31b4107bec4352fac3e1a13d91031b6b49969e21abff2301609219c43cd472

SHA256 of related samples using very likely the same loader:
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Vulnerability Spotlight: Remote code execution vulnerabilities in Simple DirectMedia Layer

$
0
0

Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities.

Simple DirectMedia Layer contains two vulnerabilities that could an attacker to remotely execute code on the victim’s machine. Both bugs are present in the SDL2_image library, which is used for loading images in different formats. There are vulnerabilities in the function responsible for loading PCX files. A specially crafted PCX file can lead to a heap buffer overflow and remote code execution in both cases.

In accordance with our coordinated disclosure policy, Cisco Talos worked with SDL to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW code execution vulnerability (TALOS-2019-0820/CVE-2019-5051)

An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW signed comparison code execution vulnerability (TALOS-2019-0821/CVE-2019-5052)

An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Simple DirectMedia Layer SDL2_image, version 2.0.4 is affected by these vulnerabilities.



Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 46143 - 46146, 50035, 50036

Threat Source newsletter (July 3, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

We disclosed several vulnerabilities this week, including two in Simple DirectMedia Layer, and a memory corruption bug in the V8 JavaScript engine in Google Chrome.

This week also saw the rise of an old favorite — exploit kits. While we don’t see them as often as we used to, Talos recently discovered a campaign using the infamous “Heaven’s Gate” technique to deliver a series of remote access trojans and information-stealers.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week. Due to the Fourth of July holiday in the U.S., expect our blog and social media to be fairly quiet over the next few days.

Upcoming public engagements with Talos

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

Cyber Security Week in Review

  • The U.S. Food and Drug Administration recalled a line of insulin pumps due to security concerns. The agency cited a vulnerability disclosure from the company behind the pumps that says "an unauthorized person” could exploit a bug to connect to the devices wirelessly and change its settings. 
  • The U.S. Food and Drug Administration recalled a line of insulin pumps due to security concerns. The agency cited a vulnerability disclosure from the company behind the pumps that says "an unauthorized person” could exploit a bug to connect to the devices wirelessly and change its settings.
  • new variant of the Dridex ransomware contains anti-virus evasion techniques that makes it more difficult to detect. Security researchers say the new variant, which first appeared last month, uses Application Whitelisting techniques to disable or bypass Windows Script Host.  
  • A new malware strain known as “Silexbot has bricked more than 4,000 internet-of-things devices so far. Researchers believe a teenager may even be behind the attack. 
  • security breach at a major cloud services provider may have exposed its customers’ emails and other data. PCM Inc. says it discovered the attack earlier this year, and believes malicious actors may have gained access to some of its clients’ email and file-sharing systems. 
  • U.S. Cyber Command urged Microsoft Outlook users to patch their software as soon as possible. The agency says its discovered attacks that exploit a specific Outlook vulnerability that appear to originate from Iran. 
  • Google removed more than 100 adware-infected apps from its store. Security researchers say the apps had been downloaded a combined 9.3 million times, often using victim’s phones to boost advertising revenue. 
  • Hackers took down the network of Georgia’s court system with a ransomware attack this week, though the system was restored relatively quickly. Government leaders say it appears the attack originated from a foreign country. 
  • Facebook removed 30 accounts that have helped spread malware over the past five years. The social media site said the attacks centered around fake Libya news websites, tempting users to open malicious sites and then downloading a remote access trojan. 
  • A Chinese tech company that produces smart home devices has been leaking users’ logs for years. Researchers discovered a database belonging to Orvibo sitting on an ElasticSearch server with no password protection. 

Notable recent security issues

Title: Spelevo exploit kit pops up to deliver banking trojans 
Description: Researchers at Cisco Talos discovered a new exploit kit known as “Spelevo.” While exploit kit activity has quieted down over the past few years, this new campaign uses some old tricks — such as exploiting Adobe Flash Player vulnerabilities — to infect victims. It then delivers various payloads, but mainly banking trojans such as IcedID and Dridex. The actors behind Spelevo seem to be strictly financially motivated.  
Snort SIDs: 50509 - 50511 
  
Title: Firefox patches critical zero-day used to target Macs 
Description: Firefox patched a series of bugs in its latest update, but most notably fixed a vulnerability that attackers exploited to install cryptocurrency miners. Last week, the web browser released a fix for a code-execution vulnerability in a JavaScript programming method known as “Array.pop,” and then a sandbox breakout bug the next day. Two new Snort rules from Talos protect against the Array vulnerability. 
Snort SIDs: 50518, 50519 

Most prevalent malware files this week

SHA 256: 440944ab47cc3140207179f5449ddacb32883a74a9cff11141fdf494eaf21592   
MD5: dd77416ab164d3423b00f33380cf06ca  
Typical Filename: SafeInstaller  
Claimed Product: SafeInstaller  
Detection Name: PUA.Win.Downloader.Installiq::tpd  

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
MD5: 47b97de62ae8b2b927542aa5d7f3c858  
Typical Filename: qmreportupload.exe  
Claimed Product: qmreportupload  
Detection Name: Win.Trojan.Generic::in10.talos  

SHA 256: 64f3633e009650708c070751bd7c7c28cd127b7a65d4ab4907dbe8ddaa01ec8b   
MD5: 42143a53581e0304b08f61c2ef8032d7  
Typical Filename: N/A  
Claimed Product: JPMorganChase Instructions SMG 82749206.pdf  
Detection Name: Pdf.Phishing.Phishing::malicious.tht.talos  

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f  
MD5: e2ea315d9a83e7577053f52c974f6a5a  
Typical Filename: Tempmf582901854.exe  
Claimed Product: N/A  
Detection Name: W32.AgentWDCR:Gen.21gn.1201  

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b  
MD5: 799b30f47060ca05d80ece53866e01cc  
Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin  
Claimed Product: N/A  
Detection Name: W32.Generic:Gen.22fz.1201    

Beers with Talos Ep. #56 - Flatlined: Breach to Bankrupt

$
0
0


Beers with Talos (BWT) Podcast Ep. #56 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded 6/24/19 - Back in the studio for EP 56 and off the top, Matt got some new audio toy for his side hustle as a Twitch star - I still can’t figure out exactly how he did what he did, but it was not helpful from a producer’s perspective. It’s repaired, but still enough to apologize for. This is why we can’t have nice things. We discuss the issues around the AMCA data heist - a breach that caused a bankruptcy - and the complexity of securely moving sensitive data, like PII and HIPAA data, to the cloud. As we get deeper, we end up discussing the issues inherent in medical data - namely, it’s sensitivity and data security issues so systemic in nature that not even HIPAA can help.

The timeline:

  • 01:00 - Roundtable - The usual collection of smack talk - wrong numbers, arson, etc.
  • 10:30 - From breached to bankrupt - AMCA files chap.11 after losing undetermined amounts of data
  • 29:00 - Growing your teams skills and sorting out what you need your consultants to know for you
  • 32:30 - Medical data - a valuable target passing through so many hands
  • 38:30 - Closing shots and parting thoguhts (trying to move the car while Craig is inside paying edition)

Some other links:

==========

Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

Hosted by Mitch Neff (@MitchNeff) with special guest Liz Wharton (@LawyerLiz).

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Roundup for June 28 to July 5

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 28 and July 5. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Packed.Bladabindi-7008528-0 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone.
Win.Trojan.Gamarue-7008527-0 Trojan Gamarue, also known as Andromeda, is a botnet used to spread malware, steal information and perform activities such as click fraud.
Win.Worm.Vobfus-7008428-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
Win.Packed.Zeroaccess-7008376-0 Packed ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
Win.Malware.Upatre-7004553-0 Malware Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
Win.Dropper.Gh0stRAT-7003946-0 Dropper Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Malware.Ramnit-7003027-0 Malware Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
Win.Dropper.TrickBot-7003081-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
Win.Malware.RevengeRAT-7004697-0 Malware The RevengeRAT remote access tool allows the operator to perform a wide range of actions on the infected system, including eavesdropping on the user, exfiltrating data, and running additional malicious software.

Threat Breakdown

Win.Packed.Bladabindi-7008528-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 14
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 14
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 14
<HKU>\S-1-5-21-2580483871-590521980-3826313501-500
Value Name: di
14
<HKCU>\ENVIRONMENT
Value Name: SEE_MASK_NOZONECHECKS
14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: ParseAutoexec
14
<HKCU>\Software\c7434f9594f3950a2e05d45cc97e0b51 14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: c7434f9594f3950a2e05d45cc97e0b51
14
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: c7434f9594f3950a2e05d45cc97e0b51
14
<HKCU>\SOFTWARE\C7434F9594F3950A2E05D45CC97E0B51
Value Name: [kl]
14
MutexesOccurrences
c7434f9594f3950a2e05d45cc97e0b5114
Unknown10
Global\ecc6d100-9d83-11e9-a007-00501e3ae7b51
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
starwydadi[.]ddns[.]net14
Files and or directories createdOccurrences
%TEMP%\winup.exe14
%TEMP%\dw.log10
%TEMP%\89A2.dmp1

File Hashes

02391e42f63b5367dd990e4327dc12dfaa24ea51e96a2ae52ba3de90c732d112 02c044948ea9f53a2ab5740af1688038ed5f0b863ce1de01caf8add16dd7f595 02c34b54efedc2927061af36e7726f1545b18842ab4df21e033e90d2d153dd45 03423dab0bddc03e0cffd0f9a5b9860fc58d4cf8a3b18b6f41afe66f6b193d97 044f80bf00154486576861f9305f13aeb3152893ccc1894e89237d5964cb3791 069615e1617ba0247fee741f107516e7bf67ba227d34d44b301bb1053f2b252b 077287b6cedd20cbf323939a3d14f080ddc1489dcf9d4989764cb09cd577b205 07dc6f0502e5689ec3cc8bc8e91323084bcb028fed68a1d407c1d25364e7ad07 07f3a667a62d0ec2cb36bafd67e0b2c8e59a62223179bfb3fe8629195bbb8ed4 090856974744db766df4757083b3dadb518dfd0e3ef1c96eee63cd7076151c4c 0c5faa63bdaa0026ab4ddbce9ccb3dfb31226befc7f5e1b38873a1d2e299f1c2 0ec95d587d006803cad956a88e6a5812c3ece5b03716cdfd9fe94ce0dd3725ee 0eed80e6a87334a1c24891bb9a0fe5c8b9cd8a92167eabcbae1b5728dc5a1e93 0f56694a00ff58c317303cdf6976e81a95cb71156e79c29ee97a32cf8600c233 0fd0606df5a28446ba55b449c8276477f3dc17dadfd8897b02fddd8e70f4dc3c 101a22afcaa749c11d119751cf03c96b8fdd2bdfc759e30a1215d19fcb4ce0c2 117c818509b04bb51ccd89cffb9e59b71dc32d73d372d01517094d1516cc58d9 13e1e5dd28c015f418232c75d88a742e5102bda4b276e90c60dc588281b0e20d 14f0f8c7ab95de503728d70d30efeae2df255f2919e9ffb61d86c728d79d54d6 154d32a8d39c2a55e71a23e126cbb141bf2a860cef997a092bd5e987f463fb64 15b960b6c2eeaed4f2d8ea53172d1bfc403a36e570c92e2a569ed4b7e781e304 1711e3dd4c2a37ee762798b13e78b2aaf1f92862089055e36d4e3889bd3cacb9 179102ea1a9e3eeac268236fe006e250625376764e931f22dd41125ddf640f6f 1804e34830d4f49a6e9686d195fdd7c178fccc31841385e8fc9a712bcd22a711 18d89015080e39d8bd13c550ecef302727f58beea070897cb62d53162b7707ed
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Gamarue-7008527-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050452834348584929485695758050\winmgr.exe
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050452048050540508045\winmgr.exe
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050324589790225392040235\winmgr.exe
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-505045204850142040560305045\winmgr.exe
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050402562050603850256869070\winmgr.exe
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050452042050540508045405080\winmgr.exe
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050452048050540508045405040\winmgr.exe
1
MutexesOccurrences
t66
trk166
t504
trk123
t592
t202
t181
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
195[.]22[.]26[.]24824
199[.]247[.]8[.]1324
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
srv1300[.]ru24
srv1400[.]ru24
srv1000[.]ru24
srv1100[.]ru24
srv1200[.]ru24
TRKHAUS[.]RU12
ad[.]yieldmanager[.]com5
audience[.]tapad[.]com5
docbook[.]org2
nwalsh[.]com2
Files and or directories createdOccurrences
\??\E:\autorun.inf24
\autorun.inf24
\??\E:\Secret.exe24
\??\E:\Documents.exe24
\??\E:\Movies.exe24
\??\E:\Pictures.exe24
\??\E:\windrv.exe24
\??\E:\Private.exe24
\Documents.exe24
\Movies.exe24
\Pictures.exe24
\Private.exe24
\Secret.exe24
\windrv.exe24
\??\E:\Music.exe20
\Music.exe20
\??\E:\Porn.exe12
\??\E:\505050.exe12
\505050.exe12
\505040.exe12
\Porn.exe12
E:\505040.exe12
%TEMP%\njabdkadwvuiajkdlawuvi1ba9
%TEMP%\05 - Exchange.mp36
%TEMP%\g3OdSbf__bigger.jpeg6
*See JSON for more IOCs

File Hashes

1f4cf029dfbf7eb7ab7349a996c714929ad997be0e09311777b84b75d8f2163b 459a89a03a6f46e5901f2c2ce54b2c47dd12777eb4b0d95caa7cf00394b5a862 50fcf4110822d9272e706ac3661f5374a00ffed48da20f6f1503c612288ca2a9 59c9b977a95e516ffffd77a72e16314a80df92cd1d59b0b16f7e1f06e72a2398 5b31e2845b9ff0c262f09eb2ea2b4cc6896eb78402c4fddf41c76fe1ebf37b79 673dfd5ddcc565679db5739f992e0b4de8c61c1628aa151cf690278afe28fa23 86982deca7af6d4d0cf0118afec263b97d4a5975eec187093d1f730334e35144 8ce0ab86f7d3fb858373ae9bc44dc058d7f4322d56d38d0b32e485c9bb27c630 9ad466fb4e695905f2c8328fef7b4917c4c97ca2377c2002ad5cea3892b69a62 a004a9cf108c93981ad0f5891215169376336c9e13cffb2fe56e68d1af5d75f6 aecde0e15dae5f0fdac6f927f39341b40158898554b25739c7cfbbc88442ddb7 b07245addc6dac3ec4c4e258016ca457d56474ad93c11b43d0b55b6f4a5e5b5d b383ca1d776204776c643a020e71bcce8990ec6768de84e7ed6fe5bef7d692d7 c3f480a13b31de10baca5e1973ff774453c6c298b13781ace209523f055a9d74 c6faca00d7e4fa656c574de14d475bccd353aa622495a8a475f4fc52031c658d c79b3cc43f74d8b0afc8db7b1d7fefe694076b06b97c7dde85f561cdb132c529 d0293d2660844495ee219f03a9a0a13ba8b364c510f65c8325367649db499cc6 d5c3e89984dcf0346a8726bd95bc00bfc269bb96c991db729c3068aa08e18f01 d6029469cfe0aa53e619ac0a3311f9b56663be048ed51e3fdb6fdde6a5e4f07c d871f17f1609e257ee0586cc9bce74acf1d0289cf9a8264b62cb4ba82b6a94c3 d97fe58b643226abaa1f9bf4ef8acd0c7810cab3d048503f4a84cd0cf196b970 e7ba39323ddb88229cb9339e051da857a2ed5c243f2d8ea41dbd6ae70117eaf6 e8531ab3f02f293c3eb42067ba92ee8cf1513201fd4089ad0db570dc2218cb2c ec58b08efd428ad04d32f3d883b1a693cfe97fff89385d9fc8b01535b2ec2052 ef8bb975c2ec5413dfd82ea1b161ad50ba684f7f01b1e2a8bf12a41ac8a58148
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella




