Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Threat Source newsletter (July 18, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

A group we’re calling “SWEED” may be behind years of Agent Tesla attacks. This week, we uncovered everything we know about this actor, and ran down their TTPs and discussed how users can stay safe.

If you didn’t get enough of the ransomware debate last week, we have even more talk of extortion payments on the latest Beers with Talos episode, too.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week. Due to the Fourth of July holiday in the U.S., expect our blog and social media to be fairly quiet over the next few days.


Upcoming public engagements with Talos

Event: "DNS on Fire" at Black Hat USA
Location: Mandalay Bay, Las Vegs, Nevada
Date: Aug. 7
Speaker: Warren Mercer
Synopsis: In this talk, Warren will go over two recent malicious threat actors targeting DNS protocol along with the methodology used to target victims, timeline, and technical details. The first is a piece of malware, "DNSpionage," targeting government agencies in the Middle East and an airline. The second actor, more advanced and aggressive than the previous one, is behind the campaign we named “Sea Turtle.”

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Researchers discovered another round of stalkerware on the Google Play store that stole users’ SMS messages and call history. Google has since removed these apps, but they were downloaded a combined 130,000 times. 
  • While the attackers behind the Gandcrab ransomware say they’ve retired, new evidence suggest they may still be active. A new, more advanced malware known as “REvil” has their fingerprints all over it.  
  • More than 300 cities in California have access to a surveillance and data-mining company's information. And there’s evidence to suggest that data is being shared with the cities’ police departments to create “digital dragnets.”  
  • A digital privacy rights group is suing AT&T and two data aggregation services over the sale of cellular device users’ location data. The lawsuit alleges that AT&T sold customers' real-time location data to credit agencies, bail bondsmen and other third parties without users’ consent. 
  • Oracle disclosed more than 320 vulnerabilities as part of its quarterly security update. This released includes patches for 10 bugs in Java, including nine that are exploitable without authentication. 
  • The U.S. Federal Trade Commission and Facebook agreed on a $5 billion settlement over the Cambridge Analytica scandal. But some lawmakers and privacy advocates say the punishment did not go far enough.  
  • Cyber criminals are increasingly turning their attention to schools in wealthier cities. Attackers believe they contain large sums of data, and are more likely to be able to afford potential requested extortion payments.  
  • Two months after the Windows BlueKeep vulnerability was revealed, it has yet to be exploited in the wild. Researchers are left guessing if attacks are happening quietly, or if attackers haven’t yet been able to figure out how to bypass other security hurdles.  
  • The image-altering app FaceApp has again exploded in popularity. However, the app, which shows what users may look like as they age, comes with some serious privacy concerns.  
  • Slack is resetting the passwords of thousands more users due to new information it discovered about a data breach in 2015. That number is equivalent to roughly 1 percent of the software’s users at the time of the attack. 
  • A Google employee recently leaked more than a thousand voice recordings from Home devices to a Belgian news outlet. The company says human review is necessary to ensure its products work correctly, and slammed the leak as a security breach. 

Notable recent security issues

Title: Vulnerabilities in Zoom meeting software could turn on Mac cameras  
Description: Two vulnerabilities — CVE-2019-13449 and CVE-2019-13450 — in the Zoom remote could allow an attacker to use a malicious website to automatically start a Zoom meeting and look in on a user's Mac camera. While Zoom says it has mitigated the issue, users are also encouraged to ensure the Mac Zoom app is up to date and to disable the setting that allows Zoom to automatically turn on the machine's camera when joining a meeting. New SNORT® rules fire when they detect a file containing Zoom client information trying to disclose sensitive information.
Snort SIDs: 50724 - 50729 (Written by Joanne Kim)

Title: Anubis malware returns to haunt Android users  
Description: Researchers at Trend Micro recently discovered more than 17,400 new samples of the Android malware. Anubis has targeted several different banking apps on Android stores, installing malicious espionage and banking trojan capabilities onto users' mobile devices. The actor behind Anubis has been active for at least 12 years, constantly making updates and adding new features. All four of these rules fire when Anubis attempts to make an outbound connection to a command and control (C2) server.
Snort SIDs: 50734 – 50737 (Written by Tim Muniz)

Most prevalent malware files this week

MD5: 4a50780ddb3db16ebab57b0ca42da0fb  
Typical Filename: xme64-2141.exe  
Claimed Product: N/A  
Detection Name: W32.7ACF71AFA8-95.SBX.TG  

MD5: 47b97de62ae8b2b927542aa5d7f3c858  
Typical Filename: qmreportupload.exe  
Claimed Product: qmreportupload  
Detection Name: Win.Trojan.Generic::in10.talos  

MD5: db69eaaea4d49703f161c81e6fdd036f  
Typical Filename: xme32-2141-gcc.exe  
Claimed Product: N/A  
Detection Name: W32.46B241E3D3-95.SBX.TG  

MD5: 8c80dd97c37525927c1e549cb59bcbf3  
Typical Filename: Eter.exe  
Claimed Product: N/A  
Detection Name: W32.WNCryLdrA:Trojan.22ht.1201  

MD5: e2ea315d9a83e7577053f52c974f6a5a  
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin  
Claimed Product: N/A  
Detection Name: W32.AgentWDCR:Gen.21gn.1201 

Threat Roundup for July 12 to July 19

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 12 and July 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Trojan.XtremeRAT-7059357-1 Trojan XtremeRAT is a remote access trojan active since 2010 that allows the attacker eavesdrop on users and modify the running system. The source code for XtremeRAT, written in Delphi, was leaked online and has since been used by similar RATs.
Win.Trojan.Kuluoz-7059308-0 Trojan Kuluoz, sometimes known as "Asprox," is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.
Win.Malware.Ursnif-7059281-1 Malware Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
Win.Dropper.Qakbot-7058187-0 Dropper Qakbot, aka Qbot, has been around for since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
Win.Ransomware.Cerber-7057873-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns this is no longer the case.
Win.Malware.Nymaim-7057729-0 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
Win.Trojan.Gh0stRAT-7059563-0 Trojan Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Malware.Ramnit-7057249-1 Malware Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
Win.Trojan.Tofsee-7055545-0 Trojan Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Threat Breakdown

Win.Trojan.XtremeRAT-7059357-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\Software\Wow6432Node\Microsoft\DownloadManager 24
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 24
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>
Value Name: ServerStarted
18
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKLM
13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKCU
13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JavaMIX
11
<HKLM>\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4N0N6X03-FM54-BKFY-G3EI-66VH61YVX11M} 7
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{4N0N6X03-FM54-BKFY-G3EI-66VH61YVX11M}
Value Name: StubPath
7
<HKCU>\SOFTWARE\JM2POJ
Value Name: InstalledServer
7
<HKCU>\SOFTWARE\JM2POJ
Value Name: ServerStarted
7
<HKCU>\SOFTWARE\LZT6VGCN
Value Name: InstalledServer
4
<HKLM>\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{751C040L-SHHK-78QW-GC0V-VI60R44D4SB8} 3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{751C040L-SHHK-78QW-GC0V-VI60R44D4SB8}
Value Name: StubPath
3
<HKCU>\SOFTWARE\J5AVE
Value Name: InstalledServer
3
<HKCU>\SOFTWARE\J5AVE
Value Name: ServerStarted
3
<HKCU>\SOFTWARE\FKVRGHZ
Value Name: InstalledServer
3
<HKLM>\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{H3JO8F05-3V0W-JBMA-H0A7-SSL627KW467I} 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{H3JO8F05-3V0W-JBMA-H0A7-SSL627KW467I}
Value Name: StubPath
2
<HKCU>\SOFTWARE\AL7IUSZ
Value Name: InstalledServer
2
<HKCU>\SOFTWARE\AL7IUSZ
Value Name: ServerStarted
2
<HKLM>\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2836V5JB-NJ6K-F70O-C5I0-TMW4O6S25IYG} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{2836V5JB-NJ6K-F70O-C5I0-TMW4O6S25IYG}
Value Name: StubPath
1
<HKCU>\SOFTWARE\RLSYBQAHT
Value Name: InstalledServer
1
<HKCU>\SOFTWARE\FAD2BSB
Value Name: InstalledServer
1
<HKCU>\SOFTWARE\8ER4NZ
Value Name: InstalledServer
1
MutexesOccurrences
XTREMEUPDATE24
j5AVEEXIT17
j5AVEPERSIST13
aL7iUSZ7
\BaseNamedObjects\Jm2pojEXIT6
\BaseNamedObjects\Jm2pojPERSIST6
\BaseNamedObjects\Jm2poj6
lZT6VgcN4
lZT6VgcNPERSIST4
j5AVE3
fkVRGhZ3
Local\TASKMGR.879e4d63-6c0e-4544-97f2-1244bd3f6de01
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]169[.]69[.]258
186[.]81[.]119[.]424
181[.]52[.]107[.]1924
177[.]252[.]225[.]1522
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
jb2168948[.]ddns[.]net4
dnsduck6[.]duckdns[.]org4
nincasu[.]myvnc[.]com3
lospatios3[.]duckdns[.]org3
lospatios1[.]duckdns[.]org3
lospapa1[.]duckdns[.]org2
dnsduck4[.]duckdns[.]org1
duckdns4[.]duckdns[.]org1
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.dat13
\testt11
%APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.cfg11
%APPDATA%\Microsoft\Windows\Jm2poj.cfg7
%APPDATA%\Microsoft\Windows\Jm2poj.dat7
%SystemRoot%\SysWOW64\svshr7
%SystemRoot%\SysWOW64\svshr\svshr.exe7
%System32%\svshr\svshr.exe6
\testt\testlr.exe6
\testt\avas.exe5
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt5
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp5
%SystemRoot%\SysWOW64\System324
%APPDATA%\Microsoft\Windows\lZT6VgcN.cfg4
%APPDATA%\Microsoft\Windows\lZT6VgcN.dat4
%TEMP%\x.html3
%SystemRoot%\SysWOW64\System32\cal.exe3
%APPDATA%\Microsoft\Windows\Jm2poj.xtr3
%APPDATA%\svshr\svshr.exe3
%APPDATA%\System322
%SystemRoot%\SysWOW64\ava.exe2
%System32%\ava.exe2
%APPDATA%\Microsoft\Windows\aL7iUSZ.cfg2
%APPDATA%\System32\ava.exe2
%System32%\System32\cal.exe2
*See JSON for more IOCs

File Hashes

01cb719e13c2a22504c6dcef5942622f5f5f762687c73dca4adbb9a4c1a6c7af 01f8782ca1f6ff83166b153b7b43bd76334188c1757388a617c5a1b981a1f405 0df323ba31479afc0a6c6094dbeaa7dffc387ffd4c2a58afc5b99dce46c87990 1405c4b2d89b832349beda35d1b654edacb69e0116d70c1fee1688d12d4f8712 1476e26cce5f9af1161cf67fa447254c93021b5ceffdc6b380d43bcf7d77283d 14ff797173560348f4a2b2eaefb414a6bd3996b7c13a6f1322b06e27b803455d 1ca56c4f1c6fef5c0fb76819d9c25f2a13237329f597b7c9eca3e79626de7821 2177ee809fc7903db595959a4aea861a9aaa69395433de035892b0fe2c918088 23eb6e59d6c0538479c9fd562ac8fb773a29328baeb0bf7663701ddfd2cafa1b 25dfafdfb9e85f8595aad8816cefb403973389f75100e3108c586fa246e19305 28d8a0be382ebf9c543dc2e79d54443560867ff24872082b6b656e0520d0df3b 2b9f3b9a808dfa25f319d16d6281e8a5cbfc3db62a90bf9fd4af73ac199fd37a 37b1659a06eb2eb82fd9464d8fa2ec9a903521d293e0347457d8c0a31805f4ba 396482c8d42a719a7a3d56b7bac00c1f0b03b2df89d96d32fee737b7201f024e 41c74ebe37151d30b223a1f72f4dcae08f2378fbc54a4627c63e0087fad84d81 4276934f373be8e263bd63c3a245c77b21dc4fa1cb7eafdd0c53735774e0ffbd 43db2d9365904164107934c1ff49dc79c5fc900351daade6ad1b4730d443d400 47d21907eee2448e640d8916e0a8fc84ea548cd8da23f245d982fb6ba24d648e 4938b9546d92a960fe3a38f37e0496ecfbcf90b8e990a13f4bcdabb5a6761142 4d161989eeb3358db945926b153ed947cf1c143671f59ef8c1260021e372d334 501eda812f73f5810441ec74fa137b848e55218843cdeb85b5f47de7318da68c 57119382746d854de9ab5e16d4d8336d3d4a238514a2399f7b0b661206749e0a 5b79b7fa2685e7652bda432c5fa64fbc324232d5895658773c2eb1138a264053 5de33244c01cba4c53875ea7f556db32b731e1737710d93ca2313785a8ca9677 5eca98ddb51faf9b47302dfd90a12c543d9d0639e4a85ed23c8c3be85a595696
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid

Umbrella




Win.Trojan.Kuluoz-7059308-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 26
<HKCU>\SOFTWARE\TEXIUSFT
Value Name: whvqowqq
1
<HKCU>\SOFTWARE\ELABEBHH
Value Name: gqfipook
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fpfojnmk
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: xnnbsqss
1
<HKCU>\SOFTWARE\SDJMVCKJ
Value Name: wpjqvldr
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fnhnolux
1
<HKCU>\SOFTWARE\LXPNLEFK
Value Name: sxlvsesc
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fghmdeex
1
<HKCU>\SOFTWARE\PBKBURIS
Value Name: rledgmma
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: isgrqtpv
1
<HKCU>\SOFTWARE\OHUNVJNH
Value Name: ruqdejab
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: hriifcac
1
<HKCU>\SOFTWARE\GKXFQLLC
Value Name: fpxjxdkq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: qupomrkx
1
<HKCU>\SOFTWARE\BCRFGBHG
Value Name: paggnklk
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: afashimn
1
<HKCU>\SOFTWARE\GROUTDUB
Value Name: hrpcdhfq
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: tekspeld
1
<HKCU>\SOFTWARE\DTRDNQPK
Value Name: pusibcmw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: pllfthmw
1
<HKCU>\SOFTWARE\PXPOFICA
Value Name: rjjggxvg
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: xnvjgxii
1
<HKCU>\SOFTWARE\CMJGOKSF
Value Name: jiseecqp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: frxcpjwg
1
MutexesOccurrences
aaAdministrator26
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
222[.]124[.]166[.]1220
64[.]76[.]19[.]24920
194[.]85[.]183[.]219
78[.]24[.]223[.]13019
186[.]115[.]122[.]6717
93[.]186[.]181[.]6216
217[.]106[.]238[.]14516
217[.]115[.]50[.]22811
Files and or directories createdOccurrences
%LOCALAPPDATA%\xutnbrko.exe1
%LOCALAPPDATA%\xwpbgtmu.exe1
%LOCALAPPDATA%\igrjkxhb.exe1
%LOCALAPPDATA%\mnhtpeqi.exe1
%LOCALAPPDATA%\xagcutko.exe1
%LOCALAPPDATA%\roqgpith.exe1
%LOCALAPPDATA%\lfeirrtc.exe1
%LOCALAPPDATA%\cirbcngq.exe1
%LOCALAPPDATA%\udiiopqj.exe1
%LOCALAPPDATA%\ttdmkjtg.exe1
%LOCALAPPDATA%\ukfgborv.exe1
%LOCALAPPDATA%\bdjctnfg.exe1
%LOCALAPPDATA%\imeovntu.exe1
%LOCALAPPDATA%\upotkcoj.exe1
%LOCALAPPDATA%\qrdbteqp.exe1
%LOCALAPPDATA%\fcklmars.exe1
%LOCALAPPDATA%\rkhnrwhb.exe1
%LOCALAPPDATA%\gfjaqioa.exe1
%LOCALAPPDATA%\vlflabdh.exe1
%LOCALAPPDATA%\aevxokcr.exe1
%LOCALAPPDATA%\osoepccl.exe1
%LOCALAPPDATA%\jtxuriff.exe1
%LOCALAPPDATA%\hswndivc.exe1
%LOCALAPPDATA%\aolfvkov.exe1
%LOCALAPPDATA%\xqwpexol.exe1
*See JSON for more IOCs

File Hashes

005e242acc91ca84a157d421cf04b1e70cf0acbca338186eeebd9d6a307b465d 01611ca8d63e83d78e906b13d4c6ceaeef870f349b79250ef2e368b89b66810f 03247ca7d7581455ee2c774d1f952bfec71850bebe89400d069a7c23c223bd97 03798902309d569891b82c98c1cfbb1bf2188bc8cef81d04d06611b7534bbffe 053aa8081aa87fb4f2c089947e166e4adc8d25d4f83d7e73ad996487e72744ee 0613bdf614ae48b7938ef97264d7fa0cfb8c767cf338f678ca9c6946caf6ea7a 09a90ed0daf0f1b7281ed7ca49ae255e7f3ef190bdaa9df9608374b8521a64bf 09ae7c7da59c93796eee6e15a176fe3495018e33d9a6f98765fd90e06a694cd9 09ce86ce64e7397dc91621b4a109847a3b657ceb24ad2d2653ad0cf84faad95c 09cf7b2388964d4c345111c5f0b65ba99718a2da28af1f78643b5a4f9492297b 0a2e4fe397906f1e96cdb3cc4fb68d8d5059d8f1b16b83d264f472c25ade584b 0abe61b2c3095978f473432fab94740838d0b96c844ae128119b5ac4d6973e98 0b076f0b98e4908caddf3a4f8a4521aa4fc33b16a553c5d0ef6834219e67b21d 0b23a3b32433c7bf0bda37e6265db503fad957a1a9468b806c27dcfb934658c3 0b8f52f9d6e2b8913e94a488a82eb5b1f14db9cd245829881b1fab181b4938d4 0c682e42e070545c14375c540a3fe3a5b192fd77ad5e8e0d2fe4db1c90fe11bc 0d1963667948b4e9e3452e120fd3fccd7cd0c19e1904c362f2503907482e90c7 0d1aa3486bd89c7557d4cf8176f4b5ae371b115a4e8d1a58089be3f4adf5cde9 0d53ba89dce68e1b1c349fc56ad0627990220f4d03a9b78b49ef3aae4cd50182 0dc8265b6586541f00202f0489978b1832a556ae70d0eefd96aafcf52e7b9202 0eae35bca5e7924673dce18e3ba3f4d14ad49c728da58e57490074792cd9f13d 1025549d6d9dff19754ac1df45d1861927f6f942955482fa77c9ed46dde423d3 105837bf20a966cf8b4867de08012ec47dae449b22d64c393ec7117e5f6a6ef6 113a7abff0936a136eb03245d7e7ce75e0a6630ac3ceca87528938c4c2ba6493 13289307bf5fe48823b28b06f5bfee5adfa0f8699cce4e4a3176245d5c7b6e20
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Ursnif-7059281-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\AppDataLow\Software\Microsoft\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 17
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: appmmgmt
17
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Install
17
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client
17
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
17
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
17
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Temp
5
MutexesOccurrences
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}17
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}17
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}17
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}17
{BBAE0F6F-DE54-A5B6-C01F-F2A9F4C346ED}17
\BaseNamedObjects\Local\{FCAA51DD-2B0A-8E99-95F0-8FA2992433F6}13
\BaseNamedObjects\Local\{6AE7CB31-C1EF-2C06-9B3E-8520FF528954}13
\BaseNamedObjects\Local\{72534A3F-299C-7437-43C6-6DE8275AF19C}13
\BaseNamedObjects\Local\{1163A908-3CC1-6BAB-CED5-30CFE2D96473}3
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
173[.]237[.]190[.]723
184[.]105[.]192[.]21
87[.]106[.]18[.]1411
169[.]154[.]128[.]1241
104[.]20[.]0[.]851
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]iclnet[.]org3
DEOPLIAZAE[.]AT3
permittitthesaurus[.]at2
iclnet[.]org2
nssdc[.]gsfc[.]nasa[.]gov1
nssdc[.]sci[.]gsfc[.]nasa[.]gov1
diuolirt[.]at1
www[.]ietf[.]org1
quiomnemauribus[.]at1
gonna[.]su1
LIOKGAMEMU[.]AT1
adesirablebcptheyimpphys[.]pw1
manystarreleasesys[.]pw1
greatwiththrtpio[.]pw1
COINAGESTWW[.]COM1
unaegvegratiasqui[.]com1
FONICARRO[.]COM1
fabelussss[.]com1
MABLOSSSSCC[.]COM1
venukex[.]com1
goglosmmosss[.]com1
filmemario[.]at1
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js17
\{4BC230AC-2EB3-B560-90AF-42B9C45396FD}17
%APPDATA%\ds32mapi17
%APPDATA%\ds32mapi\dhcpxva2.exe17
%TEMP%\<random, matching [A-F0-9]{3,4}>17
%TEMP%\<random, matching [A-F0-9]{3,4}\[A-F0-9]{2,4}>.bat17
%APPDATA%\Mozilla\Firefox\Profiles\iv5rtgu3.default\prefs.js16
\{CE10F1BD-D5E1-3049-CFE2-D96473361DD8}13
%APPDATA%\kbdidtat\iassdusx.exe13
%TEMP%\2A54.bin1
%TEMP%\5766.bin1
%TEMP%\E707.bin1
%TEMP%\7E47.bin1
%TEMP%\AFA3.bin1
%TEMP%\2889.bin1
%TEMP%\10D.bin1
%TEMP%\447.bin1
%TEMP%\E488.bin1
%TEMP%\48D5.bin1
%TEMP%\6A8.bin1
%TEMP%\9D2C.bin1
%TEMP%\BEA0.bin1
%TEMP%\B2CE.bin1
%TEMP%\C92B.bin1
%TEMP%\E5EE.bin1
*See JSON for more IOCs

File Hashes

0c0937062f20850fe9ce77fdf2a741627659a1a709b6f5cc522fac7a6ef1a1f8 3664410a8cb8f6aa69ac6018a298deb1340a85e01119c4b640b08feb9e9c18dd 5c98056d6d30501c1a751bfb9e9d254623a09c8a1e2bede6a8e11184ab9dfcae 61a41ec04624825e56192a6f3705a75fa3fe3236be7f86c3d78fc1e4937c0925 6e868a45a0f7878e42dcca96ef8de0cd08991bc1221b4a9a1b8b8f66eca6bd84 708ce4f663609d649b14d65addbea85f0646dbeb80ea543930586a7cd6aa8f51 73706c56cb7b1bb4da1a7f9c18c15ea0f1998a333639eaefffe72bfcce840479 82853aa1ff5511a00d25fe56bd6afdeb8e16e68ec674404666499f27396a0b78 865953e9cd42596232373e0f45517a69084ef6b8c00ce747decf1adc86528fd2 9616b03274ee7054894d387afb4a5f7289d9a391d68427c57f08e58ba0351600 9f5938333856986e8562cc3d236c8d9302ad0b4b8747676828e4300f106b1ff5 a1e1b4fa1d76ccbda494840fdf8fbbda3377c1d235248967efed0f55ed02c37e c1ecb3baf2ed60d888c6971c1e8f371018de3ee1b295a39d0b362f54b609600d c4e117c98948a41542e9e4018aba833be08cc0d0cf25de2a7989f6ae5fa434e6 cd029d22e9303a9243838c48a8a11cfe7ac4a17f20099e3a137e9e08e7acca50 cda5d0e4d04eeceb31a29357a92458ddb810383c38d7e6428360d0c1f87880e7 d0605005e6f4d4f042a196339f96f0258a4a9fa84607de20284c0fae6ebd6c84 d470d90b4c34369f1afe77881811256a536ddbb597135937c571158d070f98bf

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Qakbot-7058187-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\avkaxoq 14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Type
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Start
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ErrorControl
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ImagePath
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DisplayName
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnService
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnGroup
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: WOW64
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ObjectName
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ftuwqkx
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: aivx
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ohva
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: gqfcu
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: qzdknor
1
MutexesOccurrences
llzeou25
\BaseNamedObjects\392624144a24
\BaseNamedObjects\rmnzqea18
Global\amztgg14
amztgga14
Global\eqfik11
eqfika11
\BaseNamedObjects\ejovtena2
\BaseNamedObjects\Global\ejovten2
\BaseNamedObjects\hlaikmsv2
\BaseNamedObjects\Global\zclxfv1
\BaseNamedObjects\puprjd1
\BaseNamedObjects\iyokaaloa1
\BaseNamedObjects\owianu1
\BaseNamedObjects\laipbwa1
\BaseNamedObjects\Global\laipbw1
\BaseNamedObjects\sqsaga1
\BaseNamedObjects\aahrpa1
\BaseNamedObjects\Global\fzalyczn1
\BaseNamedObjects\Global\qyexvgu1
\BaseNamedObjects\Global\vgvol1
\BaseNamedObjects\Global\ijajr1
\BaseNamedObjects\Global\wyxnbogx1
2bf8953778e954ffb2ddba094aa9d65a1
1267f8266d350bb9097fcae862c40a0a1
*See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Amztggm14
%APPDATA%\Microsoft\Amztggm\amztg.dll14
%APPDATA%\Microsoft\Amztggm\amztgg.exe14
%TEMP%\~amztgg.tmp14
%APPDATA%\Microsoft\Eqfikq11
%APPDATA%\Microsoft\Eqfikq\eqfi.dll11
%APPDATA%\Microsoft\Eqfikq\eqfik.exe11
%TEMP%\~eqfik.tmp11
%APPDATA%\Microsoft\Ejovtenj\ejovte.dll2
%APPDATA%\Microsoft\Ejovtenj\ejovten.exe2
%APPDATA%\Microsoft\Fzalycznz\fzalycz.dll1
%APPDATA%\Microsoft\Fzalycznz\fzalyczn.exe1
%APPDATA%\Microsoft\Qyexvguy\qyexvg.dll1
%APPDATA%\Microsoft\Qyexvguy\qyexvgu.exe1
%APPDATA%\Microsoft\Vgvolg\vgvo.dll1
%APPDATA%\Microsoft\Vgvolg\vgvol.exe1
%APPDATA%\Microsoft\Ijajrj\ijaj.dll1
%APPDATA%\Microsoft\Ijajrj\ijajr.exe1
%APPDATA%\Microsoft\Wyxnbogxy\wyxnbog.dll1
%APPDATA%\Microsoft\Wyxnbogxy\wyxnbogx.exe1
%APPDATA%\Microsoft\Isxyas\isxy.dll1
%APPDATA%\Microsoft\Isxyas\isxya.exe1
%APPDATA%\Microsoft\Ustbpests\ustbpes.dll1
%APPDATA%\Microsoft\Ustbpests\ustbpest.exe1
%APPDATA%\Microsoft\Xtdxbtyt\xtdxbt.dll1
*See JSON for more IOCs

File Hashes

1267f8266d350bb9097fcae862c40a005a833468862b5471dffe099bb63d3d96 16d4fc9a786ec638dbea15793f1be322cb937c8c0243639c9b87181a8757e26a 2bf8953778e954ffb2ddba094aa9d65f657553953efa87181b786435a2a434c3 2c2d604d16319e7c43187b4c7f03a81a727230f7b3a59d15ab1473bd93f655c2 2c2e535cce4a7206867429548cc3849c32a672a04a969061e2b6647932f38f57 2ea9ec19e8fe9129135794a56eda8aa956ed63e8fdca90fd9e8e9da48d6335a8 318561b92649691da174ff88b4b9c6bb3e0e73fa92c1f34afa3eb8e78c8fbb54 339c33d1fb67c97caee8266b91c4f73bb2758099bbaaa980bc5ce4023f0036a8 355dddb7ece2d03044807c815b2eb6fd53273da4361b21858214c126e677912d 36779fcd942343a9c80d048a441cf1388825067eb917e853233d5f49f6face96 3f039add5eb363f9997b8feafc77302bef74e46891d005986124828c5d4c7a85 3fa149b9c02a8c4e2ab32969e9bffa20ec1407d2e249cdc876cd38419d6d59e1 45a06d73c4c2632eb69741e3a56e272851e3a33eee0b97afdc72487895acc8d9 4be25e716dd86a4df5678df1e807cadfd761542528c1c45d642635b8dca7ea86 4f57ad0f6f879ffb6e98b384615b19904d91c800c83d5fb04084f02337c447db 4f63cf6a6c97274c05bef0e2cfded13f7d28395161048cfb101c3301a6f07489 50ec1176fcfdcb1128a080f52712758deff0d708cfd59b7949324e452226e13a 543b2e27f3ec4f24a37c7991fa74adb31e24016cbfc88c9eb73e0464afa14f75 5471981908946cb6c8ecefc21ce3e84529a9bc9f9f5a6ef78de3be73a103ac3c 55ce23a507a66478a75437b62305f201fe752135afbe3d64a1199a2fca5068ae 5650cd078a14847039122a09558452e17bfbd95458e4ef3b1ae648358970b3de 56860a42b04113bad85c3e930cafe739358cd8ca6cdb6c4adff483e18e90f889 57f5bfcb14fa34cefe24ded4d6837256f276ae48c8f3624c1e4f81c1ebd36cd1 5830272b276500aea2d3947e1663fcab899e44c256e14f1eb3714e55ed743d28 5a9c8a282e0beb577a437d347f912c72f62731503f2afd4fe44f1d31e24ca0cc
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Ransomware.Cerber-7057873-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 13
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 13
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 13
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
13
<HKLM>\System\CurrentControlSet\Control\Session Manager 10
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
10
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}13
\BaseNamedObjects\shell.{B0DF901A-D930-98E8-1E89-BD8515DACB07}8
wddmnotbx5
\BaseNamedObjects\shell.{4D979936-6ECD-C1FC-8B7E-C65E6397B59E}1
\BaseNamedObjects\shell.{E0466F25-8676-B972-E20E-2E2004CD23D5}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
149[.]202[.]248[.]25413
149[.]202[.]249[.]25413
149[.]202[.]250[.]25413
149[.]202[.]251[.]25413
150[.]109[.]231[.]11613
149[.]202[.]64[.]013
149[.]202[.]122[.]013
149[.]202[.]248[.]013
149[.]202[.]248[.]12813
149[.]202[.]248[.]19213
149[.]202[.]248[.]22413
149[.]202[.]248[.]24013
149[.]202[.]248[.]24813
149[.]202[.]248[.]25213
149[.]202[.]249[.]013
149[.]202[.]249[.]12813
149[.]202[.]249[.]19213
149[.]202[.]249[.]22413
149[.]202[.]249[.]24013
149[.]202[.]249[.]24813
149[.]202[.]249[.]25213
149[.]202[.]250[.]013
149[.]202[.]250[.]12813
149[.]202[.]250[.]19213
149[.]202[.]250[.]22413
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com13
p27dokhpz2n7nvgr[.]1j9r76[.]top10
bitaps[.]com10
btc[.]blockr[.]io10
chain[.]so9
bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com9
hjhqmbxyinislkkt[.]1j9r76[.]top3
crl[.]comodoca4[.]com3
crl[.]usertrust[.]com3
w3z5q8a6[.]stackpathcdn[.]com3
crl[.]comodoca[.]com3
prod[.]globalsign[.]map[.]fastly[.]net1
crl[.]globalsign[.]net1
crl2[.]alphassl[.]com1
Files and or directories createdOccurrences
%TEMP%\d19ab98913
%TEMP%\d19ab989\4710.tmp13
%TEMP%\d19ab989\a35f.tmp13
%TEMP%\~PI<random, matching [A-F0-9]{2,4}>.tmp13
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp13
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp13
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.hta13
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.txt13
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.jpeg13
%TEMP%\8f793a96\4751.tmp10
%TEMP%\8f793a96\da80.tmp10
%TEMP%\tmp1.bmp10
<dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)10

File Hashes

03e1def6aacee690eef87e2258cb343de0ae510702e746c1f6b90713095b0af6 0d75b700002a835f0376b10d018756bed5000dc80c98bc5e2b0dbfcd0146f9f5 1d6d8c3cccaed80d97211a23313ae460889c421dc1de9f10b1d384fc07f14298 1effdcd38cbbcf779f1c6be09278bbd63a94c452117c36fec0bdbada20f57adf 3c86dbbc00e89e9433421ccc352462d2542e5071817af36585d6b038a4b074f2 469581018957d584f282f5fb12fafad8b8db506b3a463b2d963f29cf179fb74d 52fe670efafa52d293eece8e1e5e90dfafe6ec97b245f99d463699ea8f132d49 74ea5319f125c1c37d71fa834e926d88c6d96debac13a27c9aba0c4f90a93a2f 8cd0003bdf015c9ef502f791c36f74ae576f48067acd08df76814069ec16ed90 a1899bb2e5703e96a73f24d9aadab1cf4afce02bfeee67685d98079a545a9d06 de5b8612bc01bf22d724c72462785746a595aae168c6a87378bdacd4d8b53a4c e6478b31ad56410fd00f482bd7ad37fc1d1216aebc38e6a56ae95aa0894567b3 fbe34634b8ad36e8f793b25cfcf7bc7b41352033534fab2d7d437a1abd1b874d

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid


Malware





Win.Malware.Nymaim-7057729-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\Microsoft\GOCFK 26
<HKCU>\Software\Microsoft\KPQL 26
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
26
<HKCU>\SOFTWARE\MICROSOFT\KPQL
Value Name: efp
26
MutexesOccurrences
Local\{06258131-BA39-27D4-02A0-AD682205B627}26
Local\{2D6DB911-C222-9814-3135-344B99BBA4BA}26
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}26
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}26
Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}26
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}26
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}26
Local\{0CAD88C0-6AF8-0EDF-6CEE-161A49760D3C}26
Local\{1B1B0EE4-67E0-0B41-FB4A-B5AEFA21FDDE}26
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
fplraqgdaq[.]com26
RZCBJ[.]IN26
UIIMKNPSAFT[.]NET26
WURECAIGFSE[.]COM26
kicxjtaec[.]pw26
jvomazzl[.]pw26
efonzybmsdtj[.]net26
wztiqm[.]com26
ZCBIPTLC[.]COM26
mytjbj[.]pw26
RKXAMSQBNND[.]PW26
SVIWLPNP[.]IN26
ZTPMQPSID[.]COM26
jnnovcv[.]com26
kpskawv[.]pw26
MXJHZ[.]NET26
atetgyy[.]com26
qyaqzy[.]pw26
dojtzsiroyjb[.]in26
aydvw[.]pw26
kdnbfzdvpkqa[.]net26
LMHFG[.]COM26
RWAXYME[.]COM26
KZQCBTRPVQ[.]NET26
zeqyucrzmoa[.]net26
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\ph26
%ProgramData%\ph\eqdw.dbc26
%ProgramData%\ph\fktiipx.ftf26
%TEMP%\gocf.ksv26
%TEMP%\kpqlnn.iuy26
%TEMP%\fro.dfx24
%TEMP%\npsosm.pan24
\Documents and Settings\All Users\pxs\dvf.evp24
\Documents and Settings\All Users\pxs\pil.ohu24

File Hashes

1d6c1c9461d0bf7b37946e3f28407e5d88fa0da78484d9a960a4df9c4b9ffe0f 2902a96c02986c6590846a5143c4199c73cae3d5d2a12f5643743120f4d584fe 3fe8b765762f14e140b4aa8c39bb7444204167117a840bd7d5e65cbd767263c8 5b0c4cb210a1bf466a4e0ea29f255cbc42d0dfd63a97097f5c1c39ed9c55526f 5fc2ac8a8aa7694150a3aa422a6504ebfcfec6c1e8db6a8780d5d5efe9eecd4c 675cb1b87b1b643457f07b95ac17fdcb0930f27176618c9538635040f91af543 6b1c0e31f062cf4dc16943ce7885c01af0b32cae6d3695e2d0604a4e21a152b1 6d632cc9626034bb85cd49a3fcc264a41ea4569ed4fd2cc2c601ad7297f3e7e6 71b3a4f2aeba042780e39c75a2d56a31d8fc4a31c972797026ec2200a2e09e89 81ca5a3ad1f90b10020486ba3ec81052a1a830ababc3ec84317ede19fe26291d 8661bf629126df89b4d3bd297ea922b7139e742799b1787b4fad97796f39eecd 8a62eab5413d1eaa0eb15f7e0d9c011ac4f01484b5e7b7b8b9b6a41fb527b234 a6428373b3b3fa4dcf9c3e34c4b5254df87fa2ee734fd009a629d31b2c40c17f ad6a5e3d349879d994f0069911d3ed83437dc1e247b24259f44380b47ecfb3c0 ae777184b6db778db0236b4aa80725495ec525582091070b67d7522f8c2e928f b11da3e70d8b840c5cff281d684d0e8999faad69a8065a6411b32a18b96d21db b7e7d221985fd7394d9a539ac51b4625966286844437d4bdf70c746abb923383 b8d3993860c392e4b9ef0fb935bd602bdd1864d720b46c784c1002caa73c8482 ca55d250f769157a0b5ff23556ce7526b8231f8ea51585b611372b62478d2531 e0a491b18056bfb63e0d22f6a0246ac0c754b359b72f0cdbbf54896559c10c7e e2cfa862147fa2285629c42ee58c4b517c3315c1b7a9a45e8861d441d96a5553 e4a648a4f077f84951a54b45220296c062a7b02257cd82a2375e696dc40b201d e8e3666284b09d4715a46b5ca817ca0fbcdc9646f12ccd26d30d0cbe7a432363 ea72a76831207545b8c5c4605be8da138c5563ea2771a57917d2000056428136 f76d6532a35cf82c01974148f4ff4adc592f48458a14be84657dc5633b316668
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Gh0stRAT-7059563-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DirectX jrq 12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Type
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Start
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: DisplayName
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: WOW64
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ObjectName
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: Description
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: FailureActions
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ErrorControl
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
Value Name: ImagePath
12
<HKLM>\System\CurrentControlSet\Control\Session Manager 7
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
7
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DirfctX jrq 1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: ImagePath
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: DisplayName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: ObjectName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: Description
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRFCTX JRQ
Value Name: FailureActions
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DorhctX jrq 1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DORHCTX JRQ
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DORHCTX JRQ
Value Name: Start
1
MutexesOccurrences
C:\TEMP\eb220715b4a7132b3d7f1dd0deddc5221ccb11b450945f158c9a4f251b6477e8.exe27
DirectX jrq12
\BaseNamedObjects\yaoyao.f3322.net7
\BaseNamedObjects\79575465.f3322.net3
123.254.107.863
C:\Windows\bwhvas.exe3
C:\Windows\toflso.exe3
C:\Windows\xstdwq.exe3
\BaseNamedObjects\119.188.248.1442
C:\Windows\iqmuuc.exe2
103.214.171.1331
\BaseNamedObjects\BirectX jrq1
\BaseNamedObjects\27.50.162.2261
\BaseNamedObjects\192.144.129.1211
222.186.26.1051
205.209.171.1481
103.243.25.1061
DirfctX jrq1
DorhctX jrq1
mf123.f3322.net1
cx820329965.f3322.net1
mingyemo.3322.org1
labixiaoxin.e2.luyouxia.net1
chhacke.win1
guxiaosen.f3322.net1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
103[.]110[.]81[.]377
123[.]254[.]107[.]863
119[.]188[.]248[.]1442
222[.]186[.]26[.]1051
205[.]209[.]171[.]1481
222[.]186[.]170[.]371
103[.]214[.]171[.]1331
27[.]50[.]162[.]2261
103[.]214[.]171[.]2491
192[.]144[.]129[.]1211
103[.]243[.]25[.]1061
118[.]184[.]31[.]221
60[.]17[.]95[.]1451
13[.]115[.]40[.]2511
142[.]252[.]249[.]2021
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
yaoyao[.]f3322[.]net7
79575465[.]f3322[.]net3
e2[.]luyouxia[.]net1
mf123[.]f3322[.]net1
cx820329965[.]f3322[.]net1
labixiaoxin[.]e2[.]luyouxia[.]net1
mingyemo[.]3322[.]org1
CHHACKE[.]WIN1
guxiaosen[.]f3322[.]net1
Files and or directories createdOccurrences
\??\agmkis27
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\217b1c5aa83d1557640799121b2c9f8c.exe4
%SystemRoot%\kkwgks.exe3
%HOMEPATH%\Start Menu\Programs\Startup\217b1c5aa83d1557640799121b2c9f8c.exe3
%SystemRoot%\bwhvas.exe3
%SystemRoot%\xstdwq.exe3
%SystemRoot%\toflso.exe3
%SystemRoot%\dqrhqi.exe2
%SystemRoot%\yygeym.exe2
%SystemRoot%\uusmuk.exe2
%HOMEPATH%\Start Menu\Programs\Startup\04b13d6b1971341eceaa553415eca2f9.exe2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\04b13d6b1971341eceaa553415eca2f9.exe2
%SystemRoot%\iqmuuc.exe2
%SystemRoot%\fsldsw.exe1
%SystemRoot%\zmdpmg.exe1
%SystemRoot%\vipxie.exe1
%HOMEPATH%\Start Menu\Programs\Startup\ab149447eb5ccd14cef581946ce7bd25.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ab149447eb5ccd14cef581946ce7bd25.exe1

File Hashes

0384f33c0f60902aafa0c1f5f57f8394547c461dbc7c744ef68fd598bda161d4 07d20f7641f228512c53d506093fb98c506af2c4e84017b2f044fc76b18f65db 0a2b304f7c348990afd2fa67a8642fc3f863b29e732971390f1fada404a9c053 1cae49580e2f3f1c73b7601d52a537809ae6d5a318cf398616ac60a30ea40344 29ee3d91d4381e50b6c483fbc04eaf85d54bca66aea37223e7931a3bf0dffe69 2b6061826e9e21aeb486a348e550e24adff26be135ca5fa4d13ce5c4fe0390e2 2b7e3cf249f3c8064bc77c58938c35017bc9aef0302f6e78a584ef0577531005 3405ea7e2605210cc8a78a39d223651244d3082669a918d7119cdb65af90dd13 360a930d3d09b02054d0191ea1dc96b8935041b71e743e09d7f203816755f94c 39bb8cdf51b3645ad2aad562f40a84f790868b538cb84cae23b01b52083b8b40 3bc00789944f89e7d467ebff20834d1773d8c3a934c07721785a2fdf8493de2f 4c680d6e11a3bd661986dd726a8bcecdac6b0ebc48c485edec364a3642be491c 57965bfc0368d3e1a47dfd62c374395474954e44b2982650dff3f23bc676b170 581dfd21e9055843023a64c8ce8c906e17d599be1ccd950b6993c1225ee9a97d 6408d34399f7d144d4ca5b76cf52880bbfdc0cbfb352b8b22d3ac8f76d432521 686e132fd317833979b14aedf48cfdf47abeb001893599e5e57c689e128f8a37 69f0c08363af6292948172aa1756f24d9735247dd4461e5ba2d3393abe498fbd 6c6a1f46d44efa21587cb19b2d2f4f4885383e75cd0a33fe4898d64de92dfced 6ce717339f2f6fa1f9260beb2f7abb6fc9de26f05967eae1a88da97e46470a83 735b79770ad3c141b6a24b27253eaa1645608a604a6bfd50b745c9225d385f8c 7c51982cc3a0bd0fdda770cc298ddcfcb2690e51570474e73b06f14d07aba8cd 98eef02902f0aa7b6d952fe724e52dc2aa71845384ffbabecb9e6ad071975090 9e6a97e05afba9b5e7eb940cb7d91e2fe795aeca5cfe7a4c03c47507ba31dc3f a31e162ed1ca8feaeb2d2790f44a42574ac2e7ab7e6f1ee151eae89cb769b3ae b188fd0f6b4f6ca29f464a90ab331b21a1e06bd8fae3e0b9ad4e5f84ea82330a
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Ramnit-7057249-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
11
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
11
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
11
MutexesOccurrences
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}11
\BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}4
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB5651D0D}2
\BaseNamedObjects\Local\{41435A30-AC43-1BEB-BE05-A07FD209D423}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB5111D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7411D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB8B91D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB8091D0D}1
\BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7851D0D}1
\BaseNamedObjects\Ad48qw4d6wq84d56as1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]100[.]26[.]25111
172[.]217[.]12[.]14211
35[.]225[.]160[.]24511
87[.]106[.]190[.]15311
23[.]96[.]57[.]3611
46[.]165[.]254[.]20611
172[.]217[.]7[.]2061
92[.]53[.]66[.]1171
151[.]248[.]113[.]1131
37[.]48[.]125[.]1201
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
haqcdkwtukdegysigtv[.]com11
ykvhpxixrqgid[.]com11
saqjrigpkuins[.]com11
fbhtsymefdwstuivosx[.]com11
ntqchcmoegeif[.]com11
ATFPJOULJN[.]COM11
echrepdvcd[.]com11
ffdjiuvufw[.]com11
uacwwgvrdgqscbwb[.]com11
wgpvglbadxo[.]com11
qmbmbyqkltqfbbtxxc[.]com11
gwlqggasgcluo[.]com11
esxfrepgcyyvoim[.]com11
bwnkdjlesbf[.]com11
bphnopydih[.]com11
jhapjgvatltxunklfwk[.]com11
mbtseiltigrijncw[.]com11
wwteytsfaiyrrg[.]com11
qdvmstrtkslghpmunuk[.]com11
tswgqcseq[.]com11
HIVLCJCVUX[.]COM11
ybhiodxwwmoymuv[.]com11
htiobrofuirwkgn[.]com11
VQRSXSLNBQT[.]COM11
rghwarmlxmqivfmcs[.]com11
*See JSON for more IOCs
Files and or directories createdOccurrences
\Boot\BCD11
\Boot\BCD.LOG11
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat11
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat.LOG111
%HOMEPATH%\NTUSER.DAT11
%HOMEPATH%\ntuser.dat.LOG111
%LOCALAPPDATA%\bolpidti11
%LOCALAPPDATA%\bolpidti\judcsgdy.exe11
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe11
\Device\HarddiskVolume311
%SystemRoot%\bootstat.dat11
%TEMP%\<random, matching '[a-z]{8}'>.exe10
%HOMEPATH%\Local Settings\Application Data\hmqphkgx\pseqpmjy.exe4
%HOMEPATH%\Local Settings\Application Data\jpnfmrvn.log4
%HOMEPATH%\Start Menu\Programs\Startup\pseqpmjy.exe4
%ProgramData%\wtvakgao.log4
%System32%\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb1
%HOMEPATH%\Local Settings\Application Data\kgrsioak.log1
%HOMEPATH%\Local Settings\Application Data\lghigvda.log1
\eqwjnvsh1
%TEMP%\~TM3.tmp1
%HOMEPATH%\Local Settings\Application Data\ftefvsfn.log1
%TEMP%\156015309940850413887.tempcbss1
%TEMP%\1561093680624440949607.tempcbss1
%HOMEPATH%\Local Settings\Application Data\apitem.exe1

File Hashes

016d3ea1ff9056ab4d38ec27eff5f55c2937cf77ac9a18839ca2e2878ef5cab7 1b92ccc876e8f40ff500fad881f11f4594a173bb4d59c988a555a98a26ddec8a 284609ef1c4407db14ec09d6b3f429674e830d5e0c7543539e162faeb15e54d1 3e581c90b78ab15fd3febf27e4639c4ed4d83465d4c08b459bc33cad65f21b8e 75b983a6d29488b650d525a9bc666b3b1c1f4e98004d7934780d9d72a9578d86 aacdce0bcbb6cc0f3a3e171ec8bf595dbad35ad082014a1164b5e274d0d533a4 cb8dd63f3c6c3cbf7f2739ac6ef609e72a0518e8014f9d00cebff46cb2adf6c4 cf01652a747a1cbbaeab4833382dcfb4456bd80124008b1411c48fd0c5183462 d8a5782545ce9beee041085eb918d056776a3e66f2e503aa91c4cd179857d691 daf0e97b3c710a33158aee240070979c3708b6fb6a62651859b20176b14f887f f57cb898b2d3995ff95d1d075ca8a46bcc6008d83870afdf9a4034b3b6133aee

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Trojan.Tofsee-7055545-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 24
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 24
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 24
<HKU>\.DEFAULT\Control Panel\Buses 24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config4
24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
24
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\kdrxwekz
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\wpdjiqwl
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\yrflksyn
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\vocihpvk
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\xqekjrxm
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25024
69[.]55[.]5[.]25024
46[.]4[.]52[.]10924
176[.]111[.]49[.]4324
85[.]25[.]119[.]2524
144[.]76[.]199[.]224
144[.]76[.]199[.]4324
43[.]231[.]4[.]724
192[.]0[.]47[.]5924
172[.]217[.]10[.]3624
144[.]76[.]108[.]9224
74[.]125[.]192[.]2724
67[.]195[.]228[.]11020
74[.]6[.]137[.]6420
98[.]137[.]159[.]2620
208[.]76[.]51[.]5118
216[.]146[.]35[.]3518
151[.]101[.]250[.]16718
104[.]44[.]194[.]23218
209[.]85[.]202[.]2718
213[.]205[.]33[.]6218
208[.]76[.]50[.]5017
74[.]125[.]71[.]2617
104[.]44[.]194[.]23617
108[.]177[.]126[.]2716
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa24
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org24
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org24
mta5[.]am0[.]yahoodns[.]net24
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net24
whois[.]iana[.]org24
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net24
whois[.]arin[.]net24
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org24
hotmail-com[.]olc[.]protection[.]outlook[.]com24
mta6[.]am0[.]yahoodns[.]net24
microsoft-com[.]mail[.]protection[.]outlook[.]com24
honeypus[.]rusladies[.]cn24
marina99[.]ruladies[.]cn24
coolsex-finders4[.]com24
sexual-pattern3[.]com24
mta7[.]am0[.]yahoodns[.]net22
ipinfo[.]io21
etb-1[.]mail[.]tiscali[.]it20
gql[.]twitch[.]tv20
mx-eu[.]mail[.]am0[.]yahoodns[.]net19
tiscalinet[.]it18
mx-apac[.]mail[.]gm0[.]yahoodns[.]net14
video-weaver[.]lhr03[.]hls[.]ttvnw[.]net14
api[.]pr-cy[.]ru13
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile:.repos24
%SystemRoot%\SysWOW64\config\systemprofile24
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>24
%TEMP%\<random, matching '[a-z]{8}'>.exe23
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)11
%TEMP%\kjzvcyd.exe1
%TEMP%\srhdkgl.exe1
%TEMP%\gfvryuz.exe1
%SystemRoot%\TEMP\wincookie.repos1

File Hashes

4556789446c3037570f9cf1bd4f4a46eee5319570336f461c851db39c2a8ee8b 5c350fc02478ae9c7292d07fa0af0b58f0368069b24bac66d6f81b3808f51cd3 680b245f8ef2c3ba1b08061f4a3f4f483a5a5d2776f085c80743277c78419c81 6af8f0b9791de8f0738125daf6022e4a4df4e2cdb0fc1231f00967a6916aef65 70035e894d3b4a4e98749a7b4a4a6d636fc8e44bd58dda2c0c448a0478fe5fb0 72f32f1f019e887e7fc316ba85011700e0565d6206419536f13e566592e74aed 75e8d2772d064e11049533ccdcf55825c397e127abf1ab8fa03ada6bf684d1f9 79fc121497c503d895234748331ae37c476271ec1e0f50b13ed4e5cb460acad3 80f8082743934e0d25177029fce2c8f2639c72ed4459fb6bfd8dbf9705435736 a2b4b995d47f2f327cf39906194be6e0833a07dc15671f0e6f1f8c3d8dc782a0 a5b4d5d1b73f027ce5f820e52b62006c8316beb83197f66f9fa83f278da5780f a6e0de9ca55434e7e07243d803725a2322ae88a873b83ef2a0ef7f79b14edee3 a9332649c0cc1430fb1239389aae9f411cfa9adc8bbe142fcf666d50319a65b5 ad45af1453bf848a7a5285e725452e61e404d775c2860c7d5db371091d775b14 b91d9b081f503891405d4fc9c0d914e279604d441775a7f08371224ce52dce88 babd568f2356db743a96b8b8712a106606d3043144420fa916f81ff89290668d c4ef64d809a2445747813c07bbd7922292dfbcf9514baf97cf9d12c7b4c4d657 c6ab94774b2b6f02cea022202ded9d059022e4e237645ecd706f10c2f1451256 c742920b0a4ee7162aa7d50193861bdcd55307004775671da6a5897204283d45 cd936bd7f6c8e0e637e7e9714e10b9243215a757bf2a70b4e40a8d2e6da07d28 d71df2e3d86d382b33adc99f205e42645dc18aace875c544da465673ca24bd3e ddca8e327b0ef2a799feecc239d9a63437fe4a98144fa1ca6d7ea594809b731a e8509f883df6e56efc9d8ea4db91966e24a41be99df5499e5f2cb10750738ea2 f1694805ede6bb4e09b654079d2a6063c8216565ef730d49c8319f7c561978d5 f350785d4cdf862dfac6a4afb80cce91f9ec6289664a985156295d904c14e26d
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
Madshi injection detected - (1684)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (1283)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (619)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Excessively long PowerShell command detected - (585)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Trickbot malware detected - (217)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Gamarue malware detected - (189)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
PowerShell file-less infection detected - (72)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
Installcore adware detected - (58)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (52)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Possible fileless malware download - (47)
A site commonly used by fileless malware to download additional data has been detected. Several different families of malware have been observed using these sites to download additional stages to inject into other processes.

Let's Destroy Democracy

$
0
0

Election security through an adversary's eyes


By Matt Olney.


Executive summary

Over the past few years, Cisco Talos has increasingly been involved in election security research and support, most recently supporting the Security Service of Ukraine in their efforts to secure the two Ukrainian presidential elections in April. Experiences like these, along with discussions with state and local elections officials and other parties, have helped us better understand the election security space. These discussions are especially important to us because combining their expertise with our experience in the security space — and specifically our understanding of some of the actors that may be involved — is a powerful model to achieve the ultimate goal of providing free and fair elections.

Based on our research and real-world experience working to secure elections, we have recommendations for several different groups, each of which have a role to play in working against attackers who would interfere in free and fair elections:
  • Everyone should understand that interference in, and attacks on, the election system are part of a larger, coordinated attack on the very concept of free democracies.
  • Security improvements in election security can best be achieved by combining the expertise of election officials with that of traditional security practitioners.
  • Election officials should extract maximum value from this period of heightened interest in election security.
  • Security practitioners should recognize the specialized nature of the elections environment and be careful to provide the best advice for that unique environment.
  • Everyone has a role to play in ensuring that faith in democratic institutions is reinforced and that social divides aren't unnecessarily aggravated.

In this post, we will outline potential scenarios that a hypothetical attacker may take to disrupt any country's election. But it's important to remember that just because we present a scenario in this post does not mean that it is viable in the face of the security work that the election community has put in place. For example, we'll discuss an attempt to change votes on a voting machine. However, it would take an additional post to discuss the hurdles that an actor would face to achieve this. We urge everyone to not underestimate the significant work that the election community has already done in terms of security.

Now. Let's have some fun.

Building a better opponent

So how does one design an opponent? Well, a lot of people concentrate on the "how," but we also need to know the "why." Then, when we start to try and guess what an actor may be trying to do, we can make better assessments. So while we'll definitely look at the historic record — everything from obscure legal filings of relatively unknown federal prosecutors, to public findings from the entire U.S. intelligence community — we'll start with some more fuzzy, geopolitical assessments.

You might look at the recent history of interference in U.S. elections and wonder what the underlying intent of the actions were. Foreign Affairs has an excellent article that explains why an adversary might target elections and agitate the electorate. They propose that U.S. adversaries see the support of democracy as an attempt to extend U.S. influence, and specifically cited interference in the 2016 election as being intended, at least in part, "to tarnish U.S. democracy." But more specific to our actor, the article says adversaries of the U.S. share a "belief that weakening democracy can accelerate the decline of Western influence and advance [the U.S. adversaries'] geopolitical goals." This is our "why."

We're going to build the "how" based on two things: the concept of hybrid warfare and a roadmap we found for destroying democracy. Hybrid warfare is an excellent description of the actions taken by a country that is attempting to avoid traditional, kinetic warfare, but still achieve fairly ambitious geopolitical objectives. Read the paper, but for our purposes, the important concept is that actors adopting this model rely on "subversive instruments," including information operations and offensive cyber operations.

If you wanted to damage something, an easy way to do that is to try and destroy it and be content with however much injury you inflict. This is where our roadmap comes into play, courtesy of Diskin, Diskin and Hazan's paper "Why Democracies Collapse: The Reasons for Democratic Failure and Success." The authors review the root causes of failures of democratic governing structures in the past. The most serious commonalities between these failing governments are: foreign involvement in domestic politics, a history unfavorable to democratic norms and processes, a malfunctioning economy and "social cleavages" — rifts in the social fabric that divide a country.

We will, by definition as a state-sponsored actor, be a foreign interference. However, we can't change history, and the world's economy is interlaced enough that it is hazardous to go poking at it for purely political objectives. But in many ways, the U.S. is ripe for someone to come and pull at the loose threads that make up its social fabric. So, following the map laid out in the paper, this will be a major objective for our adversary — to assault the electorate's faith in democracy and to rend the social fabric of the U.S.

Finally, let's make sure we've captured recent history. The intelligence community has assessed that, in addition to undermining public faith in the U.S. democratic process, that actor also had a preference in terms of a specific candidate. Certainly some of the information operations activities we've seen, such as the conduct of the Internet Research Agency, have targeted particular candidates, but that activity has also shown a desire to inflame existing divides in U.S. culture and society. Finally, we have a few publicly known cases of cyberattacks against election systems infrastructure, in particular, the voter registration databases of several states.

Taking all of that together, we can construct a grossly simplified adversary. Things are more complex in reality, but an actor with the following basic traits will serve our purposes for thinking about general election interference:
  • A desire to drive a wedge into existing social divisions.
  • A desire to undermine faith in democratic processes.
  • A preference toward certain candidates.
  • Willingness and ability to attack voter registration databases.
  • A desire to conduct their work remotely.

Define the attack surface

Talented adversaries are fun, but they really sparkle when you have something shiny to catch their attention. Luckily, elections are super shiny, and our model actor would begin to investigate what makes up the election system. To put it in more technical language, our model actor would begin to analyze the available attack surface. Here is a list of common election system elements they would find, with a basic description of the roles they play:
  • Voter Registration Database (VRDB)
    • A statewide database that contains a roster of those state's residents who are eligible to vote.
  • e-Pollbooks
    • Electronic devices at voting locations that contain some portion of the information in the VRDB and are used by local voting authorities to ensure that individuals are permitted to vote at that location.
  • Vote-casting devices
    • What most of us call "voting machines," these are the devices where the individual voter would interact with the ballot and cast their vote.
  • Vote tallying systems
    • These are the machines that actually count the votes.
  • Election Night Reporting Systems (ENR)
    • This is the collection of systems that collate the results from various districts and make them available to media and other interested parties. These results are unofficial, but are important because, otherwise, Wolf Blitzer wouldn't be nearly as dramatic on election night.
  • Internal and public-facing communications
    • You might not think of this as a key part of the election system, but once you start to consider what the adversary is trying to accomplish, you'll understand why the Center for Defending Democracy highlighted these systems.

4 ways to destroy democracy

In case you missed it, our model actor would really want to destroy democracy. They want to reduce the influence of western democracy and damage the image of U.S. democracy to erode U.S. influence globally. For our model, attacking elections is one part of a wider effort to disrupt the political processes that are interfering with the geopolitical aspirations of our state sponsor.

Now the best part: we, as defenders trying to understand the adversary, become the adversary. We know the playing field, we know what we want to achieve and we're an all-powerful APT actor — just like in the movies. We've been tasked with attacking the election system. What are our diabolical plans? Let's pretend this is all as easy as some think it is.

Remember: This is a hacker fantasy, and doesn't account for any defenses. These are assessments of what an adversary might want to achieve, without worrying about pesky things like network isolation, patching, firewalls, antivirus software and certainly avoiding any heroic election IT staff.

Scenario 1: Let's get the obvious one out of the way. We have a preference, and we're just going to pick that candidate. To get this done, we would have to target either the voting machines directly, or the vote tallying machines. But specifically picking a winner is risky, and if detected, it might solicit an extreme response. So maybe...

Scenario 2: Let's create an election night and certification nightmare. We could manipulate the ENR system in swing states to show that the loser actually won. We likely wouldn't get away with this for long. At best, as certification went through it would become apparent that the other candidate won. We would, however, seed arguments, lawsuits and bad blood for years in a hotly contested election. But the election may not be close, so maybe...

Scenario 3: How about we turn this into an information operation and pick at the divisions already present? First, we pick a state that has been involved in some sort of election argument — accusations of gerrymandering, voter suppression or insufficient safeguards. Then, we breach the voter registration database and we deregister 10 percent of voters who are registered for the party that isn't in power. If we can't do that, we'll make the changes on the ePollbooks when they're loaded with data. Voters will have to cast provisional ballots, lines will lengthen because the process takes longer, the media will report on it, a pattern will emerge of who is affected, accusations will begin to fly. And, as a bonus, we'll also steal a lot of the registration data to make our information operations more efficient in the future.

Scenario 4: Make Scenario 3 worse. Why not? We have full APT power! Let's really dig into those wounds. Let's manipulate the communications of elections officials and change documents to make it appear this was intentional. Let's create social media accounts of "insiders" who claim to know what actually happened. Finally, let's hand the burning ember we've created to our information operations folks as an early Christmas present. They'll work to fan it into full-on flames.

Not time to panic yet. First, a history lesson

It's easy to sit here and fire off imaginary attacks at paper services. But, we haven't given thousands of election and security professionals their say yet. The past three years have been monumental in terms of the work done on improving election security, and those three years of work are built on a foundation of decades of work before that. Which reminds me...

I have something to say about the last few years. And I think this is important: To a large extent, the security community came late to the election security problem and we immediately started to go about trying to fix it. But some of us failed to take enough time to understand the deeply challenging environment we were working in, and that led to frustration on both sides.

To give an example of how complicated this space is, let's go back to December 13, 2000 and see what was going on that night in the Old Executive Building. Al Gore is giving his concession speech, conceding a tightly contested presidential race to George W. Bush. New Mexico had been decided by 363 votes and Florida by just 537 votes. It was not just close, but also by some measures deeply flawed. One MIT study estimated that between 4 and 6 million ballots out of the 100 million cast were not counted. We'll come back to Mr. Gore shortly, because what he said here is important in the larger scope of things, but let's concentrate on those 4 - 6 million lost ballots.

Congress responded, and did so in a bipartisan manner. In 2002, the House voted 357 - 48 and the Senate voted 92 - 2 to pass the Help America Vote Act (HAVA), which established the Election Assistance Commission, allocated $3.65 billion to assist states in upgrading their voting infrastructure and required states to have a centralized, computerized voter registration database. In doing so, they fixed many of the problems that existed during the 2000 election, ensuring more votes would be properly counted in the future. However, in doing this, they also unintentionally created almost the entirety of the threat surface that we are dealing with today.

In one fell swoop — and one enormous injection of funds — Congress set the country on a path to rearchitecting the election system. I'm not going to try to dissect the economics of dropping billions of dollars onto a problem like this. But I will point out that it is problematic that those funds are not guaranteed to exist every year, and there have been stretches of years where money was not supplied to states, leaving them to have to fund the maintenance and replacement of these systems themselves.

To cut this history lesson short, and get to the point: The history of computerized elections is complicated. As security practitioners, we bring with us a wealth of expertise in technology and security. But every one of the more than 8,000 election jurisdictions in the U.S. is in some way unique, and is run by people who understand that they wait at least a year between the main event and then pull it off on that one day with no failure. To do this, they have become masters of contingency planning.