Win.Worm.Vobfus-7008428-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSVC.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FPAVSERVER.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EWIDO.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CPF.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CLAMAUTO.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BULLGUARD.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSASCUI.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WERFAULT.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UI0DETECT.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CTFMON.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WUAUCLT.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIJACKTHIS.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAM.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMGUI.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMSERVICE.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIESVC.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEWUAU.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEBITS.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIECRYPTO.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEDCOMLAUNCH.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIERPCSS.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIECTRL.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\COMBOFIX.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PEV.EXE
Value Name: Debugger
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIDEC.EXE
Value Name: Debugger
13
MutexesOccurrences
©Úü×À»¢Íéõèò©13
\BaseNamedObjects\ 13
Local\https://www.hugedomains.com/13
Local\https://tiny.cc/11
Local\https://www.google.com/1
Local\https://www.ashleymadison.com/1
Local\https://www.jcpenney.com/1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
72[.]21[.]81[.]20013
172[.]217[.]12[.]13813
172[.]217[.]9[.]23813
72[.]52[.]179[.]17513
216[.]87[.]78[.]2513
172[.]217[.]10[.]22713
18[.]211[.]9[.]20613
107[.]22[.]223[.]16313
204[.]79[.]197[.]20012
104[.]25[.]37[.]10812
67[.]225[.]218[.]5012
192[.]241[.]240[.]8912
23[.]20[.]239[.]1212
185[.]53[.]179[.]2911
104[.]25[.]38[.]10811
172[.]217[.]6[.]22611
104[.]20[.]2[.]4711
104[.]20[.]3[.]4711
172[.]217[.]10[.]3610
172[.]217[.]12[.]1319
104[.]28[.]29[.]329
104[.]20[.]218[.]428
172[.]217[.]15[.]728
172[.]217[.]15[.]1008
13[.]107[.]21[.]2007
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
fonts[.]gstatic[.]com13
static[.]hugedomains[.]com13
c[.]statcounter[.]com13
www[.]directorio-w[.]com13
sstatic1[.]histats[.]com13
www[.]easycaptchas[.]com13
www[.]hugedomains[.]com13
secure[.]statcounter[.]com13
HDRedirect-LB6-54290b28133ca5af[.]elb[.]us-east-1[.]amazonaws[.]com13
directorio-w[.]com13
cdnjs[.]cloudflare[.]com12
bit[.]ly12
www[.]gstatic[.]com12
www[.]google-analytics[.]com12
parking[.]parklogic[.]com12
www[.]qseach[.]com12
tiny[.]cc12
cdn[.]pubguru[.]com12
ajax[.]googleapis[.]com11
ib[.]adnxs[.]com11
securepubads[.]g[.]doubleclick[.]net11
www[.]googletagservices[.]com11
d1lxhc4jvstzrp[.]cloudfront[.]net11
ssl[.]google-analytics[.]com11
fastlane[.]rubiconproject[.]com11
*See JSON for more IOCs
Files and or directories createdOccurrences
\??\E:\autorun.inf13
\autorun.inf13
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js13
%APPDATA%\Mozilla\Firefox\Profiles\iv5rtgu3.default\prefs.js13
%HOMEPATH%\27F6471627473796E696D6461413
%HOMEPATH%\27F6471627473796E696D64614\winlogon.exe13
%System32%\drivers\etc\hosts13
\??\E:\$RECYCLE.BIN .LnK13
\$RECYCLE.BIN .LnK13
\??\E:\System Volume Information .Lnk13
\System Volume Information .Lnk13
%HOMEPATH%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences13
\??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP13
\??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-150513
\??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-1505\Desktop.ini13
\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-1505\Desktop.ini13
%HOMEPATH%\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\Z17N57WM\www.hugedomains[1].xml10
%APPDATA%\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A3
%APPDATA%\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A3

File Hashes

c037253e276f68915f94a880ef6092f6a2a9e2a22dde3752b1a189e7392bb1c2 c9664af8c4a783ba1837929d8fbe97222a9e08ef44849d0bd3fbdd5fd3771056 d79ea7f8669da09b2a8871d5d52c046e5730edd4806228bff088fdcf60dc492f e2dfd666cf32d2825de8a84339c1a2329ccfd986164fad48190a9420b37c32d9 e895fb316f2c6e59edd5b57c98df52ac7a8cff2b08f7e6fbd57623e6608d7c70 ef995680626316921a87d60298208aa1a7337e6b8582e859fa12027909512ea1 f0e508c2ac7a24a070a1478f9cc27e3a78357fa7c3f76ca3592637eafcd5dec8 f12b6897b528bee20e2cb54f5b445d141948ae5361b6ef21b495777ecc92aaf2 f67f73d39c0fade143d1cc30c8a5f1b823ef4cf91dc45314fb51e714d179c3fe f9722379fe4ce4cd008143cb3c4cfeb4b5b4ba695ddaf1fee839a9ab368d1d8d fa4c827d119b5a98f40027dcbbdc9c3bddfdc38511772de7e4ade6bffbd5b2f9 fb4ff852fbee72185cc989143092f2f580c4997b51504da59bd873024254660e fb854a98e62eaab30f6bdb26d2ab655770dbec021e4dc62bc276fa761ff0d165

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP



ThreatGrid



Umbrella




Win.Packed.Zeroaccess-7008376-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: DeleteFlag
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
10
<HKLM>\SYSTEM\CurrentCo
ntrolSet\Services\SharedAccess\Epoch
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: DeleteFlag
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: DeleteFlag
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: DeleteFlag
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\Epoch 10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
Value Name: Start
10
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: DeleteFlag
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BFE
Value Name: Type
10
MutexesOccurrences
Global\{9a937ad1-c80e-6934-b9b5-3afedfb64be2}10
{9a937ad1-c80e-6934-b9b5-3afedfb64be2}10
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]79[.]197[.]20010
64[.]210[.]151[.]3210
13[.]107[.]21[.]2005
83[.]133[.]123[.]205
208[.]100[.]26[.]2511
154[.]214[.]250[.]731
62[.]60[.]251[.]2441
180[.]215[.]207[.]1101
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
promos[.]fling[.]com10
12geg23[.]cdn104[.]uploadetchosting[.]com2
12geg22[.]cdn104[.]uploadetchosting[.]com2
12geg1q[.]cdn104[.]uploadetchosting[.]com1
12geg1s[.]cdn104[.]uploadetchosting[.]com1
12geg1t[.]cdn104[.]uploadetchosting[.]com1
12geg1w[.]cdn104[.]uploadetchosting[.]com1
12geg1y[.]cdn104[.]uploadetchosting[.]com1
12geg21[.]cdn104[.]uploadetchosting[.]com1
Files and or directories createdOccurrences
%TEMP%\IXP000.TMP10
%TEMP%\IXP000.TMP\TMP4351$.TMP10
@10
L10
U10
%System32%\logfiles\scm\e22a8667-f75b-4ba9-ba46-067ed4429de810
\systemroot\Installer\{0f210b53-2df0-43a6-b654-d5b43088f74f}10
\systemroot\system32\services.exe10
%SystemRoot%\Installer\{0f210b53-2df0-43a6-b654-d5b43088f74f}\@10
%System32%\services.exe10
%TEMP%\IXP000.TMP\C32938~1.EXE10
%TEMP%\IXP000.TMP\reloaded.exe10
%APPDATA%\msrfa.dll1
%APPDATA%\pibis.dll1
%APPDATA%\wisnge.dll1
%APPDATA%\wsrmg.dll1
%APPDATA%\nscizr.dll1
%APPDATA%\wshufx.dll1
%APPDATA%\bgnsoc.dll1
%APPDATA%\mcrdr.dll1
%APPDATA%\zrshu.dll1
%APPDATA%\mstemf.dll1

File Hashes

1a45f21c4e9da8fe25dee15d791d14525ff229c3e0330d17af76477391c9cd5e 37ac22156718afc2837f23f12e032530f464083c7204644aa3ce2fb0676a149d 5ca82ac85c65d79b8069ec7b41b3ab212d22bf014eaccd712ed30294a23cfa6f 6c2df30ebf956363eed646fa1032395186c303e20e859f561d0bda1ebc5de002 8b91726726c5b33f1a4aa3efa0184209bee0fb26c919d748f078e887d3ddd0f8 9127e176fa15d685992b36d6781d79dee5c5994431a021d13f78f3328168cd04 b9aa60607427eedf69bfa2058c0476f8b673955ba7701b710a44ba02edcf9c36 c5f5861f4c4a560396fa5c20394515b5147d97427cba2e37c5d114738d9dcf31 d239e098f814f0350a81ade67000be01f91a8007833823d5f2e6c782a3b5552b f40030bec4290e152e63064e90b4fda8f3314f5b1ac98eb298f2993c85b93f24

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP



ThreatGrid




Win.Malware.Upatre-7004553-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
14
<HKCU>\SOFTWARE\MICROSOFT\Vunadiikify 1
<HKCU>\Software\Microsoft\Ejluzaduy 1
<HKCU>\Software\Microsoft\Hofoaldyospa 1
<HKCU>\Software\Microsoft\Byypjecykuan 1
<HKCU>\Software\Microsoft\Pekuymgu 1
<HKCU>\SOFTWARE\MICROSOFT\Uswyloyhujmo 1
<HKCU>\Software\Microsoft\Weqyireluz 1
<HKCU>\Software\Microsoft\Ahulbupagupi 1
<HKCU>\Software\Microsoft\Yvuwdefusuyx 1
<HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
Value Name: 16864bd5
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Kapya
1
<HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
Value Name: 2ai47ccj
1
<HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
Value Name: 1b0jgcdj
1
<HKCU>\SOFTWARE\MICROSOFT\Ifrytaacpiu 1
<HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
Value Name: ebecgbi
1
<HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
Value Name: 9e6eb40
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Syyqx
1
<HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
Value Name: 1eb88i7e
1
<HKCU>\SOFTWARE\MICROSOFT\Asohubtafib 1
<HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
Value Name: 292fjjef
1
<HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
Value Name: 24a073d5
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Hoavt
1
<HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
Value Name: 3jcbf77
1
<HKCU>\Software\Microsoft\Ocidrajiasze 1
MutexesOccurrences
Global\{C30C6CF2-932B-408E-55BA-04D54CAC27C8}16
Global\{566D79B0-8669-D5EF-55BA-04D54CAC27C8}16
Global\{C8D239CA-C613-4B50-55BA-04D54CAC27C8}16
Global\{C8D239CB-C612-4B50-55BA-04D54CAC27C8}16
Local\{73DE6ED9-9100-F05C-55BA-04D54CAC27C8}16
Local\{A9348FD8-7001-2AB6-55BA-04D54CAC27C8}16
Local\{A9348FDF-7006-2AB6-55BA-04D54CAC27C8}16
Global\{73DE6ED9-9100-F05C-55BA-04D54CAC27C8}16
Global\{A5D858EA-A733-265A-55BA-04D54CAC27C8}16
Global\{A9348FD8-7001-2AB6-55BA-04D54CAC27C8}16
Global\{A9348FDF-7006-2AB6-55BA-04D54CAC27C8}16
Local\{C8D239CA-C613-4B50-55BA-04D54CAC27C8}16
Local\{C8D239CB-C612-4B50-55BA-04D54CAC27C8}16
Local\{E9745CFB-A322-6AF6-55BA-04D54CAC27C8}16
Global\{B665CB4B-3492-35E7-031D-B06E1A0B9373}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
184[.]168[.]131[.]24116
68[.]235[.]37[.]8316
94[.]64[.]68[.]19716
190[.]37[.]207[.]19916
71[.]91[.]43[.]17916
79[.]187[.]164[.]15516
63[.]227[.]34[.]2816
178[.]116[.]48[.]21716
86[.]135[.]144[.]616
94[.]189[.]230[.]7816
206[.]190[.]252[.]616
86[.]140[.]35[.]5416
59[.]90[.]26[.]4916
123[.]203[.]139[.]25216
86[.]158[.]144[.]2716
75[.]87[.]87[.]19916
84[.]234[.]151[.]2316
222[.]96[.]81[.]5916
172[.]245[.]217[.]12216
58[.]252[.]57[.]19316
103[.]14[.]195[.]2016
108[.]230[.]237[.]24016
172[.]217[.]10[.]6810
172[.]217[.]10[.]364
18[.]233[.]6[.]114
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
kofinyame[.]com16
california89[.]com16
www[.]california89[.]com16
fquxszdtduirtabaguyqcyxwgu[.]com3
kbbqhhqsthaoflrodxoftwjn[.]ru3
vkljvwgzxtaltwdpso[.]ru3
eivsovswuswxlrecqxytmv[.]biz3
izfupirthqqhtdmrsgizi[.]org3
aqyldvcucbivwcuzltqszlwuiv[.]com3
dqxcpjxrkpvkrscvoibusskxkcx[.]com3
kfeyrgzheujramjvdebmfih[.]biz3
llbmbyozculfxljkrdaetkzofv[.]info3
qxwguplvcyswhiciqoylyhijrcvo[.]biz3
belzrwyugfulnrtsvwwjfzttk[.]ru3
ofdyvgdenbrwizswrgrshnvifzemam[.]info3
tobeugnjhuczhucepcedyfyx[.]net3
dieqgetxwlvwcxklrjboffi[.]info3
emfetgfafeeygpxvshmbyxwsof[.]biz3
xwlvzlnvzlwkplbtodmrtgl[.]com3
jnaqjrmfjzcepvcxgcyeaxhwcy[.]org3
mrbyprkqkemlnpzbtjnwkkvts[.]org3
lfydktrtcydhfuycuxcp[.]com3
nvzpfuwvmfbadnvvjrhipskem[.]net3
lixsgurgbcmamxkqkqijfapcmrk[.]info2
qkhfeydhaixcdvkbgihqqhq[.]com2
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\NTUSER.DAT16
%HOMEPATH%\ntuser.dat.LOG116
%TEMP%\budha.exe16
%TEMP%\kilf.exe16
kilf.exe16
%SystemRoot%\SysWOW64\secur32.dll14
%SystemRoot%\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll12
%SystemRoot%\SysWOW64\winhttp.dll10
%SystemRoot%\SysWOW64\webio.dll7
%TEMP%\OVQEBB9.bat1
%APPDATA%\Awdei\tyun.exe1
%TEMP%\QXY4CCB.bat1
%APPDATA%\Ingue\epxiur.exe1
%TEMP%\RSQ2CE0.bat1
%APPDATA%\Olvyq\juwe.exe1
%TEMP%\PJM7E60.bat1
%APPDATA%\Almenu1
%APPDATA%\Almenu\anozyb.exe1
%TEMP%\YYN5BA3.bat1
%APPDATA%\Jasit\xequ.exe1
%TEMP%\KMN5AE0.bat1
%APPDATA%\Azwia\wiziny.exe1
%TEMP%\JWJ9A47.bat1
%APPDATA%\Comomi\afve.exe1
%TEMP%\NYW5A92.bat1
*See JSON for more IOCs

File Hashes

014f7b0000b4959505cc055eb5c91283919f7e9596b9d375a15966808f3cac40 03ef7f307a4014590af1936ce69ef7f7e77fd34ecc1b553f4064a2fd4481b799 084cbb7cd8627cdfe63f8519f09a8100aac4710de7d396149d345182ce078d93 14726cda4db95441c35a350011f5ded8d832f2c8a6ab181c3c4a4fb73056ae6e 6a3eff21994abc3ae6c3c7a2d81e2f6c9e710ae4874e25db0a51213de4133c0d 7218bc90b23ce5f58e339e7e4caa68405ee10ad314c0765c92d0885f1ce3fce7 76bf6463c9751e4f8c6df80dff89dd58deeada57edc0dfaa3fcb88c5b676e3d9 7befc280a73717d09d831778e63173b1d48bf65d6d5a0da3055571a6d434bc6a 7c1b33a4ffaca8cd292d24c9b0a275629e931e0378d49305680e759d87b19aa5 8d8215b512830f6285f8248e6408e3f0e61535f32775f8c01b234c52729ce497 a05880b5a7d66ee3c976cba4553e48421da2c87d25540e81db739771217516e5 cc192820453aaf77261330c8caaf91436cbc5912e0307e9940b7265089c14705 cc908625e97f5ee851b27f69d492b90cedd17576612a8005f2a709960010a5da ccf99adebff70749af314d4414ef84fb4577ccb7bbd4816f3623a2013954d4c0 d4bda6c737fb1ea8ba4d486dc9d129c35e24faede3b17f6dd6d5f154a0e269f5 eb75f7cc2bef48e82fe540a53e39a53a78442e41b283917bb83bd050975447b4

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP



ThreatGrid



Umbrella




Win.Dropper.Gh0stRAT-7003946-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SVCSHOST
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SVCSHOST
1
MutexesOccurrences
546634635.3322.org3
kent.wicp.net3
23.95.28.1813
58.55.149.2312
59233086.f3322.org2
58.55.154.1191
www.zmr321.com1
\BaseNamedObjects\122.0.114.491
122.0.114.1391
23.245.118.141
mantou0314.f3322.org1
yanjianlong.f3322.org1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
174[.]128[.]255[.]2513
174[.]128[.]255[.]2533
23[.]95[.]28[.]1813
58[.]55[.]149[.]2312
122[.]114[.]141[.]1072
58[.]55[.]154[.]1191
122[.]0[.]114[.]491
122[.]0[.]114[.]1391
23[.]245[.]118[.]141
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
546634635[.]3322[.]org3
kent[.]wicp[.]net3
59233086[.]f3322[.]org2
www[.]zmr321[.]com1
mantou0314[.]f3322[.]org1
yanjianlong[.]f3322[.]org1