Takeaways

The way that U.S. elections are run by thousands of different precincts, a fact that stems from the very founding concepts of the country, makes providing specific recommendations difficult, especially since we try to avoid just giving rote "patch your stuff" recommendations. So, instead, I have general guidance for three different groups: election administrators, the security community and everyone.

For election administrators, I'd first apologize. I know things are aggravating right now with all these strangers marching in and trying to sound smart. My recommendation to you is that you completely abuse this situation. I know that it can be years between when people even think about elections, so with everyone so focused right now, I'd say make sure you extract every piece of value you can.

Vendors are stumbling over themselves to help solve your "problem." Election security is very much in the spotlight right now and it makes a vendor look good to be involved. Make sure you talk to their experts, take advantage of any free offerings, get extra training and basically make them earn the right to say that they are part of the solution. And make sure they understand the entirety of your specific form of the problem before they start pitching their solution.

Specific recommendations for election officials:
  1. Demand more of your vendors, especially ones that show up out of nowhere when HAVA money appears.
  2. Be clear about your resource limitations and work with your vendor's experts to correctly allocate those resources.
  3. Think like an attacker, and prioritize fixes and upgrades to those systems they are most likely to target.
  4. Our assessment is the most likely targets are voter registration databases and election-night reporting systems.
  5. This includes systems that interact with the VRDB such as the DMV, online registration services and outside systems like the Electronic Registration Information Center.
  6. You don't have to be security experts, but you do need to find trusted partners who can work with you on security issues.
For the security community, I'd ask you to be at your best. And I don't just mean technologically, but also in your soft skills. The people you'll meet in the election community are rich in experience and well-versed in their subject matter. You'll also find them to be patriotic, diligent and fully aware of the weight of their responsibilities and the limitations in their resources. Don't underestimate them just because they aren't experts in cybersecurity. Work hard to build trust and to find a way to combine their expertise and yours in ways that improve their overall security stance.

Also, know that there is a ton of momentum today that you need to be aware of. A lot has happened since 2016. The federal government has declared elections critical infrastructure. While federal law enforcement and national security agencies were certainly already at work on election security, this change provides focus and prioritization that helps. The Election Infrastructure ISAC has been stood up offering threat intelligence and network monitoring assistance to election administrators. Additional funding has been allocated to the states to address security issues — more than $380 million dollars through HAVA, the first such funding since 2010. We're much more clear on the threat than we have been, with indictments and reporting detailing the kind of attacks we're facing. In short, a great deal of progress has been made.

Finally, my recommendation to everyone. This brings me, at last, back to Mr. Gore, standing before the nation. Having lost a contentious and problematic race, including what was, for this election, a brilliantly on-brand, narrow 5-4 Supreme Court decision, Mr. Gore faced the nation to share his thoughts. Think of all the things he could have said. Think of some of the things he probably wanted to say. Now, know that he chose to invoke the words of Sen. Stephen Douglas, who after losing the election to Abraham Lincoln said to him, "Partisan feeling must yield to patriotism. I'm with you, Mr. President, and God bless you." Both Sen. Douglas and Mr. Gore chose to mend when they easily could have chosen to rend.

Remember how hard adversaries are working to drive wedges into the cracks and crevices that divide us along cultural, social and political lines? So much investment in terms of money, time and technology to drive toward this goal — it must be very important to them. Everyone has a role in standing against this effort, it cannot fall just to one small group. We are each targeted, so we must each consider how to respond.

Each of us is given opportunities, in near infinite forms, to help. But to just constrain our topics to election issues, know that every software design, network architecture, resourcing and risk acceptance decision, along with every stump speech, interview, argument, tweet and blog post is an opportunity. These are opportunities to reinforce faith in democracy and to mend the social fabric through transparency, accuracy and a commitment to free and fair elections. These opportunities can also be squandered, and when they are squandered, they hand an unearned victory to our adversaries.

Choose wisely.

Note: Want to hear more about election security? Check out our election security episode of the Beers With Talos podcast.

Beers with Talos Ep. #58: Defending Democracy and Doing DEFCON

$
0
0



Beers with Talos (BWT) Podcast episode No. 58 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded July 19, 2019 — Wow, we packed a lot in this one: election security, burner phones, social apps' terms of service, and maybe the worst opsec of all time. Of course, Nigel blames Canada for all of it.

Fair warning, this episode set a new record for beeps and train horns. We primarily take a look at how an attacker would see disrupting democracy (and not in the cool startup way) by looking at the available attack surface with their intentions in mind. We also lay out some cases where burner devices make sense and where they might not. We close out with some helpful tips to enjoy a massive con like BlackHat or DEFCON. But seriously, that was a lot of beeps.

The timeline:

  • 00:45 — Roundtable: Nigel ships up to Boston, "Cats" the movie, and FaceApp deep fakes.
  • 13:45 — Would you like to add SWEED as a friend? OpSec is super hard.
  • 21:45 — Let’s Destroy Democracy: An attacker's view of election security.
  • 38:30 — Do you need a burner at DEFCON? (hint: probably not)
  • 56:15 — Maximizing the value of time spent at conferences
  • 1:07:30 — Closing thoughts and parting shots

Some other links:


==========

Featuring: Craig Williams (@Security_Craig), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

Hosted by Mitch Neff (@MitchNeff)

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Source newsletter (July 25, 2019)

$
0
0

Newsletter compiled by Jonathan Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

No one really likes talking about election security. It’s a sticky subject, costs lots of money and doesn’t come with an easy fix. But that doesn’t mean the conversation shouldn’t happen.

With another presidential election just around the corner, we decided to take up the topic and examine the approach a potential attacker may take to disrupting a democratic election. Matt Olney took a deep dive into their psyche here, and wrote about what may happen in a real-life attack scenario. 

He and the rest of the Beers with Talos crew broke down these scenarios more in this week’s Beers with Talos episode, too.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.


Upcoming public engagements with Talos

Event: "DNS on Fire" at Black Hat USA
Location: Mandalay Bay, Las Vegs, Nevada
Date: Aug. 7
Speaker: Warren Mercer
Synopsis: In this talk, Warren will go over two recent malicious threat actors targeting DNS protocol along with the methodology used to target victims, timeline, and technical details. The first is a piece of malware, "DNSpionage," targeting government agencies in the Middle East and an airline. The second actor, more advanced and aggressive than the previous one, is behind the campaign we named “Sea Turtle.”

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Facebook confirmed in its latest earnings report that it reached a $5 billion settlement with the U.S. Federal Trade Commission over data privacy violations, the largest fine in the history of the U.S. over online privacy. The social media network also said it would create “a comprehensive new framework for protecting people’s privacy.” 
  • Attackers are using file-sharing network WeTransfer to bypass email security. Security researchers have discovered multiple attacks where malicious actors are sending emails to users with a WeTransfer link that leads to an HTM or HTML file redirecting to a phishing landing page. 
  • Former FBI special counsel Robert Mueller warned that Russia made multiple attempts to disrupt the 2016 presidential election. During Congressional testimony, Mueller said "They're doing it as we sit here, and they expect to do it during the next campaign." 
  • Certain LG and Samsung phones are open to an attack that could allow a malicious user to listen in on conversations. The attacks exploit the devices’ accelerometer to eavesdrop on any audio played through the speaker. 
  • The U.S. Federal Trade Commission fined Equifax up to $700 million over a 2016 data breach. However, privacy advocates and some lawmakers say the punishment doesn’t go far enough. 
  • The latest round of security updates from Apple fixes a critical flaw in the Apple Watch’s walkie talkie app that could allow an attacker to listen in on conversations. There were also fixes to vulnerabilities in the iOS operating system. 
  • U.S. Attorney General William Barr stepped up his fight against encryption, saying tech firms “can and must” put backdoors on their devices to bypass encryption. Barr argued that encryption allows criminals to operate unnoticed and can stall law enforcement agencies’ investigations. 
  • The National Security Agency says it is working on a cybersecurity directorate that aims to align America’s offensive and defense cyber capabilities. The directorate will begin operating on Oct. 1 under the direction of Anne Neuberger, who helped establish U.S. Cyber Command. 

Notable recent security issues

Title: Attackers spread AZORult trojan, attempts to steal passwords 
Description: Attackers recently began spreading the AZORult trojan AZORult through a series of phony cheat codes for video games, such as "CounterStrike: Go and Player Unknown's Battlegrounds. The attackers embedded links to the supposed cheats in YouTube videos and other social media sites. Once installed, the trojan attempts to steal users' passwords. This Snort rule fires when AZORult attempts to make an outbound connection to its command and control server. 
Snort SIDs: 50771 (Written by Tim Muniz) 

Title: New protection rolled out for Microsoft vulnerability exploited in the wild 
Description: Attackers continue to exploit a previously disclosed vulnerability in Windows' win32k.sys component. The escalation of privilege bug, identified as CVE‑2019‑1132, was exploited in a series of targeted attacks in Eastern Europe. An APT installed espionage malware on victim machines through this bug. Two new Snort rules activate when a user attempts to corrupt a machine's memory using this vulnerability. 
Snort SIDs: 50734 – 50737 (Written by Joanne Kim)

Most prevalent malware files this week

SHA 256: 6dfaacd6f16cb86923f21217ca436b09348ee72b34849921fed2a17bddd59310 
MD5: 7054c32d4a21ae2d893a1c1994039050 
Typical Filename: maftask.zip 
Claimed Product: N/A 
Detection Name: PUA.Osx.Adware.Advancedmaccleaner::tpd 

SHA 256: e062f35810260a1406895acff447e412a8133380807ef3ddc91c70c01bd34b50 
MD5: 5a315fdaa14ae98226de43940630b147 
Typical Filename: FYDUpdate.exe 
Claimed Product: Minama 
Detection Name: W32.E062F35810-95.SBX.TG 

MD5: 47b97de62ae8b2b927542aa5d7f3c858  
Typical Filename: qmreportupload.exe  
Claimed Product: qmreportupload  

Detection Name: Win.Trojan.Generic::in10.talos  

MD5: 4a50780ddb3db16ebab57b0ca42da0fb  
Typical Filename: xme64-2141.exe  
Claimed Product: N/A  

Detection Name: W32.7ACF71AFA8-95.SBX.TG  

MD5: db69eaaea4d49703f161c81e6fdd036f  
Typical Filename: xme32-2141-gcc.exe  
Claimed Product: N/A  

Detection Name: W32.46B241E3D3-95.SBX.TG  

Threat Roundup for July 19 to July 26

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 19 and July 26. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Dropper.Kovter-7079842-0 Dropper Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. It has been used to spread ransomware and click-fraud malware.
Win.Dropper.Qakbot-7079811-0 Dropper Qakbot, aka Qbot, has been around for since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
Win.Malware.Nymaim-7077794-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
Win.Virus.Expiro-7077458-0 Virus Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Win.Trojan.Lokibot-7077039-1 Trojan Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
Win.Dropper.Gh0stRAT-7073937-0 Dropper Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Dropper.TrickBot-7071016-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Trojan.Tofsee-7067486-0 Trojan Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
Win.Malware.XtremeRAT-7070642-1 Malware XtremeRAT is a remote access trojan active since 2010 that allows the attacker to eavesdrop on users and modify the running system. The source code for XtremeRAT, written in Delphi, was leaked online and has since been used by similar RATs.

Threat Breakdown

Win.Dropper.Kovter-7079842-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ssishoff
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUpgrade 25
<HKCU>\SOFTWARE\xvyg 25
<HKLM>\SOFTWARE\WOW6432NODE\xvyg 25
<HKCR>\7b507 25
<HKCR>\7B507\shell 25
<HKCR>\7B507\SHELL\open 25
<HKCR>\7B507\SHELL\OPEN\command 25
<HKCR>\.16a05d 25
<HKCR>\.16A05D 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vrxzdhbyv
25
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 22
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
7
<HKCU>\SOFTWARE\9OVFKL4
Value Name: DC1iXk9
1
<HKCU>\SOFTWARE\IUV2K1GDZ
Value Name: IxF25a
1
<HKCU>\SOFTWARE\IUV2K1GDZ
Value Name: xSnk64X
1
<HKCU>\SOFTWARE\TYG6ZX
Value Name: Y4d5jxtm
1
<HKCU>\SOFTWARE\TYG6ZX
Value Name: 49rU6evnxC
1
<HKCU>\SOFTWARE\5WGIB69
Value Name: VR6KTbo
1
<HKCU>\SOFTWARE\5WGIB69
Value Name: VuVY43ROT
1
<HKCU>\SOFTWARE\0wn0hDCj1e 1
<HKCU>\SOFTWARE\0WN0HDCJ1E
Value Name: CURAMV
1
MutexesOccurrences
EA4EC370D1E573DA25
A83BAA13F950654C25
Global\7A7146875A8CDE1E25
B3E8F6F86CDD9D8B25
\BaseNamedObjects\408D8D94EC4F66FC24
\BaseNamedObjects\Global\350160F4882D1C9824
\BaseNamedObjects\053C7D611BC8DF3A24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
50[.]146[.]204[.]2121
94[.]30[.]53[.]921
75[.]127[.]77[.]201
202[.]102[.]245[.]2331
34[.]209[.]49[.]1821
92[.]45[.]45[.]1161
54[.]81[.]147[.]1231
145[.]176[.]133[.]2191
146[.]220[.]4[.]691
85[.]110[.]127[.]161
108[.]101[.]90[.]1621
217[.]139[.]102[.]351
223[.]4[.]245[.]2141
46[.]26[.]51[.]521
2[.]28[.]17[.]561
179[.]50[.]78[.]1731
198[.]59[.]65[.]1591
173[.]197[.]223[.]511
115[.]97[.]126[.]951
73[.]83[.]125[.]501
91[.]159[.]138[.]541
201[.]209[.]158[.]281
37[.]128[.]128[.]1981
20[.]253[.]19[.]1941
141[.]85[.]236[.]2291
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]cloudflare[.]com5
www[.]beian[.]gov[.]cn1
httpd[.]apache[.]org1
bugs[.]debian[.]org1
apps[.]digsigtrust[.]com1
apps[.]identrust[.]com1
music[.]taihe[.]com1
www[.]hao123[.]com1
vh74[.]timeweb[.]ru1
cloud[.]mobiledatasciences[.]com1
www[.]flaik[.]com1
flaik[.]com1
coolertags[.]com1
hydra-pilot[.]skillwise[.]net1
Files and or directories createdOccurrences
%LOCALAPPDATA%\39b0325
%LOCALAPPDATA%\39b03\6a5cc.16a05d25
%LOCALAPPDATA%\39b03\7cbdf.bat25
%HOMEPATH%\Local Settings\Application Data\2501\1ffa.41d6824
%HOMEPATH%\Local Settings\Application Data\2501\aae7.bat24

File Hashes

29b60b1870d5c5e5d43c5464f835bcbfa314e5b0ac9cdfb7c224a24b1a378997 3783c9eafb1545bf643fcfac6c8ff7b23b122b6e295fc55d86f20aa6efc10416 3d965e1ccb25b5a245ff78d2f94c428acf9e888308ac4b63b017dbdfa2e3f52b 41cfb4585f9a85975f2c2a97b8b658a4f87b8e124400299d6418622cbd6d1105 441ff5b57de23331617d3de7af3d99d42ec1d64333d681c495ec9138744f659f 4c02bb11cd484d34262107fc5be9293bb3ce30b34d101696da61f19c3dea6c49 58e483d3179ba0713713a15c636d91f7e91a5df9ff657fcabfcc83bdf75c6db8 5b9f29cf93e099afc38387244e0e236aba1657d21ece357d1a17e02b7de92849 5ca6cdcf11c74c3530edd621378e73b976d5ebe43e335bed462bb7391df03781 61d9a9c1fdc2eaac37b3fc96e7eda980ae1f597891a3fc17e3011881602e146b 6e1e0f2754045a60f4a8e60762355470a2d8c1da7f5017f9c48932ea68a03667 6eccddc1173278809cf6954b640dbd56bd85003444d7d8204db677f15e609bcc 70b67aed1ad4bf81c53345ba3adc83bac92421190c47e9e660a245f2f36db338 710d7f0f75f89d3982ddd157eacacb9679c55a849193cbbea54cd28e04fe0fba 7239bfb7bd55e894b780a148a7416d6e8bf5cf30570dfc9a0cfcbae036054447 7bfd1327e87da19a4c68c9039871fa4bbebd0f25e1dfe197a7362f3a2f47bfa5 808d2f09dd84f42bde3d16f2df0de3fd08574a576ba6a73b59c0bcd8eabcbf1c 964bc3e1921c620b04fee83c440a666505bc8e6ca83d861e7bd435e2c3b89e0f 96621d3887a64e2e5b7539c11b6f3392fabfc4d1662330f06aa1ec9d2619e761 b2ae8ded94a877da3fc61c59afcbe77f10c498a0bc1739237736a3106ad63dfb ba694da7444f518b3e2e01dd2c198ec172313d229ecfee591112de710935ff85 bb43faf1b229d23b6c9ee025b69ccf8b0280107214d8f04fb5194d0de3832345 c7961d7d76cb4794e8a1bf3495373b293633bc1338cba6e9ef2553486e1fecdf cf4a0f9af6afb96e7b8dad098db397530f4fe7fb69790b87f17713655e4534c4 d19e5ca2f10019456bb4d2508ba78fb172108d08df769a259ee2ff1d0730fcda
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Dropper.Qakbot-7079811-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
22
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
22
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CRLs 1
<HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CTLs 1
<HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\Certificates 1
<HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CRLs 1
<HKCU>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CTLs 1
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\Certificates 1
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CRLs 1
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CTLs 1
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\Certificates 1
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CRLs 1
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOTd7Q`\CTLs 1
<HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\AUTHROOTd7Q`\Certificates 1
<HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\AUTHROOTd7Q`\CRLs 1
<HKLM>\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\AUTHROOTd7Q`\CTLs 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: djce
1
MutexesOccurrences
\BaseNamedObjects\393733234a24
Global\eqfik22
llzeou22
eqfika22
Global\epieuxzk22
Global\ulnahjoi22
Global\utjvfi22
bzqjzpdrfpamvq22
\BaseNamedObjects\vjviza18
\BaseNamedObjects\Global\yfpeuru2
\BaseNamedObjects\Global\uazov2
\BaseNamedObjects\Global\orpoamc2
\BaseNamedObjects\lwwveb2
\BaseNamedObjects\Global\vyczm2
\BaseNamedObjects\paoiea2
\BaseNamedObjects\Global\uxxgniue2
\BaseNamedObjects\Global\yusia2
\BaseNamedObjects\Global\paoie2
\BaseNamedObjects\uvkfavmyiwoktbx2
\BaseNamedObjects\gpgpzbxkqqqpyc2
\BaseNamedObjects\Global\ubezkvio2
\BaseNamedObjects\Global\lqwii2
\BaseNamedObjects\Global\nanwvx2
\BaseNamedObjects\Global\ylijdnyu2
\BaseNamedObjects\Global\ioyyjlyp2
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]100[.]26[.]25122
172[.]217[.]12[.]14222
181[.]224[.]138[.]24022
69[.]195[.]124[.]6017
162[.]144[.]12[.]24116
50[.]87[.]150[.]20316
52[.]201[.]200[.]2815
52[.]45[.]143[.]17810
209[.]126[.]124[.]1668
207[.]38[.]89[.]1157
85[.]93[.]88[.]2514
85[.]93[.]89[.]63
69[.]64[.]56[.]2442
173[.]227[.]247[.]541
195[.]22[.]28[.]2221
173[.]227[.]247[.]501
5[.]136[.]131[.]341
12[.]167[.]151[.]791
12[.]167[.]151[.]871
195[.]22[.]28[.]1961
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
forumity[.]com22
www[.]ip-adress[.]com22
www[.]NameBright[.]com22
zqpbnjvmfkfzbyko[.]info22
uofdwoxezbdujgadioqvy[.]net22
hibqrywwciwhbks[.]net22
aqksafpuovjyfrzit[.]org22
wupgkipgaiu[.]biz22
ymoabqpo[.]com22
erbqfnvqsahyshygeglwhxhvd[.]org22
yaznaovutvzwgp[.]net22
vljfhvniqpl[.]org22
aulmkpipscpopgwrtzhlnqmjk[.]info22
nwocsvuw[.]net22
bmbtgoova[.]com22
wlakhytkctowfowlzyehtt[.]net22
pzsbodhuinrzhcjin[.]org22
vwsbvkpkzgsvyhapfcm[.]org22
cagkhrabktfwkuroydfwtta[.]org21
doiknfcneeeydnyofyurzy[.]info21
nbparking-lb-1977168523[.]us-east-1[.]elb[.]amazonaws[.]com19
jkijlzrsvic[.]com19
jueafvkiigmul[.]org17
mgpepssjlpytbdktejekl[.]net17
tvntnfczmfiewin[.]info7
*See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol22
%APPDATA%\Microsoft\Eqfikq22
%APPDATA%\Microsoft\Eqfikq\eqfi.dll22
%APPDATA%\Microsoft\Eqfikq\eqfik.exe22
%TEMP%\~eqfik.tmp22
%APPDATA%\Microsoft\Eqfikq\ceqfik32.dll22
%APPDATA%\Microsoft\Eqfikq\eqfik32.dll22
%APPDATA%\Microsoft\Yfpeuruf\yfpeur.dll2
%APPDATA%\Microsoft\Yfpeuruf\yfpeuru.exe2
%APPDATA%\Microsoft\Uazova\uazo.dll2
%APPDATA%\Microsoft\Uazova\uazov.exe2
%APPDATA%\Microsoft\Orpoamcr\orpoam.dll2
%APPDATA%\Microsoft\Orpoamcr\orpoamc.exe2
%APPDATA%\Microsoft\Paoiea\cpaoie32.dll2
%APPDATA%\Microsoft\Paoiea\paoi.dll2
%APPDATA%\Microsoft\Paoiea\paoie.exe2
%APPDATA%\Microsoft\Paoiea\paoie32.dll2
%APPDATA%\Microsoft\Orpoamcr\corpoamc32.dll2
%APPDATA%\Microsoft\Orpoamcr\orpoamc32.dll2
%APPDATA%\Microsoft\Ioyyjlypo\cioyyjlyp32.dll2
%APPDATA%\Microsoft\Ioyyjlypo\ioyyjly.dll2
%APPDATA%\Microsoft\Ioyyjlypo\ioyyjlyp.exe2
%APPDATA%\Microsoft\Ioyyjlypo\ioyyjlyp32.dll2
%APPDATA%\Microsoft\Yfpeuruf\cyfpeuru32.dll2
%APPDATA%\Microsoft\Yfpeuruf\yfpeuru32.dll2
*See JSON for more IOCs

File Hashes

0440f27f5ec6a3b96a5ac1a56c3071c2fb671794b558d0c340755fed8dbbcbdf 07a387b7fe3fd93eccb572a851c8d0d7bb8bee2a43a6efb7bea8063df339c5fc 08b3f64d69cb5d5a799fcc1604b95f3dc85f033cceb7f29664bcb2abe184010d 2c20bf3afca2d75888c4d3442387f23f9d85457f4a52e2164ea75854d1eee21a 3de9a7c47558120acd829bc1ae1cd77662e17a078c6af82fbbdd20b8dc656c82 404e3ed4451c7b151e95fe9c8c09f411d57ee04116c7b82b239b9d8baf7999d4 456445f92ca18a7803c0e59199034ebde11f954a82fd787b1ef09bb62c9553cd 4ce1cdf63b0a137680c1c3e1bdf6731c77560ca03f82a8654236cdd01beaa0c5 58df7f7c7e9cee07a09a22ceb8567cabfa55455b959e09410a072b2270a8b09b 5eb66c06f7052ea6498241906973894e9fdb91e87c3a49d46a249584139eacb1 6d355205908b972cfbc28968cff4af3ef82ee4b01ad96ee1a2a278da107eaa52 7148c12097deebd480a77358fe0b6fcde38748926268b0b7b1b5391424240cd9 7a5b774c96e44c8699f629a3302e542445a8ecea2f6dd144daeeea5a633b7ac7 92681cfdfae3ff339edac84854c97ff7addb8527a687fecfa67da455c9bfa928 9a118f361bf191b02014ee42c2b0f1123d532e6e71c00c8ab2184bb49f654250 9e26b2631e0378a16727b2d4a87ea1767ee2906300169a9da57a591e0e87bf6f c171ecf4a11c6803799df9c478456e614877b3864ab413d96e2af1fb7c250e25 c2a935ba2e9b4a8cc1d72ce148146733e4c0a9cc991a28f6fe705979236d7923 cd2199f303e84e7914bb05549ec0de6854f7f99e1b2324aedbdac57c35f7d327 cf3ebd8f260a8e3edcb37e6abf9a08b691f68a4868ed1e6f86bb225005df6bcb da4f0ca86ce54cac893b9fc4391060512ad684211a7c6515756fc90b4d523616 e61741ec46c8530acc6b3fb3f90d0c0ce16290b3f2db67a1f6470879d5042d4e e7908bce85cd610f8e156e9ecee9a39d5d96d684748178f9007d7236f5e7a74b f1bb3c10b9330a92bd31a38483fe56f9e8ef30d79c1d07517f6632f389968319 f20d6347774835c9fd25d3134b9e0bda0fb66a0ca5728339ac28d67bec80df7c

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella




Win.Malware.Nymaim-7077794-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\Microsoft\GOCFK 18
<HKCU>\Software\Microsoft\KPQL 18
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
18
<HKCU>\SOFTWARE\MICROSOFT\KPQL
Value Name: efp
18
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}18
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}18
Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}18
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}18
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}18
Local\{9AF4643E-0898-BB80-6A14-0133AB3F8A5C}18
Local\{AC7E1B07-D66B-D6D7-68B8-F1D274B98185}18
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
GOBEZJ[.]IN18
jqmxfop[.]in18
ICSCHQDJWQ[.]COM18
OINCXXQTDBH[.]NET18
gxeiohsixfc[.]com18
pmxwbnpc[.]pw18
fzfpwupqpryc[.]com18
wglcpwdbg[.]net18
NFOOJZPDTSL[.]IN18
OTQFOI[.]IN18
ticfwfen[.]pw17
qxeejy[.]pw17
ahvcnjqki[.]in17
wyftxsolryia[.]in17
klwrihhgj[.]pw17
ldssmbugesb[.]in17
dobra[.]in17
yeqmndxtavuf[.]in17
txvzjzoosogn[.]in17
euvee[.]com17
gyxsvdvcilju[.]net17
djxexguecx[.]com17
euharm[.]net17
jgpazdzh[.]com17
lqtcrom[.]net17
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\ph18
%ProgramData%\ph\eqdw.dbc18
%ProgramData%\ph\fktiipx.ftf18
%TEMP%\gocf.ksv18
%TEMP%\kpqlnn.iuy18
%TEMP%\fro.dfx17
%TEMP%\npsosm.pan17
\Documents and Settings\All Users\pxs\dvf.evp17
\Documents and Settings\All Users\pxs\pil.ohu17

File Hashes

103dd76b28018b8c7060c010c991e512101224e1d606189e54196012af3aeca3 25d88513e5e7ee69cca49695f1a1b2aff798289e3a3f2ad9b8d7ca40c8c7b1e3 378459b44562c821612f32b44ecd5a99cc052feb585f2cf07dd89e0b30e0e46a 47a7aff55e7601a0375f0a247a9d34448494a18b0883cb35df18620f2defee5c 525b8633165d7dcf019047154eb33611b019568b82c38ff32901bd3a47029420 5c3d514d21793bfb4f61ab1f3b6d56471181f49747f1bccc124c07a25f3003a6 5cb52e9cbb50b96a9a6af88de2991148b047da4e87e9b7bb11729fcc483591af 60587d89f106426713d8ed1fc03a44709573aa5bf8bc3dd1df11c764323a4bf0 617963a3ccefd5e0d5a27d7107c60913b303e3ea95a9ccef14bc5fd5e30c005b 797dc8c6d07d24d9b962483d79b007e2dd79f885834abf69d3e98db25267f186 7ca0c09b2560427969859f394e5d23816c6d055385f934fb25e38cbf3382d8d3 86394ba7ec72599cf0bea11b8208f355f11e4c2b97650a71cea1627a02f2a45d 9cf35426ad14545658eea6da023763c5ae509d331d98a000af227072511bcef6 a1503f23fd579b896cad65d9efc508edd42bff231d7ccc89b9d77b586a852468 b716cb702d977f2dae682b60a257675de65041d4573100d7619e1210fe66a428 c0bc0b9c5c86fcaae425af50f3c4a63fee282545b5cb35f8b72227645ababb6b f0cc095352ba5dde07da8aac3404655a32ca95ad0efc8d4bff73001efc81817e f1c66096f2af78b2482e81d744e2be043c5ab4e2ac38e432f2106bf8b36e6d7a

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Virus.Expiro-7077458-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\CLASSES\.vcf 15
<HKLM>\SOFTWARE\CLASSES\.wab 14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
14
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
14
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102 1
MutexesOccurrences
kkq-vx_mtx114
kkq-vx_mtx8114
kkq-vx_mtx8214
kkq-vx_mtx8314
kkq-vx_mtx8414
kkq-vx_mtx8514
kkq-vx_mtx8614
kkq-vx_mtx8714
kkq-vx_mtx8814
kkq-vx_mtx8914
kkq-vx_mtx9014
kkq-vx_mtx9114
kkq-vx_mtx9214
kkq-vx_mtx9314
kkq-vx_mtx9414
kkq-vx_mtx9514
kkq-vx_mtx9614
kkq-vx_mtx9714
kkq-vx_mtx9814
kkq-vx_mtx9914
kkq-vx_mtx3114
kkq-vx_mtx3214
kkq-vx_mtx3314
kkq-vx_mtx3414
kkq-vx_mtx3514
*See JSON for more IOCs
Files and or directories createdOccurrences
%System32%\notepad.exe15
%ProgramFiles%\Outlook Express\msimn.exe15
%ProgramFiles%\Outlook Express\wab.exe15
%ProgramFiles%\Windows Media Player\wmplayer.exe15
\SfcApi15
%ComSpec%15
%System32%\magnify.exe15
%System32%\mobsync.exe15
%System32%\narrator.exe15
%System32%\osk.exe15
%System32%\utilman.exe15
%System32%\rcimlby.exe15
%System32%\tourstart.exe15
%ProgramFiles%\Outlook Express\msimn.ivr15
%ProgramFiles%\Outlook Express\wab.ivr15
%ProgramFiles%\Windows Media Player\wmplayer.ivr15
%System32%\cmd.ivr15
%System32%\magnify.ivr15
%System32%\mobsync.ivr15
%System32%\narrator.ivr15
%System32%\notepad.ivr15
%System32%\osk.ivr15
%System32%\rcimlby.ivr15
%System32%\tourstart.ivr15
%System32%\utilman.ivr15
*See JSON for more IOCs

File Hashes

0287f750c02c8179cc04627b01f33ba36d3918abcf4878fb671ccdcc73c7ca63 08c5f2ff3ddf2a310c820b160e849813ec817d2fce37d185215404dd069c5566 0aa836462926c36d56ac69dfb924bfbfa534faa15c6a4d886a3a8dcfe814e23f 4a8dd8754167a319f12a7ee150b2a46dc6c1e8613eb923009912ac85ddccd732 4f1776195e9504bfe938841f4d77449302719d55b809d1189aa7774a2bcd1df8 576df1b91051f7a8e44b828669fbf46602e94aaf35faef9d88d71dc675d3d7b4 6898956f391244367a61e555ebc77e9e90dd446212a7521a590f772d7c175a91 6fb10a72e40505b431994eeef6aff6a050fb3eeaed57030a552172103ddf4171 83c8cca17f61612b7b64f502fb65e882579663135654e10956ae2ef26316dccf 9631fc0cb55a3063d6a4ea563b013b72cac38371482775e5e15c377b22eca569 98f91b16eb7721cd9af879b2871b5a3e72683886cd6c06a74783d50b49e4535e 9c6b7a22580451dfaf6893e02093cf6e6ffc68109ea170340ce3c12681e8581a a3c60be24a879356f3cdffd3549f95b24bd42986ca8b0c196575fbbde42575bc cc7b2d1f1321776ff48f45bd637299b671dec4a462c1f72128afd83b770ccd32 de0c25d47b8a2690e7db1796a981869c1ac7cd1701285ce92dad6f8459c31612

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Lokibot-7077039-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\VB and VBA Program Settings\HcMI61124620925\x60E5372900416 25
<HKCU>\SOFTWARE\VB and VBA Program Settings 24
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\HcMI61124620925 24
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\HCMI61124620925\X60E5372900416
Value Name: bnVpl1584056334
24
<HKCU>\Software\Microsoft\Windows Script Host\Settings 5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Registry Key Name
4
<HKLM>\Software\Microsoft\RADAR\HeapLeakDetection\Settings\LeakDiagnosisAttempted 1
<HKLM>\http://chartinductries.com/nwata/fre.php 1
None 1
<HKLM>\http://lapphuongshoe.com/dino/five/fre.php 1
<HKLM>\http://suksez-ab.com/cola/five/fre.php 1
<HKLM>\http://tqe2009.com/bjoe/herold/fre.php 1
<HKLM>\http://www.runtaichem.info/rick/la/fre.php 1
<HKLM>\http://www.willhelmsen.com/orange/rok3/fre.php 1
<HKLM>\http://www.exwelloilfleld.com/fresh/julxxx/fre.php 1
<HKLM>\http://galeadz.info/jp/five/fre.php 1
<HKLM>\https://granjepages.com/wpincludes/star/png/jpeg/wpcontent/fre.php 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\40413c204bb0867c9e93f83dc86d23cfcd420485519ffe9d27557585677d66d6.exe 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\40413C204BB0867C9E93F83DC86D23CFCD420485519FFE9D27557585677D66D6.EXE
Value Name: LastDetectionTime
1
<HKLM>\http://zooptiyoupoiunert.tk/fre.php 1
<HKLM>\http://hszna.com/class/five/fre.php 1
<HKLM>\http://lapphuongshoe.com/deal/five/fre.php 1
<HKLM>\http://www.ferosdwitama.pw/osi/la/fre.php 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: cghjjfygjhkjhgfghjt
1
<HKLM>\http://versuvius.ru/java1/Panel/fre.php 1
MutexesOccurrences
3749282D282E1E80C56CAE5A24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]185[.]129[.]1092
185[.]144[.]28[.]1961
37[.]49[.]224[.]1461
37[.]49[.]225[.]2171
185[.]80[.]128[.]191
194[.]67[.]78[.]621
199[.]192[.]26[.]1471
104[.]31[.]82[.]1751
192[.]185[.]131[.]581
37[.]49[.]224[.]2091
104[.]18[.]48[.]191
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]cloudflare[.]com2
lapphuongshoe[.]com2
chartinductries[.]com2
www[.]ferosdwitama[.]pw2
www[.]exwelloilfleld[.]com1
www[.]willhelmsen[.]com1
hszna[.]com1
SUKSEZ-AB[.]COM1
VERSUVIUS[.]RU1
newmarken[.]tk1
fundrises[.]com1
pastipasterputgripe[.]tk1
womarpool[.]com1
TQE2009[.]COM1
WWW[.]SCM-HK[.]COM1
www[.]runtaichem[.]info1
GALEADZ[.]INFO1
GRANJEPAGES[.]COM1
chikasixtus[.]ml1
melia[.]cam1
i9contabilidadeadm[.]com[.]br1
zooptiyoupoiunert[.]tk1
Files and or directories createdOccurrences
%APPDATA%\D282E1\1E80C5.lck24
%APPDATA%\D282E124
%TEMP%\subfolder\filename.vbs4
%TEMP%\subfolder4
%TEMP%\subfolder\filename.exe4
%TEMP%\cghjjfygjhkjhgfghjt1
%TEMP%\cghjjfygjhkjhgfghjt\cghjjfygjhkjhgfghjt.exe1
%TEMP%\cghjjfygjhkjhgfghjt\cghjjfygjhkjhgfghjt.vbs1

File Hashes

075cf35b3b963211fb7bba6ede59114206ddbf321ec642f0f7b347a11b8b6fef 0967bfac099b4ecf2e76c45ac95e43c638d1e8bd47de72e53ec44e87f11d393c 0a6766bc092647edf1f56c993458a7902425111914ca609da2e02278ca483cfc 0a7a5afe3ca9d7bcb99c4281d58a2c9781701f33000ed3dbf563cc8b8a61bd3e 0c4b3e770540676c8395d4bb955e669332017804f9d4e17a92bdd4d184fed8bc 0cf69c5d348932c346ca90146dda2191f61402719d3408d5515e89057004d263 1214fc13e9595cbd87428a0c8ab76fac9e6717680d17029dda4321e901880e4d 1c3057da6dc19df586271526e765039fe828065dd8d1a307f6f6f6ac39da0b55 2acf4434083ca7b1beb0819dc039949b7cae49bdc89124698190f4a45e11e679 3753908ecd911647acfe191c9d3c7cfbb213103e9da8c070dd05de9c3ec52588 40413c204bb0867c9e93f83dc86d23cfcd420485519ffe9d27557585677d66d6 5132fd6dafe1a5a2f793d7fb2646b1f2b375657e68a37791ce7823c89671b792 5b8534960b823d8503a2efa4cf657338c398d8df712343fd8910e99b6005f7de 5bb27e37d3eb360c40f622224bae2869ddfacdd6c0977cad4121d4058f7010ac 6898b07a8c5340a5ec0d0c5a049ce8a44da2e8ae065abcc377a226bb5e4d8444 6a8ee2c77d39ffd21b04fd334ce5aa339d6ea6d8d7aea2d897037c6b34784f8a 7df27d7eaab754928d250ec4250b29c129dd07c1cad340383b29064f0b9eae93 8bbc7518497873e1da26379f5d1857ce3b3f18133ba492dc5c6295f7549b231b 93ba0b74bdd57936fb44449614aae5605da21f186048701339bafc2b94913395 9835c5bbde2381c1c9de6adb80b66b22ea7ed6618518a9c96deac38b3d57d6de a12bb223d5b78ced5f9f5898edae53c963a88364d4e5a86ab40ea3254c719bcb a4a67f78dbcfdd9751f16c66d7c9ac79fbef28fab95aa3788f5772dab9ff1c1f b28c369a00801f63fe7c9d9bf8fc0a0053a12f843075513cac455f475e743f92 b80a76e0a7ef63564724e5c060136a98659752f57f0664452cea3ff92b5aec5e b8cf7f4b17617f508e819e91e9bf68711abaca523859c14d8bae1323b3533b54
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Gh0stRAT-7073937-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CurrentControlSet\Services\System Remote Data 11
<HKLM>\SYSTEM\CurrentControlSet\Services\System Remote Data\Parameters 11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: Description
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SVCHOST
Value Name: System Remote Data
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: Group
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: InstallTime
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\System Remote Data 11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: Type
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: ErrorControl
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: ImagePath
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: DisplayName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: WOW64
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: ObjectName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SYSTEM REMOTE DATA
Value Name: FailureActions
11
<HKLM>\SYSTEM\CurrentControlSet\Services\SRDSL 3
<HKLM>\SYSTEM\CurrentControlSet\Services\SRDSL\Parameters 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: Description
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SVCHOST
Value Name: SRDSL
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: Group
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL 3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: ErrorControl
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRDSL
Value Name: ImagePath
3
MutexesOccurrences
pzss.f3322.org:10010:System Remote Data4
eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-181
\BaseNamedObjects\254143.f3322.net:10010:Apple SPPER1
\BaseNamedObjects\254143.f3322.net:10010:apple.com11
\BaseNamedObjects\www.foxdos.cc:10010:System Remote Data1
\BaseNamedObjects\separa.f3322.org:8002:saufjj11
\BaseNamedObjects\192.168.0.100:8001:SRDSL1
\BaseNamedObjects\53ca.meibu.net:1993:SRDSL1
\BaseNamedObjects\1321.f3322.org:10010:System Rem2ote Data1
\BaseNamedObjects\39.109.5.112:8998:SRDSL1
\BaseNamedObjects\123.129.113.61:10010:System Remote Data1
\BaseNamedObjects\pzss.f3322.org:10010:System. Remote. Data.1
\BaseNamedObjects\feng12763.3322.org:888:Poweri1
\BaseNamedObjects\pass.5sfox.com:10010:System Remote Data1
\BaseNamedObjects\688300.com:9999:svchost1
\BaseNamedObjects\219.235.4.247:10010:System Remote Data1
254143.f3322.net:10010:System. Remote Data.1
pzss.foxdos.cc:10010:System Remote Data1
wfs2015.f3322.net:1083:SRDSLr1
121.41.74.174:8001:System Remote Data1
jwl520.xicp.net:8000:Mttack wocaonimei Service test1
27.202.226.109:10010:System Remote Data1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
111[.]74[.]238[.]1093
119[.]29[.]53[.]1442
61[.]147[.]125[.]1841
117[.]21[.]224[.]2221
115[.]49[.]170[.]771
61[.]155[.]136[.]2331
61[.]160[.]41[.]1031
39[.]109[.]5[.]1121
123[.]129[.]113[.]611
107[.]160[.]240[.]1961
219[.]235[.]4[.]2471
119[.]124[.]0[.]71
121[.]41[.]74[.]1741
27[.]202[.]226[.]1091
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
PZSS[.]F3322[.]ORG6
254143[.]f3322[.]net3
cncert-sinkhole[.]net1
jwl520[.]xicp[.]net1
www[.]foxdos[.]cc1
separa[.]f3322[.]org1
1321[.]f3322[.]org1
feng12763[.]3322[.]org1
53ca[.]meibu[.]net1
PASS[.]5SFOX[.]COM1
PZSS[.]FOXDOS[.]CC1
wfs2015[.]f3322[.]net1
Files and or directories createdOccurrences
%TEMP%\-<random, matching '[0-9]{9,10}'>.dll19
%SystemRoot%\SysWOW64\System Remote Data.exe11
%SystemRoot%\SysWOW64\-<random, matching '[0-9]{9,10}'>.dll5
%SystemRoot%\SysWOW64\SRDSL.exe3
%ProgramFiles%\Google\28484.dll2
%SystemRoot%\SysWOW64\System. Remote. Data..exe2
%SystemRoot%\SysWOW64\en-US\svchost.exe.mui1
%ProgramFiles%\Google\32640.dll1
%ProgramFiles%\Google\29703.dll1
%ProgramFiles%\Google\661453.dll1
%System32%\660125.dll1
%ProgramFiles%\Google\638859.dll1
%ProgramFiles%\Google\693828.dll1
%ProgramFiles%\StormII\668515.dll1
%System32%\33625.dll1
%ProgramData%\DRM\32046.dll1
%System32%\30421.dll1
%ProgramData%\DRM\36265.dll1
%ProgramFiles%\Google\32812.dll1
%ProgramFiles%\Google\33718.dll1
%ProgramFiles%\Google\28281.dll1
%ProgramFiles%\33234.dll1
%ProgramFiles%\Google\32250.dll1
%ProgramFiles(x86)%\-1672280194.dll1
%SystemRoot%\SysWOW64\System Rem2ote Data.exe1
*See JSON for more IOCs

File Hashes

035e3a8317ddd6aa352df4b3e088bbff2f1e482feb527ca9c159d1896370a8b4 0433376629abc250a4b4200df8a28d6fdf7fc7dff45bdaa5841fe1e98bb21ec9 0747b22ff9bc71d2f8da3d15b900e3553f80351a80126dbe67ed01b6c7ab19e6 0bd96f8c2fcce6fc384113844241dbf4d14b1251d1b56571831dc7d34b5ce147 1124d96932cf836d96b69ccaa1c8511f587a5f9c52bf7498d61382141afbf592 15f09c89df13858abe6905a55d6f5a0de9cfb3c346182b539759d5aacbe0a721 180a88e9a96ac2fa5645585af4c24fd899605a81ce8d989f24b06253e9444214 1d9a87e2ce471d4826f46f71947f1348562a98eef54270d195bb26ce6a0d829e 1e7161c1274747b441d9f4f48bae13a3b342b64c73afb6a96b21d3842932c2f7 23f57ad22964d920fce6873c0b8f554b4ffab4eacf10f9a2bb12a32d2671b13c 27033a0e98907fd2c5cfdb7b5dfaa3c6d35affef323b3e79a04c400aa6659203 281723771bc6562bce0c4661dd595ad3afeeba79e62194669a30f2dc46ab2098 2fb9683a78a4c0c3f15f60bc9028f243244f9fab0e0bb69c865b32f75c67fb0d 39b28e0d4f2a4fb04b634bcd68364bbbaa541be8eb39dcb35253292cde0e457d 3cab4e999db0485a15803cef539571dd66b507a33194c68268b01c7efb989b74 3d3555311f1023b76e5c070aa1146e92c762ba3c4685b2f22ce273b873f729e1 43b4996fa8ecc58c4a04f4ca080d4ea57b25c10612c61ec8052239cfd76feec1 453db1ba955324d4152924f47dfde9c5d2f4162b646eb599773cebdfe7984850 510b27c5b138e1d5b4a7fc274511cc036a9744d0e1747a6b7c1f6dfb9c025d6c 5463a5a7591c51caf1f7a4996b6296977e9a0dfba3e86505199be3f83ccc2995 57bdf55ccf70525364a33e49f08416b19574ac5b79912058fa8eab4ee7f74e7a 5e0e8552bf3c110b409b9798a110b498c1ffd0945ede6c26d2da0fe6769fe36d 615803622ef8cac2aac9fcb25dd0c78ce3f74ac61b2e8d4a245396f4f3cae259 6fa8b278efb2358b37dbddd6d234337e4b90a30557612de0ebc8c1b4419e833e 6fab0bb5f3536763a05af8a9632259152f50f3eb42fa63102215dc729f160a78
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.TrickBot-7071016-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
23
MutexesOccurrences
\BaseNamedObjects\Global\TrickBot20
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
207[.]35[.]75[.]11022
192[.]189[.]25[.]14320
36[.]37[.]176[.]620
216[.]239[.]38[.]2111
216[.]239[.]32[.]216
216[.]239[.]34[.]216
216[.]239[.]36[.]214
54[.]243[.]198[.]124
54[.]204[.]36[.]1562
107[.]22[.]215[.]202
78[.]47[.]139[.]1022
54[.]243[.]147[.]2262
54[.]235[.]124[.]1122
50[.]16[.]229[.]1402
23[.]23[.]243[.]1542
50[.]19[.]247[.]1981
23[.]21[.]121[.]2191
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
myexternalip[.]com2
Files and or directories createdOccurrences
Modules23
client_id23
group_tag23
%System32%\Tasks\Bot23
%System32%\config\systemprofile\AppData\Roaming\client_id23
%System32%\config\systemprofile\AppData\Roaming\group_tag23
%APPDATA%\client_id20
%APPDATA%\group_tag20
%SystemRoot%\Tasks\Bot.job20

File Hashes

027285368ca802e7fce3dd6de901dd68f86d05f464addaa81b4bb1961fcf9be2 0955213e2d07b8ed5ccd0ba0977d55da06d481e323959d8bbee0dcd0e83b85e4 0a0425f7cfe29f069045214fb1600e60a88e0d89e309818acbe66a347e6401dc 2886837dc5baed1a22dd46782f63c9d6c5db2c929dc8a88657c4059e599e2673 2f2053e002951fac67da2f6052900cb244632bfe4a8153cf56798ce0656ab6ee 402978f2746c3411677f4b05c4fb68b80baf44e8d4d92bfd343fe583e161365f 4c38cb3fe5c84ef22b7b604a8f28bf3bc9454af0645a8c847ed4699d3a428293 50084b6e587eb489aa823567c684e40b009eb8a2927a251ccf8fe47a8dfbc812 5394a7638b734bb070132904ffa31cb689cc8a1af55088836c054c546bf37338 561efa6f7e1e13645be8f30e4aba5316bfc18efaa0dd78f666b252a484d4dc08 5bac218180dcd885641b550f6c98919ba40208e0a5427b0f58177f7e047f2819 5d89a114fbb50329669e9497936860c4f7503eeac9d3906b5ba5623e720c85ab 5f003b9b1d68cc22e895bfabd0aea197a5a36ec6f1f3fbd1842265111890e6d5 64dcdd701c313c860d65127ebac397eb4137850aeb387dd3492e2553bb07fd88 691be5f3dfac97406df0d1582c90c60446fafcc9d342ca512bcfda5e6ecb8696 774851bc757d11226036b52eb8a2e994602d3ec32aacaf7d98230e7c7c3fa856 7edb72dffccef26433320595bdead4743f015901cc45d42d3786b7bfa27e2267 84a81ab2dd2bbfbcd86b236bf19ac7056e065616e650e040cfffabc3de7ab4cb 86b865d8a3fa6cce2558d2af3a1c93ddcacf58111820e16c923cf2bc542532d9 8c6d865e07dbe05f27ddfe2e785f8b7383f71f694e6d2a63630a18c7f95ab702 93b05e686c6e133e09fe98a144c4434982ff63556a4dc1ffe06fe3fa49a2c6a3 9ed083fc3988a56256f149bb0fb1113088a4302402b505b6365edcdc628e872a a162bb9219a09b302b90bc6f908e117e3fb2c722560336d378fd76a8f22f78f8 acabdcfa9a083fe2dc5be7680c2fc0454b930d6607248fe9536f0fc6fa808300 b019141f31cce8683375cbec4cd75b66e5b3e4eded495d4d757d048978c855c4
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Tofsee-7067486-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 25
<HKU>\.DEFAULT\Control Panel\Buses 25
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
25
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
25
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
25
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\fymsrzfu
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FYMSRZFU
Value Name: ImagePath
4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\athnmuap
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\buionvbq
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BUIONVBQ
Value Name: ImagePath
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ATHNMUAP
Value Name: ImagePath
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\nguazhnc
2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25025
69[.]55[.]5[.]25025
46[.]4[.]52[.]10925
176[.]111[.]49[.]4325
85[.]25[.]119[.]2525
144[.]76[.]199[.]225
144[.]76[.]199[.]4325
43[.]231[.]4[.]725
192[.]0[.]47[.]5925
172[.]217[.]10[.]3625
144[.]76[.]108[.]9225
172[.]217[.]15[.]10024
213[.]205[.]33[.]6324
64[.]233[.]186[.]2724
209[.]85[.]202[.]2723
213[.]205[.]33[.]6122
213[.]205[.]33[.]6421
211[.]231[.]108[.]4621
69[.]31[.]136[.]520
74[.]125[.]192[.]2720
96[.]114[.]157[.]8019
212[.]227[.]15[.]4019
216[.]146[.]35[.]3518
104[.]47[.]53[.]3618
125[.]209[.]238[.]10018
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa25
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org25
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org25
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net25
whois[.]iana[.]org25
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net25
whois[.]arin[.]net25
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org25
microsoft-com[.]mail[.]protection[.]outlook[.]com25
honeypus[.]rusladies[.]cn25
marina99[.]ruladies[.]cn25
sexual-pattern3[.]com25
coolsex-finders5[.]com25
hotmail[.]com''stat=0x0brsnds=4resp='s10s78i3'24
etb-1[.]mail[.]tiscali[.]it23
eur[.]olc[.]protection[.]outlook[.]com22
tiscalinet[.]it22
tiscali[.]it22
smtp[.]secureserver[.]net21
mx-eu[.]mail[.]am0[.]yahoodns[.]net21
ipinfo[.]io20
mta5[.]am0[.]yahoodns[.]net20
yahoo[.]com''stat=0x0brsnds=4resp='s10s78a7'20
mx1[.]comcast[.]net19
comcast[.]net19
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile:.repos25
%SystemRoot%\SysWOW64\config\systemprofile25
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>25
%TEMP%\<random, matching '[a-z]{8}'>.exe25
%HOMEPATH%24
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)24
%TEMP%\rqgcjfk.exe1
%TEMP%\wvlhokp.exe1
%TEMP%\utjfmin.exe1

File Hashes

06442a39540917cfa3370f3427023cfb2592c31de5c5f9370f012e734731f4ac 14f6caa0a689e466b2dbfce5e9945e5d3950cdbad1bd92fecd882004aa4b012e 185a939b94aa56b0aa736d2e31911c666302e52716ad6305f66e2e38aa0f7885 1c3e1fff7351f002df5cc7ef00c41dea632bc4e00689002c9ddf176fc6d4c906 302e3489f9f3f342adb3d94d42ecd241b6fddf6f3ec181398f228ed206ec74ca 30ecc33b922369a5b52669ab3567c065a15e4e6eb4098e7d81dffe33d16a0f8f 3333e26a6437b72d1d3a5512d430dc11c7c099af0367c0c9e7914a5c56a0efa1 36c758a5c3eb289ab2937a5921187c2f4ba75c5531d4f6fc9e1db585b920e6b6 3b89d6c2c0f064f0856c853dec187bbefcbca5cdc281f5cd46ee92df7386dd74 3c971b975da95610f8907002e5f221ea3db3ab0accb35c6aa8a481d1ca2f8762 3d993e6a7801a6935ff137004041a3eb50c97296159777207e72033e858f8054 4197745f05150f4395779b7107ec9088fd36e276dbab2819e7f2a5feec55679e 42545b6f5866b07980ed750b68f71f3d2c27f5bc3ddf3a568c86ba4cca0b0906 4292cd3eb1fb432cdcfc389baed6296cd840e356fa5c56527a57f3615416a738 4e8c43751f3364735c739ab34c28db0e13554d8ef7d21e64a1357b9bcb01e388 524ad24ee4bcb940533e9c994ca043332108f4837fa0537735e6866fb714687b 56c31cf0ffe2d5bb9cee137d912742c286d19b7834991a4861db9c95ad7c0142 5d14a447be266c4c9e81b30b3e965635f942bf2bfe7645b81790836678b3941b 60b37f2cbcabca3ffa70adf368298d11f687094e34a6fb35695a756666dfb9ad 662fa2498447a789ddc76a2c52a8e5ec2d53288b1b8bef61847344907393b12a 66f58cdc04793f275d5658c2cb134d48a8415dba37f1f09b8849a79c689bb459 6a61dbf1df22534f74bc604755ab6f28d3413d3c8fe8b5f59e48f041315a5e68 6b17990069791ada47ce0ef4bd1658929147ed93009eec390733654146655f6c 6eb838b70b81c3e65f0f7fa304697e81cfc75294a42683f056323b786e66e90c 703f6a71baf18e2ebdb9d512ff9ef76736ea2202ae92dcb9e50173aec9bba09c
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella




Win.Malware.XtremeRAT-7070642-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\XtremeRAT 5
<HKCU>\SOFTWARE\XTREMERAT
Value Name: Mutex
5
<HKLM>\Software\Wow6432Node\Microsoft\DownloadManager 3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKLM
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKCU
3
<HKCU>\SOFTWARE\P@-zxRM2 2
<HKLM>\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{W8E4P17Q-7F6G-I050-W34W-7RI0JXOG67T2} 2
<HKCU>\SOFTWARE\P@-ZXRM2
Value Name: ServerStarted
2
<HKCU>\SOFTWARE\P@-ZXRM2
Value Name: InstalledServer
2
<HKCU>\SOFTWARE\XTREMERAT
Value Name: TDados
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{W8E4P17Q-7F6G-I050-W34W-7RI0JXOG67T2}
Value Name: StubPath
2
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
1
<HKCU>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon 1
<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows 1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Users\Administrator\AppData\Roaming\Microsoft\upnps.exe
1
<HKLM>\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BBB9B0D-C1D4-6CDA-BC8D-D19CCBC6ACD3} 1
<HKCU>\SOFTWARE\Microsoft\Active Setup\Installed Components\{1BBB9B0D-C1D4-6CDA-BC8D-D19CCBC6ACD3} 1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Taskhost
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Taskhost
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Taskhost
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1BBB9B0D-C1D4-6CDA-BC8D-D19CCBC6ACD3}
Value Name: StubPath
1
<HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1BBB9B0D-C1D4-6CDA-BC8D-D19CCBC6ACD3}
Value Name: StubPath
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID\ID
Value Name: XEJJI3T7BL
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL\DATE
Value Name: XEJJI3T7BL
1
MutexesOccurrences
Global\5fc48401-ace7-11e9-a007-00501e3ae7b56
UFR35
XTREMEUPDATE4
Administrator12
Administrator42
Administrator52
--((Mutex))--2
--((Mutex))--PERSIST2
\BaseNamedObjects\--((Mutex))--EXIT2
STUBXTREMEINJECTED2
P@-zxRM22
P@-zxRM2PERSIST2
P@-zxRM2EXIT2
CWSPROT20S1
Local\https://docs.microsoft.com/1
\BaseNamedObjects\CWSPROT20S1
XEJJI3T7BL1
9e47MGT34YL1
9e47MGT34YLPERSIST1
CoFsQ3su@1
yrRJ11
yrRJ1EXIT1
yrRJ1PERSIST1
\BaseNamedObjects\9e47MGT34YLEXIT1
\BaseNamedObjects\_kuku_joker_v4.001
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
217[.]69[.]139[.]1603
23[.]62[.]7[.]1382
208[.]185[.]118[.]892
13[.]107[.]21[.]2001
204[.]79[.]197[.]2001
172[.]217[.]9[.]2381
94[.]100[.]180[.]1601
208[.]100[.]26[.]2511
206[.]189[.]61[.]1261
192[.]30[.]253[.]1131
151[.]101[.]0[.]1331
72[.]22[.]185[.]2011
193[.]166[.]255[.]1711
152[.]199[.]4[.]331
65[.]55[.]44[.]1091
20[.]36[.]253[.]921
151[.]101[.]64[.]1331
151[.]101[.]192[.]1331
85[.]17[.]31[.]1221
178[.]162[.]203[.]2111
5[.]79[.]71[.]2051
85[.]17[.]31[.]821
96[.]17[.]236[.]1311
104[.]107[.]7[.]251
23[.]32[.]81[.]1181
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
smtp[.]mail[.]ru4
whatismyip[.]akamai[.]com3
5noseqwa[.]no-ip[.]info2
a1524[.]g[.]akamai[.]net2
mariokart[.]no-ip[.]biz2
chan4chan[.]no-ip[.]biz2
schema[.]org1
www[.]google-analytics[.]com1
stats[.]g[.]doubleclick[.]net1
github[.]com1
e13678[.]dspb[.]akamaiedge[.]net1
ajax[.]aspnetcdn[.]com1
img-prod-cms-rt-microsoft-com[.]akamaized[.]net1
avatars0[.]githubusercontent[.]com1
avatars1[.]githubusercontent[.]com1
az725175[.]vo[.]msecnd[.]net1
aka[.]ms1
avatars3[.]githubusercontent[.]com1
developercommunity[.]visualstudio[.]com1
static[.]docs[.]com1
6noseqwa[.]no-ip[.]info1
avatars2[.]githubusercontent[.]com1
entony[.]no-ip[.]org1
absoluthack[.]no-ip[.]org1
MRPIKO[.]WBH[.]HU1
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\x.html3
%SystemRoot%\SysWOW64\hackersi.dll3
%System32%\hackersi.dll3
%TEMP%\~PI<random, matching [A-F0-9]{2,4}>.tmp3
%SystemRoot%\SysWOW64\InstallDir2
%SystemRoot%\InstallDir\Server.exe2
%TEMP%\ïðåñåðâû.jpg2
%APPDATA%\Microsoft\Windows\P@-zxRM2.cfg2
%SystemRoot%\SysWOW64\InstallDir\Svchos.exe2
%APPDATA%\Microsoft\Windows\P@-zxRM2.dat2
%TEMP%\ .jpg2
%System32%\InstallDir\Svchos.exe2
%HOMEPATH%\Documents\MSDCSC\msdcsc.exe1
%APPDATA%\Microsoft\lorinsk1
%APPDATA%\Microsoft\upnps.exe1
%TEMP%\report_22-07-2019_20-15-23-4F87A9367435FE0BD80DBD46B859D933-ABCC.bin1
%TEMP%\NO_PWDS_report_22-07-2019_20-15-23-4F87A9367435FE0BD80DBD46B859D933-ABCC.bin1
%TEMP%\report_22-07-2019_20-15-23-4F87A9367435FE0BD80DBD46B859D933-FDGM.bin1
%TEMP%\NO_PWDS_report_22-07-2019_20-15-23-4F87A9367435FE0BD80DBD46B859D933-FDGM.bin1
%TEMP%\fcwxfBuH5r.ini1
%TEMP%\7h2nNSO06Q.ini1
%APPDATA%\Microsoft\Windows\CoFsQ3su@.cfg1
%SystemRoot%\25440efbff3a567fe49111131c0266fab38.jpg1
%SystemRoot%\25440efbff3a567fe49111131c0266fab38.jpg.exe1
%APPDATA%\Microsoft\Windows\CoFsQ3su@.dat1
*See JSON for more IOCs

File Hashes

0606cb23c9f53b8733da8f468f07cc3946268e0b61e5365c4e0c68f62738f9a4 06c472a7fa697a598789f11f504b52440475645ef0cc2724632824b813834f51 10e6a8b2e0099fbf14b0321f76f0967f3d9887bda985fe44848121ddef549940 19101b1bb2a3e755719b76bb3da51a5a68edc049f7c319a34c77e971a5962d49 19e466e5bc75837312b910189374fc16d5b70b3dc6acb2ed0bbc706ea9067633 21a1d982819a068c7e90a3af6e9b87a0b16218888433b8bcb8376eaefb047406 235a23a1ca798d25cecab5a643c1d21eb2a583ff0ab4e21ebd8cf723c64d2a02 23f58dfb6c889c626e130c10eedf2edf4b752cc9447c76b6b9e0febe7f7b678c 257af09cb154acf881269aaf64cc73010ee8d56382dd4c93897e1990627ccfbd 29d41e65ef7d0b66dfc0c714f4395da21929b6a2af8105022f5a562cc7f6b774 2b47901571451ff5474dc296ef22d4d256921acb97574dbc071f10748bf7cb60 481f4de864a9837cbdc2e122bfe34899463f56ae5b15ba07c0959cda3f161afb 48455f9cd96de211b57b244fdea79023d46b047f5ea0f8e61742a34c877c7eea 4f7385b3060fcaefa29ac3f916ff39baadbea77c98cc22a1f6ae2a670a937545 5517c9483d3dfcbc9eaceb72644a2ef4c9f13d3eea113c883c195866da561347 584cbda453a9a037b5b641c8fdc3fe70765427a50633014e4dea2344049bcda4 67436d748f0c7752295bec9f3f1e4aed9412c2795bfbebbc153b3c16e67301c8 6a12cfdc5b1a52f608e83154a2afa020ce5f895fb07f60bef1eb26981ec8e16a 6aa650a6322d68336b844608cd0acaee3d39921003d620d27365c8637c2eb6b6 770ca6daee2d99bb27ac27b291fb1fcf88949ca86e0744c5b77d41bd5e44ada4 7f5c1dde2982c0294a195e362a1a94c5567feeba0e450ac25899d0bbed4c44d8 8290d1138fce94bec6379ba5989bec612b8ee728cbe869eda0b4dc79dfc01373 82f9d4b98c5388ad9436b377bb35c49f72fdafae13dadc6311115de2db5d93d7 896e26d91c4a5eaa3ac2eea1d6140ff7a3f62de61f9d28ad46d98e4a08d88541 9689cd800c21fa168fc34f7e183fd30b2b354fcaae0e5ef2411785ebbab911e5
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
Excessively long PowerShell command detected - (1614)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Madshi injection detected - (1552)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (1374)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Trickbot malware detected - (666)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Process hollowing detected - (381)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Gamarue malware detected - (183)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Dealply adware detected - (130)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Installcore adware detected - (49)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
WinExec payload detected - (42)
An exploit payload intended to execute commands on an attacker controlled host using WinExec has been detected.
PowerShell file-less infection detected - (25)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

All the places you can see and hear Talos at Black Hat 2019

$
0
0

It is once again time for Security Summer Camp – the annual week when security experts descend upon Las Vegas for Black Hat and DEFCON. Talos will be around all week, but we want to start off with a Black Hat preview — the Defcon one will be here later today.