File Hashes

065b0891dd2f1f140a304d6083a42920f479e9f78449653dda3e3f4773d65f64 0e3ca15c7fbb7290152a4352eb9f128d371a61748bf574629b1e20e88194f39a 16ae0bbd83dfbf5d842d830eb025a48afeb882d280cd2667178a64c5e4e52aa7 2c3bb3de7dc1618182cc870473e21773ec64a7907a7a8b908ba84aa3dfc1ccb8 3fc973ba80cdb771e03afcede4504b916e2271ee061371132943e69a6851d0a6 72ad952cd9fb882a07fc5076925ef9f54c99c1e2b8d787c6b7da5efe93d2320d 7947b164011507462d16333b66ff489f62d0d07c063886a65fc1119c434595b4 7c23edb038674293f17bcd1f54ce09257155f50167c291b898369b7f67a0543d 7dd7075d773df6b6adbceecb7670aeba729b409c4eab34fa43ee12cec71d961f 8099dfc84e82896b7ffd60989d80dcf3e6d201119fe41c297be02efa198d4c97 8e985850c2689d00fb7a806b008798980036f4d2ec139e1b7ee50aa7adb2a1da 908e09cdf2eacbb1361d94c86d393c0149634d927ba537862db5c26ee1fdd1d5 9a744852496a014e1346262aab597cdc6d7c86cc1254a6b3f1e2f0509e011f49 9d83339f74a26f74ab4b32835f4e56224bf4455f52d78e4e1597a36f63dc34ca 9e2ae029580b63672ebed5d256f22745cda92397969ae98db888275c74c33492 a9c39431622634720eb6af8bed7440508c1b76d955377bb98ff6b4a5f3cd476e bc6a883c9ea0eb02da0590ad56eee63fffff733fb530fb901e449c41fd63dee4 d94e3332f0f9181e0fe3e4dc6da12024a66ac9bd27e3e2e8a2805cd99de34552 e1645442bba1f21d0a3243661dca6d4bae3dd28150e03f5d959f1c8bf61fca64 e880f061dc1f2f08585787d07c55ae03e212408f9e2e6ee8b6d392be694f2663 fb0f9a707cc2ab33dd9370aac07dd7c0f354bc6780de8c0c54c69f7d828e8e1e fd514b2dfc176298d8b6b4885079cdb43a7c374fdd914850c50aad7c8791b455

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP



ThreatGrid




Win.Malware.Ramnit-7003027-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
10
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
10
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
10
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
10
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
10
MutexesOccurrences
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}10
\BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}10
\BaseNamedObjects\{137A1A2C-4964-635A-544B-7A4CB2C11D0D}10
\BaseNamedObjects\{137A2419-4964-635A-544B-7A4CB2C11D0D}10
\BaseNamedObjects\{137A1A2D-4964-635A-544B-7A4CB2C11D0D}10
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB6991D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4951D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB8651D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB6891D0D}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]100[.]26[.]2519
172[.]217[.]12[.]1429
46[.]165[.]254[.]2149
89[.]185[.]44[.]1004
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ryfgpvevpka[.]com9
FXOPHXMRRY[.]COM9
rijyjgrqrod[.]com9
wqebvfqhvdwd[.]com9
xkfkhlwxmy[.]com9
hpujpcor[.]com9
msdsspdwrtmjjjrgeew[.]com9
hwlfiogofk[.]com9
yogtmphumejfhm[.]com9
ATIUTTVAQR[.]COM9
MKYJFUMSG[.]COM9
okjndyeu3017uhe[.]com9
JIFGMEOA[.]COM9
xfqtdsyao[.]com9
vbtwrlpdfbcvqgrfxa[.]com9
ifshcrwujqprjwuwt[.]com9
TTGFETOSRTL[.]COM9
bujynaslvjlmf[.]com9
gyjijwyrhwyugui[.]com9
urjpwtnytfyiaaly[.]com9
fqxonymdkdmjjfceuf[.]com9
PLOOWSETHQB[.]COM9
hkdagrtomfuev[.]com9
yephjhhcg[.]com9
OHEFDIGIK[.]COM9
*See JSON for more IOCs
Files and or directories createdOccurrences
\Boot\BCD10
\Boot\BCD.LOG10
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat10
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat.LOG110
%HOMEPATH%\NTUSER.DAT10
%HOMEPATH%\ntuser.dat.LOG110
%LOCALAPPDATA%\bolpidti10
%LOCALAPPDATA%\bolpidti\judcsgdy.exe10
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe10
\Device\HarddiskVolume310
%SystemRoot%\bootstat.dat10
%TEMP%\guewwukj.exe10
%TEMP%\yowhywvr.exe10
%HOMEPATH%\Local Settings\Application Data\hmqphkgx\pseqpmjy.exe10
%HOMEPATH%\Local Settings\Application Data\jpnfmrvn.log10
%HOMEPATH%\Start Menu\Programs\Startup\pseqpmjy.exe10
%ProgramData%\wtvakgao.log10

File Hashes

00848dceedd7c2271a182e97c8e5ad7c947af0350f4dc2ace6f600d1f1eaf9c8 07f659c6e3ac188112a9cbec06ed454711f8450b4cef0b59c95a8db0acfe8137 1a82f19a88827586a4dd959c3ed10c2c23f62a1bb3980157d9ba4cd3c0f85821 2a4d1cdf8ceb39bcdd782e2fca4c01390218ad32862d0df40eac079875dfdf89 2e6bebb485ed1ac9bf88e8fa2bb54fe0493e792771d33876b229008b13d4a85f 3fdedad406e3f100e8a216ae7477366a47998f14893adf97f647777c692e4151 5943564ab3d38d4a9a0df32352dd5d2b04ccb76294e68a5efcbad5745d397de3 8ab75a0bc7167646928afd8eea3c3450f2c9529e7d58ed2a87f4f32885017f30 f18fba4d2779d4407f522bf5a9287e9b9117c92aa92bcaa843f69cf842e1d7d5 ff66f9cf0c4ffa299fff1b03a92daa2070087301ea89cba2c03d58a9480fa843

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP



ThreatGrid



Umbrella




Win.Dropper.TrickBot-7003081-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender 9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Users\Administrator\AppData\Roaming\services\
9
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Users\Administrator\AppData\Roaming\services\
9
<HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions 9
<HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths 9
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
2
MutexesOccurrences
316D1C7871E009
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
116[.]203[.]16[.]953
194[.]87[.]94[.]2253
104[.]20[.]16[.]2422
82[.]146[.]48[.]2412
194[.]87[.]93[.]842
216[.]239[.]34[.]211
216[.]239[.]36[.]211
198[.]27[.]74[.]1461
52[.]202[.]139[.]1311
82[.]146[.]48[.]441
82[.]202[.]226[.]1891
78[.]155[.]199[.]1241
195[.]133[.]147[.]1401
209[.]205[.]188[.]2381
73[.]252[.]252[.]621
185[.]21[.]149[.]411
67[.]209[.]219[.]921
80[.]87[.]198[.]2041
195[.]88[.]209[.]1281
82[.]202[.]236[.]841
179[.]43[.]160[.]451
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ip[.]anysrc[.]net3
icanhazip[.]com2
myexternalip[.]com1
ipecho[.]net1
checkip[.]amazonaws[.]com1
wtfismyip[.]com1
Files and or directories createdOccurrences
%TEMP%\4rQ7ipw10
Modules9
client_id9
group_tag9
%System32%\Tasks\services update9
%APPDATA%\services\client_id9
%APPDATA%\services\group_tag9
%SystemRoot%\TEMP\4rQ7ipw9
%APPDATA%\services9
%TEMP%\nsb246C.tmp\System.dll1
%TEMP%\nsgFCA0.tmp1
%SystemRoot%\TEMP\nshF273.tmp1
%TEMP%\nsg6A03.tmp\System.dll1
%SystemRoot%\TEMP\nswC349.tmp1
%SystemRoot%\TEMP\nswC349.tmp\System.dll1
%SystemRoot%\TEMP\nsn69F3.tmp1
%SystemRoot%\TEMP\nsn6A42.tmp1
%SystemRoot%\TEMP\nsn6A42.tmp\System.dll1
%SystemRoot%\TEMP\nsc1020.tmp1
%SystemRoot%\TEMP\nss107F.tmp1
%SystemRoot%\TEMP\nssDD4E.tmp1
%SystemRoot%\TEMP\nss107F.tmp\System.dll1
%SystemRoot%\TEMP\nssDD9D.tmp1
%APPDATA%\services\67ff09786g26g98gef29fgb5035370fb293gb44g2d766fb0gff228fge797gbb6.exe1
%SystemRoot%\TEMP\nssDD9D.tmp\System.dll1
*See JSON for more IOCs

File Hashes

357b2a34ad3496df379c3ad774fa3be01969472363a53defb2642119ac1a8f51 57ee09685f15f98fde19efb4024260eb192fb33f1c755eb0fee118efd797fbb5 65ea62aa3ed8bb08e2519bb0cc54f39dde625e11517ef43f1ce9acf306df412f 664c4f020f49f18b5d4cb6952184a9f2472bfbc41d4922e8c43d8c8db3411930 a690c57af967f33edfd3e34448af5a3d0aeb6885262d1dec9150debb404241d0 a7e40660025a2f92bf5b27a429c2a65038932203d7d6c33168f01c47b34868fa bd60a69a384090fbdf9c03ae483e5e3eddcfdbfb7d8d5ebee7d106a2e21d86e4 c2e6cb0575738459478d51904bf70fe81fc44c88b560e45b06a74571dcfbf83f dde71d9ec99bef73f61f841af134463fc1e494522c35fa8534a668337082f107 e5a25723b4386688017c8a808488f7827c526b4848a05b23a85a65ed398fd035 fafa057ebb741166e290c0864d2392e34700a1fb2147e7d4817295db9adaaddb

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP



ThreatGrid




Win.Malware.RevengeRAT-7004697-0

Indicators of Compromise

MutexesOccurrences
RV_MUTEX-BtNHuiGGjjtn37
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
79[.]134[.]225[.]835
105[.]112[.]96[.]5127
91[.]221[.]66[.]63
185[.]244[.]29[.]152
197[.]210[.]44[.]1571
105[.]112[.]96[.]1091
197[.]210[.]55[.]2101
197[.]210[.]44[.]681
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
mallorca[.]myftp[.]org37
mbvd[.]hopto[.]org37
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\pcwrun.url37
%APPDATA%\cdosys37
%APPDATA%\cdosys\aadtb.exe37
%APPDATA%\cdosys\pcwrun.vbs37
%HOMEPATH%\Start Menu\Programs\Startup\pcwrun.url25

File Hashes

043e6e31d0efe8f818b408a4f38ed07d33ff6c9e3ff5efe33440f426da6c65e9 08255fa9a6461fe91cc3c7cabb4d7cf1d0e34442916989f121c25c007d0e4f4e 14ff9bca2e40edf80f24f64944a187691436d26dec1c57e71c83e2f8d3cf8d83 172c143486841e0e24c436f8cc4548c46afb9db7f6bf52d857795f62b18124fb 1bfb8266eb0284cbda01b9405977691de3abd817d4575285aaef4f5065391ba8 232238e349a632c148ff162e31159a6ba7b19d89f9cdb43027c98c69d03756a9 2ee4332fa127a46c6bff99587d8ec99778a6eaa764d80d1abb874495f27605b5 33faa6cad2fe7aaf15771977673baed989f973cc3b6be562c5caa2de71c7d532 3c0ea80441e2824c506dc57154ccc1123e7c293856ba89c078269177f0bdc940 3f09b3040a82ce439e8147eeb19e109505866982e3a1150a79ea011e53920745 4209a07df4409b81df9fd0bdab4bfd0f45f15ee0acb57be1b28dc7409e7f8417 4e91a567c5de2bc40e9be1fd72065a17f98454f93bceb3c3f6bc01c95880ea8e 5683d55fcbaec725b59770d31bf272cf1aa99b8c1c4955eba6cf23204ebcca79 6db50a7f6a77e354d56b65175024df2baa70e7c161a05b2c876d65c09448f30b 6fb1ef865a16257408e954ca2d917eb50126767b9be5505d5772238b60eed25e 723617156eb76841485e598c6958b4b29261dc78f1187629a5c001f037a92920 75d8713483f5a769d1140c4eef300f27dcd39f3799f1106c3c6600a8dd44cccd 7ef273b2c04c40e249f250a5c12513587ac84125df78c870df5ca17c8833d3c9 82541fd5caae2acdff85558a535874361c3f5d6e2e6c27a821cc3bc4b9b50b35 951b10c3a12ebe5a4923c7ddac5d9b534e717cd86fa29dabd5c67d66dc73418d a41d6ab21b948ce314ec0805d96ea7480da8a3a8de7691501c46cacf7bb2921c a84a57b96eb296cf90c881bb18a19df7930aa114e97c12171ad1b238e45b3d31 a9230c56cec40f3238f21c7a5c5e1b79c63160275eacc814d12d637370e39333 ad9ecaf4f946fe463f98b468049de4563eb4d7666d12338cc7f6d555f4633c2d ba048c20a4e0fb9ae726d05b10cf3097e245a14d2260e43a9f34c4adef004b7b
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP



ThreatGrid



Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
Trickbot malware detected - (3094)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Atom Bombing code injection technique detected - (2529)
A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
Madshi injection detected - (947)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Excessively long PowerShell command detected - (904)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Kovter injection detected - (583)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Dealply adware detected - (545)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Process hollowing detected - (528)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Gamarue malware detected - (166)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
PowerShell file-less infection detected - (63)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
Installcore adware detected - (40)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques

$
0
0


By Danny Adamitis with contributions from Paul Rascagneres.

Executive summary

After several months of activity, the actors behind the "Sea Turtle" DNS hijacking campaign are not slowing down. Cisco Talos recently discovered new details that suggest they regrouped after we published our initial findings and coverage and are redoubling their efforts with new infrastructure. While many actors will slow down once they are discovered, this group appears to be unusually brazen, and will be unlikely to be deterred going forward.

Additionally, we discovered a new DNS hijacking technique that we assess with moderate confidence is connected to the actors behind Sea Turtle. This new technique is similar in that the threat actors compromise the name server records and respond to DNS requests with falsified A records. This new technique has only been observed in a few highly targeted operations. We also identified a new wave of victims, including a country code top-level domain (ccTLD) registry, which manages the DNS records for every domain uses that particular country code, that access was used to then compromise additional government entities. Unfortunately, unless there are significant changes made to better secure DNS, these sorts of attacks are going to remain prevalent.


New DNS hijacking technique

Talos now has moderate confidence that the threat actors behind Sea Turtle have been using another DNS hijacking technique. This new technique has been used very sparingly, and thus far have only identified two entities that were targeted in 2018, though we believe there are likely more.

This new technique once again involved modifying the target domain's name server records to point legitimate users to the actor-controlled server. In this case, the actor-controlled name server and the hijacked hostnames would both resolve to the same IP address for a short period of time, typically less than 24 hours. In both observed cases, one of the hijacked hostnames would reference an email service and the threat actors would presumably harvest user credentials. One aspect of this technique that makes it extremely difficult to track is that the actor-controlled name servers were not used across multiple targets — meaning that every entity hijacked with this technique had its own dedicated name server hostname and its own dedicated IP address. Whereas previously reported name server domains such as ns1[.]intersecdns[.]com were used to target multiple organizations.

In one case, a private organization primarily used a third-party service as their authoritative name server. Then, for a three-hour window in January 2018, their name server records were changed to a name server hostname that mimicked a slightly different version of the organization's name. During that three-hour window, the actor-controlled IP address hosted three hostnames, the two actor-controlled name servers and the webmail hostname. This would allow the threat actors to perform a man-in-the-middle (MitM) attack, as outlined in our previous post, and harvest credentials. This technique was also observed against a government organizations in the Middle East and North African region.

Continued activity against ccTLD

The Institute of Computer Science of the Foundation for Research and Technology - Hellas (ICS-Forth), the ccTLD for Greece, acknowledged on its public website that its network had been compromised on April 19, 2019. Based on Cisco telemetry, we determined that the actors behind the Sea Turtle campaign had access to the ICS-Forth network.

Cisco telemetry confirmed that the actors behind Sea Turtle maintained access to the ICS-Forth network from an operational command and control (C2) node. Our telemetry indicates that the actors maintained access in the ICS-Forth network through at least April 24, five days after the statement was publicly released. Upon analysis of this operational C2 node, we determined that it was also used to access an organization in Syria that was previously redirected using the actor-controlled name server ns1[.]intersecdns[.]com. This indicates that the same threat actors were behind both operations.

We also saw evidence that the threat actors researched the open-source tool PHP-Proxy. Notably, this particular C2 node searched for both blog.talosintelligence.com and ncsc.gov.uk, presumably to view Talos' previous reports on DNS hijacking and this DNS hijacking advisory from the United Kingdom's National Cyber Security Centre.

New actor-controlled nameserver

We recently discovered a new actor-controlled nameserver, rootdnservers[.]com, that exhibited similar behavior patterns as name servers previously utilized as part of the Sea Turtle campaign. The domain rootdnservers[.]com was registered on April 5, 2019 through the registrar NameCheap. The new actor-controlled name server rootdnservers[.]com was utilized to perform DNS hijacking against three government entities that all used .gr, the Greek ccTLD. It's likely that these hijackings were performed through the access the threat actors obtained in the ICS-Forth network. Below is a table showing the three most recent actor-controlled name servers that we have associated with this activity and their current operational status.

Hostnames
IP addresses
Operational Status
ns1[.]rootdnservers[.]com.
45[.]32[.]100[.]62
Active
ns2[.]rootdnservers[.]com.
45[.]32[.]100[.]62
Active
ns1[.]intersecdns[.]com
95[.]179[.]150[.]101
Inactive
ns2[.]intersecdns[.]com
95[.]179[.]150[.]101
Inactive

New IP addresses associated with man-in-the-middle activity

By identifying the targeted domains, we were able to identify the hijacked hostnames and the corresponding actor-controlled MitM nodes. The threat actors, again employing previously documented tradecraft, by performing a "certificate impersonation" technique. This is where the threat actors procure an SSL certificate for the targeted hostname from a different SSL provider. Below is a table showing the dates and associated IP addresses.

Date
IP address
April 13, 2019
95[.]179[.]131[.]225
April 16, 2019
95[.]179[.]131[.]225
April 11, 2019
95[.]179[.]131[.]225
April 11, 2019
140[.]82[.]58[.]253
April 10, 2019
95[.]179[.]156[.]61


Updated victimology


Since our initial report, Sea Turtle has continued to compromise a number of different entities to fulfill their requirements. We have identified some of the new primary targets as:
  • Government organizations
  • Energy companies
  • Think tanks
  • International non-governmental organizations
  • At least one airport
In terms of secondary targets, we have seen very similar targets as those previously reported, such as telecommunications providers, internet service providers and one registry.

Coverage and mitigations

In order to best protect against this type of attack, we compiled a list of potential actions. We have included additional security recommendations, that were highlighted by Bill Woodcock during his presentations on DNS/IMAP attacks.
  • We recommend implementing multi-factor authentication, such as DUO, to secure the management of your organization's DNS records at your registrar, and to connect remotely to your corporate network via a Virtual Private Network (VPN).
  • Talos suggests a registry lock service on your domain names, which will require the registrar to provide an out-of-band confirmation before the registry will process any changes to an organization's DNS record.
  • DNSSEC sign your domains, either in-house, or using a DNS service provider which performs DNSSEC key-management services.
  • DNSSEC validate all DNS lookups in your recursive resolver, either using in-house nameservers, or a service like Cisco Umbrella / OpenDNS.
  • Make Internet Message Access Protocol (IMAP) email servers accessible only from your corporate LAN and to users who have already authenticated over a VPN.
  • If you suspect you were targeted by this type of activity, we recommend instituting a network-wide password reset, preferably from a computer on a trusted network.
  • Lastly, network administrators can monitor passive DNS record on their domains, to check for abnormalities.

Indicators of compromise


IP address
Characterization
Date Range
185[.]64[.]105[.]100
Operational Node
March - April 2019
178[.]17[.]167[.]51
Operational Node
June 2019
95[.]179[.]131[.]225
Mitm Node
April 2019
140[.]82[.]58[.]253
Mitm Node
April 2019
95[.]179[.]156[.]61
Mitm Node
April 2019
196[.]29[.]187[.]100
Mitm Node
December 2018
188[.]226[.]192[.]35
Mitm Node
January 2018
ns1[.]rootdnservers[.]com
Actor-controlled nameserver
April 2019
ns2[.]rootdnservers[.]com
Actor-controlled nameserver
April 2019
45[.]32[.]100[.]62
Hosted malicious nameserver
April 2019
ns1[.]intersecdns[.]com
Actor-controlled nameserver
February - April 2019
ns2[.]intersecdns[.]com
Actor-controlled nameserver
February - April 2019
95[.]179[.]150[.]101
Hosted malicious nameserver
February - July 2019


Microsoft Patch Tuesday — July 2019: Vulnerability disclosures and Snort coverage

$
0
0

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 77 vulnerabilities, 16 of which are rated “critical," 60 that are considered "important" and one "moderate."

This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra scripting engine, Internet Explorer and the Windows Server DHCP service. For more on our coverage of these bugs, check out the SNORT® blog post here, covering all of the new rules we have for this release.

Critical vulnerabilities

Microsoft disclosed 16 critical vulnerabilities this month, nine of which we will highlight below.

CVE-2019-0785 is a memory corruption vulnerability in the Windows Server DHCP service. The bug arises when specially crafted packets are sent to a DHCP failover server. A malicious user could exploit this vulnerability by sending a specially crafted packet to a DHCP over failover mode. This could allow them to gain the ability to run arbitrary code on the DHCP failover server or cause the DHCP server to become unresponsive.

CVE-2019-1001 and CVE-2019-1004 are both memory corruption vulnerabilities that exist in the way the scripting engine handles objects in memory in Microsoft browsers. These bugs could corrupt memory on machines in such a way that attackers could gain the ability to execute arbitrary code in the context of the current user. An attacker could exploit these bugs by tricking a user into visiting a specially crafted, malicious web page through Internet Explorer. They could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that uses the Internet Explorer-rendering engine.

CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106 and CVE-2019-1107 are all memory corruption vulnerabilities in the Chakra Scripting Engine that could allow an attacker to gain the ability to execute arbitrary code on the victim's machine. An attacker could exploit these bugs by tricking a user into visiting a specially crafted, malicious web page on Microsoft Edge, or by visiting a site with attacker-created content.

CVE-2019-1113 is a remote code execution vulnerability in the .NET Framework. The vulnerability exists in the way the software checks the source markup of a file. An attacker could exploit this vulnerability by supplying the user with a specially crafted file, and then tricking them into opening it using an affected version of the .NET Framework. An attacker could then gain the ability to execute arbitrary code in the context of the current user.

The other critical vulnerabilities are:

                Important vulnerabilities

                This release also contains 60 important vulnerabilities, two of which we will highlight below.

                CVE-2018-15664 is an elevation of privilege vulnerability in Docker that affects Microsoft Azure internet-of-things edge devices and Azure Kubernetes Service. The bug allows a malicious or compromised container to acquire full read/write access on the host operating system where the container is running. While a fix is still ongoing in Docker, Microsoft recommends customers do not use the Docker copy command on their AKS clusters and the Azure IoT devices.

                CVE-2019-1132 is an elevation of privilege vulnerability in Windows when the Win32k component fails to properly handle objects in memory. An attacker could exploit this bug to run arbitrary code in kernel mode. Microsoft disclosed that this vulnerability has been exploited in the wild.

                The other important vulnerabilities are:

                Moderate vulnerability

                There is one moderate vulnerability, CVE-2019-1075, which is an information disclosure vulnerability in Windows Event Manager.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                Snort rules: 45142, 45143, 46548, 46549, 49380, 49381, 50198, 50199, 50662 - 50683

                Should governments pay extortion payments after a ransomware attack?

                $
                0
                0


                By Jonathan Munshaw. 

                When it comes to ransomware attacks this year, it’s been a tale of three cities.

                In May, the city of Baltimore suffered a massive ransomware attack that took many of its systems down for weeks — restricting employees’ access to email, closing online payment portals and even preventing parking enforcement officials from writing parking tickets. After the attack, the city’s mayor said several times the city would not be paying the extortion request, but it’s still expected to cost the city more than $10 million to recover.

                But two cities — albeit smaller ones — in Florida chose to take a different route. Last month, the governments in Lake City and Riviera Beach chose to pay off their attackers in exchange for the return of their data after ransomware attacks, though they still face some work in decrypting the stolen data.

                The cities paid the hackers a combined $1 million in Bitcoin — and researchers say these kinds of attacks aren’t going to slow down. So when the next city or state government gets hit, should they pay up, or start the long process of manually recovering their data? We asked experts from Cisco Talos and Cisco Security to weigh in.

                We asked all of them the same question: Should city governments be paying ransoms in ransomware attacks? What are the benefits of paying ransoms? What are some of the potential drawbacks? Their answers are below and have been edited for clarity.

                It’s worth noting that, in many cases, it makes more fiduciary sense for cities to pay the ransom and spend time decrypting their data than spending the money to restore all of their systems. For example, last year, Atlanta spent roughly $17 million to recover from a ransomware attack when the attackers had initially requested an extortion payment of $52,000.

                Be sure to tune into the next Beers with Talos podcast, where the hosts will discuss some of their answers and the reasoning behind them.

                Craig Williams, director, Talos Global Outreach: Paying the ransom should be the last resort of any cybercrime victim for several reasons. This is especially scary from a health care perspective. If a government actor could tamper with a primary target’s medical record under the guise of a ransomware campaign, for example, they may be able to get away with harming the primary targets undetected. How do you know the data has not been accidentally corrupted? There are several things that could go wrong even if the ransomware author is trying to do the right thing. The fact that you cannot verify the data’s integrity should be of concern.

                Another negative impact around paying the ransom is that you are literally funding the budget for the people attempting to compromise you. It might be more cost-effective to bite the bullet, shut down the network, and redesign it with proper security architecture in mind.

                Joel Esler, senior manager, Talos Communities Division: Paying ransom is essentially aiding the enemy. You're funding the bad guys with absolutely no guarantee that you will get your files back, or that the attacker hasn't left a backdoor to come back in again.

                Additionally, the vulnerability that caused the attacker to infect your systems in the first place is still present. It is far preferable to have a good backup strategy now before you get hit. Then, if you do get hit, wipe the computers, restore the backups, and before bringing everything back online, patch your systems, perform remedial user training, etc. Ransomware or not, the computer is no longer trusted after a cyber attack.

                Mitch Neff, senior marketing manager, Talos Communities Division: I learned an important first lesson in business back when “business” was cutting grass and slinging newspapers: It is easier to generate revenue from existing customers than it is to find new ones. If you let me cut your grass for $10, I would keep my eyes on your lawn and show back up as soon as it looked shaggy. The only sure-fire way to keep me gone once you paid me was to spend a lot more than I was charging on a new lawn care plan.

                Paying the ransom makes you a customer of the threat actor, and other actors will compete for your (unwilling) business. The ransom itself is only the initial cost and doesn’t advance you any further than you were at the moment of the breach. Notifications, security training, and retooling security platforms to address the root cause will be much more expensive. An ounce of current backups and disaster recovery planning is worth a pound of ransom money.

                Brad Garnett, manager, Cisco Incident Response: We generally do not recommend organizations pay the ransom. First, ransomware is often the byproduct of an ongoing compromise spanning weeks, months, or even years. Ransomware continues to evolve and so does its anti-forensic capabilities that allow the adversary to clear event logs and destroy other critical forensic evidence. Next, paying the ransom does not remove the adversary from your environment, nor fix security underlying security issues that the adversary may have leveraged to gain an initial foothold on your network.

                There's a recent uptick in municipalities and local government entities falling victim to ransomware attacks and paying the ransom to recover data. The decision to pay a ransom should only be considered in the most extreme cases and this should be viewed as a business continuity/disaster recovery workflow (not a forensic investigation, nor the fast-track to recovering an environment).

                Chris Marshall, director, Cisco Talos: I must look at this beyond the view of just a security leader. Victim businesses that find themselves in that difficult situation must determine in a very short time frame if their own staff, incident response capabilities and partner vendors can right the ship to get it all sailing again. The risk must be judged to see if the cost is worth the attempt to get that data back or if these resources can do it within a reasonable timeframe. There are no guarantees in either direction. While the majority opinion seems to be to not pay, to not fund the malicious actor, to not take the gamble of a possible recovery, sometimes it’s worth the risk to that business.

                Nigel Houghton, director, Cisco Talos Operations Division: This is a business decision. There are things that need to happen simultaneously after an infection is discovered: An external security team needs to be brought in to do forensics, assess the damage, validate findings and more at the same time in-house IT security need to be working on restoring backups (if possible) and fixing the entry vectors identified by the forensics team. Meanwhile, another external resource needs to be engaged to deal with the criminals demanding the ransom. At some point, all parties involved need to come together with lawyers and executive leadership, possibly including law enforcement, to determine the best course of action, basically to pay the negotiated ransom or not. This is not a simple “never pay the ransom” or “just pay the ransom” resolution.

                Threat Source newsletter (July 11, 2019)

                $
                0
                0

                Newsletter compiled by Jonathan Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                Generally, when we write about a threat group or attack, that threat will calm down for a while. After all, it’s much for difficult for these threats to survive once awareness spreads about them. However, in the case of Sea Turtle, they’ve actually doubled down on their DNS hijacking techniques. Our new research indicates this group has developed a new way to secretly redirect DNSs, and they’re unlikely to slow down any time soon.

                Ransomware has been making headlines over the past 12 months. Between Atlanta, Baltimore and, most recently, two cities in Florida, governments have been taken down by attackers looking for extortion payments. In the case of the two Florida cities, they chose to pay the extortion payment to the attackers, while Atlanta and Baltimore chose to go the more expensive route and manually recover their data. Which route is best? Which makes the most fiscal sense? We tried to find out in a roundtable featuring experts from Cisco Talos and Cisco Incident Response.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week. Due to the Fourth of July holiday in the U.S., expect our blog and social media to be fairly quiet over the next few days.


                Upcoming public engagements with Talos

                Event: "DNS on Fire" at Black Hat USA
                Location: Mandalay Bay, Las Vegs, Nevada
                Date: Aug. 7
                Speaker: Warren Mercer
                Synopsis: In this talk, Warren will go over two recent malicious threat actors targeting DNS protocol along with the methodology used to target victims, timeline, and technical details. The first is a piece of malware, "DNSpionage," targeting government agencies in the Middle East and an airline. The second actor, more advanced and aggressive than the previous one, is behind the campaign we named “Sea Turtle.”

                Event:“It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                Location: Metro Toronto Convention Center, Toronto, Canada
                Date: Oct. 7 - 10
                Speaker: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Cyber Security Week in Review


                • A new version of the surveillance tool FinSpy has been spotted in the wild stealing information from government and law enforcement agencies. Security researchers say the actors behind the attack appear to monitor mobile device updates closely and constantly tailor FinSpy to avoid detection. 
                • GitHub is cracking down on open-source versions of a deepfake software that can make some people appear naked in videos. The creator of “DeepNude” destroyed the original app, but other creators had tried uploading clones to the code repository.  
                • A vulnerability in the Zoom video conference app could allow an attacker to unknowingly turn on some Mac users’ cameras. The best current workaround is to update the Zoom Mac app and disable the feature that allows Zoom to turn on the camera when joining a meeting. 
                • Adobe’s monthly security update included fixes for vulnerabilities in DreamWeaver, Experience Manager and Bridge CC. None of the bugs are considered critical. 
                • A malicious app on Android known as “Agent Smith” was downloaded more than 25 million times before being removed. The malware disguised itself as a Google updater but instead made modifications to legitimate apps such as WhatsApp. 
                • The U.K.’s privacy watchdog is preparing to fine Marriott the equivalent of more than $11 million for a data breach last year. More than 339 million guests across the globe had their information accessed in an attack that dates back to 2014 but was only disclosed in 2018. 
                • Microsoft security researchers discovered a new fileless campaign that uses living-off-the-land techniques. Known as “Astaroth,” the attack only runs system tools throughout its attack chain.  
                • The Buhtrap APT exploited a Windows zero-day to spy on government institutions in Eastern Europe and Central Asia. The targeted campaigns abused a NULL pointer dereference in the Windows win32k.sys component, which has since been patched. 
                • Apple patched a bug in iMessage that could allow an attacker to completely brick a device. If a user opened a message containing a specific string of characters, they would have to perform a factor reset to regain access to their device. 

                Notable recent security issues

                Title:Microsoft Patch Tuesday
                Description: Microsoft released its monthly security update this week, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 77 vulnerabilities, 16 of which are rated “critical," 60 that are considered "important" and one "moderate." This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra scripting engine, Internet Explorer and the Windows Server DHCP service.
                Snort SIDs: 45142, 45143, 46548, 46549, 49380, 49381, 50198, 50199, 50662 - 50683


                Title:Cisco warns of three critical vulnerabilities in DNA Center
                Description: Cisco released fixes for three critical bugs in its DNA Center last week. Two of the vulnerabilities — which both have a CVSS score of 9.8 out of 10 — involve Cisco Data Center Network manager. The flaws could allow an attacker to gain a valid session cookie or create arbitrary files on the victim machine’s underlying Cisco Data Center Network Manager (DCNM).
                Snort SIDs: 50622, 50637, 50650 - 50653

                Most prevalent malware files this week

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 64f3633e009650708c070751bd7c7c28cd127b7a65d4ab4907dbe8ddaa01ec8b 
                MD5: 42143a53581e0304b08f61c2ef8032d7
                Typical Filename: N/A
                Claimed Product: JPMorganChase Instructions SMG 82749206.pdf
                Detection Name: Pdf.Phishing.Phishing::malicious.tht.talos

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin  
                Claimed Product: N/A  
                Detection Name: W32.46B241E3D3-95.SBX.TG  

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a  
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A  
                Detection Name: W32.AgentWDCR:Gen.21gn.1201  

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin  
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201    

                Threat Roundup for July 5 to July 12

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 5 and July 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Virus.Expiro-7011826-0 Virus Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.
                Win.Dropper.Nymaim-7011878-0 Dropper Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Dropper.TrickBot-7011945-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                Win.Malware.njRAT-7011967-1 Malware njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
                Win.Malware.Tofsee-7012060-0 Malware Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                Win.Ransomware.Gandcrab-7012204-0 Ransomware GandCrab is ransomware that encrypts documents, photos, databases and other important files typically using the file extension ".GDCB", ".CRAB" or ".KRAB." GandCrab is spread through both traditional spam campaigns, as well as multiple exploit kits, including Rig and GrandSoft.
                Win.Packed.Xcnfe-7012508-0 Packed This cluster provides generic detection for the Dridex banking trojan that's downloaded onto a target's machine.
                Win.Packed.Kuluoz-7051229-0 Packed Kuluoz, sometimes known as "Asprox," is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.
                Win.Ransomware.Cerber-7052005-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."