Throughout the conference, Talos researchers and analysts will be at the Cisco Security booth giving “lightning talks,” where they’ll be tackling complex topics and giving attendees a 20-minute overview that will give you actionable intelligence to bring back to your organization.

Stop by and see us to listen to talks, pick up some exclusive swag (including special Snort colors) and chat with our researchers.


Here’s a rundown of the schedule for Wednesday and Thursday. Be sure to stop by for as many talks as you want. We’ll also be posting live updates on Twitter from the theater.



The major theme you’ll hear from most of Talos’ talks this year: The danger of DNS hijacking. Many of the flash talks at the booth deal with this topic, and we already have a blog post on Black Hat’s website on the topic.

Talos has published several pieces of research on DNS-based attacks over the past year, including ongoing actions from the Sea Turtle actor.

Warren Mercer caps off the DNS conversation with a sponsored talk in Business Hall A at 12:40 p.m. local time. He’ll be giving a presentation called “DNS on Fire,” where he’ll discuss two recent malicious threat actors targeting DNS protocol, along with the methodology used to target victims, timeline, and technical details.

The first campaign featured will be DNSpionage, which targeted government agencies in the Middle East and an airline in November. While researching DNSpionage, we also discovered an effort against multiple countries to redirect DNSs from the targets and registered SSL certificates — Sea Turtle.

Cisco Security’s crown jewel of Black Hat takes place Wednesday night. We’ll be throwing a party at the Jewel Nightclub inside ARIA Resort & Casino from 8 p.m. to midnight local time. Come talk to Cisco Security and Talos researchers, enjoy some good music and you may even be able to find your way into a special Talos VIP area. It’s free to get on the list, but you need to register beforehand to get in.

Besides Talos, Cisco Security also has a series of talks at Black Hat. Here’s a rundown:

Defeating Evasive Malware: Sacrifice is a Good Little Trick 

Shyam Sundar Ramaswami, security researcher, Cisco  

Aug. 7, 11:30 a.m. - 12:20 p.m. | Oceanside E   

Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention 

Rebecca Lynch, Software Engineer, Cisco Duo 

Aug. 8, 9 - 9:25 a.m. | Islander FG 

Inside The Apple T2 

Mikhail Davidov,  security researcher, Cisco Duo 

Jeremy Erickson,  R&D Engineer, Cisco Duo 

Aug. 8, 2:30 - 3:20 p.m. | Jasmine 

Shifting Knowledge Left: Keeping up with Modern Application Security 

Mark Stanislav, head of security engineering, Cisco Duo 

Fletcher Heisler, CEO, Hunter2 

Aug. 8, 5-6 p.m.| Jasmine 

Be sure to stay in touch with us throughout the event to receive updates from the booth and ask us any questions: @TalosSecurity, @CiscoSecurity, @OpenDNS, @CiscoDevNet, @Snort and @PortcullisLabs.

Reverse-CTF, Snort rule challenge and more — What to expect from Talos at Defcon

$
0
0
Want to get up close and personal with Talos researchers?

Then be sure to stick around for the second half of “Hacker Summercamp:” Defcon. After our series of talks at Blackhat, we’re headed elsewhere on the strip for Defcon.

Specifically, we’ll have a huge presence at this year’s Blue Team Village, where you can speak with our researchers, test your threat detection and prevention skills and even get a few tips on your resume.

This year’s Defcon runs from Aug. 8 – 11, and the Blue Team Village specifically runs Aug. 9 – 11 — look for us just past the main entrance near the three stages. Here’s a rundown of what you can expect to see from us at Defcon, and start preparing for our challenges now.

Blue Team reverse-Capture the Flag 

Our researchers are crafting a reverse-Capture the Flag challenge that will test how well you know protection.

There will be multiple virtual machines used for the games, and it’ll be up to our participants to patch vulnerabilities specifically to stop the “attacker” from entering your system.

This challenge will teach you to work with defensive mechanisms and respond to a variety of scenarios.

Snort rules challenge 

We’ll present participants will several packets that are going to be vulnerable to a vulnerability-to-be-named later. It’ll be up to you to write a Snort rule that will catch it across the wire.

This challenge is perfect for anyone from beginners to advanced researchers. So even if you are brand new to Snort, you can stop on by. If you impress us in the CTF and Snort challenges, you may even be hearing from us again.

Oil rig pumpjacks 


Ever wanted to blow up an oil rig? We won’t exactly let you do that, but you can get close on a micro scale.

We’ll have several of our hackable pumpjack models out in the village for you to work with. Participants need to defend the models with an unauthenticated protocol to keep them from “overheating.”

The best part? We’ll have the pumpjacks open to the entire Defcon network, so you could be facing off against someone from across the conference floor.

For more information on these pumpjacks, you can check out our initial blog post on the models.

“Ask Talos at BTV” 

Need to freshen up your resume? Have no idea how to get into the threat-hunting business? Just want to ask us a question?

We’ll have recruiters and researchers on site to answer any questions you may have about job searching, working with (or at) Talos and even some resume pointers.

New Re2PCAP tool speeds up PCAP process for Snort rules

$
0
0


By Amit Raut

We often joke that for SNORT® rule development, you have to live by the saying “PCAP or it didn’t happen.” PCAP files are very important for Snort rule development, and a new tool from Cisco Talos called “Re2Pcap” allows users to generate a PCAP file in seconds just from a raw HTTP request or response.

Re2Pcap consumes a small number of resources — the docker image is less than 90MB, reduces Snort rule development processing time and there’s no complex setup.


Let's consider you want to create a Snort rule to protect your customers from bugs like this Sierra Wireless AirLink ES450 ACEManager iplogging.cgi command injection vulnerability.

There are two different ways to create a PCAP file and test your rule:
  1. Get the vulnerable product and run the exploit code while capturing the traffic
  2. Run a dummy server, then the exploit code while capturing the traffic
But these methods require a lot of time and resources. Re2Pcap improves the productivity of Snort rule development.

Let's see how Re2Pcap can help us create a PCAP file for a vulnerability like the Sierra Wireless one we just mentioned. Talos’ advisory lists a raw HTTP POST request that is used to exploit this vulnerability, which we’ll put below:
POST /admin/tools/iplogging.cgi HTTP/1.1 
Host: 192.168.13.31:9191 
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0Accept: text/plain, */*; q=0.01 
Accept-Language: en-US,en;q=0.5 
Accept-Encoding: gzip, deflate 
Referer: http://192.168.13.31:9191/admin/tools/iplogging.html 
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 
X-Requested-With: XMLHttpRequest 
Content-Length: 63 
Cookie: token=1e9c07e135a15e40b3290c320245ca9a 
Connection: close 
tcpdumpParams=tcpdump -z reboot -G 2 -i eth0&stateRequest=start
We can take this raw HTTP request and feed it to the Re2Pcap web interface and get PCAP file back in seconds.

We have a short video showing you how to use the program.

Re2Pcap uses the Python3 requests library to send the parsed HTTP raw request, so it supports  HTTP methods (GET, POST, HEAD, DELETE, OPTIONS, PATCH and PUT). Re2Pcap uses Python3 http.server.BaseHTTPRequestHandler to handle the raw requests. As we are not using this in production, the use of http.server is enough for Re2Pcap. Learn more about this project over at GitHub.

Malvertising: Online advertising's darker side

$
0
0


By Nick Biasini, Chris Neal and Matt Valites.


Executive summary

One of the trickiest challenges enterprises face is managing the balance between aggressively blocking malicious advertisements (aka malvertising) and allowing content to remain online, accessible for the average user. The days of installing a basic ad blocker on your web browser and expecting full protection are gone. Between the sites that require them to be disabled and the ability for advertisers to pay to evade them, ad blockers alone are not sufficient.

As this blog will cover in detail, malvertising is a problem not strictly associated with basic web browsing. It can also come with other software programs including adware or potentially unwanted applications (PUA). These latter examples require the most attention. In today's enterprise, an aggressive approach to advertising is required to be protected against malicious threats. That may include securing your DNS or adding additional layers of inspection through a firewall, intrusion prevention system, or a web security platform. Regardless of the approach, it needs to be thorough and take into account not just the security impacts, but the potential of cascading impact on your users.

Advertising is a key part of the internet as a whole and, whether you realize it or not, is one of the most foundational aspects of it. It is one of the reasons that a large chunk of the content available on the internet is free. It allows people to support their passion projects, their small businesses, and the food blogs of people around the world. However, it is a highly complex and convoluted system that is ripe for abuse. This is an issue that should not be ignored by the public, as these malicious ads can deliver malware out of nowhere and trick traditional internet users who may not be aware of the threats that exist on some pages.

This blog is going to walk through how online advertising works, what malvertising is and why it's dangerous including real life examples, and finally the options that exist for organizations and private citizens to try and protect themselves from these threats.


Online advertising primer

Online advertising is big business. In 2018, the United States digital advertising revenue exceeded $100 billion. To put that in perspective, that's as large as the annual revenues for leading aerospace and multinational banking companies. So how does this complicated industry operate and how are ads served to users? There are numerous types of online advertising and associated ways to make money from it. One common distinction is between sponsored content and banner ads. Most users are familiar with banner ads as they tend to be somewhat isolated from the content of the webpage. Sponsored content, on the other hand, can appear on a page mixed in among the original content on the page. It typically will have some sort of identifier saying "Sponsored Content" and when a user clicks the link they are typically taken through the ad network to another site. Inside of each of these categories there are a wide variety of options for the advertiser. However, for the purposes of this blog we are going to focus on the area of online advertising that is the most ripe for abuse, real time bidding (RTB).

Let's start by talking about the components of an RTB advertising network.

The first piece is the publisher, who gets paid to host ads on their site. To host ads, the publisher utilizes an advertising server. There are several ad servers to choose from, including self-hosted or service solutions. Self-hosted ad server options include open-source and paid solutions. The second key portion of an RTB network is an open ad exchange. This is a public digital marketplace where the publisher posts their site's ad spots that are available for bidding. The third and final portion of a basic advertising chain are the advertisers. These advertisers can include marketing companies, individuals, or other ad networks. These groups then bid in real time on the ad real estate available on content being rendered. Now, let's walk through how exactly this works.

When a random user requests a web page, the HTTP request is sent to the publisher and the bidding begins. The publisher leverages integrated code or their ad server to list the ads for bid via the advertising exchange. As part of the HTTP request and response, the publisher can gather additional information about the requestor, including things like demographics, URL, location, browser type, window size, and other identifiable pieces of information. All this information is then passed to the ad exchange where advertisers begin the bidding. The additional information provided by the publisher can allow the advertiser to target their ads more specifically and display only to those users that are likely to be engaged. The winning bid is then chosen and the advertiser provides the ad to the ad exchange. The ad exchange in turn returns the ad to the publisher and it is rendered to the user in the browser along with the remaining content on the page. Keep in mind this all happens in a matter of milliseconds and, as such, there is a potential for abuse.

Monetization

There are several ways publishers can get paid. First, and most common, is pay per impression (PPI). This is basically receiving money any time an ad renders on your page, no user interaction required. Advertisers pay per thousand impressions, in what is known as cost-per-mile (CPM). Next is pay-per-click (PPC). In this scenario, the publisher gets paid every time a user clicks on an ad. This usually generates a higher revenue than PPI since user interaction is required, but for the same reason is also less likely to occur. Finally, there is a pay-per-order (PPO) monetization. This is the highest revenue generation of the monetization avenues but usually requires the user to complete some action. These actions can include things like installing software, signing up for a mailing list, completing a form, or any other actions that constitute an order to the advertiser. This is also the most difficult of the monetization routes because it requires a user to not only click the ad, but also complete an action afterwards.

Tracking

One final point before moving onto malicious intent: tracking. Since advertisers and marketers are spending significant amounts of money in online advertising, they want to know which methods work best and they get that information through tracking data. This provides an interesting glimpse into the ways that the traffic is sourced and driven. You may notice some of this tracking information being passed in the URLs that you visit. Below you will find an example of one of these URL additions.
utm_term=2310109&s=1&utm_campaign=pps_News%20Anchors%20T3%20DS%20LLE%20-%20Desktop%20USA&utm_source=taboola&utm_medium=news_site&pps_term=She%20Was%20Live%20Reporting%2C%20And%20Viewers%20Got%20Way%20More%20Than%20What%20They%20Bargained%20For&utm_content=msn-ie11-us

To better understand how this works we have modified the text formatting. The elements that start with utm are the tags associated with marketing. UTM stands for Urchin Tracking Module, the standard way to track marketing in digital advertising. As you can see there is a plethora of information provided in this context. The first couple of fields are tracking for the campaign and other numerical identifiers. Some of the other clues are more interesting. Note the utm_medium field which shows where the traffic originated, in this case news_site. Additionally, you can see what term may have been clicked from fox news' page. Now these links can be both traditional banner ads or could also be sponsored content, which you now will see commonly on most major websites. The last field is the one that deserves attention and shows why this could be valuable for a malicious actor. Attached to the utm_content variable is a key bit of information 'ie11-us' which identifies both the location and the web browser of the system accessing the link. Imagine if you were an exploit kit user and could make your landing pages target systems running specific web browsers or a specific geolocation. Enter malvertising.


Malvertising

Malvertising refers to the method by which malicious actors are abusing the online advertising markets for nefarious gains. The process is largely the same as what is outlined above, but interspersed with legitimate advertisers are a handful of malicious actors, 'domainers', and traffic directors (TDS). These groups specialize in generating traffic to a destination, whatever that destination may be. Along the way, they employ multiple layers of obfuscation before finally serving malicious content. Effectively, they bid on ads at ad exchanges and then have those ads move through multiple layers of redirection techniques until landing on some sort of malicious content. That malicious deliverable can vary widely from fake flash players and tech support scams to exploit kits which compromise the requestors systems without user intervention.

What we commonly see is a user getting dumped out to an exploit kit landing page and in triaging the compromise we can see clearly how the ad campaigns try to obfuscate themselves.
This first image walks through the traffic director systems or TDS and the common redirection technique of using HTTP/1.1 302 requests. This technique, 302 cushioning, has been used for a long time with adversaries, but is also commonly used by most websites on the internet, which makes it an effective redirection mechanism.
Here is the final 302 redirection that actually points to an exploit kit landing page, in this particular case the RIG exploit kit. This is the first major challenge that faces advertising networks: validation of ads. How is an ad network able to verify the true purpose of an ad that relies on so many tiers of 302 redirection? Manipulation of any of the 302 redirects along the path the exploit kit could make it completely benign. For instance, if the adversary pointed the final 302 redirect to a legitimate ad and then only shifted it to a malicious location in targeted instances, it becomes increasingly difficult to defend.

Redirections can also happen server-side, as in the case of HTTP 301, 302, or response headers, as well as through client-side code such as JavaScript or HTML elements. Additionally, malicious actors can leverage the effects of certain redirects to their advantage. For instance, redirecting the browser to another site via a Javascript 'location.replace' will not leave evidence of the redirect in the browser history, a useful tactic for anyone trying to obfuscate their tracks.
This malicious infection chain involves a large amount of components and moving pieces. This complex environment provides a malicious actor ample opportunity to divert traffic from legitimate sites into malicious territory. Below is an infographic covering this overall process and flow.

Use Case 1: Large-scale exploit kit campaign

Cisco Talos has noticed a marked increase over the past several weeks in the amount of global RIG activity largely driven by malvertising. Before we get too deep into the campaign itself, let's discuss why malvertising is an attractive avenue for exploit kit users.

Talos has observed three different ways to interact with exploit kits: malvertising, compromised websites and adware. Let's focus on malvertising to start. The large victim pool is one of the major advantages of malvertising. When leveraging a compromised website to deliver exploits, your victim pool is confined to only people navigating to that website. However, with malvertising you can hit a much larger array of different victims in different locations. Additionally, as we highlighted above, you can potentially target specific web browsers, greatly increasing your infection success rate. Below we can see one set of options presented to advertisers on an established ad service:
Another advantage of malvertising is its negative impact on defenders or threat researchers. An adversary using a compromised website to deliver an exploit kit creates a single point of failure: the compromised site. Defenders and researchers can find the malicious server and block the compromised web site, and potentially even engage the victim to remediate the compromised site, effectively containing the campaign. The same campaign powered by malvertising, on the other hand, has multiple different entry points from a variety of both related and unrelated web pages, making enumeration and mitigation more difficult. Additionally, malvertising networks commonly iterate through multiple ad networks when being served ads. Tracing the malicious ad back to a particular advertiser can be challenging. Trying to recreate the infection chain can be extremely difficult if not impossible, since real-time bidding introduces an element of randomness to the content served.

We've also seen a surge in adware delivering malicious ads to users. In today's world, anything that generates ad revenue could be leveraged by malicious actors. Let's walk through an example of this infection path that we discovered in Threat Grid during our research into the ongoing campaign.

One of the challenges software developers have is the decision of how to monetize software. There are basically three options: sell it, bundle it, or open-source it. Selling and open-sourcing are fairly straightforward options resulting in either monetary gain from the sale or (hopefully) donations or other methods of support from the open-source community. Let's instead focus on bundling, or the process of adding additional software to the installation package.

Worms are just one type of threat that analysts are familiar with. Over time there have been high-profile examples of such threats like Conficker, Slammer, Code Red or the more recent WannaCry. Difficult to contain, worms spread quickly and effectively. Due to both their prevalence and the potential difficulty associated with remediation, there are many software solutions to address these types of threats. A quick web search can result in a wide variety of results from the legitimate and expensive to the quasi-legitimate and free. One of those results could lead to a site like USB Guardian.
As you can see, USB Guardian claims to be software designed to prevent you from getting infected with a worm and scan USB devices. This screen pops up when installing the software.
This is where the bundled software comes into the picture, in this case the BestSecurityTips toolbar. This toolbar will be installed along with USB Guardian and is the source of the malicious activity. One red flag to the user should be when you click the toolbar end user license agreement you are met with a blank webpage.
This particular toolbar is the Best Security Tips toolbar, and after some initial research, led to the conduit toolbar. Once installed, this toolbar will change the browser homepage and default search engine, allowing adversaries to change search results and other activities to promote click fraud and excessive advertising, which can lead to more damaging results including malware infection. These changes allow the ad networks to push content onto end systems with higher efficacy. This particular infection chain demonstrates some of the ways ads are requested by this software.

A series of web requests kick off immediately after installation. The first request is to an ad network called "daily ads" and it ends with the user being served an exploit kit landing page.
The request above is to a URL ending in "indexbst.php?idapp=198." However, there were other tiers of redirects that are occuring being the scenes.
It begins with a request to daily ads for /version/version.php and is met with the first of many HTTP/1.1 302 requests pointing it to a series of other dailyads servers. This eventually results in a get request being delivered to ww7.dailyads[.]org, shown below.
There is one key piece of information to pull from the above packet capture: the header 'X-Adblock-Key'. This header includes an API key that allows dailyads to bypass one of the most popular ad blockers. In many cases, this ad blocker is the only thing preventing a user from being shown a malicious ad. So the presence of this key implies that at least one of the biggest ad blockers would not have stopped these ads from rendering to the user. Eventually, the user will end up with a request ending in 'indexbst.php?idapp=198' as shown above, which is when the user first starts down a malicious path.
This presents the user with yet another 302 cushion. This time, it points to what appears to be an ad hosted on mybetterdl[.]com. That request is met with yet another 302 pointing to a different subdomain at mybetterdl[.]com.Hosting 91Hosting 91.
That leads to another 302 cushion, which this time points to an apparent ad at a different domain bitcoinmaker[.]site — it's this final ad that results in one final 302 cushion that points the user to an actual exploit kit landing page, in this case, RIG.

Once the user completes the request after the series of 302 cushions, they will be presented with a landing page and eventually will be served a patched Adobe Flash or Internet Explorer vulnerability to deliver some sort of malicious payload.

Scope and impact

The specific example above walks through how a software installation can lead to a user hitting a series of malvertisements. However, most of these infections do not have a nexus of antivirus software or adware specifically and just involve users getting compromised by malicious ads.

These malicious campaigns have hit a wide variety of different sites in various different verticals from news to design, music, racing, and popular culture. Talos has observed sites ranging as high as in the top 5,000 websites, per Alexa. However, Talos has also found evidence of ways that sites in the top 100 have been indirectly linked to this malvertising campaign. These often start with sponsored content, links typically displayed on various high ranking web pages linking to other, smaller web pages. The utm tags that were discussed earlier in the blog are a prime example of this behavior.

We found several examples where a user would start at an Alexa top 50 site, including some of the biggest news sites on the internet. The user would then click on some sort of sponsored content, either wittingly or unwittingly. The user is then taken to a new site, well outside the Alexa top 50 to something in the Alexa top 10,000 instead. These sites will then have ads that move through multiple 302 cushions, similarly to what is described above.


Use Case 2: Malicious content shot from the hip

In June of 2019, Talos discovered a website redirecting Safari browsers to a domain delivering a malicious Flash Player installer. As opposed to the exploit kit use-case discussed above, the behavior for this malvertising campaign is somewhat repeatable, allowing Talos researchers to extract some additional information.

In this case of malvertising, the actors utilize a common service called "domain parking" to enable their campaign. Essentially, parking domainers don't wait for a user to click on an ad to generate PPC revenue, but take benign traffic that would otherwise return an error, and redirect it into their ad network, acting as an ad publisher.

The benefits of this type of malvertising are similar to the previous use case: ease of use, simple targeting and higher likelihood of traffic. Zero Click traffic is sold in "traffic marketplaces," where an owner of a domain can purchase traffic and have it directed to their domain. As in the previous use-case, using a parking service, a user can specify the category of the domain to affect bidding, user's target browser, operating system, geolocation and in some cases the age and demographic of the person viewing the ad.

At the time of the investigation, the initial domain was hosted with a parking service at a cloud provider in Lithuania. Cisco Threat Grid has nearly 700 malware samples with a threat score of 95 or above associated with this host. DNS history data shows the IP has hosted hundreds of domains over time. In a one-week span, 87 domains were pointed to the IP, including some obvious typo-squats such as:
  • 0utlook[.]com
  • yotub[.]com
  • gmyail[.]com
  • yspace[.]com
  • yyooutube[.]com
During our investigation, more often than not, and while avoiding a server-side request rate limit, a Safari browser will be redirected through a series of sites ultimately landing at the fake Flash Player installer. A non-Safari browser, on the other hand, will redirect to a default domain parking page, offering the end user a chance to buy the domain through sedo.com, one of the long established domain parking providers with more than 16 million domains for sale.

Several different redirect methods were used in the request chain that delivered malware, as can be seen in the example in the table below.
A number of domains are visited multiple times during the redirect chain, with different query paths on each visit. The HTTP flow shows how difficult and convoluted the online advertising process can be to follow and how easily it can be compromised.

When the visitor issues an HTTP GET for the site in the first sequence, client-side JavaScript redirects the host to two subsequent sites. Site 2 sets a tracking cookie containing a user ID and closes the connection. Site 3 redirects to site 4 using an HTTP response header:
{"Cache-Control": "max-age=0, private, must-revalidate", "Content-Length": "11", "Date": "Wed, 03 Jul 2019 17:27:44 GMT", "Location": "http://usd.franciscus-ful[.]com/zcvisitor/de20fa7f-9db7-11e9-9522-1264782e7ac8?campaignid=77a8d2a0-8209-11e9-bf85-0a5f8f5656fe", "Server": "nginx", "X-Cache": "MISS from bc01", "Via": "1.1 bc01 (squid/3.5.27)", "Connection": "close"}

Here, we can see a clue to the domain's role in Zero Click parked traffic via a response header for all requests to site 4:
"Server": "ZeroPark-Traffic"
The code on site 4 contains capabilities for both HTML and JavaScript redirect methods, and redirects to two more sites. Our test setup executed the JavaScript element to redirect to site 5, but not before collecting and attaching identifiable information about the browser such as page width and height, as well as whether the current window is the topmost window in the browser:
<script type="text/javascript">

setTimeout(function () {

var pageWidth = window.innerWidth ? window.innerWidth : (document.documentElement && document.documentElement.clientWidth ? document.documentElement.clientWidth : document.getElementsByTagName('body')[0].clientWidth);

var pageHeight = window.innerHeight ? window.innerHeight : (document.documentElement && document.documentElement.clientHeight ? document.documentElement.clientHeight :



var iframeDetected = window.self !== window.top;

window.location="http://usd.franciscus-ful[.]com/zcredirect?visitid=de20fa7f-9db7-11e9-9522-1264782e7ac8&type=js&browserWidth=" + pageWidth +"&browserHeight=" + pageHeight +"&iframeDetected=" + iframeDetected;

}, 1);

</script>
Site 5's redirect via JavaScript to Site 6 is immediately redirected through two more HTTP redirects before ultimately being served the fake Flash Player.
All 3 buttons are HTML href's to the same path on the current domain, which, if clicked, would download the malicious .dmg installer. This particular installer would infect your system with a well-known piece of malware called "Shlayer."

Defending against malicious advertising

Defending against malicious advertising is a difficult task for a variety of reasons. Online advertising is the reason that internet content is free, and there needs to be a balance between blocking ads and still allowing sites to generate revenue. In recent years, there have been some major shifts in this space, notably websites requiring users to turn off ad blockers to view content. While this is understandable from a revenue perspective, it does introduce risk and, in the campaigns we've seen, you can trace the infection path back to a user-clicked sponsored link on some of the most popular sites in the world. Additionally, there have also been reports that some of the big advertisers have been paying a premium to bypass popular ad blockers. In fact, in both uses cases that Talos researched for this article, advertisers paid to bypass an ad blocker, thus rendering the ad blocker unable to stop any ad served from that advertiser.

In the end, this is no more than risk assessment, with various options available as a compensating control. On one end, you have an unfettered user experience with the highest possible risk associated with malicious advertising. As you add controls to address malicious advertising you will reduce risk, but also hinder your users. One step may be adding an ad blocker to web browsers, which will reduce risk with minimal impact to the user. However, some sites will no longer be available even at that low bar of protection. There is also a danger of a user whitelisting sites that eventually host malvertising or the aforementioned advertiser opt-out. The next phase could be to start adding other technologies like a web proxy or IDS/IPS to analyze the traffic on the wire. This again will increase the security and decrease risk, but comes with a significant cost increase and adds possible points of failure along the way. Then you have more aggressive options including attempting to block all ad networks. This will give you the greatest reduction to risk, but also has the largest impact on your users.

There are many different ways to block ad networks at the domain or nameserver level, but it does require you to make use of some sort of DNS product like Cisco Umbrella to achieve that goal. Another advantage to a product like Umbrella is its ability to block the gate and TDS domains. This may allow the organization an extra layer of protection that will stop known bad domains from serving content to users, without blocking ads unilaterally. Below is a table illustrating how the controls need to balance between risk and user impact.
From a consumer perspective there are plenty of options, including open-source solutions that can help mitigate the issue at home, as well. Among them is the pi-hole project which leverages a raspberry pi to achieve ad protections. We at Cisco also offer some options for consumers to take advantage of the protections available in Umbrella.

Regardless, of how you approach it, digital advertising is one of the biggest battlegrounds on the threat landscape for drive-by attacks delivering malicious content around the globe. Both enterprises and consumers need to be prepared and make a decision on how aggressive they want to be on blocking it. However, it's a unique challenge since the risk is eliminating large chunks of free content on the internet as it becomes increasingly difficult to generate revenue from that content. These are just a couple of the major issues we will be forced to confront over the next several years and the quicker you realize you are going to need to address it, the better served you will be.


Coverage

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOC)

Use Case 1: Rig Exploit Kit Campaign

IP Addresses:

185[.]246[.]65[.]115
185[.]246[.]65[.]118
185[.]246[.]65[.]119
176[.]57[.]217[.]135
92[.]53[.]124[.]156
185[.]246[.]64[.]222
185[.]246[.]64[.]233
185[.]246[.]64[.]236
176[.]57[.]214[.]193
176[.]57[.]217[.]89
185[.]43[.]4[.]106
185[.]246[.]64[.]155
92[.]53[.]124[.]176
82[.]146[.]49[.]141
188[.]225[.]25[.]248
92[.]53[.]124[.]167
185[.]43[.]4[.]66
188[.]225[.]35[.]239
188[.]225[.]18[.]213
188[.]225[.]34[.]73
188[.]225[.]34[.]66
37[.]230[.]117[.]169
37[.]230[.]117[.]43
37[.]230[.]117[.]77
37[.]230[.]117[.]87
188[.]225[.]35[.]55
188[.]225[.]24[.]229
185[.]246[.]64[.]144
185[.]246[.]64[.]148
185[.]246[.]64[.]157
188[.]225[.]25[.]246
176[.]57[.]217[.]134
185[.]43[.]7[.]162
94[.]250[.]253[.]147
94[.]250[.]253[.]29
188[.]225[.]33[.]219
185[.]43[.]6[.]90
185[.]43[.]6[.]106
188[.]225[.]26[.]80
176[.]57[.]220[.]7
176[.]57[.]220[.]28
37[.]46[.]135[.]254

Use Case 2: Shoot2020 Campaign

Domains:

shoot2020[.]com
axiomatic[.]world
charmolivia[.]com
sleepdiploma[.]pw
usd[.]franciscus-ful[.]com
cdn[.]formatlog[.]com
cdn[.]detectioncache[.]com
cdn[.]browsedisplay[.]com
cdn[.]essentialarchive[.]com
cdn[.]alphaelemnt[.]com
cdn[.]megaelemnt[.]com
cdn[.]originaloption[.]com
cdn[.]entrydisplay[.]com
cdn[.]initiatormaster[.]com

Threat Source newsletter (Aug. 1, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

Are you heading to Vegas next week for Hacker Summer Camp? Talos will. We’ll be at Black Hat and DEFCON holding a series of talks, taking resumes, answering questions and hosting a number of challenges. Check out our talk lineup for Black Hat here and a rundown of our activities at DEFCON here.

Everyone on the internet has seen the ads on web pages that suck you in with enticing headlines, too-good-to-be-true sales or highly specific offers. But many times, these ads can lead to malware. We took a deep dive into adware to talk about a slew of recent campaigns we’ve seen that have targeted some of the most popular sites on the web.

If you work with Snort rules at all, you have to check out our new Re2PCAP tool, which allows you to generate a PCAP file in seconds just from a raw HTTP request or response.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: "DNS on Fire" at Black Hat USA
Location: Mandalay Bay, Las Vegs, Nevada
Date: Aug. 7
Speaker: Warren Mercer
Synopsis: In this talk, Warren will go over two recent malicious threat actors targeting DNS protocol along with the methodology used to target victims, timeline, and technical details. The first is a piece of malware, "DNSpionage," targeting government agencies in the Middle East and an airline. The second actor, more advanced and aggressive than the previous one, is behind the campaign we named “Sea Turtle.”

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Capital One was hit with a data breach that affected more than 100 million customers. Information stolen included names, addresses, ZIP codes, credit scores, credit limits, contact information and more.  
  • The person behind the breach is a former Amazon Web Services employee who made little attempt to hide after the attack. She even went as far to boast about the data she had stolen in a Slack room.
  • The Federal Trade Commission warned consumers that Equifax will not be able to meet the $125 per person payout it promised as part of a settlement over a 2016 data breach. More consumers requested the payment than expected, and only $31 million of the total $700 million settlement was set aside for cash payments. 
  • The latest Google Chrome update automatically blocks Adobe Flash Player and makes it harder for sites to detect Incognito mode. The new Incognito feature will make it possible for users to bypass paywalls on many sites, which had developed scripts to detect the secret browsing mode. 
  • Honda Motor Co. left an ElasticSearch database containing critical information about its global systems exposed. The server included information on which devices aren’t up to date or protected by security solutions, as well as approximately 134 million documents.  
  • Democratic lawmakers are going after Senate Majority Leader Mitch McConnell for sitting on election security bills. FBI head Christopher Wray and former special counsel Robert Mueller recently testified to Congress that Russia will likely attempt to disrupt the 2020 presidential election. 
  • The cyber threats posed to the oil and gas industry are “high and rising.” A new report also states that these companies are at “high risk” for a cyber attack that could lead to potential loss of life. 
  • Apple patched five vulnerabilities in iMessage that could allow an attacker to read iPhone users’ messages without their interaction. One of the bugs could only be fixed by completely restoring the device to factory settings. 
  • A new Android malware is being spread through malicious Reddit posts. The ransomware attempts to spread to the contacts on victims’ phones and then encrypting all files on a device.  

Notable recent security issues

Title: New coverage available for Godlua malware
Description: Attackers recently targeted Linux and Windows machines with respective versions of the Godlua malware. The backdoor secures its communication via DNS over HTTPS. The attackers primarily use Godlua as a distributed denial-of-service bot, even launching an HTTP flood attack against one domain. 
Snort SIDs: 50808 - 50811 (Written by Kristen Houser) 

Title: New protection rolled out for Microsoft vulnerability exploited in the wild 
Description: The OceanLotus APT recently launched a new malware known as "Ratsnif," which comes in four different variant forms. These rules fire when Ratsnif attempts to make an outbound connection to a command and control (C2) server, or if the malware attempts to download any files. Ratsnif remained undetected after its C2 went online back in August 2018, though researchers believe it’s low level of infection kept it under the radar. 
Snort SIDs: 50800 - 50802 (Written by Kristen Houser)

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858 
Typical Filename: qmreportupload.exe  
Claimed Product: qmreportupload 
Detection Name: Win.Trojan.Generic::in10.talos 

SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6  
MD5: f7145b132e23e3a55d2269a008395034  
Typical Filename: r2 
Claimed Product: N/A 
Detection Name: Unix.Exploit.Lotoor::other.talos  

SHA 256: 2f4e7dba21a31bde1192ca03b489a9bd47281a28e206b3dcf245082a491e8e0a  
MD5: cc0f21a356dfa1b7ebeb904ce80d9ddf 
Typical Filename: f1cf1595f0a6ca785e7e511fe0df7bc756e8d66d.xls  
Claimed Product: Microsoft Excel 
Detection Name: W32.2F4E7DBA21-100.SBX.TG    

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
MD5: 4a50780ddb3db16ebab57b0ca42da0fb 
Typical Filename: xme64-2141.exe 
Claimed Product: N/A 
Detection Name: W32.7ACF71AFA8-95.SBX.TG  

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08 
MD5: db69eaaea4d49703f161c81e6fdd036f 
Typical Filename: xme32-2141-gcc.exe 
Claimed Product: N/A  
Detection Name: W32.46B241E3D3-95.SBX.TG 

Threat Roundup for July 26 to Aug. 2

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 26 and Aug. 2. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Trojan.Fareit-7090291-0 Trojan The Fareit trojan is primarily an information stealer with functionality to download and install other malware.
Win.Malware.Tofsee-7090196-1 Malware Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
Win.Ransomware.TeslaCrypt-7090181-1 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
Win.Virus.Parite-7090021-0 Virus Parite is a polymorphic file infector. It infects executable files on the local machine and network drives.
Win.Malware.Remcos-7089920-1 Malware Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
Win.Dropper.Kovter-7086582-0 Dropper Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries that store its malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
Win.Dropper.Miner-7086571-0 Dropper This malware installs and executes cryptocurrency mining software. You can read more about this kind of threat on our blog https://blog.talosintelligence.com/2018/07/blocking-cryptomining.html.
Win.Trojan.Zegost-7086512-0 Trojan Zegost, also known as "Zusy," uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Dropper.Ursnif-7083691-0 Dropper Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.

Threat Breakdown

Win.Trojan.Fareit-7090291-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\WinRAR 6
<HKCU>\SOFTWARE\WINRAR
Value Name: HWID
6
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
Value Name: F
6
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
Value Name: F
6
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
Value Name: F
6
MutexesOccurrences
Global\b7b392a1-b3e0-11e9-a007-00501e3ae7b59
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
77[.]111[.]240[.]773
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
dkaul[.]su3
kglso[.]ru3
FFUEX[.]SU3
mmbild[.]se3
digitalimagellc[.]us3
PLNDIGITAL[.]ORG3
brettsplus[.]com[.]au3
Files and or directories createdOccurrences
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt9
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp9
%System32%\config\SAM6
%TEMP%\-959430038.bat1
%TEMP%\94859.bat1
%TEMP%\-958164199.bat1
%TEMP%\-958105901.bat1
%TEMP%\-958121813.bat1
%TEMP%\-958085949.bat1
%TEMP%\-958128100.bat1
%TEMP%\86484.bat1
%TEMP%\100125.bat1
%TEMP%\92015.bat1
%TEMP%\92140.bat1
%TEMP%\93656.bat1

File Hashes

037dbde69db377adba75065b57b988175b883d5d22a0211f78cd8e3ea63a8c0b 04d401c93e8648d698044aa500afbe0d1ba2e6352b208bac1f31e65f3786a6f4 0a860e6eace6b4fb43c40e1d1ff5aa646771fbb890afc291da814f7a7b66a686 2c022ec86c02f2629ad5e6db757a2ee169a7071e5ad458afdaf42b7e8dd24d37 3680f7e4dcf0416edb86258c24c6d41aae1fa7a37b2eb26a829dd4979ec28810 37d97b05a5f046eaa1939c9eacca2f337a3239bb00cd4895772547c5bc738831 912c9de409dee4bbfb4c29e4ef968e6df4a34e106ca49761b7ad47994f445f15 93669f7e7726bc9d4aaa24dcd8f84b0ccc30dbcefc974d6f4ea361179203c8e2 9d723fbcbb53a3b7f55cb1d6bcd9bd35d7f5eed752c90147cf6b9d72c2217409 9f38462f183111e0bff6672ac65485ce1d4593a31153f07d8cc9ce6f4edc6821 a67a928a736c05e48b977a0a2a140bd1ff2729b8d260a2dafae9871822cc14a3 c55d9bc607cf45dcc2fc66f6aca60d495ea4ac32c52828112e67a24761164fc7 d3dc4b97c1dda85f27401227881ce1f5267d6ceadf7f884b9e0264648f0687b1 dd563db1527d80f0b402fc44116a1de141d52226b245fa23e754b1b1e30514d9 f2399366114ae7a2567992ac96d06ca86f052bc0f90a4ccc3638807d2624de84

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Win.Malware.Tofsee-7090196-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 36
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 36
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
36
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
36
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\sraabisk
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SRAABISK
Value Name: ImagePath
6
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\poxxyfph
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\POXXYFPH
Value Name: ImagePath
5
<HKCU>\SOFTWARE\MICROSOFT\Java VM 3
<HKCU>\SOFTWARE\MICROSOFT\VBA 3
<HKCU>\SOFTWARE\MICROSOFT\IME 3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\xwffgnxp
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\XWFFGNXP
Value Name: ImagePath
3
<HKCU>\Software\Microsoft\<random, matching '[A-Z][a-z]{3,11}'> 3
<HKCU>\SOFTWARE\MICROSOFT\Direct3D 2
<HKCU>\SOFTWARE\MICROSOFT\TPG 2
MutexesOccurrences
Frz_State3
Sandboxie_SingleInstanceMutex_Control3
8C7EF2D18C62E966FAA2F103BC71DB043
B76FD347C7201967BD7510FFC887D89D3
F81EAF302D1CAD1CD52C598895B98F493
B55D882B6AD53F2630F641F93DBC66323
DFD9CCD816EA09FA87380EE972D3FE0A3
947A2F20D44434751A1FD63E133D38833
27F7FFA07BD0546DF3E613F21C61F3E93
B159CDAF25784C79CB1C9F0CDF12E94C3
891B5C99F4D8068194399C87B72D54C63
9EA2A5F4E10686779AD6C370F4D8A1343
A4F11C837EB2FB7FE5D4A9AAC3668D443
FCC07BE63C5A293474A56972D25359B23
\BaseNamedObjects\55316F50AA5F7C0AF74B646D5BA30B6C1
\BaseNamedObjects\F6634E1FD2EF7234AA9F24F39DA8C9891
\BaseNamedObjects\ED5F41B655CEDB95F08EE542BD539E901
\BaseNamedObjects\FD509C28F9012AA4076303B64747B7931
\BaseNamedObjects\CD01D078DCB1643DC8E3667F120CAB401
\BaseNamedObjects\6F9EA2070C7CC350EF1BF8B5AC5A96011
\BaseNamedObjects\CA8A51536CF3D38C27A4072A756591C11
\BaseNamedObjects\B3E288CBEA2F275076EA13D7EAA6AA2B1
\BaseNamedObjects\5904F95108046C70AE0DC46DD119468C1
\BaseNamedObjects\DAB8A830ADCB8D21D190CF3C585F3F911
\BaseNamedObjects\DB628CF0707BDD5E042097FDB915669A1
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
103[.]248[.]137[.]13336
111[.]121[.]193[.]24236
104[.]47[.]53[.]3619
104[.]47[.]54[.]3617
104[.]215[.]148[.]6311
40[.]112[.]72[.]2059
40[.]76[.]4[.]158
40[.]113[.]200[.]2015
185[.]198[.]57[.]1511
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
microsoft-com[.]mail[.]protection[.]outlook[.]com36
gordinka[.]xyz3
Files and or directories createdOccurrences
%TEMP%\<random, matching '[a-z]{8}'>.exe36
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>36
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)35
%HOMEPATH%\NTUSER.DAT3
%HOMEPATH%\ntuser.dat.LOG13
%APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\webappsstore.tmp1
%TEMP%\akylzxd.exe1
%TEMP%\6656.bat1
%TEMP%\2712.bat1
%TEMP%\6820.bat1
%TEMP%\6042.bat1
%TEMP%\8737.bat1
%TEMP%\7438.bat1
%TEMP%\8443.bat1
%TEMP%\0502.bat1
%TEMP%\1752.bat1
%TEMP%\6287.bat1
%TEMP%\3440.bat1
%TEMP%\8320.bat1
%TEMP%\8476.bat1
%TEMP%\2350.bat1
%TEMP%\0526.bat1
%TEMP%\3735.bat1
%TEMP%\8143.bat1
%TEMP%\8515.bat1
*See JSON for more IOCs

File Hashes

0272591f11ebfafde7cbb811ce4d4cc8d650956e8ea850c0751ac2f4de954138 0528c84d8c9003db021603719a7649c359221c6d7b2ad918726f8bf48f5cc5c9 06ffafb628585e4db0e5663baca4bd11378f6a381994fd55194f9f071c3c5a0c 0bcba9302e58883bb6dc4b68ebf28e0849845d4bbf469b08b465a0bee4d69bd3 12b98384530eb3f073a46c50a7ad0248389b11b2d6c508e33f71bbf034578aa0 18b39e415880a0c86ac92ccaeb4b69ca6aeb7d800661b03249b9e522903ed38c 1ad0c706365e29e30a208cb8058b3f8023ab9838e728b83de99412ca3015c6a2 2622d0798a83e1377c5a495b12e23e77bef09bcfb3b880aa521ca2b402ff5f4e 2691b34696328d028edab98a5dcaf3e5d492908c5ba0d16d8cdb8927dd614fcc 29393f713a89a7529e4e66793a042c349ea7967957b0c02b8c6b40f3f05b52d0 2c77eaf233dec2d3b165dccec7350c0b4653e0db550fb14c1d3571bbd1a4d403 2c9c2c4bdb923a21057cb24a54cd593f61af0b913215911db43a939b4550a9c5 3070f13f4d3db4bee1c37eeafb6de059d6e172a40bdef17e3a778a71176ddf6d 394cb2df083d3106b6e659fdd8ec27514a82c2c48d9b21aa189efcce6a321677 3a8a90823aee9b2fa6bd72548b7b69b5d1e0917fcf10065ade2c944eac9fd703 3e5723f2b6a2480d4b0a3aac03e457e8abf21ef72eab2bd5d7ced9908eec929c 3e9abc021820c1f954388b59dc5d6f9a48b6bf15a22168576fa007778f5fe6cb 4193bb216522035460434b367f699ac2211317bcf86f777709fe2d1ab01bf649 48118321467cab596dbb1f049f3fed4b6cee2621933124f1bb3d36db5ea7aaf6 4c10c671efd90d492b7ddc4a9a20e0d8ec306fb333710f20f698c533331c4c04 4ee8e166d1f8f358038947b9a0a1d2c4d552112e179fdfa536769a9e79b2bbfe 4fe975be2d2cce5c26a849ea1d6d9342dfa79d332bed221736463427a45b22c5 5090d89adf0523559aba758adb1bf3c1f1afe20e354242a96020c41816652cbf 52d32a74235bdfac594154dedaf572d4cd38148016dc3ab4e4ae4c325b813bb7 556386fd0ca3000d635251734cfdffdbb4e8331c9c4ea6f576196f4a5fc3d21e
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella



Win.Ransomware.TeslaCrypt-7090181-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: TileWallpaper
13
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: WallpaperStyle
13
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
13
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: msconfig
13
MutexesOccurrences
dslhufdks313
Global\1e6e4b01-b3e8-11e9-a007-00501e3ae7b55
\BaseNamedObjects\RAS_MO_022
\BaseNamedObjects\Global\ADAP_WMI_ENTRY2
\BaseNamedObjects\Global\RAS_MO_012
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]239[.]34[.]215
216[.]239[.]38[.]214
216[.]239[.]32[.]213
148[.]81[.]111[.]1212
88[.]198[.]69[.]432
194[.]150[.]168[.]742
216[.]239[.]36[.]211
192[.]35[.]177[.]641
52[.]2[.]137[.]1991
104[.]216[.]88[.]2481
162[.]255[.]119[.]2271
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io13
epmhyca5ol6plmx3[.]wh47f2as19[.]com13
epmhyca5ol6plmx3[.]tor2web[.]fi13
epmhyca5ol6plmx3[.]tor2web[.]blutmagie[.]de13
7tno4hib47vlep5o[.]7hwr34n18[.]com13
ant[.]trenz[.]pl2
ymxunc[.]com1
iiiavb[.]com1
ergcgi[.]com1
giyxhd[.]com1
lxecov[.]com1
ymjjaz[.]com1
uunzlo[.]com1
exukeu[.]com1
ogcfic[.]com1
ihpuyg[.]com1
yqnonu[.]com1
hzadcu[.]com1
fogwee[.]com1
aiszao[.]com1
fasuoi[.]com1
bsieau[.]com1
azuyzw[.]com1
aldcea[.]com1
gknysc[.]com1
*See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\key.dat15
%APPDATA%\log.html15
%APPDATA%\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Desktop\CryptoLocker.lnk15
%HOMEPATH%\Desktop\HELP_RESTORE_FILES.bmp15
%HOMEPATH%\Desktop\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Favorites\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Favorites\Links\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Favorites\Microsoft Websites\HELP_RESTORE_FILES.txt15
%HOMEPATH%\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Local Settings\HELP_RESTORE_FILES.txt15
%HOMEPATH%\NetHood\HELP_RESTORE_FILES.txt15
%HOMEPATH%\PrintHood\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Recent\HELP_RESTORE_FILES.txt15
%HOMEPATH%\SendTo\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Start Menu\HELP_RESTORE_FILES.txt15
%HOMEPATH%\Templates\HELP_RESTORE_FILES.txt15
%TEMP%\HELP_RESTORE_FILES.txt15
%APPDATA%\Microsoft\HELP_RESTORE_FILES.txt15
%APPDATA%\Microsoft\Internet Explorer\HELP_RESTORE_FILES.txt15
%HOMEPATH%\My Documents\HELP_RESTORE_FILES.txt15
%APPDATA%\<random, matching [A-Fa-z0-9]{5,8}.exe15
\$Recycle.Bin\HELP_RESTORE_FILES.txt13
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\HELP_RESTORE_FILES.txt13
%HOMEPATH%\AppData\HELP_RESTORE_FILES.txt13
*See JSON for more IOCs

File Hashes

0440593af56240ec063b2b37c106fc13375c2f503fdb707f9a83dd512c110430 11aaa79c21033387be690f5cf986c3c665d935a73682a16f5468c0b0a29ad2b6 1ccde26dc844e8c9fac9f94c2b4b1280fb69bd4f6759b944773e37be54e0d893 48113627269680d6875edef5b537babe9f99b2beb24aa1bc59aba2c12a8db364 4dff2478037871b72eecbeed8e0c4ba84aa0eab8ae54282a172cfb2059ceb74a 561465d60606ce7533cc049cc5025c426d888acf44d3334bcb5ff124cc9beb9f 58712cf1cab21e5e62d71ac9291eddcbda43944dc85f3eb91cee93d603761d56 5b076ac98c514923e6eb20cb3bd64db901988976af434052d5537c258a03614e 5eb80c4b9818c022a4b1e7cc5dbfca4c573cf76dfaf8ce7f8f8fa31dfbf77c4c 733f08642330249b7362d5496e7d5ddc660e69b99fcbf0128f3f6e647714dd86 7cc97b2908e9d76a917b37ca6433d451a5a0d866e18b0f92146c25bb56847a35 9b462800f1bef019d7ec00098682d3ea7fc60e6721555f616399228e4e3ad122 b1fbb20c2a4df11fe9a316156977f4f842c3c1f150c10e873cbac59aec43426c b7b24dc901e44293beaaa7ec379b8e8feb917abde42fdcdb38de5eda3cb147fa bb276ee7a6272c91c77fd973e1cd2a42e04274ca122eb28f4445cc1e8e49a014 bc2622816c972a21201772fd8b7635ecff8c1fcb6249dd02266ab92f1fa2687f c4fa6dc2ae89d1530423bb9842af7ba8e800b05ff81315130f9de893beb89288 da624ceb034570a844d919d20f1ac7db99516558cb6e2571e1ddd2f46d73c7e5 e27f924db5152237a6783a43d6bd982ab3dbd0e22aee3e8dc70980b083cff767 eccfe2366884a5a947aad1c26277043e3af20e6d1cf8e27b48e0bb72b1e963bd fc8946571e73d04ade5a3308de8b191eb747667fb31aa10162174542674a9746

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware



Win.Virus.Parite-7090021-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\Software\Wow6432Node\Intel\ICCInst 25
MutexesOccurrences
Residented25
Global\IIF-{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}25
Files and or directories createdOccurrences
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt21
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp21
%TEMP%\bna1.tmp2
%TEMP%\fpa1.tmp2
%TEMP%\edb242D.tmp1
%TEMP%\ldb2574.tmp1
%TEMP%\spb9CB6.tmp1
%TEMP%\ceb291C.tmp1
%TEMP%\ddb2324.tmp1
%TEMP%\rpb98B0.tmp1
%TEMP%\npb9788.tmp1
%TEMP%\txbEAC6.tmp1
%TEMP%\upb96CD.tmp1
%TEMP%\hob9547.tmp1
%TEMP%\opb9A94.tmp1
%TEMP%\mhb4D7E.tmp1
%TEMP%\feb2832.tmp1
%TEMP%\lrbB277.tmp1
%TEMP%\veb29D8.tmp1
%TEMP%\ngb3F89.tmp1
%TEMP%\apb9602.tmp1
%TEMP%\vgb41DA.tmp1
%TEMP%\ogb4093.tmp1
%TEMP%\qgb3FA9.tmp1
%TEMP%\hgb4257.tmp1
*See JSON for more IOCs

File Hashes

0de64a980bd8ba77c2d6f216bac219376a5981e3e3bca7fb7797d8658e0af56f 1a949bb288102e17fc51645e7cbf098ccdaa3fb5414d2874f454b67133cfeff6 1ac60ed1f894fc3758748ba428554b91253af824d56972e3af76f3b4932d75f8 2571f483b3363c6f4e31b5fe674958ecd78f10c82211b56e3a3da07175404f5c 2f59cc275a2306af4c0c22aabbb672fe316358b105b8aa1d1df9e34e8b8141ba 32438083d79ac23f89bc2f96befd073ca3f4a30f831aa85dcded3f0e6bde168a 363ba569063f98eed6553089dd75c19d8f87f8adc171a4c707f6e4158cd0b37c 3ce4b7ade0171971c2c8106b9b58fa5432e8feba8d10b80f2a82f87511eb4a84 3efcc75fac41f6a3f8cf626753c72f6df00ff8617640989bfc67f284a6782eab 42dcaf24b47e158c5bde0bf37aca7494cf4a318203205fd44d8a957fb4a54965 47be4b0e8768289addb59602b024887db8c8ebca026bc054eb1d03f6602e09b7 4d6b7067ff55b4e5025f0713aa0f93328ca500444f5c52c4b84993d0c00a3675 5386a3f5dfa37f454ce6ea8aba622cdea0e1a6e7bfee4b34c3235eeb6ca7c21d 5e5e207352827e19880e32e481281ae32a895bfa47af7702cbeb49f6a90404a6 66da22fd2c8d82e6267c6b21d03dd20f1fb9f242170f4a3c2b0e05b337a1080c 919864b47bbb9dc802df79a974f0a119e79e4ddab76c01cf79071d9a4866c8df 9220f5a71a621ac56ab75aef023d15fedf18fe40dd094a2409a1586712b929b0 949add118d6e884685a78104077991d8cff1a0b9b28e8359d551ab4b698b3af8 9ceee0623cb6c2c1f94b4cb90b2a0cfb6a07e203e3d901b8c5a2cfcba34d46ca 9d60933316a5def1ddf71e9dddbcd48b2b2f5cd711cc7dd1ce1354655dbcd2a9 bd8d558604fc04fde215abf52ed73ecde6a7f97bfd48f9540b8dc823054525a8 c07b02bff8ebaa27f5da40de8c92ba78c2f9a1d3c76dee6c4f76596594d68f0f c71ced95ef06e91dd6083a21bfae4bcf5696ba91d5b7c25b1ce62e2fbc58450c cf0face1fb821f4ce1944f65549e242b1b033e7525921c3e24d027dd4efbcaa6 ea873fa6d0bad68c2f2c52949a2eb10aadf140ad0cf5b5b753819a1063a14fbb
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Win.Malware.Remcos-7089920-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\Software\Microsoft\Windows Script Host\Settings 22
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: task
22
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: task
22
<HKCU>\Software\Remcos-F5NWKC 14
<HKCU>\SOFTWARE\REMCOS-F5NWKC
Value Name: exepath
14
<HKCU>\SOFTWARE\REMCOS-F5NWKC
Value Name: licence
14
<HKCU>\Software\Remcos-FNLRTG 6
<HKCU>\SOFTWARE\REMCOS-FNLRTG
Value Name: exepath
6
<HKCU>\SOFTWARE\REMCOS-FNLRTG
Value Name: licence
6
MutexesOccurrences
Remcos_Mutex_Inj22
Remcos-F5NWKC16
Remcos-FNLRTG6
Global\82814f21-b3c0-11e9-a007-00501e3ae7b55
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]69[.]169[.]2514
179[.]33[.]146[.]2226
172[.]217[.]7[.]2381
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
abeasinf[.]duckdns[.]org14
remsalvados2019[.]duckdns[.]org6
Files and or directories createdOccurrences
%TEMP%\install.vbs22
%APPDATA%\remcos20
%APPDATA%\remcos\logs.dat20
%APPDATA%\System3216
%APPDATA%\System32\task.exe16
%APPDATA%\explored6
%APPDATA%\explored\task.exe6

File Hashes

07e4832ad064b83345dc65d845c656acb036d1ba416aeba93ea1e5e455e5d93f 0e4ef97aaa97a61adfcbcc801ae9bf1554aff454f17ecc1c12ae1b78de63a82f 0f73749d1f1275074b813d85df5da536242a5dd841df5e6beccda497da11c688 2428324467859f295b59fa94ae4a2d46383e727ecde439b9ae8a98ee3a058c82 33b9073da941fe67d1c2d6ac3db931a12dd16eff3e40614d142ba9f20a2f6cfa 40ddc409d3c26b0d6718b9933242c6c8a317d82626f2b5657b6d53ca1e94f8b9 4eb7eb5ff66633577f584e08638eddb1f175295dc6f140e4daaa499503c7903d 53d5a95234af1e094671269c8de5e54675495a7d6ff7d00736ebc9c5d7f9233e 603b1c659c004167578170b44c3b953eeed7caf47dcf878cde6a085e096b2d0a 615d24c911f1a5f99250f0b16003d1a52f22f9f9e3560863f542f624132239b0 637f60b9ca2e20c192e3c9758972477cf4389a0e6b86d2e68e3712855eaf5bf4 6cc16b02084076c656e304e81712f27f8813d7b97b8851517946a7e2cc933d31 6f54f3d6d8c7f4487e56368ee015c1d4fbc00bc77bdc76b45d14530ca28980ef 7a1fbd0098df288e866f3cc6cad071a616fe4916f5f489d6ddda5bc077c7bbdd 868dc90c4bbc89a2b21cea9d234e4189578b6c3beeb590126ae6ae949f62eaf4 8ee5bda36b3104b33ac8f5e8b8ac9828717e27bc8a66a8bd24a85f01bf84a95f 8f9a5246320b31ca9e48b8e8ff53918705d311a8afd6dd144797166751a6d469 9a8e4530aa2a8aaad91f72014d2b2878f557c3e424fc4f0b9ff3e6768f8fe912 9b38f1d468eb8b5accb360d34de2e6522e23c0b07a8b64fc7b42b2ffd4cb5d52 9bd3531c471b33207020377534b3bd9bbf5ea46a0a20006952b8627ff400fc51 a03f12df245983e127285885886bbe98377cafb7bbcd11e26bf0b8841ff991e9 a13e9d6bd38f8579d6bb06fb51be5354fd3e7704adf159817499d1bc536091a1 a98a627f7eeeba6267037bab8ad15c6443547a1d1fcd148d6a7934ffa6e1062e acc90634c7b0d8ebb28d8763c5395eb4b715a66b0caf2b299921be3b7fd3593d b06c46bcb19243e30ed996e2af8ba284f413863bc57402345bc09b5e42389ceb
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Dropper.Kovter-7086582-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 25
<HKCU>\SOFTWARE\3a91c13ab1 25
<HKLM>\SOFTWARE\WOW6432NODE\3a91c13ab1 25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 656f27d6
25
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 656f27d6
25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 96f717b3
25
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 96f717b3
25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 01b2a448
23
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 01b2a448
23
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
3
<HKLM>\SOFTWARE\WOW6432NODE\5F287F4F75829A94 1
<HKLM>\SOFTWARE\WOW6432NODE\zT1Dki 1
<HKLM>\SOFTWARE\WOW6432NODE\5F287F4F75829A94
Value Name: 016CFBC1BABEFF10
1
<HKLM>\SOFTWARE\WOW6432NODE\ZT1DKI
Value Name: CpYrHqV
1
<HKLM>\SOFTWARE\WOW6432NODE\ZT1DKI
Value Name: 39WZL4
1
<HKLM>\SOFTWARE\WOW6432NODE\90ED0D761B2FB199A 1
<HKLM>\SOFTWARE\WOW6432NODE\olRmhsU 1
<HKLM>\SOFTWARE\WOW6432NODE\90ED0D761B2FB199A
Value Name: 7A09ED122AF4ECD0E83
1
<HKLM>\SOFTWARE\WOW6432NODE\OLRMHSU
Value Name: vsctEaBx
1
<HKLM>\SOFTWARE\WOW6432NODE\OLRMHSU
Value Name: 80de8Ae
1
<HKLM>\SOFTWARE\WOW6432NODE\C9E39C761A77CAC1DC 1
<HKLM>\SOFTWARE\WOW6432NODE\l0CEbsVa 1
<HKLM>\SOFTWARE\WOW6432NODE\C9E39C761A77CAC1DC
Value Name: E6D1B26BEF7541793FF1
1
<HKLM>\SOFTWARE\WOW6432NODE\L0CEBSVA
Value Name: rSCO76J
1
<HKLM>\SOFTWARE\WOW6432NODE\L0CEBSVA
Value Name: PY7gGpGla
1
MutexesOccurrences
EA4EC370D1E573DA25
A83BAA13F950654C25
Global\7A7146875A8CDE1E25
B3E8F6F86CDD9D8B25
\BaseNamedObjects\408D8D94EC4F66FC25
\BaseNamedObjects\Global\350160F4882D1C9825
\BaseNamedObjects\053C7D611BC8DF3A25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
157[.]249[.]130[.]1891
112[.]51[.]201[.]1171
53[.]61[.]24[.]1711
119[.]97[.]239[.]351
188[.]236[.]23[.]1971
1[.]165[.]149[.]971
27[.]173[.]241[.]961
147[.]117[.]235[.]2201
26[.]218[.]146[.]921
209[.]73[.]97[.]1091
139[.]121[.]49[.]821
119[.]149[.]159[.]1871
191[.]184[.]185[.]1791
6[.]40[.]66[.]2251
112[.]117[.]175[.]941
172[.]43[.]49[.]441
6[.]214[.]160[.]881
28[.]29[.]189[.]121
60[.]97[.]36[.]1411
99[.]24[.]117[.]1211
192[.]242[.]171[.]821
74[.]101[.]122[.]651
5[.]107[.]225[.]1991
165[.]64[.]226[.]2201
109[.]209[.]166[.]1381
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
A25
api[.]w[.]org1
home[.]pl1
php[.]net1
www[.]interworx[.]com1
www[.]openssl[.]org1
apache[.]org1
lod[.]is1
dev[.]allsystemsgomt[.]com1
allsystemsgomt[.]com1
allsystemsgocomputer[.]business[.]site1
Files and or directories createdOccurrences
1.txt25