                Threat Breakdown

                Win.Virus.Expiro-7011826-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
                Value Name: Type
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
                Value Name: Start
                27
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\VSS
                Value Name: Type
                27
                MutexesOccurrences
                kkq-vx_mtx127
                gazavat-svc27
                kkq-vx_mtx6427
                kkq-vx_mtx6527
                kkq-vx_mtx6627
                kkq-vx_mtx6727
                kkq-vx_mtx6827
                kkq-vx_mtx6927
                kkq-vx_mtx7027
                kkq-vx_mtx7127
                kkq-vx_mtx7227
                kkq-vx_mtx7327
                kkq-vx_mtx7427
                kkq-vx_mtx7527
                kkq-vx_mtx7627
                kkq-vx_mtx7727
                kkq-vx_mtx7827
                kkq-vx_mtx7927
                kkq-vx_mtx8027
                kkq-vx_mtx8127
                kkq-vx_mtx8227
                kkq-vx_mtx8327
                kkq-vx_mtx8427
                kkq-vx_mtx8527
                kkq-vx_mtx8627
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.vir27
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.vir27
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.vir27
                %CommonProgramFiles%\Microsoft Shared\VSTO\10.0\VSTOInstaller.vir27
                %CommonProgramFiles%\Microsoft Shared\ink\ConvertInkStore.vir27
                %CommonProgramFiles%\Microsoft Shared\ink\InputPersonalization.vir27
                %CommonProgramFiles%\Microsoft Shared\ink\ShapeCollector.vir27
                %CommonProgramFiles%\Microsoft Shared\ink\TabTip.vir27
                %CommonProgramFiles%\Microsoft Shared\ink\mip.vir27
                %ProgramFiles%\DVD Maker\DVDMaker.vir27
                %ProgramFiles%\Internet Explorer\ieinstal.vir27
                %ProgramFiles%\Internet Explorer\ielowutil.vir27
                %ProgramFiles%\Internet Explorer\iexplore.vir27
                %ProgramFiles%\Java\jre6\bin\java.vir27
                %ProgramFiles%\Java\jre6\bin\javaw.vir27
                %ProgramFiles%\Java\jre6\bin\javaws.vir27
                %ProgramFiles%\Java\jre6\bin\unpack200.vir27
                %ProgramFiles%\Java\jre7\bin\jabswitch.vir27
                %ProgramFiles%\Java\jre7\bin\java.vir27
                %ProgramFiles%\Java\jre7\bin\javacpl.vir27
                %ProgramFiles%\Java\jre7\bin\javaw.vir27
                %ProgramFiles%\Java\jre7\bin\javaws.vir27
                %ProgramFiles%\Java\jre7\bin\jp2launcher.vir27
                %ProgramFiles%\Java\jre7\bin\ssvagent.vir27
                %ProgramFiles%\Java\jre7\bin\unpack200.vir27
                *See JSON for more IOCs

                File Hashes

                0f11058b9bb9dce7014b474d85d37f38fef0c65ed40d4cba8045d37728cc3127 12b6dcadcf34533c756995f06ca4c874b355e9fe44fda55f8313e2cfb126b419 1a4c6b55be877c65e946d24812000fb8dfccbdfe19be1b8acc67bce8b4893743 2458be6e8b13f29643ab1bbb040b78d1a94e55e50146eade0a705740eebf054a 26dcb212b2eace9a14bc33b421505143fa0a247df2418b575046df6ef80ee6a9 288fb9363990e5cbbad51e4e0436b4ea69a1cf148dbabae124ffd00151b7bc33 32beb33b4e36b69c79c50928e05d24a8f175d25701bb507e1ad03cdf70b63f3f 3550e5495f8922d17929b8a9bac9c23135d1418356b82576c7dd0a4f15aa95f6 3b2f5faad148f5ed6a824553dded90c2de38978845deb2fbdf99816cabfb8854 4624f0bdb4bb2092cfc73dbd30f7ab61403a0d1c60bef5290c6ed9fe60bff849 47b7d95889199a717407c7a6e8278f5ab9a32c499aabe9930da52f9051304ff2 535bb9df4d41d57fc44572ebc1a535ac726546a41a8b2fcf3b904ed037a96db6 552a987dd3722960cba7fd8c4fc1cd36cc5bf2668c9f0ffe5b452eecdc1824e9 5f998984132fabb1879ddca658baa12d891afbbfd0738d2a2063a491be833a0a 6669a807690556293a60830285c9c2c9ad52842a1c7646e99852724b1b049ab0 67dc0704b4393c6dc523756d107279340eaba04a62d49048588ecd4be5a88aac 6c0f5ca1ab0562b3c285c5556f1a68fbe8a2a5fcec892bbd8333c8a6414c46d8 6cf2f544a52878b86e09d4a6938949fffb1b65c2afae49241c99913e3046baa3 7057f866649141c5f09b96dbece2db447ac2ef1a25ea992d16cc1f44afe9622e 710a3ca2a0030b4b064dc29da045ab7ff61a5f1a5cf11b100ab89a9b1d9ffc83 7327a9114c1facf322d5c31744aa1199a15ba9f57825650b3a548495630c1d63 73aa657a49c7c13b1c0727c05ef7d51fe9fd138862c15fdcc0fd64cdb06ece8d 79732b1aeb27cb1ead7ab37e4681c96d5f97d9e72c6a934b779f05fd82c51473 8de151ef4f21b6e74cc96403debbdd50ecb97299cac0fa7dc988dba68e30c44b 8ef41dc44a6c264c6c475b4d24ad44649a15f4bbbb4e237580621865361b995b
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Dropper.Nymaim-7011878-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\GOCFK 23
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                23
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}23
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}23
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}23
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}23
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}23
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}23
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}23
                Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}23
                Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}23
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                xunveu[.]in22
                rerbitzfyff[.]in22
                uwsmf[.]net22
                utgwcrp[.]com22
                xyiubkksjo[.]pw22
                octvwlg[.]net22
                mzutglz[.]com22
                bjgouvf[.]net22
                ulgug[.]in22
                bybxug[.]pw22
                ilqmz[.]com22
                wnckjojra[.]net22
                vncya[.]in22
                mzpgaccm[.]in22
                cspflbgtpwxg[.]com22
                pcarbnracpll[.]in20
                hnmkptaybcf[.]pw20
                ypgfnvixxaw[.]in20
                emuakrgqzg[.]pw20
                ucwwhvxji[.]com20
                rinzevlc[.]net20
                zdlvqrnmf[.]net20
                chavpayztnex[.]net20
                fwceecdhnnph[.]net20
                xlwzoffpooo[.]com20
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %ProgramData%\ph23
                %ProgramData%\ph\fktiipx.ftf23
                %TEMP%\gocf.ksv23
                %ProgramData%\l4szb23
                %LOCALAPPDATA%\15rdg23
                %APPDATA%\4fo23
                %TEMP%\fro.dfx20
                \Documents and Settings\All Users\pxs\pil.ohu20
                %TEMP%\bpnb.skg10
                %TEMP%\wghpl.bqj1
                \Documents and Settings\All Users\akt\aaq.hcr1
                %TEMP%\mfw.cac1
                \Documents and Settings\All Users\yvn\uwawv.hnd1

                File Hashes

                21ca501957eb98d23abf16f253027ccf878f8045408dfefe9428df4357d8e4ac 2c7e7c4b50c4eccd7d68eb6aeea2a234a8b6f16cbc82740f85cf950755195aed 2f281ae6cd2f21d87ddd323ea4f1fe37949fd97e9d8fd69019c88754537dbd69 4e242fcebfb964c32ae3d53ac0bb5d85ff940cd58e26733bb677c4fafbd1c7c7 59a7dd286660811bb00e121c3e46c7e591f28e73fffa1d0b2b90eedb8a7824b1 5f4333e507e6d1868060e38423f036facc05cb30b863bef129ecf4db8c45470f 6b21c1f71ee50d296c0ada1d6c8924388b2049556c67966d8a4fcb513ad5afea 829e62346b8b1c58fa10995003137254a9c30f03154875c66b881c9ea6f45e5e 8da1535783ed2194ae6751f2a62964e0969758caa84e24cffaca42dd801e2c11 936179c3eccc864f82de20a7e7620679b78f4439a06b954afea38e81e8dc4597 a1099ca231637ee33617ec9fd3751bc79780a1e4cf5b27a320d8350f83520f86 a3a7b86869d6a01fd9ec3f91b909b40d82e1f970b7d5760c213a6cc7744fc33a a44b775b0768448ba60a004e452d0b3b36fbd92bf68ad97095a7b2fbad4df0c0 ac9f91736bfa4b2659ee9f3b2f4aabb5f6f9bf8ff92ffc9f4b1eb597c97b7580 b0b4f210c37edf202d27069530d03f808cb72c5103adab2c964d7e35fc372ec0 b516d410b359b11a05a0e94f39cfb7671139899bff1e1aa08dcaf8440c8c5f97 b8d03c79b54cca29f77504b224ec785ca19c735d9137a3c0265066711c6a658e c33f524a6bbde609dda5ebe36ab56d4c8963a9099446e8da94ea4e48531aa4d8 c50561443829e85ed8477ebab944e1fb44f36d1cf1148f6b1d2c9e4fe95454b1 c855e4b372f4bc3a66c9da5ffa57e39a95fe024bf11d5008097010adcb3a93a1 cd38e469faf445589dd68e69ee193533d86945355019b37f93f1232c0e337b71 f1553bddcfd8a3b662251154296dbac605b1e45e3cdab36af876fb431f0f6c71 f9548073e75760af718afb6466557ef52f84e0f43591b7b44e1f090b590ed6db

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Dropper.TrickBot-7011945-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                10
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender 2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Users\Administrator\AppData\Roaming\services\
                2
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Users\Administrator\AppData\Roaming\services\
                2
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions 2
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths 2
                MutexesOccurrences
                316D1C7871E0016
                \BaseNamedObjects\785161C8872009
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]239[.]34[.]214
                37[.]230[.]115[.]1294
                78[.]155[.]207[.]1434
                193[.]233[.]62[.]1314
                195[.]133[.]196[.]2193
                200[.]111[.]97[.]2353
                186[.]68[.]120[.]163
                37[.]230[.]115[.]1713
                37[.]230[.]115[.]1333
                62[.]69[.]241[.]1033
                216[.]239[.]36[.]212
                23[.]21[.]121[.]2192
                50[.]16[.]229[.]1402
                94[.]103[.]80[.]162
                216[.]239[.]32[.]211
                34[.]233[.]102[.]381
                198[.]27[.]74[.]1461
                104[.]20[.]17[.]2421
                216[.]239[.]38[.]211
                54[.]235[.]124[.]1121
                52[.]206[.]161[.]1331
                104[.]20[.]16[.]2421
                94[.]127[.]111[.]141
                184[.]73[.]220[.]2061
                46[.]30[.]45[.]2081
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ipecho[.]net5
                elb097307-934924932[.]us-east-1[.]elb[.]amazonaws[.]com5
                myexternalip[.]com2
                checkip[.]amazonaws[.]com2
                api[.]ipify[.]org2
                wtfismyip[.]com1
                ipinfo[.]io1
                icanhazip[.]com1
                Files and or directories createdOccurrences
                Modules16
                client_id16
                group_tag16
                %System32%\Tasks\services update16
                %APPDATA%\localservice\client_id14
                %APPDATA%\localservice\group_tag14
                %APPDATA%\localservice14
                %SystemRoot%\Tasks\services update.job9
                %SystemRoot%\TEMP\~DFDA4328936B46A2E2.TMP1
                %SystemRoot%\TEMP\~DFBEE2068C496B9A0B.TMP1
                %SystemRoot%\TEMP\~DFE4F856122203E5A6.TMP1
                %SystemRoot%\TEMP\~DF95BC682C0250D9D0.TMP1
                %SystemRoot%\TEMP\~DF664B3409FD7DCCB3.TMP1
                %SystemRoot%\TEMP\~DF8B34B44DCAF0FAB3.TMP1
                %SystemRoot%\TEMP\~DFDFC8A9E27AB554F4.TMP1
                %SystemRoot%\TEMP\~DFE798A25A56E126CC.TMP1
                %SystemRoot%\TEMP\~DFCCEBCD519293AB68.TMP1
                %SystemRoot%\TEMP\~DF5DE8F500481F14C0.TMP1
                %SystemRoot%\TEMP\~DFB36F6F7DB9D671D4.TMP1
                %SystemRoot%\TEMP\~DF7A2364BFEF750112.TMP1
                %SystemRoot%\TEMP\~DF604668AE25DEDE76.TMP1
                %APPDATA%\localservice\82b686b66ad703470800edb64763f2b64e1cffaa6830accbe7ff8178e6b48724.exe1
                %SystemRoot%\TEMP\~DF7802BEE615801D53.TMP1
                %SystemRoot%\TEMP\~DF50F658542C3B5672.TMP1
                %SystemRoot%\TEMP\~DF5E22B8EF8D659CE2.TMP1
                *See JSON for more IOCs

                File Hashes

                008d13100397cf0ce26850e3bcbb5a8c2fc01502d9a2b452439c101aea7d0824 0214625318a30153d364581fb580334f05be63bd5a355cbf86f12be66461716d 11f8a050648d0b8c70d19a99c48aeb9ba0d893d348ee503b96313b4499d96c63 198311c124d55765d5488c44a27d94087c67599f88e7b7afdcce4a1bc936c0c3 36c46dd363ce161955f1fe561791fe7a6f923e8c185b8dd0408211d8001f3515 48994b0e9f9a32783b49759a81e09e818a0faad7b854f349819a0cca9e04ebbb 646d1f9f85c1d2db58748961f9c08147f011434cd79be11cafff4db43a10218a 6c0f7bb7d6d7782d9fbf4b5c9659a8e3502e7ad6ccdb9527311cbd554b716459 71d157b247885a9fac9d5a2de95d62675a2887bd539face9f6d97a749bf368a9 7ee35d3aca75c64bff75826baa082a1d65e5d0a0c4bc5a258d37d22facbaf159 82b686b66ad703470800edb64763f2b64e1cffaa6830accbe7ff8178e6b48724 928e054bade6765803e23936c60ede96cb02603eeecbd98abbef98f88d431c06 98a9522efeef7720f8ba8aad303259eb1e52b35d9b38cc5a44715439d4729b0e a418ba3cb2818dba4487178db3ac2beabdbd73aec9a5ce38d93d7c3eeb998fba ebe4c5cdda2437d323417c8d4e43a4fb973665c89a6a7dcf28c2ad0803612f5d f01e645d797000911da3221face197fd3a6eeb12d2e6acc99b984236530d117b

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Malware.njRAT-7011967-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: di
                26
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                26
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                26
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 24
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 24
                <HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 24
                <HKCU>\Software\3d115699981cee571b7b4f66ac05e68c 7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3d115699981cee571b7b4f66ac05e68c
                7
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3d115699981cee571b7b4f66ac05e68c
                7
                <HKCU>\SOFTWARE\3D115699981CEE571B7B4F66AC05E68C
                Value Name: [kl]
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: d357c7c29de6f023d943a6a5749259b6
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: d357c7c29de6f023d943a6a5749259b6
                1
                <HKCU>\SOFTWARE\D357C7C29DE6F023D943A6A5749259B6
                Value Name: [kl]
                1
                <HKCU>\Software\eecedbc08899b6053b2f68175c2ade9d 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: eecedbc08899b6053b2f68175c2ade9d
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: eecedbc08899b6053b2f68175c2ade9d
                1
                <HKCU>\SOFTWARE\EECEDBC08899B6053B2F68175C2ADE9D
                Value Name: [kl]
                1
                <HKCU>\Software\cee69a9c58a2f342efc10ce9b61baf18 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: cee69a9c58a2f342efc10ce9b61baf18
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: cee69a9c58a2f342efc10ce9b61baf18
                1
                <HKCU>\SOFTWARE\CEE69A9C58A2F342EFC10CE9B61BAF18
                Value Name: [kl]
                1
                <HKCU>\Software\c89d6f2f51b03aeeb600705006913620 1
                <HKCU>\SOFTWARE\C89D6F2F51B03AEEB600705006913620
                Value Name: [kl]
                1
                MutexesOccurrences
                Unknown26
                Global\783b85a0-9df2-11e9-a007-00501e3ae7b526
                3d115699981cee571b7b4f66ac05e68c7
                767e342b9464203399b874be2f756a331
                88f1bb19962eeb60cb416d731fb26aea1
                e4147808b03abe9f0c3c590c783b5f671
                cd37f8fb04904790aec64ec6b02964331
                b2d5379932f9d6eda0b4b4e483e6f7061
                d1c945c77014d102f98a39383a30a06f1
                54652225b66d96cf87694edf842a80cd1
                43ea784f064f564187850c70cfe36c6e1
                d357c7c29de6f023d943a6a5749259b61
                eecedbc08899b6053b2f68175c2ade9d1
                cee69a9c58a2f342efc10ce9b61baf181
                c89d6f2f51b03aeeb6007050069136201
                b92cfeca418c2dea22378d2a69b20e0d1
                2fec419046b765ea0c3b4e01c9db47a71
                853654d9e10653518ce2df77e9edb5a01
                f6a16052a275bda28850cb9c07e032e61
                2c19e5532f94fc5804396a44a7b110751
                bd038787fbc588893c8c348e22ae35571
                f1d09ec17b6425dd6e0a316aeae5b67e1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                156[.]196[.]135[.]144
                67[.]214[.]175[.]693
                159[.]89[.]214[.]311
                66[.]199[.]229[.]2511
                85[.]17[.]30[.]1671
                154[.]121[.]37[.]51
                62[.]117[.]61[.]1301
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                magichako[.]publicvm[.]com7
                shadowhakar41[.]ddns[.]net2
                AAAA5[.]HOPTO[.]ORG1
                kounan19[.]myq-see[.]com1
                salehboot[.]ddns[.]net1
                updated[.]ddns[.]net1
                blackstrretboy[.]ddns[.]net1
                z12z12[.]hopto[.]org1
                bobaramos[.]ddns[.]net1
                hackerdzarit[.]ddns[.]net1
                hassan1212[.]ddns[.]net1
                rezallta[.]ddns[.]net1
                serveo[.]net1
                android-update[.]servehttp[.]com1
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Mirosoft.js26
                %APPDATA%\Microsoft\Windows\Templates\Windows.Exe26
                %TEMP%\dw.log24
                %TEMP%\73E7.dmp24
                %HOMEPATH%\Start Menu\Programs\Startup\Mirosoft.js24
                %HOMEPATH%\Templates\Windows.Exe24
                %TEMP%\server.exe13
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\3d115699981cee571b7b4f66ac05e68c.exe7
                %TEMP%\ddn.exe2
                %APPDATA%\explorer.exe1
                %APPDATA%\server.exe1
                %TEMP%\system32.exe1
                %APPDATA%\wininit.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\767e342b9464203399b874be2f756a33.exe1
                %TEMP%\syswine.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\cd37f8fb04904790aec64ec6b0296433.exe1
                %TEMP%\updated.exe1
                %TEMP%\svchos.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\d1c945c77014d102f98a39383a30a06f.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\cee69a9c58a2f342efc10ce9b61baf18.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\b92cfeca418c2dea22378d2a69b20e0d.exe1
                %TEMP%\windows updates.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\f6a16052a275bda28850cb9c07e032e6.exe1

                File Hashes

                07ae3ba8b6bb636c3cbc305d25f60d1b8544cbd3932ec60a41979aca444a0c8a 09332d76d630cf20549d849b207a78ac2608d719c7bdfedcf3904d9b07587210 14f0bf6f2bb1706c7c64c42a6dec0d18743ce84455cfa5507671628f09e0056b 29a28ff8074cacda1ee387ea13ea3264fc0819a32ba207002014b69a01e7d20a 2ce9507eca7390d1447568f575a31b3cccc185239956c34df11b8a97d5a41d6f 30ba3ca3f8bfe1be88a41da21b74b442f89ac3b9bc991f1429620cfe43a3d957 3709900a8d262b587769688b9ad51196212647f0c461cfa7c6aa02aad03f4c8e 37cf34ef1a59fa7f2a821d2aea146aa341d56ad8cbe8b60c028218919d9fb65c 3afaa0d40d4d857113aa2211bb268bb71a9f172a66581172c891171f3ec595d1 438a539d7fc684ff23c37d28f6968e16a26361baa95611374e844b527d8348f2 4492ee2ea728db7e9ef4a385f08890082d7754aad197aec3d3ad8a1f1b2e0554 49b6302a30504389f9f9fc0efb48da95aa52053e9c1a1ebcb309dcc0c60c071e 4ff6b9d3c069558001457fef65c1623d05ef503580db96a5b444ccc8dfb58fe8 59c9a7f0f2c8c0abdbe9790fe6d1f4b08dadb7764500fee60fd9782c076cdf40 59e1820154d4a5e6bc42158847a3f82cb25f4e7ac6a89fec036357a5e9ce6342 83e0d7c8af1ab2095ebfd11d195f5b2f1f999d741c0487c97c4f814050d0bb6f 8b9d87a3c7b4a03bf14459e9efdb89b4a73c3ffb006396638163ccd0ac73a72f 8e225d1629cb1c372d096f3d32bb621fadeba5b1c4489b08069ff977130d7bdd 9c36c86b6d998c5c3bded236f5fe94ac15239d8d283afe73acffb35bf45fea39 9cfe4f5840153f5bd81ac360c812854063952cb01fc5f3848fe9d460d84b17d7 9d46831f0a0d012493bde6165661a9af05199aa7451ca4bd89c840546d2c9d0e a0d93958f9ccada56204fafd970d87ff67d40f78014c65cc3ce063979578aaf7 a1739268211e4f63d1f8d89a897272a945f709e9350a4a8a8f788995b5086c54 b1a0998fd2465208767650c597906941f2c95d9acaa69254238f1923ab6290fb bc63a9907ef52f5c765a390b140e94b253b97f83aa3959f45c2ee0dcb823e0bb
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Malware.Tofsee-7012060-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 13
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 13
                <HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\athnmuap 13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: Type
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: Start
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: ErrorControl
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: DisplayName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: WOW64
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: ObjectName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: Description
                13
                <HKU>\.DEFAULT\Control Panel\Buses 12
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config0
                12
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config1
                12
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config4
                10
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config2
                10
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config3
                10
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\gzntsagv
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\athnmuap
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\mftzygmb
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MFTZYGMB
                Value Name: ImagePath
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: ImagePath
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
                Value Name: ImagePath
                2
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                43[.]231[.]4[.]713
                69[.]55[.]5[.]25012
                239[.]255[.]255[.]25010
                46[.]4[.]52[.]10910
                176[.]111[.]49[.]4310
                85[.]25[.]119[.]2510
                144[.]76[.]199[.]210
                144[.]76[.]199[.]4310
                98[.]137[.]159[.]2710
                192[.]0[.]47[.]5910
                209[.]85[.]202[.]2710
                168[.]95[.]5[.]11410
                104[.]44[.]194[.]2329
                104[.]44[.]194[.]2369
                94[.]23[.]27[.]389
                188[.]125[.]73[.]878
                74[.]6[.]137[.]658
                65[.]55[.]92[.]1848
                65[.]55[.]33[.]1358
                65[.]55[.]92[.]1688
                65[.]55[.]92[.]1528
                65[.]55[.]37[.]728
                65[.]54[.]188[.]728
                104[.]44[.]194[.]2318
                65[.]55[.]37[.]1208
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                microsoft-com[.]mail[.]protection[.]outlook[.]com13
                250[.]5[.]55[.]69[.]in-addr[.]arpa12
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org10
                250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org10
                mta7[.]am0[.]yahoodns[.]net10
                mta5[.]am0[.]yahoodns[.]net10
                mx-eu[.]mail[.]am0[.]yahoodns[.]net10
                250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net10
                whois[.]iana[.]org10
                250[.]5[.]55[.]69[.]bl[.]spamcop[.]net10
                whois[.]arin[.]net10
                250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org10
                hotmail-com[.]olc[.]protection[.]outlook[.]com10
                mta6[.]am0[.]yahoodns[.]net10
                honeypus[.]rusladies[.]cn10
                marina99[.]ruladies[.]cn10
                coolsex-finders4[.]com10
                sexual-pattern3[.]com10
                msx-smtp-mx1[.]hinet[.]net9
                ipinfo[.]io8
                yahoo[.]fr6
                charter[.]net6
                mx0[.]charter[.]net6
                smtp[.]secureserver[.]net6
                msa[.]hinet[.]net6
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\athnmuap13
                %TEMP%\wmslmukt.exe13
                %SystemRoot%\SysWOW64\config\systemprofile:.repos12
                %SystemRoot%\SysWOW64\config\systemprofile12
                %System32%\antugrwv\nuhhkvni.exe (copy)10
                %HOMEPATH%9

                File Hashes

                130c448935b7cda787b3b2c25759959feb78b4da0578993910dea9810ac5d65b 144f230d8ff21cebd98c9baceb3f6bf183cddf3faf499ef998265ce229c6c96f 1849aaffd6046b733d684532e2c96e9022df4a024f5d906f112d1dbe3a8cfe3b 3857377eca60c925c02e5225156497b7e048239b492c2bba6e183ffa11a1fca2 67a3626583d536db9f4e8facf0e2054db1aa5cb3fc0ffc2dd994b6e784aaf0fe 8b5bcebde67ea9f0f71b9dbceff20f719334b364efe2555c0a7faa53c2cccab9 993beed87fcc986b4dacb829f412f3cd0d8d3bd055abf62ad4b2808e308d2a90 ade3682626c6aa2269e28672fe60ebbeafc42a60f5e02922d2506d6bbe8f353c ae2cc0636044f30a1c0c662699b23bb371584fe4a53cad4ed63f91c25afa5dbb b1a7847311263f61d845e04d26d4bdb477ebc511e53438ab11408b69f079140c b2b29afc2cf0d1f3d4d0e29cf102c168d09405d7f1aa98426f1b2f6ae79ca1eb d63483697d4daef64ece202d8d000b45c5db118d55865b2c981b49dbc2ec80ea e0def1110bf0854a33f83b38925aee003e3264a35c41df58f39cc6cface46412

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Win.Ransomware.Gandcrab-7012204-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                15
                <HKCU>\SOFTWARE\keys_data\data 10
                <HKCU>\SOFTWARE\keys_data 10
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\TASKBAND
                Value Name: FavoritesChanges
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\TASKBAND
                Value Name: FavoritesVersion
                9
                <HKCU>\Software\EncryptKeys 9
                <HKCU>\SOFTWARE\ENCRYPTKEYS
                Value Name: local_enc_private_key_len
                9
                <HKCU>\SOFTWARE\ENCRYPTKEYS
                Value Name: local_public_key_len
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\TASKBAND
                Value Name: FavoritesResolve
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\TASKBAND
                Value Name: Favorites
                9
                <HKLM>\SOFTWARE\Wow6432Node\ex_data\data 5
                <HKLM>\SOFTWARE\Wow6432Node\keys_data\data 5
                MutexesOccurrences
                Global\8B5BAAB9E36E4507C5F5.lock15
                BleepingComputer_no_more_ransom9
                Global\XlAKFoxSKGOfSGOoSFOOFNOLPE5
                Global\syncronize_9WATTOA1
                Global\syncronize_9WATTOU1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                213[.]186[.]33[.]515
                185[.]135[.]88[.]10513
                23[.]236[.]62[.]14713
                217[.]70[.]184[.]5013
                66[.]96[.]147[.]10313
                149[.]56[.]154[.]14113
                199[.]188[.]201[.]21813
                47[.]75[.]206[.]14813
                45[.]118[.]145[.]9613
                69[.]163[.]193[.]12713
                23[.]100[.]15[.]18013
                142[.]93[.]6[.]24913
                62[.]210[.]24[.]11613
                104[.]31[.]75[.]22710
                104[.]27[.]162[.]2419
                104[.]28[.]31[.]1608
                104[.]24[.]103[.]1537
                45[.]33[.]91[.]796
                104[.]24[.]102[.]1536
                194[.]154[.]192[.]676
                186[.]202[.]153[.]956
                217[.]160[.]0[.]275
                209[.]182[.]208[.]2455
                94[.]73[.]148[.]185
                213[.]186[.]33[.]35
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]cyclevegas[.]com13
                img[.]maokeyang[.]cn13
                himmerlandgolfogsparesort[.]dk13
                www[.]casegranmoun[.]com13
                acbt[.]fr5
                www[.]billerimpex[.]com5
                asl-company[.]ru5
                www[.]macartegrise[.]eu5
                oceanlinen[.]com5
                nesten[.]dk5
                perovaphoto[.]ru5
                koloritplus[.]ru5
                pp-panda74[.]ru5
                dna-cp[.]com5
                boatshowradio[.]com5
                www[.]mimid[.]cz5
                tommarmores[.]com[.]br5
                cevent[.]net5
                poketeg[.]com5
                alem[.]be5
                h5s[.]vn5
                wpakademi[.]com5
                www[.]fabbfoundation[.]gm5
                6chen[.]cn5
                zaeba[.]co[.]uk5
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Templates\LiveContent\Managed\SmartArt Graphics\1033\TM02660319[[fn=Tab List]].glox23
                %HOMEPATH%20
                %HOMEPATH%\ntuser.ini15
                %HOMEPATH%\98b689da98b68e3d7f.lock14
                %HOMEPATH%\AppData\98b689da98b68e3d7f.lock14
                %APPDATA%\98b689da98b68e3d7f.lock14
                %APPDATA%\Media Center Programs\98b689da98b68e3d7f.lock14
                %APPDATA%\Microsoft\98b689da98b68e3d7f.lock14
                %APPDATA%\Microsoft\Internet Explorer\98b689da98b68e3d7f.lock14
                %APPDATA%\Microsoft\Internet Explorer\Quick Launch\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Cookies\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Desktop\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Documents\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Documents\My Music\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Documents\My Pictures\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Documents\My Videos\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Downloads\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Favorites\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Links\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Music\98b689da98b68e3d7f.lock14
                %HOMEPATH%\My Documents\98b689da98b68e3d7f.lock14
                %HOMEPATH%\NetHood\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Pictures\98b689da98b68e3d7f.lock14
                %HOMEPATH%\PrintHood\98b689da98b68e3d7f.lock14
                %HOMEPATH%\Recent\98b689da98b68e3d7f.lock14
                *See JSON for more IOCs

                File Hashes

                0341bda36f866ba3f1577ff22863cc98f3db2eb576f9ddba0efd72226362fc43 0420cacdcaf5e4dea7eacab7a960a18bc6037a88b87c1965636e70a1c3227721 11f5d5328ee2f9cef980dcfbb30621c0310eda7a6d7827c5781b32dd0d15ec22 3cb3e5d46cfbd6e6f7e1cb2398df4ff36d615657e9156bd5381564e283ce58a8 4229d9cbca43732abbe849cf9b41cb92e62702a9716a36040a51ae4ae53b4035 4844c20d9a7b7f968d0dc2a2155abb371b53098f17c14d02eca4c3e318532d59 4ce34bd577092109a075a1889b0a7de35348d6e1c5055e8fed4c78f1deed3ffe 4eb064297e7f7c2353d9a6838527168e38765163f252277049fa55eab0adc8d7 567c39590d4590c201b42384e0188ce2e621613444da676c5a4a5010fd27e4a8 5c9db3e49d5f7633752a11bf74e9d11140ddfab0957bbdabd6c55eadaa9b87f9 68ae6904af508a6fdd6cb66f8db5ddb8fc1d3da7c97241ffe31a818fa0e8ed72 720b56fd906ba499f031c7747f630fec03bec5c0bcd4a48751783550fb089df5 7662ed6be2dda454c3660d65db1a0c4d67af16a563a0c128bcf6d8a498526c7a 87b9a389d2797a074483d4147805e82f225702363afe8d1f95416cdc6dc77678 8c099167fbe1897dc8390979486353371194c2cfcb8095b6542f13670c75cab4 9c0e9a4eadea6cab1ec7faf191e77e77b91e709d8222b5c2a1d30059d026f266 a0c0eab3ce2d8be0e79d2f45b106095912f28f3f55e179cb376d7c71323146f6 a159c38828b48df7f02089b7e69e18e154054c45aa056cb9a6cefe47cd1dda47 b00ff6be8bc64d83f2d33042b9bc17110e03acc140dc3a26aa777767f210bd1e b423e1d48c0278c2844858deff96748e9d28e8fb076990a57de6b85d8beacb03 bb187240ab8850d6b731921ab5d3ae0caeb5015ac5986af51af789ea75a3ef71 c6b096d8100033e510406c7d3f5ae5e16c8d3fb976509dacbc435c0bd0e3a118 c992d5faf5fc1cbafaf5e40e3fcfc0daad218bda2768b3640a97ed5185f91627 d88411b37cb58467d6f6050675757d8ec5cb7dfa1bbb9804f898010d4611eac6 ddee26d282c0eac34452e28c3295638fc9c887ee8f5750913f7de255b929b493
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella


                Win.Packed.Xcnfe-7012508-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: trkcore
                25
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: DisableTaskMgr
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                Value Name: CheckSetting
                25
                MutexesOccurrences
                47DjnezoRe2
                IXK1mBzkeB2
                RkTC1Yz5Uz2
                TmvHGtjMMV2
                gTBa3BMJg62
                mssh1fu7QG2
                pyG6EAoW3D2
                rPy4lSuqRA2
                ii60Bmwus71
                vKukwxgBam1
                CUDKUvauMV1
                KCeMGJgXYT1
                SFxcCQUOXu1
                SUC2X0PwVg1
                X3ENRc03mQ1
                YWuTH3ehY01
                nVz9jsXjUw1
                oFYy6Mcbck1
                0CNHUsuQfc1
                2rTNQbESAE1
                PbFIJDskBy1
                R5aLQD5OQO1
                rrQXp0Shel1
                9ykplVD3nO1
                sKcAQgjpGg1
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                172[.]217[.]12[.]14225
                104[.]20[.]209[.]2113
                104[.]20[.]208[.]2112
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                pastebin[.]com25
                www[.]fvtbhlnxj0[.]com2
                www[.]fynzp0oht8[.]com2
                www[.]in4lprxgui[.]com2
                www[.]ct1wlbyjzx[.]com2
                www[.]uttn4zziks[.]com2
                www[.]lrv8bvrmhq[.]com2
                www[.]rm1cbe2kvb[.]com2
                www[.]tcp1twzitf[.]com2
                www[.]gzw0bfzxhb[.]com1
                www[.]glixbn9lnj[.]com1
                www[.]coxymk80cd[.]com1
                www[.]exgk5nzv7m[.]com1
                www[.]c62yc6xsm1[.]com1
                www[.]hludxizrvf[.]com1
                www[.]huga7gshpk[.]com1
                www[.]rjhw2tvcvh[.]com1
                www[.]5twtwy19pp[.]com1
                www[.]fwn4l9u2gb[.]com1
                www[.]xpqvri1vhh[.]com1
                www[.]seqamoa4jp[.]com1
                www[.]b7qxyidhg5[.]com1
                www[.]porsukgrlq[.]com1
                www[.]lqdu4kraxu[.]com1
                www[.]t0uetiplqk[.]com1
                *See JSON for more IOCs