File Hashes

0c308626f38e758cdb362c216e98b86754423ee8a7db0c6cdc73e9aaacbfbd57 158542e3697bb1d467a68b50035950a6eee3f4cdf4a87ef35ec280f092aa8f24 179bfcba0795d5b8c53cd381a3bd5272b0ba170cb76312263f7cf7fa9801950b 17f14b4856e5f4919f908400d8789cc8388381989d4f1333ec6c70346c8d78d3 1c6937a286b18f016d6687ba872b0d19cf99932f523b8c9b98e5203dce8636b3 246b9a16823df5dce07e6435afd691833a4056b87c51cfa8812b82c156063426 2a10ba74892b50cfe9338482c758d0eff0f62c2cf5e5750c05779d9c67381bd5 4839855b43c168a5f5a92266906c8b070cc65d496e0f37978b6f34eae30327b2 48dccfab3d58e5370ddd4481768e7f66fe259364367c7ae40a45ed74ef67323a 4e78f30bb53f103efa2923359348c48d1cff85fb481ee60c70fb7937f44d6f0d 4f9607712eaad7066f27a05e427dc18661cb6f4847d59027ae1ef20400975a9f 4fda5660b594ab93dfac2a37a0bb114b8d68fc51334431f3d1c1ddb982dd6446 500fd828118c21813966513f5fd4d0badebae33e7b8280a95a8924a4a5eebba1 59ac65640ef6b7d2236b869ad56315567652eaa87c9161ec001950b00ca98608 60bd60bdf77e61d2acbf4980229ae21a2ac24ea381f58ca5cbc1d67fc1ed6775 62fdea9bdc0d4ed1f1c05f333af859f548e1442eaacbdac8645750694d4e575d 7148d96630544e09b466bddc4a8ac60eeadc05af9afb4dbc85a8621a93400c18 7a21fa88108ed9456d3a462c9c57487c8def488728995b2a858d13641465df5d 7d07b0f68bd1873e5372cc79d7e24e4d2c70d5fdc55ad01aff968c42a428d484 866c5a060cf8f44209a39d358ec0c6a872317f3957f08609b1817774eabce57f 8e08a03289e73d0bf196fcb4f36a16ab547f9eb4ef6f38ff20fa70d898871ee0 9acb88217e012f43bdfa085b062c5da48ab5dd5ed888be77f9617a1ba2400c93 a89ace7661f6189a698955d46e97ebe3da70a308e25a4b7862c5dde9b3d4776c afb3a3ca5db5736154aabfc6e86bd31b7c0fb725fdc67eb42a02e0e211f9831c b092d2e89c04741e1d5150767a0e79a49e6edb05a142ccb7a971373c2abb3ae8
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Win.Dropper.Miner-7086571-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Quarantined 21
<HKLM>\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Monitored 21
<HKCU>\Software\OCS 21
<HKCU>\SOFTWARE\OCS
Value Name: CID
21
<HKCU>\SOFTWARE\OCS
Value Name: PID
21
<HKCU>\SOFTWARE\OCS
Value Name: lastPID
21
<HKCU>\SOFTWARE\OCS
Value Name: lastSID
19
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
2
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
2
MutexesOccurrences
Local\https://www.chip.de/2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]13[.]208[.]2617
91[.]199[.]212[.]5211
176[.]9[.]97[.]24411
5[.]9[.]198[.]8310
5[.]9[.]176[.]310
5[.]9[.]116[.]276
5[.]9[.]175[.]194
204[.]79[.]197[.]2002
172[.]217[.]12[.]1982
54[.]210[.]244[.]1312
64[.]202[.]112[.]632
23[.]6[.]70[.]2272
13[.]107[.]21[.]2001
151[.]101[.]2[.]21
151[.]101[.]66[.]21
173[.]223[.]56[.]521
173[.]223[.]236[.]1731
96[.]6[.]22[.]2111
96[.]6[.]29[.]521
64[.]202[.]112[.]311
70[.]42[.]32[.]311
23[.]32[.]81[.]2491
23[.]41[.]180[.]261
35[.]158[.]10[.]181
104[.]121[.]102[.]1421
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]chip-secured-download[.]de21
e3056[.]dscg[.]akamaiedge[.]net12
www[.]chip[.]de12
ocs3[.]chdi-server[.]de10
ocs2[.]chdi-server[.]de6
crt[.]usertrust[.]com5
ocs1[.]chdi-server[.]de4
schema[.]org2
ad[.]doubleclick[.]net2
odb[.]outbrain[.]com2
tcheck[.]outbrainimg[.]com2
log[.]outbrainimg[.]com2
widgets[.]outbrain[.]com2
mcdp-nydc1[.]outbrain[.]com2
efahrer[.]chip[.]de2
gutscheine[.]chip[.]de2
services[.]chip[.]de2
www[.]summerhamster[.]com2
filestorage[.]chip[.]de2
apps[.]chip[.]de2
search[.]chip[.]de2
mms[.]chip[.]de2
www[.]interred[.]de2
www[.]chip-kiosk[.]de2
chip[.]info2
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\DMR21
%TEMP%\DMR\dmr_72.exe21
%HOMEPATH%\NTUSER.DAT21
%HOMEPATH%\ntuser.dat.LOG121
%APPDATA%\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD20
%APPDATA%\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD20
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E}\LocalServer321
%TEMP%\DMR\ishnuwkqraonlvar.dat1
%TEMP%\DMR\usbxlrosrdztgwpi.dat1
%TEMP%\DMR\seysuwrfdtqhnrpj.dat1
%TEMP%\DMR\xglpmhfhfspocakr.dat1
%TEMP%\DMR\lbhlcyuzmtpetsxw.dat1
%TEMP%\DMR\gwlwmrciqqkeyeks.dat1
%TEMP%\DMR\ymbcvbzrdalmdftj.dat1
%TEMP%\DMR\hpiylxvkyztuheei.dat1
%TEMP%\DMR\dpnpigfwacztjuns.dat1
%TEMP%\DMR\spvazpzpxhusfvjq.dat1
%TEMP%\DMR\fhandfasizfmozvg.dat1
%TEMP%\DMR\nvdvdyywkouvxaym.dat1
%TEMP%\DMR\puzhauckewbevmtx.dat1
%TEMP%\DMR\bacuhsidwpicjayv.dat1
%TEMP%\DMR\vjjeolwfjjggtcev.dat1
%TEMP%\DMR\sfmbwidykwqvqawj.dat1
%TEMP%\DMR\fnoohkjzniiixfov.dat1
%TEMP%\DMR\mygfrlcodocysopx.dat1
*See JSON for more IOCs

File Hashes

4f14400c7865d769d6c4328464b49cc4e179124a00a423204356285846a0b07f 666a1635a2d0fb5cbc4af2749198f4c0fe57bdb27e3f5b60ea194081b2a373b1 68371d415a84102cc9c42fce2e2b434e984a7cd6824cd6d25c33496b4b779cd8 6e6043d7c25d2c717bbecd32b9fdd60291e2012d2df692319c1b76894c9e88b4 6fef1f8672b5c19972babe4f533dd84964ba67dcea8013545a1756150a043f02 701c053066142c8ce92f00a1739c7c7fee19165799067a1478e2d2f4b0660300 756c99bdbf516b88d69aecafd94b81d338718364fed4a66e0e7430f5070fe4d3 7cc3b82e8ea40284061707c6918eb30b94c2d153bdad7ebcea40fb74269e800d 8f86d8033e08b367c9577f9c1d5f0f67f914687607720a627ce4467d855acb31 95f954c65d2f3f44015ba04d3bd95b2c14eb25702549c2ec46402a79caf5bf4b 9849abcf225ff91f2b50db88c8330f27477f753c1062980ad3a61e66729b9319 992778f2fb834d928bdc56df4d782f841475183e2cd156b153e6f5fe5b5cfa70 9b833124a43f9edd8482da692534ae3165026eeb0885f0a426da434993661d4d a0ae34105095f8e498f5ef7fa3a2c70c1fca7d0463453114d8e6fcb1400cf4b7 aa032e4e646aed28148b54ffab1671aeabf99d6695341c273d6b20921092cb3a bde0eefd7fd333518f0d29c8e4e82d635c77f2511eaaafc8cd38b1cc185fe423 ddb185cb305a9c0ab7feedbc74b5c1e8403c8949f8eceb816c2bc27bdd363e18 e0d5e5618ae25a2f13cdb593db3e51e6fb92cb63518c3416b4d122d8a82fc284 e12019286976d31196602d1c653f984ed376d6a18bddfda61b7cff437b4aaab7 ee7740f172da0a36060ba569cab938764d6646d82473b35bc05361e9bbc16f24 f2fb2e8f9f7826463ba3ca722fe33bf9c7525f4cb6f69d5d248843542de16da3

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Trojan.Zegost-7086512-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\Software\Wow6432Node\Microsoft\DownloadManager 12
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: XXXXXX579E5A5B VVVVVVrr2unw==
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: XXXXXX2CD24958
1
MutexesOccurrences
AAAAAA9PT0vfT4rqenp70A/Pqpp6+vr58= BBBBBB9PT0vf4Fr7K0sr0A/Pqpp6+vr58= CCCCCC9PT0vQXpr7K0sr0A/Pqpp6+vr58= GGGGGG4wIF/vL7858= XXXXXX579E5A5B VVVVVVrr2unw==11
AAAAAA8fjz+gD9A66xsL0A/AP98L0A/PqpprOwnw==1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
107[.]165[.]236[.]23311
154[.]90[.]68[.]5211
50[.]63[.]202[.]885
50[.]63[.]202[.]704
184[.]168[.]221[.]733
184[.]168[.]221[.]852
184[.]168[.]221[.]742
50[.]63[.]202[.]731
45[.]39[.]189[.]311
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
bjerfogxz[.]ddns[.]net12
www[.]af0575[.]com11
www[.]fz0575[.]com11
www[.]wk1888[.]com11
af0575[.]com7
rktmcnd123[.]codns[.]com1
Files and or directories createdOccurrences
%SystemRoot%\XXXXXX579E5A5B VVVVVVrr2unw==11
%SystemRoot%\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe11
%SystemRoot%\XXXXXX2CD249581
%SystemRoot%\XXXXXX2CD24958\svchsot.exe1

File Hashes

21ec5795c07ed8c65dced2ca73a94f870cde60947574a06861cdf199af788dfa 26c6a08b58e3d5ff4d67ff39198306c9e7f681876f0b2ebe66fed7bedbfb1aae 3a2e092cefd3fcb61f5411a0bd03fdeb9fa48cfa3f439522e2f2090b0d1b4035 3ca6404e74295a09db3747db63d04600915b772bba68e6c9a7ecca07f6175337 5458070fe2e706f6c0559fafaba2ee6cd2c57e3b9d578d3d6bef860e2f60683f 5f4af61b5e7f60cb4db4faf750fa148a4c019052e126c96ed9c6bed672e8a8dc 6db119c36ff19b5f8a288fe515fb3a20980495d36c071feca82d0e664567c78c 8b8a6a9551c89b8d7a561d25ac5ea0e3482ceff12fa48d15060d20e74957fb75 9702dbfb26ad6cebd6d223a2503e7a84cef55ee09e8db9a1201fa054dd81f913 bc46ec7de14d120876ae205f133864b3bb25a1514cc583479eec1a84bcd99b39 fc08509806bfbd4142b38782f2b397604e8c9cbde369c5384531b384635a57a1 fe6d46a51cc7b1b7330c81c2c513cf152a74d69c46e3266bcc7f9ad126ba3b78

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella



Win.Dropper.Ursnif-7083691-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
27
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
27
<HKCU>\Software\AppDataLow\Software\Microsoft\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: apiMPQEC
9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client32
9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client64
9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: datat3hc
9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Dmlogpui
9
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client
5
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
5
<HKCU>\SOFTWARE\MICROSOFT\IAM
Value Name: Server ID
2
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
2
MutexesOccurrences
killsoldierS28
songSixLe28
Local\https://www.avast.com/27
Local\https://vars.hotjar.com/26
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}5
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}5
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}5
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}5
Global\6ed2e341-b08b-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]12[.]20627
157[.]240[.]18[.]1927
172[.]217[.]12[.]19827
172[.]217[.]10[.]10427
169[.]54[.]251[.]16427
152[.]199[.]4[.]3327
23[.]221[.]50[.]10227
13[.]109[.]156[.]11827
172[.]217[.]10[.]426
157[.]240[.]18[.]3526
23[.]41[.]182[.]9624
172[.]217[.]3[.]11023
104[.]107[.]26[.]21422
204[.]79[.]197[.]20021
65[.]55[.]44[.]10921
104[.]107[.]18[.]9121
23[.]41[.]181[.]23020
38[.]126[.]130[.]20220
13[.]107[.]21[.]20018
204[.]11[.]109[.]6617
23[.]221[.]50[.]12216
23[.]221[.]49[.]7516
204[.]2[.]197[.]20216
173[.]194[.]175[.]15715
23[.]54[.]215[.]14715
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
googleads[.]g[.]doubleclick[.]net27
www[.]googletagmanager[.]com27
www[.]google-analytics[.]com27
connect[.]facebook[.]net27
www[.]googleadservices[.]com27
avast[.]com27
static[.]avast[.]com27
mc[.]yandex[.]ru27
dev[.]visualwebsiteoptimizer[.]com27
amplifypixel[.]outbrain[.]com27
pixel[.]mathtag[.]com27
tr[.]outbrain[.]com27
amplify[.]outbrain[.]com27
ajax[.]aspnetcdn[.]com27
img-prod-cms-rt-microsoft-com[.]akamaized[.]net27
az725175[.]vo[.]msecnd[.]net27
script[.]hotjar[.]com27
static[.]hotjar[.]com27
c[.]s-microsoft[.]com27
assets[.]onestore[.]ms27
www[.]avast[.]com27
vars[.]hotjar[.]com27
static3[.]avast[.]com27
action[.]media6degrees[.]com27
6679503[.]fls[.]doubleclick[.]net27
*See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js5
%TEMP%\RES<random, matching [A-F0-9]{4}>.tmp5
%TEMP%\seuyoffm.dll1
%TEMP%\seuyoffm.out1
%TEMP%\2orfeuv0.dll1
%TEMP%\2orfeuv0.out1
%TEMP%\xgn0se5v.dll1
%TEMP%\xgn0se5v.out1
%TEMP%\6624.bi11
%TEMP%\omznovgy.dll1
%TEMP%\omznovgy.out1
%TEMP%\CSC144932DD66624AD4A66FAEED56434A36.TMP1
%TEMP%\CSCDA1AB6EFEFE44DDB43A48EBFF8742A.TMP1
%TEMP%\uqovbfke.dll1
%TEMP%\uqovbfke.out1
%TEMP%\CSC16F899F61E954B869696D94AD85DEDF4.TMP1
%TEMP%\0m1c0rej.dll1
%TEMP%\0m1c0rej.out1
%TEMP%\0m1c0rej.0.cs1
%TEMP%\0m1c0rej.cmdline1
%TEMP%\uqovbfke.0.cs1
%TEMP%\uqovbfke.cmdline1
%TEMP%\RESE10.tmp1
%TEMP%\CSCBAA72AD8A34F43D688C3F6093AC2A3B.TMP1
%TEMP%\hcfrzhfk.dll1
*See JSON for more IOCs

File Hashes

09de71ba2e0a093748878986b5a845a6a826009638f11dbc0cac7450d55943bd 184abb514e009fbeedeb23d28f3f4d2ba30f2407680dbdda112e5a2761cb904b 1b4576a2a5ba0f49f1475c2b993201acea056c342bdc0c7eaabd22718e1a52bb 1ec792344097e1ebd114fd49e90e3d0a040a11bb18d3bef5333aebbe12a95a59 1fa590f73f1cce34190ef3975835ad9d48bf03a3718fdb306cd5dae387dc91b9 1ff1c2bd12738bc3ee36651917e52d76bb2c165b6b96594dac4c9179c6ee3c1f 2496306cf77459222d8aad059e22bdde9d963561c7495589e907517b4fdcf495 25062ef38c0e9751e8b619eed7ab76a4fe61d4c178db9c1b9dddd2cf49afbbac 28a09b1a512cbc0b51850b82a99dfec4597b8fd0a5647d461bb2642fab259792 2992047d9fa9e052e63c116a4d66929306ca5e484aae00c5cbf16df8429e9c52 34a36bc17cc76d13e8610b10dddd0855b4c7ec4545a21048843bba1a3b0165ed 3aefeaad4bb74267dfeb3bfacba97f112df7fd4d6bcf0011da48ef723530fcdf 3af45cf6205e4ccec0d57e0dafd09054167b337f4ddd4cb46ed17b16f5247b42 4437c72cd4f0e98ff080328135531b5bd83cd9420731ccb1ec3c410207b931b9 4dd835aa054bc5e17bd4a38454b94fec1565dcea9883b1adfbac691d5a014a3c 4e1e91f011e8a233409ac3cbd4c99d5b8e202296fe11c745fdb37daf48bb9a6e 4f2171077a8413912ed96f60514396708e6aeac2b88124bb9c1fce5858d42597 5147f2ac46cb1f5716b6b84ad6f89480b317e788c05ce2e2dce7c8355f214e5d 5efe419c36aa35ed45f7892304e509093e5d7bcf3eaeea424cc00fb44bf78aae 6c22722f45247e1384fc7b1cce569cdf6e07c38faf56c8aa63880172f2a9d54a 7236e727ba5221e7b863c5748e4837e170ed15cd7f9e6608029b7117a021552a 7a8b10e464c31aa574dd3d8f6d41d4361ebbb5c1e48ff08b3871789287056c75 8cdce07c34684d8613e50bd66df5acbe3f88513417c02049ec25d927ee6dee8f 90263c41cca8e6215b1b1d90c90fbb396b104cb284463e798be50d4c3849cf72 92babffc76f0e8cdd1e58ed39c001943c3b30e2e220abd7f1fcb65e8e4c3829d
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella



Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
Madshi injection detected - (1834)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (1447)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Trickbot malware detected - (974)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Excessively long PowerShell command detected - (935)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
CVE-2019-0708 detected - (347)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Process hollowing detected - (266)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Gamarue malware detected - (172)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Dealply adware detected - (83)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Installcore adware detected - (60)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
PowerShell file-less infection detected - (45)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

Vulnerability Spotlight: Multiple vulnerabilities in NVIDIA Windows GPU Display Driver, VMware ESXi, Workstation and Fusion

$
0
0

Piotr Bania of Cisco Talos discovered these vulnerabilities.

Executive summary

VMware ESXi, Workstation and Fusion are affected by an out-of-bounds write vulnerability that can be triggered using a specially crafted shader file. This vulnerability can be triggered from a VMware guest, affecting the VMware host, leading to a crash (denial-of-service) of the vmware-vmx.exe process on the host (TALOS-2019-0757).

However, when the host/guest systems are using an NVIDIA graphics card, the VMware denial-of-service can be turned into a code execution vulnerability (leading to a VM escape), because of an additional security issue present in NVIDIA's Windows GPU Display Driver (TALOS-2019-0779).

Moreover, two out-of-bounds write vulnerabilities that could lead to arbitrary code execution have been found on NVIDIA Windows GPU Display Driver (TALOS-2019-0812, TALOS-2019-0813). These can be triggered by a specially crafted shader file.

In accordance with our coordinated disclosure policy, Cisco Talos worked with NVIDIA and VMware to ensure that these issues are resolved and that updates available for affected customers.

Vulnerability details

VMware Workstation 15 pixel shader functionality denial of service vulnerability (TALOS-2019-0757/CVE-2019-5521)

An exploitable denial-of-service vulnerability exists in VMware Workstation 15. A specially crafted pixel shader can cause denial-of-service issues. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host, leading to vmware-vmx.exe process crash on host.

Read the complete vulnerability advisory here for additional information.

NVIDIA NVWGF2UMX_CFG.DLL shader functionality code execution vulnerability (TALOS-2019-0779/CVE-2019-5684)

An exploitable untrusted pointer dereference vulnerability exists in NVIDIA NVWGF2UMX_CFG driver, versions 24.21.14.1216 and 412.16. A specially crafted pixel shader can cause an untrusted pointer dereference, potentially resulting in code execution. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, and will affect a VMware host.

Read the complete vulnerability advisory here for additional information.

NVIDIA NVWGF2UMX_CFG.DLL Shader functionality DCL_INDEXABLETEMP code execution vulnerability (TALOS-2019-0812/CVE-2019-5685)

An exploitable memory corruption vulnerability exists in NVIDIA NVWGF2UMX_CFG driver, versions 25.21.14.2531 and 425.31. A specially crafted pixel shader can cause an out-of-bounds memory write. An attacker could provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Read the complete vulnerability advisory here for additional information.

NVIDIA NVWGF2UMX_CFG.DLL Shader functionality DCL_INDEXABLETEMP code execution vulnerability (TALOS-2019-0813/CVE-2019-5685)

An exploitable memory corruption vulnerability exists in NVIDIA NVWGF2UMX_CFG driver, versions 25.21.14.2531 and 425.31. A specially crafted pixel shader can cause an untrusted pointer dereference. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that TALOS-2019-0757 affects VMware Workstation 15 (15.0.2 build-10952284) with Windows 10 x64 as guestVM. The three other bugs affect NVWGF2UMX_CFG.DLL, version 25.21.14.2531; NVIDIA D3D10 driver, version 425.31 on NVIDIA Quadro K620 and VMware Workstation 15 (15.0.4 build-12990004) with Windows 10 x64 as guestVM.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48852, 48853, 49894, 49895 - 49897, 49205, 49206

Threat Roundup for August 2 to August 9

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 2 and Aug. 9. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Malware.Swisyn-7105182-0 Malware Swisyn is a family of trojans that disguises itself as system files and services, and is known to drop follow-on malware on an infected system. Swisyn is often associated with rootkits that further conceal itself on an infected machine.
Win.Worm.Phorpiex-7104335-2 Worm Phorpiex is a trojan and worm that infects machines to deliver follow-on malware. Phorpiex has been known to drop a wide-range of payloads, from malware to send spam emails to ransomware and cryptocurrency miners.
Win.Malware.Zusy-7102354-1 Malware Zusy is a trojan that uses Man-in-the-Middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe". When the user access a banking website, it displays a form to trick the user into submitting personal information.
Win.Worm.Brontok-7102096-1 Worm Brontok is an email worm that can copy itself onto USB drives. It can change system configuration to weaken its security settings, conduct distributed denial-of-service attacks, and perform other malicious actions on the infected systems.
Win.Worm.Socks-7102087-0 Worm Socks is a generic worm that spreads itself via autorun.inf files and downloads follow-on malware to infected systems.
Win.Malware.Formbook-7102043-1 Malware Formbook is an information stealer that attempts to collect sensitive information from an infected machine by logging keystrokes, stealing saved web browser credentials, and monitoring information copied to the clipboard.
Win.Malware.Tofsee-7101989-1 Malware Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
Win.Malware.Chthonic-7101817-1 Malware Chthonic is a banking trojan derived from the Zeus family of banking malware. It is typically spread via phishing emails and attempts to steal sensitive information from an infected machine. Chthonic has also been observed downloading follow-on malware such as Azorult, another information stealer.
Win.Malware.Remcos-7101023-0 Malware Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.

Threat Breakdown

Win.Malware.Swisyn-7105182-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS 9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: Type
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: Start
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: ErrorControl
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: ImagePath
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: DisplayName
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: WOW64
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: ObjectName
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINMSS
Value Name: Description
9
MutexesOccurrences
xinduanyou9
Global\aca756c1-b9e5-11e9-a007-00501e3ae7b51
Global\ad6324e1-b9e5-11e9-a007-00501e3ae7b51
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ZFT[.]QBAIDU[.]INFO5
che[.]qianma[.]info4
Files and or directories createdOccurrences
\SfcApi9
%SystemRoot%\inf\oem13.PNF9
%SystemRoot%\inf\oem13.inf9
%SystemRoot%\LastGood\TMP4.tmp9
%SystemRoot%\LastGood\system32\DRIVERS\winyyy.sys (copy)9
%SystemRoot%\Temp\OLD5.tmp9
%SystemRoot%\inf\INFCACHE.09
%SystemRoot%\inf\INFCACHE.1 (copy)9
%SystemRoot%\stin.bat9
%System32%\DRIVERS\winyyy.sys (copy)9
%System32%\drivers\SET3.tmp9
%System32%\drivers\SET6.tmp9
%SystemRoot%\winsys.exe9
%SystemRoot%\winsys.inf9
%SystemRoot%\winyyy.sys9
%SystemRoot%\SMSS.bat8
%SystemRoot%\lsass.exe8
%SystemRoot%\winhost.exe8
%SystemRoot%\SysWOW64\SMSS.bat1
%SystemRoot%\SysWOW64\lsasys.exe1
%SystemRoot%\SysWOW64\winhost.exe1
%System32%\SMSS.bat1
%System32%\lsasys.exe1
%System32%\winhost.exe1

File Hashes

0f502626053f598a870375325ba7f7c81c2a791d0fd2401d4d6bd27c784b5f90 37e5a76ef3b1de92c162fb42b6e783a9734ccb1d4f61e1252ec9a8aba6417ca2 64b2a00a400501b742eb336eceee3a398b418315ed676e37e4d4f3fc7ab76e2c 722449fd99d698856b809df09e75e79ec4cee7840960e3df72a8ceb3d954134c 729d483257c6907c3f423d344f2cb5c9a78a899455ef246fc033c965043272bb 96d5ea254ca506622c2c70c4bcb8594c62a20db7ce9552deb302166bda37b226 b784fc881fb56dceeaad3afbad770a3c76eaa1acc389877be514af02413c06e7 d8318b7b34f4662ee8b6b537ee08f763ffb7d2c4794b722561d305db65c6fc5f da0c26355fd7abdd3683beb7ab9f96efdec52207c150664bd177de4d794e6a53 de782ca97daf89c1208ea57618498de7aaa6f4ddbbc9794f3491dc947cca8cc3 e4aeeaf8b385bfccc637411b5030ab6c91a289cff425a14953e6549073478aa0

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Win.Worm.Phorpiex-7104335-2

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\M-5050402520507690204050\winmgr.exe
15
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Manager
15
MutexesOccurrences
t110015
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
195[.]22[.]26[.]24815
199[.]247[.]8[.]1315
208[.]100[.]26[.]25014
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
srv1300[.]ru15
srv1000[.]ru15
srv1100[.]ru15
srv1200[.]ru15
srv1400[.]ru6
Files and or directories createdOccurrences
\autorun.inf15
\Secret.exe15
\Documents.exe15
\Pictures.exe15
\505050.exe15
\Movies.exe15
\Music.exe15
\Private.exe15
\windrv.exe15
E:\autorun.inf15
E:\Secret.exe15
E:\505050.exe15
E:\Documents.exe15
E:\Movies.exe15
E:\Music.exe15
E:\Pictures.exe15
E:\Private.exe15
E:\windrv.exe15
%APPDATA%\winmgr.txt15
D:\autorun.inf15
%SystemRoot%\M-505040252050769020405015
%SystemRoot%\M-5050402520507690204050\winmgr.exe15

File Hashes

45dd665a06a9f87ec8ad562e6678a8384e0950bedba7beebba9c905157d1be52 4890d7aa8b302210932dacef3a0452ada7ee9c6565b1175f75925915e6036331 4ae81c49804d96d6913fc91ec79c77c0a16f09a5628cd9e6365bb621217ed3c9 5327d5502aa0e6cb6456809fc27cfcd1b0830a9cfd337d2a9493ec47a2eb6530 81489692294fa6e70b73f959a30a7bdd684141a72d3153b409f45173753acb82 8b66de0f1099ff243fbea1782c0ab7566bb9a201818d7793641e797c52067cab 8c03c0f22d09ba5384b804eced1c56e74f6c6df97d35a21f0d596dc2c80e5f5c 90b7e12af41916b8c82d0d83f6073e5bbc95f3c4ff1fd29391d50e7115967460 a0287b2bc66e1f6695d9c7e4ad6f70e8b1099f3f4b9761a4428e8ff02b173962 a80da89dfba6049d759500b272030ea7a97ab0d7cbe386456ddb65fa24b7f738 ce79b0e5a78be79315d2f20c6998812b75f4b95646d457034b4a534467e71558 d3da28644ddeaa70d828a659e27b83abcc284e578a62c26d1a4efc418cdac942 d6a90b5ff319cf5eb51d7b202c77e7e8037d2b160b80807e027ceb2e9834a29e d8797103159c7ebf48b8ff67033f61866b1e46f70f82a91ce33b8afe27f0252e e571c9202cd58870434c981bc0cf546473c446145d77362b1fdf7eb75f18400c

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Malware.Zusy-7102354-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: F5DBF765
20
MutexesOccurrences
F5DBF76525
\BaseNamedObjects\5145C9BD11
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16223
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ynefefyopqvu[.]com17
Files and or directories createdOccurrences
%APPDATA%\5145C9BD\bin.exe23
%HOMEPATH%\AppData\LocalLow\F5DBF76522
%APPDATA%\F5DBF76521
%APPDATA%\F5DBF765\bin.exe20

File Hashes

03e74e58f2aed047d6bac9bde066206c64d3e48a4c865d86e29bc62edbb19c77 0eb478d5757cb872b80386250de948ac3abc76b5ebf0d7f2ab38f6a6ad95479c 0f779f8c2d4d342da2fc6bda22eb75bcc3939102ecea72847fafd9cbc10e26ad 1ed3291baf7d32ab690b56f430399d7c46d261176c5b05b3cf8f2cdd1f9a4681 2828b72f4856b8054ff75af987aa43d84f2d42405979c99e89e6082afc47d6da 2bcd2e02bf0cefed898990ae64791f9c294c50695542e2cf0e073c1f12dfed94 2bf93320c70c222aa89db3df81845d9277dc8eb7ff764b63f5ad4c5b78839557 2ecbe3620a6f08eadaf5c14aa35b2975b07ee41827f7004b692a7508b6a3c1a5 354d64a310cc3ce7a957c29f8654201ee0e79237609172e746aa25b5e038b837 3776eb64c25acfc28fd35fe6a123a0b4b1e0ee7e4ff2cde20169f1a914c01df1 39627480021a400069ee270b040601af19aaaf669bc6db2bf64058e14fb13875 3d0a697fec4326426bf22ae6b848700a3274c55767fb18a8e0748fc7f3024597 3e7ed99b45129a136287f785dffb67b044da28fd2232190fafc30c759c447a96 460de49bf98a472753462a9264bf40ea24b95fa667f3b8d7d010ca3fa94b715a 47e8ec99e3c0bb7526b381db1bec98b13df1deb95c56868703309bf4979155d2 48a0d3749139aebb4d435db7158aa1916e4d305139d3db168c795c68b9431ed6 4c46b50c94ad30df7661d5be4eaf3da8ed1f8f1924fa25f0b87f9e2bc5b21dc8 4cad121b0408001868b22b92d7def0a3125efe64ebd5d28bfbd933395fecf512 5ecd70109eec90c8ac0869398a4da72f9264ef5f3f61f2be883456ddd9bc6a32 62a2d6d129e578279b691542eea61040212cc4f26855beecd991118343d081cf 62afaeae9d1bc8473416423c46423951eb35cac6927798f6d9967a8fb358af2a 6b2d254b662c18e9a23fead0e661587c3f46b8fc8fac940fedb13e4e2b3d8bd6 6f3c9f7a94b4f3a3ecf29bcd646a55bb3d286ffd20b98fe2d984594dd73dbb5e 72683fb9644dbdc7d2fc1ba436d7f7379f2ce86fe3dac5431d29160abff07755 72c16952c7f016b6bbac0e1cc243aec6d9eacb1c1db8c3f744499584672580e5
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP




ThreatGrid


Umbrella



Win.Worm.Brontok-7102096-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: ScreenSaverIsSecure
25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: ScreenSaveTimeOut
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoTrayContextMenu
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CABINETSTATE
Value Name: FullPathAddress
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: HideFileExt
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoViewContextMenu
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableRegistryTools
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: DisallowRun
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoTrayItemsDisplay
25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: nEwb0Rn
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: n3wb012nAdministrator
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: n210bw3n
25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT
Value Name: AlternateShell
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Shell
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\AEDEBUG
Value Name: Debugger
25
<HKLM>\SOFTWARE\CLASSES\LNKFILE\SHELL\OPEN\COMMAND 25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: RegisteredOrganization
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: RegisteredOwner
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoFileAssociate
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: NoFileAssociate
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: DisallowRun
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\DISALLOWRUN
Value Name: 1
25
MutexesOccurrences
Local\MSCTF.Asm.MutexWinlogon225
Local\MSCTF.CtfMonitorInstMutexWinlogon225
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
51[.]141[.]32[.]5124
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
time[.]microsoft[.]akadns[.]net24
Files and or directories createdOccurrences
%System32%\winevt\Logs\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx25
%HOMEPATH%\Local Settings\Application Data\winlogon.exe24
%SystemRoot%\nEwb0Rn.exe22
%System32%\DamageControl.scr22
%System32%\JawsOfLife.exe22
\nEwb0Rn.exe22
\Documents and Settings\All Users\Start Menu\Programs\Startup\Empty.pif21
%HOMEPATH%\Local Settings\Application Data\WINDOWS\CSRSS.EXE21
%HOMEPATH%\Local Settings\Application Data\WINDOWS\LSASS.EXE21
%HOMEPATH%\Local Settings\Application Data\WINDOWS\SERVICES.EXE21
%HOMEPATH%\Local Settings\Application Data\WINDOWS\SMSS.EXE21
%HOMEPATH%\Local Settings\Application Data\WINDOWS\WINLOGON.EXE21
%System32%\WishfulThinking.exe21
\about.htm18
%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif2
%SystemRoot%\msvbvm60.dll2
E:\Download Administrator.exe2
E:\MP3[NEW-RELEASE].exe2
E:\nEwb0Rn\New Folder.exe2
\Download Administrator.exe2
\Friendster Blog.exe2
\MP3[NEW-RELEASE].exe2
\Mini Games.exe2
\StyleXP-WindowsVistaPack.exe2
%LOCALAPPDATA%\WINDOWS\CSRSS.EXE2
*See JSON for more IOCs