                File Hashes

                071530d5d5e7021d1138953c314be94b1808f172e46e2e6e2b28d97ffbf2c0b1 178f3b0fc03659a616e12f423e870ab1aab778b44bd82cbc06e2c485f04bf8c3 1d987ccce04b8ba41261670691d44983a11ec2518098b312be88cb71beffa897 381a0476632ef5d0ebccd2ab242efc6a83a2e4834f2cb1fa3fa67f8fb4c09972 39c3b3c78175e68a946f81d3f5e5b2e4e45d2575387e0ab49324832fe1f47452 45103c6e8ccfda4b3f15ce4b2f3ecfdd44e1d335206f75b9a43665d35f0da2ee 486e2ea46a4e4d0e0392cb35c2e81ec465a0f89908f67a029c67c31a6178c20b 4c148b99dedd40de86d9fa90aeffae2615d465cef96547e32e2f76719f85cb26 6becb03594eaa1591c61343ba50e39df29ae01499aae44edf98a403970b0c8ac 73508f028e327bb43f8881d00a1067b5566e62b83ea5f98167a4a1947c24805a 7b89b754f7a6874a3273eedae6002a97d6ad2fab6be330207454f1ab403d38cc 8110313cc103989b2cf33894381e8715214e9003cde31d6fdf1bc8c5b49a4e89 82f1226d731f6f3c27911079d760b544b88da1e8eb5f61f4071d1d50aff37702 9915365d2bea4cd179b535b6591443ed07206dcdeb76f07dcfb9a0858e53be5b a1e834564e9e46ee8ee26b853b4341de9909840cb82357e5ceca6cceb5346733 a5922d0eb96861fa4d6354ea66b4cb3adca32c2767de523becd1f27c7fc3cd22 b17f763211175ee8f0cbe6aec43037fb299122dcd57367b7723dd27522934365 b7c692bea525a7f6fbde41f5f85212ca38495b23795efe801246ce061ae0d6d6 bf920f2cde720bd50bab18f19b4a55ec397461dcb184e46b51884294030311a9 c80454dfd900f67cb0e22b653c5dd0b3b45cb5ac2bdf8c47c45e3ba82fb36e79 c92b1407e77bcfeb097fbe7e03c22d5adad5e437522c2bcecaa3005973817d45 dd07a463b6a9f7405660ce8ae71307e044ec17a17d9dd06cbd456cf716d51a11 f745b8cf0c6e0c86f647613e3ee3557f471bf5f4ab5b7b37565881d6d1b83838 faee0cb6a7535b30312dfb855a1c59a24dc533564ff1aa5405f351a4748b6464 fdca740263e4d6dd9d71bacb869b3792010c9e427216e54c72edfc9acfe584d7

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Packed.Kuluoz-7051229-0

                Indicators of Compromise

                MutexesOccurrences
                2GVWNQJz126
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                178[.]63[.]193[.]6017
                74[.]208[.]246[.]25016
                37[.]26[.]108[.]4114
                133[.]242[.]134[.]7614
                62[.]75[.]143[.]21113
                78[.]47[.]145[.]7213
                77[.]72[.]26[.]978
                Files and or directories createdOccurrences
                %LOCALAPPDATA%\hcxlrall.exe2
                %LOCALAPPDATA%\nxeeoucb.exe2
                %HOMEPATH%\Local Settings\Application Data\rbgruqii.exe2
                %HOMEPATH%\Local Settings\Application Data\leqahubc.exe1
                %HOMEPATH%\Local Settings\Application Data\kwoisujq.exe1
                %HOMEPATH%\Local Settings\Application Data\qoqjntog.exe1
                %HOMEPATH%\Local Settings\Application Data\pegwmgts.exe1
                %HOMEPATH%\Local Settings\Application Data\oubnlaau.exe1
                %LOCALAPPDATA%\bufneahr.exe1
                %LOCALAPPDATA%\ixhcodud.exe1
                %LOCALAPPDATA%\esnbtcpu.exe1
                %LOCALAPPDATA%\qphrcdrs.exe1
                %LOCALAPPDATA%\gamnsluq.exe1
                %LOCALAPPDATA%\qakojkqh.exe1
                %LOCALAPPDATA%\tachgniq.exe1
                %LOCALAPPDATA%\wcsmjqql.exe1
                %LOCALAPPDATA%\akkqeuve.exe1
                %LOCALAPPDATA%\huhqpcvi.exe1
                %LOCALAPPDATA%\bxqfccqi.exe1
                %LOCALAPPDATA%\jbsxvqlw.exe1
                %LOCALAPPDATA%\gjqfijgu.exe1
                %LOCALAPPDATA%\qxvxkxtb.exe1
                %LOCALAPPDATA%\nsahkntd.exe1
                %LOCALAPPDATA%\ptlqijon.exe1
                %LOCALAPPDATA%\saxrgecs.exe1
                *See JSON for more IOCs

                File Hashes

                00722db9477ac36de1c2862fc9f35cafc7a01347110d29102dce98cdf72155bc 012ab737e3a2128c76e48db7bef2768bdd57778e4af397ec133c6079c42411c5 012c77f8b7c99a1d27823d452e130abc5cac6f000adf05d56c7f2ae47a9d72bf 0146c339fb7ec7f1284c123da8e8a4d4faf8c52301949b1da482696a054c87d1 01afc54230a064be47e8948f41b699a33ed1fef92eada1fbab8cde2ab0655d03 02494b4c16f22b6d4f92ce1eef08a661cea52f673c7eb0289579290d46717898 03c783b4a26b0d890a71bdf0a643bdb96de4818898177a4716333b435ca1cd28 04a85f4471adefcba2b10c0e32a2fe12ff81b804205730f3cc21f3db4bc49b7c 04b02fc83ba2785e3216acccb81490bb1db3807bc2a2a255a193313ed90717fd 04f45879c4e79a6bea82e39aea468d8e1f8e55f13c8dbde1e4855141b19b26e6 0522ba3cf1a33345ee6bffade7ff3f73d8d3d018994f08e1a9d36df93efa9299 06370b03ef47ca5e5547d750f49034fbeb3782c201e36921c2577f074123ccb8 069df491cffe2a3fe59b8e85dce0e6520b61c2a8d9fd164277ee0f9a254354d0 06bc29e3a3c0cdc268fca231cb64458228d9d11b5f72cb6416321c986832aaf8 07067626f964e49a6efde18624deed513c1a53f5ac096e2bc422fdf23d70dedf 0763b04d0acac49c55a7fec6f47169e7567ccd9c0ed9264ddadd848bb08b7b65 08f908d9480fc99e75ba466f9fa113495db64e6decf5d26ced63a24a9c240caa 091fabce8131379f261ab41ade48b8b5ffb939f66e0219cc5083c85346d99661 0a579fd78803ea10efd73e5e1a36986f5a4f1caba4fecb0774d918ba578818de 0ae4096d1264141e9714700691f6fcad18b1ccac36f73d9e580a652b6b9e2743 0b7adc1b0cfd8e7b0b24f98a7ff788ef6ce9f361f09b286bee4d99ec5bd2c0ac 0c042729532173d9c64ab369c0710861299ed553b201c218a1453c52d967032c 0e0e274ce9e54e585f9ac7d096f3092f152f090fb5f5273d6086270f2b8da40d 0eacc634900f97e7c7b7e421db1f38c40e869dc86e79c0f490b71572510e6085 0ef4c5d715006cba42eb775a72e285c59c7ccf64082dcc85e3ed2843b1fc1be7
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Ransomware.Cerber-7052005-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 18
                <HKCU>\Printers\Defaults\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 18
                <HKCU>\PRINTERS\Defaults 18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: Run
                18
                <HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
                Value Name: AutoRun
                18
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: SCRNSAVE.EXE
                18
                <HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}
                Value Name: Installed
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                Value Name: CleanShutdown
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
                Value Name: Generation
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
                Value Name: Data
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
                Value Name: Generation
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
                Value Name: Data
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
                Value Name: Generation
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
                Value Name: Data
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
                Value Name: Generation
                7
                <HKLM>\SYSTEM\CONTROLSET001\ENUM\PCIIDE\IDECHANNEL\4&A27250A&0&2
                Value Name: CustomPropertyHwIdKey
                7
                <HKLM>\SYSTEM\CONTROLSET001\ENUM\USB\VID_46F4&PID_0001\1-0000:00:1D.7-2
                Value Name: CustomPropertyHwIdKey
                7
                <HKLM>\SYSTEM\CONTROLSET001\ENUM\PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00\3&2411E6FE&2&18
                Value Name: CustomPropertyHwIdKey
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: winrs
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: rasautou
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: rasautou
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: getmac
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: getmac
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Utilman
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: Utilman
                1
                MutexesOccurrences
                shell.{381828AA-8B28-3374-1B67-35680555C5EF}18
                \BaseNamedObjects\shell.{573F0F01-C284-E3E4-B166-E3C39544ED56}17
                cversions.1.m12
                GeneratingSchemaGlobalMapping12
                cversions.2.m12
                Local\ExplorerIsShellMutex8
                1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                31[.]184[.]235[.]22418
                31[.]184[.]234[.]12818
                31[.]184[.]234[.]018
                31[.]184[.]235[.]25218
                31[.]184[.]235[.]25418
                31[.]184[.]235[.]24818
                31[.]184[.]235[.]12818
                31[.]184[.]234[.]22418
                31[.]184[.]234[.]19218
                31[.]184[.]235[.]19218
                31[.]184[.]234[.]25218
                31[.]184[.]234[.]25418
                31[.]184[.]234[.]24818
                31[.]184[.]235[.]018
                31[.]184[.]235[.]24018
                31[.]184[.]234[.]24018
                216[.]239[.]32[.]218
                216[.]239[.]34[.]217
                216[.]239[.]38[.]217
                216[.]239[.]36[.]217
                104[.]26[.]15[.]736
                147[.]135[.]15[.]1865
                104[.]26[.]14[.]735
                185[.]100[.]85[.]1501
                54[.]84[.]252[.]1391
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ipinfo[.]io18
                en[.]wikipedia[.]org8
                www[.]collectionscanada[.]ca8
                alpha3[.]suffolk[.]lib[.]ny[.]us8
                www[.]archives[.]gov8
                www[.]vitalrec[.]com8
                www[.]cdc[.]gov8
                freegeoip[.]net6
                ip-api[.]com5
                52uo5k3t73ypjije[.]hlu8yz[.]top2
                52uo5k3t73ypjije[.]xmfru5[.]top2
                onion[.]to1
                cerberhhyed5frqa[.]onion[.]to1
                52uo5k3t73ypjije[.]zclw5i[.]top1
                52uo5k3t73ypjije[.]ujtwhg[.]top1
                52uo5k3t73ypjije[.]ka0te8[.]top1
                52uo5k3t73ypjije[.]j92msu[.]top1
                52uo5k3t73ypjije[.]nameuser[.]site1
                52uo5k3t73ypjije[.]b7mciu[.]top1
                52uo5k3t73ypjije[.]marksgain[.]kim1
                52uo5k3t73ypjije[.]moonsides[.]faith1
                52uo5k3t73ypjije[.]bigfooters[.]loan1
                52uo5k3t73ypjije[.]poplenjohs[.]review1
                Files and or directories createdOccurrences
                %APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.html17
                %APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.txt17
                %APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.url17
                %APPDATA%\Adobe\Acrobat\9.0\# DECRYPT MY FILES #.vbs17
                %APPDATA%\Adobe\Acrobat\9.0\JavaScripts\# DECRYPT MY FILES #.url17
                %APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.html17
                %APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt17
                %APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.url17
                %APPDATA%\Microsoft\Office\Recent\# DECRYPT MY FILES #.vbs17
                \MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html17
                \MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt17
                \MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url17
                \MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs17
                \MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html17
                \MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt17
                \MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url17
                \MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs17
                \MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html17
                \MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt17
                \MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url17
                \MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs17
                \MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html17
                \MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt17
                \MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs17
                \MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html17
                *See JSON for more IOCs

                File Hashes

                209658cf26f8038c101648b334666a1cbd99ba42a080a43876e8029213fd405b 274afa596526d108c10f535087a70a4fa67b6f1fd104d21e3c8674af03f7adfe 39c03cb39ccac093652c84050ce94ee6369a61bc8a1ca6a29da77e29085b2911 5a7a2465a741812bb9f5f6d203600e190db972f3e04dba331af035ccb27c61fb 70ee34b58fdfb524314767a6054328bd22fe04b57d6ac91e4509ec4ca11255ea 7fe89fee44b718691ba4af29f533b375ad78bdee6660a89071f80f8b12c58295 84237ea2516de3f238fbcc495a5c50b3c2ef72001b0afc14d0939a984d1dbf22 934861f1991b586ea681132cf93cc5a3d0892158ffa310ac55691c996e6bec19 9bf0aa931cd9e7faf11a6b17ead1493b98dae3155d948eb648d2b797e301a2cc ad93c9f4410bb99238320518457308695053b36d9034ba6a3720a9294b6b4c4f b52f586b1d185c332aa2c8ec7e196747b817344e508896bb24996c607cbd4581 b8148a65912385e4ce63f6ea7bb78b30479dddbc84d2bd6cbe9fa1a3425c27a3 d41538fe9d4c4edb975df9af8850749b9db89cd470139b0a58ff8d68e5b6240f eaf534a49e96dcbd62b64e4ca52c2aa087f554eec76d40760393841f4440f451 ec3b5abf71ccbe9986bf6033ab48cb2f616519825047dbdf7668f7fea8bcebeb eefe9124619775ab69b2cd620988245f928a8bb9c988298b9340f82cdf0187a7 f65d7ea6666e7aa4d3bac195a0493c4b736c995d36118915a1d10567a2b31b3f f8c55ef8913ff76ec97e8d226fdbe88c82a2ccaab4662fd6859585f3db946d6d

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid


                Umbrella




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                Madshi injection detected - (1969)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Kovter injection detected - (1195)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Process hollowing detected - (792)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Trickbot malware detected - (714)
                Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                Dealply adware detected - (468)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Gamarue malware detected - (125)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Atom Bombing code injection technique detected - (61)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                PowerShell file-less infection detected - (42)
                A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                Installcore adware detected - (38)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Excessively long PowerShell command detected - (37)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

                SWEED: Exposing years of Agent Tesla campaigns

                $
                0
                0
                By Edmund Brumaghin and other Cisco Talos researchers.

                Executive summary

                Cisco Talos recently identified a large number of ongoing malware distribution campaigns linked to a threat actor we're calling "SWEED," including such notable malware as Formbook, Lokibot and Agent Tesla. Based on our research, SWEED — which has been operating since at least 2017 — primarily targets their victims with stealers and remote access trojans.

                SWEED remains consistent across most of their campaigns in their use of spear-phishing emails with malicious attachments. While these campaigns have featured a myriad of different types of malicious documents, the actor primarily tries to infect its victims with a packed version of Agent Tesla — an information stealer that's been around since at least 2014. The version of Agent Tesla that SWEED is using differs slightly from what we've seen in the past in the way that it is packed, as well as how it infects the system. In this post, we'll run down each campaign we're able to connect to SWEED, and talk about some of the actor's tactics, techniques and procedures (TTPs).

                2017: Steganography

                One of the earliest SWEED campaigns Talos identified dates back to 2017. In this attack, the actors placed droppers inside of ZIP archives, and then attached those ZIPs to emails. The attachments usually had file names similar to "Java_Updater.zip" or "P-O of Jun2017.zip". Here's an example of an email associated with this campaign:
                The attached ZIP archive contained a packed version of Agent Tesla. The packer uses .NET and leverages steganography to hide and decode a second .NET executable, which uses the same technique to retrieve the final Agent Tesla payload. Here's the file stored in the resource:
                And here's the algorithm used to decode the PE stored in that image:
                The decoded binary is stored in the array.

                January 2018: Java droppers

                In early 2018, we observed that SWEED began leveraging Java-based droppers. Similar to previous campaigns, the JAR was directly attached to emails and used file names such as "Order_2018.jar". The purpose of the JAR was to obtain information about the infected system and facilitate the download of a packed version of Agent Tesla. Interestingly, only a few months prior to these campaigns, a HackForums user with the account name "Sweed" actively sought out a Java crypter — but we'll get to that activity later.

                April 2018: Office exploit (CVE-2017-8759)

                In April 2018, SWEED began making use of a previously disclosed Office exploit. One of the documents featured in these email campaigns was notable because it was a PowerPoint document (PPXS). Code contained inside one of the slides triggers an exploit for CVE-2017-8759, a remote code execution vulnerability in Microsoft .NET framework.
                You can see the execution of external content hosted on the attacker-controlled web server using the file name "chuks.png". As expected, the PNG is not actually an image. Instead, it is a Soap definition in XML, as seen in the screenshot below:
                The purpose of this code is to decode a URL and download a PE32 hosted on an attacker-controlled web server. The resulting executable is a packed version of Agent Tesla.

                May 2018: Office exploit (CVE-2017-11882)

                In May 2018, campaigns being conducted by SWEED began leveraging another vulnerability in Microsoft Office: CVE-2017-11882, a remote code execution bug in Microsoft Office that is commonly observed being leveraged in malicious documents used in commodity malware distribution.

                We see how the vulnerability abuses the Equation Editor in Office when executing the sample in ThreatGrid:
                As seen below, the malicious document is designed to appear as if it is an invoice.
                As consistent with previous campaigns, the purpose of this malicious document is to download and execute a packed version of Agent Tesla.

                2019: Office macros and AutoIT droppers

                Beginning in 2019, the campaigns associated with SWEED began leveraging malicious Office macros. As with previous attacks, they are leveraging spear-phishing emails and malicious attachments to initiate the infection process.
                The attached XLS contains an obfuscated VBA macro, which executes a PowerShell script using a WMI call. The PowerShell script is also obfuscated using XOR operations to hide its code. Once decoded, it reveals itself to be .NET.
                This .NET code is responsible for performing some checks and downloading another executable file. The obfuscation scheme used in this code is the same as the one used in the previously described PowerShell. The downloaded file is then saved and executed.
                Call graph after WMI execution.

                The downloaded binary is an AutoIT-compiled script. The script has a lot of junk code designed to make the analysis more difficult and time-consuming.
                Extracted AutoIT script.

                The strings and some of the commands contained in the AutoIT script have been obfuscated using XOR operations, as described below.
                The decoder receives two hex strings: The first is the string to deobfuscate, while the second determines the number of rounds of the XOR operation. The XOR operation is performed on each character against the length of the second parameter. This operation is then repeated for as many times as the length with the length and the position. If the length value is one, then the operation is repeated twice using the same key, which leads to a plaintext hex string.

                After performing environment checks, the malware will reconstruct the assembly code which is obfuscated in a hex string. Using the AutoIT scripting language Dll* family functions the code is loaded into the current process address space.
                Memory allocation

                Finally, the malware executes the assembly code with two arguments. The first argument is the path for an executable. This assembly will create a process with the executable and will inject the payload into this process.
                As expected, the final payload in this campaign is another packed version of Agent Tesla.

                UAC bypass

                One of the common characteristics with several of the campaigns associated with SWEED is the use of various techniques to bypass User Account Control (UAC) on infected systems. An example of this is present within the campaigns observed in 2019. When the malware is first executed on systems, it executes "fodhelper.exe", which is a Windows process running as high integrity. Prior to executing it, the malware sets the following registry key:

                HKCU\Software\Classes\ms-settings\shell\open\command

                This registry key points to the location of the malicious executable:
                This key is used by "fodhelper.exe" and its value is executed as administrator whenever fodhelper.exe is executed. This functionality simply allows for the malware to bypass UAC and is not a privilege escalation vulnerability — the user must already have administrative access rights on the system. It is used to avoid displaying a UAC prompt to the user. This second instance of the malware is then executed with administrative access to the infected system.

                SWEED infrastructure

                The various distribution campaigns linked to SWEED feature use of a limited amount of distribution and C2 infrastructure with the same servers used across many different campaigns over long periods of time. The majority of the registrants associated with the domains used by SWEED list the following email addresses:

                aaras480@gmail[.]com
                sweed.[redacted]@gmail[.]com

                The registrant contact information used to register most of the domains is also consistent:
                In April 2018, a security researcher published a screenshot of an RDP server believed to have been actively leveraged by SWEED (84.38.134[.]121):
                In the screenshot above, the list of user accounts established on the RDP server can be seen, which includes an account named "sweed." The fact that multiple users are currently active indicates that this server is being used in a multi-user capacity and provides a platform on which members of SWEED can function collaboratively. This also likely indicates a business relationship between multiple individuals responsible for these ongoing malware distribution campaigns.

                We also identified several DDNS domains which were being used to facilitate connectivity to the shared RDP server that feature many of the same values as the RDP user accounts:
                • sweedoffice[.]duckdns[.]org
                • sweedoffice-olamide[.]duckdns[.]org
                • sweedoffice-chuks[.]duckdns[.]org
                • www.sweedoffice-kc.duckdns[.]org
                • sweedoffice-kc.duckdns[.]org
                • sweedoffice-goodman.duckdns[.]org
                • sweedoffice-bosskobi.duckdns[.]org
                • www.sweedoffice-olamide.duckdns[.]org
                • www.sweedoffice-chuks.duckdns[.]org
                During our analysis of various campaigns associated with SWEED, we identified several common elements that also reflect the distinct values associated with users of the RDP server. In many cases, the distribution servers being used to host malicious PE32 being distributed by SWEED contained a directory structure consisting of multiple directories containing the binaries being distributed. In many cases, the binary file names used, as well as the directory names used to host the malicious content reflected the same users present on the RDP server.

                For example, in June 2019, the following URLs were hosting malicious content associated with these campaigns:
                • hxxp://aelna[.]com/file/chuks.exe
                • hxxp://aelna[.]com/file/sweed.exe
                • hxxp://aelna[.]com/file/duke.exe
                Likewise, when investigating samples associated with known domains used to exfiltrate sensitive information from infected systems, we can see the following binary file names being used repeatedly across campaigns over a long period of time:
                • dadi.exe
                • kelly.exe
                • chuks.exe
                • olamide.exe
                • sweed.exe
                • kc.exe
                • hero.exe
                • goodman.exe
                • duke.exe
                • hipkid.exe
                In several cases, the directory structure present on the distribution servers contained multiple directories hosting malicious files, an example listing below using the domain sodismodisfrance[.]cf:
                • sodimodisfrance[.]cf/2/chuks.exe
                • sodimodisfrance[.]cf/6/chuks.exe
                • sodimodisfrance[.]cf/5/goodman.exe
                • sodimodisfrance[.]cf/1/chuks.exe
                • sodimodisfrance[.]cf/1/hipkid.exe
                • sodimodisfrance[.]cf/5/sweed.exe
                • sodimodisfrance[.]cf/2/duke.boys.exe
                These appear to match the handles used by actors known to be associated with SWEED. Another known domain used to exfiltrate sensitive information collected by Agent Tesla is sweeddehacklord[.]us. Analysis of known malware seen communicating with this domain shows similar patterns of operations.

                In analyzing the malware activity associated with SWEED, we also investigated the use of interesting paths in the hosting of the administration panels associated with the various RATs and stealers being distributed by this group. Indeed, on a single C2 server, we identified several panel with the following URLs:
                • sweed-office.comie[.]ru/goodman/panel
                • sweed-office.comie[.]ru/kc/panel/
                • wlttraco[.]com/sweed-office/omee/panel/login.php
                • wlttraco[.]com/sweed-client/humble1/panel/post.php
                • wlttraco[.]com/sweed-client/sima/panel/post.php
                • wlttraco[.]com/sweed-office/omee/panel/post.php
                • wlttraco[.]com/sweed-office/kc/panel/post.php
                • wlttraco[.]com/sweed-office/olamide/panel/post.php
                • wlttraco[.]com/sweed-office/jamil/panel/post.php
                • wlttraco[.]com/sweed-client/niggab/panel/post.php
                • wlttraco[.]com/sweed-client/humble2/panel/post.php
                • wlttraco[.]com/sweed-office/harry/panel/post.php
                Based on our research, as well as the panel-hosting locations, we believe that wiki, olamide, chuks, kc, goodman, bosskobi, dadi, hipkid, and others are SWEED customers or business associates. Using the binary file names, directory structures, and other artifacts, we have been able to identify interesting online behavior and interests exhibited across various hacking forums, IRC servers, etc. that appear to link some of these users with various elements of the malware distribution campaigns.

                There are several other domains that can be linked to SWEED that appear to be associated with various malware families and distribution campaigns. These have been observed to resolve to the IP associated with the aforementioned RDP server, as well.
                • sweeddehacklord[.]us
                • sweed-office.comie[.]ru
                • sweed-viki[.]ru

                Use of typosquatting

                Another interesting element of many of the campaigns associated with SWEED is the use of typosquatting for the domains used to host the packed Agent Tesla binaries that have been distributed over the past few years.
                Victims' geographic dispersion.

                Looking at the victimology from a country point of view it is clear that there is no geographic focus, when choosing their target. SWEED target companies all over the world.
                Breakdown of victim's activity by industry.

                The breakdown by activity however does show a clear tendency for manufacturing and logistics companies.

                Here's a rundown of these domains, along with the companies they are supposed to look like and the industry that the company is associated with. In some cases we were unable to determine the targeted organization from the typosquatted domain.
                In all of the domains listed above, the registrant account information associated with the domains is consistent with what we have identified as associated with SWEED campaign activity.

                Operational Security (OPSEC)

                We identified various behavior on hacking forums, IRC channels, and other web sites that appeared consistent with the TTPs we observed with the actor distributing this malware.

                "SWEE D"

                During our analysis, we identified a user on HackForums using the moniker "SWEE D." In most of the online posts associated with this user, their contact information was included in the post and listed the Skype address "sweed.[redacted]".

                In the months leading up to the January 2018 campaigns, we observed this user posting asking for access to a Java crypter. Typically, crypters are used to help evade antivirus detection as they "crypt" the contents of the malicious payload being distributed.
                The same user posted repeatedly in threads related to Java crypters, and even annoyed other users with how often they were posting:
                The same Skype account listed in the HackForums posts was also used by someone using the name "Daniel" in 2016 while commenting on a blog related to the creation of Facebook phishing pages:
                This same Skype account was also used in 2015 by someone going by the name "[redacted] Daniel."
                Note: [redacted] is also the name used in the email address associated with the registrant account for the domain wlttraco[.]com (sweed.[redacted]@gmail.com).

                We also located screenshots that were published on the Twitter account .sS!.! showing the Discord server "Agent Tesla Live" that listed sweed ([redacted] Daniel) as a member of the staff.
                It is important to note that the avatar used by this Discord user (SWEE D) is the same avatar that is used by Skype user sweed.[redacted].
                We actually contacted SWEE D on Skype and were able to confirm that the same user operates the Discord and Skype accounts:
                During our interaction with SWEE D, they mentioned that they are a student studying ethical hacking and that they work in the IT departments of various companies to help remove malware and increase their security.
                This is contrary to the following activity which was observed in an IRC transaction where a user named "sweed" was submitting credit card information to a bot listening in the channel in an effort to check the validity and usability of presumably stolen credit card information.
                The IRC channel appeared to be created and used solely for this purpose, with a bot named "chkViadex24" returning information related to the credit card that was submitted:
                This is an example demonstrating how stolen credit information is actively being used by adversaries to determine whether or not they can monetize the information once they have stolen it from victims.

                It's possible that "SWEE D", "sweed" and [redacted] Daniel may be the same person. We also identified the following LinkedIn profile that listed the same name:
                This account lists Nigeria as their location. "[redacted]" is a Nigerian novel. Many of the details we identified during our analysis of "sweed," such as information in the LinkedIn profile, the references to "[redacted]," the registrant information used, and the location listed in the Skype account indicate the individual is likely located in Nigeria. We believe "sweed" is a key member of the group and that other accounts are likely associated with customers or business partners.

                Conclusion


                SWEED has been active for at least three years — and a user with that name has been active on various forums, IRC channels and Discord servers since at least 2015. Currently, SWEED is actively targeting small and medium-sized companies around the world. Based on the TTPs used by this group, SWEED should be considered a relatively amateur actor. They use well-known vulnerabilities, commodity stealers and RATs (Pony, Formbook, UnknownRAT, Agent Tesla, etc.) and appear to rely on kits readily available on hacking forums. SWEED consistently leverages packing and crypting in order to minimize detection by anti-malware solutions. We assess that SWEED also does not have effective operational security, as they used several of the same online accounts for about five years, allowing for the discovery of a lot of their information, operations and associates.

                At this time, we cannot say with certainty whether the other accounts and associated individuals associated with SWEED are business associates or customers. However, they all use the same infrastructure in a coordinated manner across domains, rely on the same malware and packers, and all operate very similarly. While SWEED is relatively well-known in the security research community, this research provides insight into how these cybercriminal organizations operate and evolve over time in an effort to maximize their ability to generate revenue and evade detection. We expect SWEED to continue to operate for the foreseeable future and we will continue to monitor their activities to ensure that customers remain protected.

                Coverage


                Ways our customers can detect and block this threat are listed below.


                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                Indicators of Compromise (IOCs)


                The following IOCs have been observed as being associated with malware campaigns conducted by this group.

                Campaign #1

                Java_Updater.zip -> 59b15f6ace090d05ac5f7692ef834433d8504352a7f45e80e7feb05298d9c2dd
                P-O of Jun2017.zip -> e397ba1674a6dc470281c0c83acd70fd4d772bf8dcf23bf2c692db6575f6ab08
                Agent Tesla: 8c8f755b427b32e3eb528f5b59805b1532af3f627d690603ac12bf924289f36f

                Campaign #2

                Java sample=> d27a29bdb0492b25bf71e536c8a1fae8373a4b57f01ad7481006f6849b246a97

                Campaign #3

                New Order For Quotation.ppsx -> 65bdd250aa4b4809edc32faeba2781864a3fee7e53e1f768b35a2bdedbb1243b

                Campaign #4

                SETTLEMENT OF OUTSTANDING.xlsx -> 111e1fff673466cedaed8011218a8d65f84bee48d5ce6d7e8f62cb37df75e671

                Campaign #5

                Request and specification of our new order.xls -> 1dd4ac4925b58a2833b5c8969e7c5b5ff5ec590b376d520e6c0a114b941e2075
                Agent Tesla -> fa6557302758bbea203967e70477336ac7a054b1df5a71d2fb6d822884e4e34f

                Domains

                sweeddehacklord[.]us
                sweed-office.comie[.]ru
                sweed-viki[.]ru
                sweedoffice.duckdns[.]org
                sweedoffice-olamide.duckdns[.]org
                sweedoffice-chuks.duckdns[.]org
                www.sweedoffice-kc.duckdns[.]org
                sweedoffice-kc.duckdns[.]org
                sweedoffice-goodman.duckdns[.]org
                sweedoffice-bosskobi.duckdns[.]org
                www.sweedoffice-olamide.duckdns[.]org
                www.sweedoffice-chuks.duckdns[.]org
                aelna[.]com
                candqre[.]com
                spedaqinterfreight[.]com
                worldjaquar[.]com
                zurieh[.]com
                aiaininsurance[.]com
                aidanube[.]com
                anernostat[.]com
                blssleel[.]com
                bwayachtng[.]com
                cablsol[.]com
                catalanoshpping[.]com
                cawus-coskunsu[.]com
                crosspoiimeri[.]com
                dougiasbarwick[.]com
                erieil[.]com
                etqworld[.]com
                evegreen-shipping[.]com
                gufageneys[.]com
                hybru[.]com
                intermodaishipping[.]net
                jltqroup[.]com
                jyexports[.]com
                kayneslnterconnection[.]com
                kn-habour[.]com
                leocouriercompany[.]com
                lnnovalues[.]com
                mglt-mea[.]com
                mti-transt[.]com
                profbuiiders[.]com
                quycarp[.]com
                regionaitradeinspections[.]com
                repotc[.]com
                rsaqencies[.]com
                samhwansleel[.]com
                serec[.]us
                snapqata[.]com
                sukrltiv[.]com
                supe-lab[.]com
                usarmy-mill[.]com
                virdtech[.]com
                willistoweswatson[.]com
                xlnya-cn[.]com
                zarpac[.]us
                Oralbdentaltreatment[.]tk
                wlttraco[.]com

                Beers with Talos Ep. #57 - It’s a business decision, not rocket science

                $
                0
                0


                Beers with Talos (BWT) Podcast Ep. #57 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded July 8, 2019 — Matt skipped this episode podcast in favor of a meeting (for real). The rest of the crew carried on to discuss a few of this week’s hot-button issues, such as municipalities paying (or not paying) the ransom, NASA JPL reporting APT breached their network via a rogue Pi (in true Mr. Robot fashion), and looking at rogue devices in general. Next episode will be our last before Black Hat and DEFCON, so tune in to find out where you can find Talos at those conferences.

                The timeline:

                • 01:30 — Roundtable: Craig has a terrible internet plan, just saying.
                • 10:45 — Paying the ransom, yeah or nah? If so, when?
                • 21:00 — NASA JPL finds an APT with their fingers in the Raspberry Pi
                • 40:00 — Can owned and rogue devices be used for hunting?
                • 49:00 — Closing shots and parting thoughts.

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), and Nigel Houghton (@EnglishLFC).

                Hosted by Mitch Neff (@MitchNeff) with special guest Liz Wharton (@LawyerLiz).

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Viewing all 1927 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>