File Hashes

642e0acdbece0f1e99604f63488e2d0ae4845080adba80ecfc55cbc95db05bc5 73fcbb6f10cd849bff109dd05cf89d9b612302faed9c382791d6df4d024bc009 7e98f0308fd88e97e4f80b1e2c6845e18186e07d2a27d936bccadad719114334 809f403efb1c7f19a30cfdd62841b898ebfbc1e91626928bb372ad630d8d9b81 81dc5726d4af65258dec6ccf0dda1327fcacb9b950539992fff82859c6645a27 85506de211f0441c3bbf0e98668a7d3d1c2a62aadc07ef82968245644fca4b00 8ef7ee2b458b006e3364f972a744031cb99c9a9d7bb4329b4a41e6d0e1cbb784 96093b99c83298eeb0aa6ac9a9c006f23ad8d8c1818b8a88c62ea1f88fd7d368 9784b14130ecabb2d53ea4226e79f6dca68e9bf31a83cc447a0113464582a5df 99da8c945884ce7e214aba8f0b363532082d660bae2693c098b230701d236b7b 9b4eabfb075dd32ce295b7dab5a0347f7c5f89021c8804cf88152b0be7de1544 9bf0202ddec81f84ad07867e28214decfef7fd5bd1327a6b9482de823d90ff60 9da800449b88fbc076c16d4fa6d42645367e9b0e1c3306ad5f65df77b3348a72 9de658e0f67bdcae688d74907763d87f280086e5c47cc0c2ee545f8cf675a42d a2cbadc9bb11b4174d11407599ae95ee3680054e04105b0ef435628dcc252954 a84944ae92cc5732281c71ffa5b17b68ee362441bc8093da4d59bc0ca5723f74 a86c3e90ba9c53348dde346e5bebf63d8198dafabf82baaf298f5b8c23ff4fa8 b36b7ceef1d16e877580931a8ec5a70462f0513a4d113bcb1e3e198830aa3447 c600cf8b855fefb4e9e1e4d0c1f0d92c58eee1f06d53a88b0d96ecac94e7dbfd c88906c44642322a0ad3fd0207e9873d89d16d15b317c0e51d1fed28138ce210 cba998582b123d210bccb81e49db805736439eba5f4735883d4597e2c5895f85 d296651dfc3d2d3f31115e48e815449bf71d06a64318462c1bd2f0e299d6a63f d38e3cfe3f57ddea4f4b8966b4b51812af1ac688849a8bbee086ec905f0406d1 d3a23ff88633039f39ea421a2d197e3b6d9bb26ad6e5500dfb559b126884fbac d5456a558e240fbe2e116155e4a04c8c038550ab4c2c4103d9e49da2a8ba495f
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Win.Worm.Socks-7102087-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ntuser
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: autoload
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCHEDULE
Value Name: ImagePath
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ntuser
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: autoload
11
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
208[.]100[.]26[.]25111
23[.]20[.]239[.]1211
104[.]25[.]37[.]1088
104[.]25[.]38[.]1083
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]hugedomains[.]com11
fewfwe[.]com11
fewfwe[.]net11
static[.]HugeDomains[.]com7
Files and or directories createdOccurrences
%HOMEPATH%\cftmon.exe11
%SystemRoot%\SysWOW64\drivers\spools.exe11

File Hashes

16c60b7975280008e5491cae5e71fa48671be5c97010488faf63956c6552c628 44f3b28713682be10e02bdf52a99290b733931bac2e8c0b4102e4f458b1284bd 5943ca2e22ce53fcc9b7caabfca8d8cf721ccbd4f536833b10a370303fcaf505 7e9b3d25d766a1ff8520187b8f49387b1f654778ba58838e37e0ff741ab10f73 8dfb856841b2f70e2bffb74f26225dcc42d65d3fa6250767397ac30bf21823f5 a52c2e6216c1685d35385419c9c8cd854ea70490f923bbc3eaff92df26bafbc6 a73604e5b2456cc803dae1b79d91db32ce2535562bdc73eb762394540c79d7af b9510728d8c9d3807e26ba9286f3ab6890e335a197b377201b939230a3d6d69b c8a3ac87c01529800bd6461d94702428322c7a3aed93ed676f0a55d3d56addd9 e4c7f241397b5a46c3081214f1eb67b51bd6d5dd20cd984db4f5ac164f260bf1 fe80f9c59fc294d3a6fe8d973ea687f92daf1a6988e13a26bcec20f34f44ab25

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Malware.Formbook-7102043-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Registry Key Name
11
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE2 8
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX 8
<HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX\20.0.1 (EN-US)\MAIN 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000001 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000002 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000003 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\0A0D020000000000C000000000000046 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\13DBB0C8AA05101A9BB000AA002FC45A 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\33FD244257221B4AA4A1D9E6CACF8474 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\3517490D76624C419A828607E2A54604 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\4C8F4917D8AB2943A2B2D4227B0585BF 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\5309EDC19DC6C14CBAD5BA06BDBDABD9 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\82FA2A40D311B5469A626349C16CE09B 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\8503020000000000C000000000000046 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9207F3E0A3B11019908B08002B2A56C2 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9E71065376EE7F459F30EA2534981B83 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\A88F7DCF2E30234E8288283D75A65EFB 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\C02EBC5353D9CD11975200AA004AE40E 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\D33FC3B19A738142B2FC0C56BD56AD8C 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DDB0922FC50B8D42BE5A821EDE840761 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DF18513432D1694F96E6423201804111 8
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\ECD15244C3E90A4FBD0588A41AB27C55 8
MutexesOccurrences
8-3503835SZBFHHZ11
551NC37UWE1041Fz11
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
213[.]171[.]195[.]1052
213[.]186[.]33[.]51
74[.]220[.]215[.]741
154[.]91[.]238[.]821
208[.]91[.]197[.]391
47[.]91[.]169[.]151
103[.]251[.]238[.]1111
185[.]218[.]125[.]671
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]aamyz87[.]info3
www[.]ingenuity[.]degree2
www[.]activeliberal[.]win2
www[.]beautagram[.]com2
gmpg[.]org1
www[.]cyqunli[.]com1
WWW[.]SOJAH[.]STORE1
www[.]qhdljj[.]com1
www[.]tzhmc[.]net1
www[.]yourbostonrefinance[.]com1
www[.]immersive-journey[.]com1
www[.]studiodennis[.]com1
www[.]wanggh[.]com1
www[.]americatourbus[.]info1
www[.]kalayab[.]download1
www[.]shaoerjia[.]com1
www[.]maybrooktaxiandlimo[.]info1
www[.]tipshots[.]com1
Files and or directories createdOccurrences
%TEMP%\subfolder11
%TEMP%\subfolder\filename.exe11
%TEMP%\subfolder\filename.vbs11
%APPDATA%\551NC37U8
%APPDATA%\551NC37U\551log.ini8
%APPDATA%\551NC37U\551logrc.ini8
%APPDATA%\551NC37U\551logri.ini8
%APPDATA%\551NC37U\551logrv.ini8
%APPDATA%\551NC37U\551logim.jpeg7
%ProgramFiles(x86)%\Amb80q1
%ProgramFiles(x86)%\Amb80q\serviceslds.exe1
%TEMP%\Amb80q1
%TEMP%\Amb80q\serviceslds.exe1

File Hashes

0d9c018014931c251ac8bf951a99fcb974673e895f27e62fa6ead981b2d7b4a2 152f38878f5a8b19fef76f086f60f9a350bacfb55ced80cdbceb200b88e9c9fa 2908ff55a23aa61c2393df98cd6847f60343f296aeeb7bcc60c510701dcbf84f 2b6f4aad989ddca53c3cb56bbddb52e8577cbb40939f97ef9c7efb60d24a39ae 2c82db5284c54272e4ba7ac3523ffccf496d1584fd99444c0eaa225773e29721 6fc83ce9acf100506d039461642290e798f46baaf8034b5f2ead098edc3d9f4c 78663a1055ddd96e74b633b43128c83378787b52f031194ebaeccf69a0222645 c1b420d09459d96aa0bbc12a6b010a6d12b5910ffbd0289fa7a3ed3aebfac40d d27385d640966750e4ead578539a36a62ba0ae5c9083f03865927ef5deac2d8f d7bb858da997925668b1f85b83ba9f01b381a16de1ee6c37d003658cb98c4990 e4baf530d129b0a3a87e5de09ce86efc7c6c532ec91ade78c934d5e8d818938e

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Malware.Tofsee-7101989-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 15
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
15
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
15
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
15
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
12
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config4
4
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\wpdjiqwl
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\xqekjrxm
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\unbhgouj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\ibpvucix
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\athnmuap
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\tmagfnti
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\piwcbjpe
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\mftzygmb
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25015
69[.]55[.]5[.]25015
46[.]4[.]52[.]10915
176[.]111[.]49[.]4315
85[.]25[.]119[.]2515
144[.]76[.]199[.]215
144[.]76[.]199[.]4315
43[.]231[.]4[.]715
192[.]0[.]47[.]5915
74[.]125[.]192[.]2615
168[.]95[.]5[.]11715
98[.]137[.]159[.]2515
188[.]125[.]73[.]8714
172[.]217[.]12[.]22814
213[.]205[.]33[.]6214
212[.]82[.]101[.]4613
67[.]195[.]228[.]10613
168[.]95[.]6[.]5913
74[.]6[.]137[.]6513
96[.]114[.]157[.]8013
213[.]209[.]1[.]12912
66[.]218[.]85[.]13912
213[.]205[.]33[.]6112
67[.]195[.]228[.]11012
209[.]85[.]202[.]2612
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa15
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org15
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org15
mta5[.]am0[.]yahoodns[.]net15
mx-eu[.]mail[.]am0[.]yahoodns[.]net15
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net15
whois[.]iana[.]org15
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net15
whois[.]arin[.]net15
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org15
hotmail-com[.]olc[.]protection[.]outlook[.]com15
microsoft-com[.]mail[.]protection[.]outlook[.]com15
honeypus[.]rusladies[.]cn15
marina99[.]ruladies[.]cn15
eur[.]olc[.]protection[.]outlook[.]com14
mx-aol[.]mail[.]gm0[.]yahoodns[.]net13
aol[.]com13
msx-smtp-mx1[.]hinet[.]net13
ipinfo[.]io12
smtp-in[.]libero[.]it12
libero[.]it12
tiscali[.]it12
etb-1[.]mail[.]tiscali[.]it12
tiscalinet[.]it12
mx3[.]qq[.]com12
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile15
%SystemRoot%\SysWOW64\config\systemprofile:.repos15
%TEMP%\<random, matching '[a-z]{8}'>.exe15
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>15
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)14
%TEMP%\ondzgch.exe1
%TEMP%\rqgcjfk.exe1
%TEMP%\baqmtpu.exe1
%TEMP%\qpfbiej.exe1

File Hashes

03014df764784dff0d3c56cccdbfb07ca0c04cdbd302403ebedc466e83e18f6c 0c30a1e0c3e91cbaf62beb5e217b44f5065f7e97c19d0eb181e0d37720be178d 213b7ea1e4fee2c08e48c1536b099ab55b0ace638710a8c1920a834ac80648b5 23dc9f05f6003f3730b5731072eb9754fbf80a353cdbe94704a5e425a18aa0e5 31702562438866f49dddb8c0fc8e6d9b68ec2eb73b142c899479102850de0fdd 398288b17c7ffc8b569ac4c8623cb4e1dc4c97da2a021bfd86182fd23e92735c 5a3fe5af1026e7f6217e91cc4b6d1c888efde908369b1b8a216c6e954c648d3d 5d9dc6e667bd105d7e2e77162e87e94b0c5a72be94c1ae726e45ccf4d23753bb 7c73e7cfd0be419b1538309b2a5fb45a2515808fe92492db79e0cbbdce976643 8895dda1641282ea209e8482269cb7c34f2da9843c9d0293fc3d6aec2612e212 8ef82ce7ed1ed7c6ddd446b4a8a7144acac21aab0af0ee82ac764b525ea00b07 b9c035fd6f4d2a6b8d619812b98764885927b80f3a8369e87495f95b2bcbf44d d2f043f4002cdcbd88319a360dc11a0aec1ebae63f37ef9a845beb23779a1151 e42a5b04986cbdc9c13fcb99b2e1e0a2d156e6faaf1369ed71a92220a1347f06 e4c584dd32770439810067fe8607f74a64380fe354725ff4a5d42215b873b1e1

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella



Win.Malware.Chthonic-7101817-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: ShowSuperHidden
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: TaskbarNoNotification
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: TaskbarNoNotification
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: HideSCAHealth
24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: HideSCAHealth
24
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: 2827271685
24
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
20[.]45[.]1[.]10721
40[.]91[.]124[.]11121
192[.]42[.]119[.]4118
40[.]67[.]189[.]1415
20[.]41[.]46[.]1458
192[.]42[.]116[.]416
40[.]90[.]247[.]2102
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
dnshkjashsdk3d111[.]ru24
www[.]update[.]microsoft[.]com[.]nsatc[.]net21
Files and or directories createdOccurrences
\TEMP\005F5E~1.EXE1
\TEMP\1B106F~1.EXE1
\TEMP\0956E4~1.EXE1
\TEMP\382BAE~1.EXE1
\TEMP\00BA93~1.EXE1
\TEMP\12CC7F~1.EXE1

File Hashes

005f5e12924dad7fe014a84db45f13429f6ece0b8247f5d352d715b2846c0c4f 00ba939c36fa3b49267f278dc9bb198bc9ae990ce888720048bea52a40cf1c23 0956e4f5453664330032f4d772aba4fc67c67543ca6b5b5970277d3509c0b947 12cc7fd46b6a47ac1c87526633c7a608d31275b31c885f8f47bb994d8ae19e90 17e720effe9bb9123f12df8149180130f8239870cf0d9267f67cf476b6ab44e5 1b106ffffabfe8c46bca9ad44e1fd47a2150a99a701452d4a6d2e51fb968a1af 382baee7e059546686749c2e25e7077db13f724e67629aa253033b53c4aff934 38fa5765572ad2cd028f6aa284d0b780b881d390dd5a8ae32c06d39e7442c026 42c5dd7eebdd5bd210832a6588259e33e737208817c4c1817615b3995c3ac378 4471cabd599d69896184f4e9264f377961488fb4c6cdf41992e0f5b2096c9899 46901064a8beca5f66dd0e9072feab0abb6ec3223b54f6bad81959a306915b47 62828391fca3a6d82749ca15cd2eb5d28153001457df7f1806377235a95603f5 63641d47b507920bd79600352d71655abed663ebe9347ccc5f7841b9dcb95d1b 73b71b837f43a97bfab5c6f541d54b7b090fef3893a0e78b769140a946ba162a 75da2447c69b6b0d78ace3c73e9302688b46cf1bdddac5c61d0c7c8403d39036 7a38d305151c979898e46d7d52dcb8bd4dc67485415a7d122c81facd320bcba8 8be6459aa2282ae9cf52ec766d7c8c55721988ba866339e358d15ae47fbae61f 8c1ab54da3a2372a624d22d902278e048942e9a495b71d330f1eee4073b14eb7 8c495bba75c5ab08e66063bd323525502188899663ad8ac5183baa2a42583bb8 8e3fd8961f232fdbf26019c56901c76db886ed56f86fba8c2f3f0631d33f969e a7316bed0f3820f1ca51eb4c687c763d059d086b610a4250a4051d795b47fd44 acc883924cc2e4b6f5f979a2586e2246a9837faa07702c6a18f90a086d681796 aebb9e807054a61b9125efa05507a9e2cdc6812bd286c007367713d1f377b514 b01cefc142aee229491e1b19a32888b921f1935c4d472807b7d115dc568356e4 b50a5542b24d20aa60a3614699c36f4f75062c7492955b9785fad0df4d0c1525
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Win.Malware.Remcos-7101023-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\REMCOS-LOPOXR 25
<HKCU>\SOFTWARE\REMCOS-LOPOXR
Value Name: exepath
25
<HKCU>\SOFTWARE\REMCOS-LOPOXR
Value Name: lic
25
MutexesOccurrences
Remcos_Mutex_Inj25
Remcos-LOPOXR25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
95[.]140[.]125[.]5825
Files and or directories createdOccurrences
%SystemRoot%\Tasks\Stencilens0.job25
%APPDATA%\antepenuit.pif25
%System32%\Tasks\Stencilens025

File Hashes

081f8d61a3cd912e00e9f53f6a8a3923164cb86205cdaab63abd9b2814ed9777 0a7cfd1b34af81f40d8f05f85bcfa9139bf9ec2eff82fcda1fba409b5a7650f2 0bed354bdcb152cbd012fe1c37d53c8c02da11c11084e8eb83bf577bdd80a464 0d0a83234404e0c08958aafcb6910f6cdfd7dc75d9713bf654c89b99fc341bdc 0d271c5c9ca84e2ab86f6c95d32802e7ec64b846d07b7bf81d0f82409b1b2101 1092677328703cc000e9c63be2b0a2f46103c14f053e9ee079ffd7f0ca2d6f8f 1831367e74cc96e0f72ec11f054525e6c024215bde7b61f110f9b73338ce03cf 1a801a28dfffaea7742f1d467a2c80bb8632b39db214d22abc804f0bc6515cc6 2027c7d8d4403334509ae483d7e0c8be28640a39d4bd9441f87cdc259b92ca4c 2e16d6892291790348a9ebe49ca192925a8db1a7a286c0fbb44c30ba1dff74e2 354c76d9316c5ba1edd6b052f361ec42e925b878915879c1ca903f81b05bfd7b 36c6f434e27087f707a813495e82bdbeac383507ce5a2ca3816e4557a4cddb5e 376746cbbf27f98f9f07676bdb6a5e556fee27b1ae1c388416f17d5e4bc4c62f 392474631d8c58ec089b896569d6e362484865b479c85e2c0906b87349bce68f 3adb3198ca6ac80a842b6aba596fef43eda6aca0f32dbdf59d60133eabde541d 40b75ec8743801bfcbac60c8f0b232971aa61bfb031fe829132a8537c63b9a41 40cf7790bd379a14cecc933b48e6f341164ad872d5ee61136b91092cbfe14aba 49c149ba04e9af98c5da19d305556af3d7cdacf6e2044abfef604b0e5bb38d29 54a0550408c68795a9652e18a4e3820cca6c16246c2e8198497e795dba448644 585061420029af8f635eefe1834874a422d140b8adfbc77d0e789ea9d4ade500 5914996ccdfda579afbd3116cae43d5bd35db5eee27545a60ddef3270af351f1 5a756ce1c997dd1615ea2fc97e5dd3cfcbc29a5f848e5ea6ede37e3d526d4ce3 5e7c49bef106709d6cfc9d85b8d82dc0583f42c1701cb7990e700914db842186 5f9034f63a3cf362b1d2f7baf35a7fadceccd2add363bf7ef3cae4e95a6afb86 5faf5309caaeb3ed3d1b4825b55646c83d769d22c226420bb6418e037cd2f029
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Exploit Prevention
Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (2337)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Madshi injection detected - (1399)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Trickbot malware detected - (1212)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Excessively long PowerShell command detected - (1002)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Kovter injection detected - (466)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (297)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Gamarue malware detected - (152)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Dealply adware detected - (118)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Possible fileless malware download - (95)
A site commonly used by fileless malware to download additional data has been detected. Several different families of malware have been observed using these sites to download additional stages to inject into other processes.
IcedID malware detected - (52)
IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.

Microsoft Patch Tuesday — Aug. 2019: Vulnerability disclosures and Snort coverage

$
0
0

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 97 vulnerabilities, 31 of which are rated “critical," 65 that are considered "important" and one "moderate."

This month’s security update covers security issues in a variety of Microsoft services and software, including certain graphics components, Outlook and the Chakra Scripting Engine. For more on our coverage of these bugs, check out our Snort advisories here, covering all of the new rules we have for this release.

Critical vulnerabilities

Microsoft disclosed 31 critical vulnerabilities this month, three of which we will highlight below.

CVE-2019-1181 and CVE-2019-1182 are both remote code execution vulnerabilities in Remote Desktop Protocol. The vulnerabilities arise when an attacker connects to the target system using RDP and sends certain specially crafted requests. These bugs require no user interaction and do not require any authentication on the part of the attacker. An attacker could gain the ability to execute arbitrary code by exploiting these vulnerabilities. RDP has gained notoriety recently for being a part of the infamous BlueKeep vulnerability, a wormable bug in Microsoft that has yet to be exploited in the wild.

CVE-2019-1200 is a remote code execution vulnerability in Microsoft Outlook that occurs when the software fails to properly handle objects in memory. An attacker could use a specially crafted file to exploit this bug and be able to perform actions at the same security level as the current user. A user can exploit this vulnerability by tricking the user into opening a specially crafted file with a vulnerable version of Microsoft Outlook. However, this attack vector only works if the user opens the email itself — it does not work in preview mode.

The other critical vulnerabilities are:


                Important vulnerabilities

                This release also contains 65 important vulnerabilities, one of which we will highlight below.

                CVE-2019-9506 is a vulnerability in Bluetooth that could allow an attacker to change the size of a device's encryption key. While it is not directly a Microsoft vulnerability, the company has released a fix for it. An attacker could use a special device to change the encryption key size of a Bluetooth-enabled device to become as small as one. This method only works if the attacker is within an appropriate range fo the targeted device. Microsoft released a software update that enforces a 7-octet minimum key length by default to ensure that a smaller encryption key does not allow an attacker to bypass encryption.

                The other important vulnerabilities are:


                Moderate vulnerability

                There is one moderate vulnerability, CVE-2019-1185, an elevation of privilege vulnerability in Windows Subsystem for Linux.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                Talos Black Hat 2019 flash talk roundup

                $
                0
                0

                Talos went wall-to-wall at Hacker Summer Camp, showing up to Black Hat and DEFCON with talks, challenges, advice and education.

                Over the course of two days at Black Hat, Cisco Security hosted more than 20 talks at our booth, many featuring Talos researchers and analysts.

                In case you couldn't swing by the booth, we've got a quick recap of eight of those "flash talks" to give you a quick rundown of what our researchers wanted to get across. Click on each of these videos to hear each speaker give a quick recap, and stay tuned for a future Beers with Talos episode to hear all of them together.

                Nick Biasini

                Andrew Blunck


                Azim Khodjibaev

                Matt Valites


                David Liebenberg


                Josh Williams


                Jamie Filson


                Earl Carter 

                Threat Source newsletter (Aug. 15)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                Sorry we missed you last week, we were all away at Hacker Summer Camp. If you missed us at Black Hat, we have a roundup up on the blog of some of the “flash talks” from our researchers and analysts.

                Patch Tuesday was also this week, and we’ve got you covered with Snort rules and coverage of some of the most critical bugs. 

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                Location: Metro Toronto Convention Center, Toronto, Canada
                Date: Oct. 7 - 10
                Speaker: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Cyber Security Week in Review

                • The United Nations says it is investigating 35 different North Korean state-sponsored cyber attacks in 17 countries. A new report states the attacks hoped to raise money to fund the country’s atomic weapons program. 
                • Police in South Wales, U.K. are starting to use facial recognition apps to identify suspects without having to take them to a station. The department plans to start testing the app over the next few months on 50 different officers’ phones, but privacy groups are already pushing back. 
                • A sponsored presentation at Black Hat regarding the “Time AI” program was taken down after researchers attacked the talk online and in person. At least one attendee interrupted the talk and accused the speaker of misleading people by pitching this new form of encryption. 
                • Adobe disclosed dozens of vulnerabilities as part of its monthly security update this week, including 76 bugs in Acrobat and Reader. There were also 22 critical vulnerabilities patched in Photoshop. 
                • Google says it is working on replacing passwords for Google services for 1.7 billion Android users. Engineers at the company say the goal is to allow Android users to log into Google sites and services using their fingerprint or other methods because “new security technologies are surpassing passwords in terms of both strength and convenience." 
                • Facebook disclosed that they previously allowed contractors to listen in on and transcribe users’ conversations. The social media site says it recently discontinued the practice, but the Irish Data Protection Commission is still looking into the practice for possible GDPR violations. 
                • A bug in the Steam video game store could open Windows’ users to attacks, but the company says it is not within its scope to fix. 
                • The FBI released a report warning Americans of a recent uptick in dating scams. The agency says malicious actors are using data apps to convince victims to open up new bank accounts to send them money under the guise of a fake user. 
                • Security researchers at the DEFCON conference discovered a critical vulnerability in the F-15, a popular fighter jet used by the U.S. military. If exploited, the bug could shut down a portion of the plane’s cameras and sensors, preventing the transmission of data during missions. 

                Notable recent security issues

                Title: 31 critical vulnerabilities addressed in latest Microsoft security update
                Description: Microsoft released its monthly security update Tuesday, disclosing more than 90 vulnerabilities in several of its products. The latest Patch Tuesday covers 97 vulnerabilities, 31 of which are rated “critical," 65 that are considered "important" and one "moderate." This month’s security update covers security issues in a variety of Microsoft services and software, including certain graphics components, Outlook and the Chakra Scripting Engine.
                Snort SIDs: 35190, 35191, 40851, 40852, 45142, 45143, 50936 - 50939, 50969 - 50974, 50987, 50988, 50940, 50941, 50998, 50999, 51001 - 51006 (Written by Cisco Talos analysts)

                Title: Cisco releases security patches for multiple products, including high-severity bugs in WebEx Teams
                Description: Cisco released security updates to address vulnerabilities in multiple Cisco products. An attacker could exploit the more critical bugs to take control of an affected system. Some of the most severe vulnerabilities exist in Cisco WebEx Network Recording for Microsoft Windows and Cisco Webex Player for Windows. These bugs, identified across five different CVEs, could allow a remote attacker to execute arbitrary code on an affected system.
                Snort SIDs: 50902, 50904 - 50907 (Written by Amit Raut) 

                Most prevalent malware files this week

                SHA 256: b22eaa5c51f0128d5e63a67ddf44285010c05717e421142a3e59bba82ba1325a  
                MD5: 125ef5dc3115bda09d2cef1c50869205 
                Typical Filename: helpermcp 
                Claimed Product: N/A 
                Detection Name: PUA.Osx.Trojan.Amcleaner::sbmt.talos  

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
                MD5: 47b97de62ae8b2b927542aa5d7f3c858 
                Typical Filename: qmreportupload.exe 
                Claimed Product: qmreportupload 
                Detection Name: Win.Trojan.Generic::in10.talos  

                SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6 
                MD5: f7145b132e23e3a55d2269a008395034  
                Typical Filename: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6.bin 
                Claimed Product: N/A 
                Detection Name: Unix.Exploit.Lotoor::other.talos 

                SHA 256: 39a875089acaa37c76dd333c46c0072c6db0586c03135153fe6c15ac453ab750  
                MD5: df61f138409416736d9b6f4ec72ac0af 
                Typical Filename: cslast.gif  
                Claimed Product: N/A  
                Detection Name: W32.39A875089A-100.SBX.TG 
                  
                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb 
                Typical Filename: xme64-2141.exe 
                Claimed Product: N/A 
                Detection Name: W32.7ACF71AFA8-95.SBX.TG 

                Threat Roundup for August 9 to August 16

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 9 and Aug. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Win.Packed.njRAT-7122661-1 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
                Win.Malware.HawkEye-7122916-2 Malware HawkEye is an information stealing malware that specifically targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media.
                Win.Malware.Cybergate-7114776-1 Malware Cybergate, also known as Rebhip, is a Remote Access Trojan that allows attackers to fully control the target system. Functionality includes command shell interaction, screenshot capturing, audio/video capturing, keylogging, as well as uploading/downloading files from the target system.
                Win.Malware.Nymaim-7112030-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Malware.Tofsee-7112026-1 Malware Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                Win.Malware.Trickbot-7112005-1 Malware Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Malware.Gh0stRAT-7109635-2 Malware Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
                Win.Packed.Zeroaccess-7109532-0 Packed ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
                Win.Trojan.Shiz-7108197-0 Trojan Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.

                Threat Breakdown

                Win.Packed.njRAT-7122661-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: di
                18
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                18
                <HKCU>\SOFTWARE\91DFFF70961506A1564FE50B6195DEAD 18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 91dfff70961506a1564fe50b6195dead
                18
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 91dfff70961506a1564fe50b6195dead
                18
                <HKCU>\SOFTWARE\91DFFF70961506A1564FE50B6195DEAD
                Value Name: [kl]
                18
                MutexesOccurrences
                91dfff70961506a1564fe50b6195dead18
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                187[.]4[.]28[.]10015
                189[.]10[.]170[.]1953
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                aab58[.]ddns[.]net18
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91dfff70961506a1564fe50b6195dead.exe18
                %TEMP%\iexpress32.exe18

                File Hashes

                082411fe51dee3bbd6a97833be2f4dcaed2baac2497719384d583ecf10543032 187d82724fbe8fc09023fe8a5bb734acb8eda95cff5e7f80b2481161224539c0 4577dfba3c8f21b0d617fcf22c23e26cc09e7bdbe9b33da561632f8fb94e3e2b 4aa27fd43e7d7bc052b82dcf0b5354c4df80e53cc5a57a73a6ae54665e96f688 4ff742c0e90c295e97e2db692f30435d987ad34deaeafec1ea0772d958c1bb02 5986cbe8265a3a289e5854c5996adce4e415b966d2967b77056fb5f64a2d37ef 606ffb24b488b0d9fb5646779f2806795f836ad1af7565bf8fcc0147318e17a5 60dbc16e6c6f7b338374f48dfa19fb0946275982b021d25370cad3bbc27e303b 95ba99bc91142b433da3a42eaaeefb1ce2a7abe93f2d8816b931eaccff600192 9b7a41fc9ccb0392a9d609fcb583e3b966ed713732342822898ac6d560d569b1 9ec10adc83de49e13e491384047b11e40f2b7567991a11ab03a9703899ab55f0 b168b7b5acf2cb602aacb9c737a9a6e252461e7a4f2a4c0c1eab2fdbd36fdd7a c2d48bfb920ccc59958d456262b6313d6c1246790e1ad0270ea775665e411dac e81f03b9fcfb674248f670d60be4918781bc0c6d6b343f890c2c2fcab15d7ea0 eac06f1399c63d11fb621d348a2a8fb6256262639d239b142092fde76a684eff f0eb05bd16881de42de9a63d54164a9bc68f6f6ea1dcbf5a14a1325c018a4584 f446642655c929d6b069a874364d6da67a6d07f4a2a5f78a77087fb2f1f243aa fe84c213aa4643ba68eeca9e6af567aa809a6c0a3d2b0f9f5fa13aba4033a5de

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.HawkEye-7122916-2

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Update
                3
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: Registry Key Name
                1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                104[.]16[.]155[.]367
                104[.]16[.]154[.]364
                93[.]158[.]134[.]382
                87[.]250[.]250[.]381
                136[.]143[.]191[.]1891
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                whatismyipaddress[.]com11
                smtp[.]yandex[.]com3
                smtp[.]zoho[.]com1
                Files and or directories createdOccurrences
                %TEMP%\holdermail.txt11
                %APPDATA%\pid.txt11
                %APPDATA%\pidloc.txt11
                %TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp11
                \Sys.exe9
                \autorun.inf9
                E:\autorun.inf9
                E:\Sys.exe9
                %TEMP%\holderwb.txt8
                %TEMP%\SysInfo.txt8
                %APPDATA%\Windows Update.exe8
                %APPDATA%\WindowsUpdate.exe3
                %TEMP%\subfolder1
                %TEMP%\subfolder\filename.exe1
                %TEMP%\subfolder\filename.vbs1

                File Hashes

                0360cd478f78ed02dc9cebf82d31721fbc6915b0201900cd922e59ccc32f6038 04e3d5854d00d835e206b0982889a079e3710296d33ed1ebdaf349b4bbcf790a 1c38e7e3f9a7277e60399523a664c73ad1e950de5ab59981f6ce77c908403448 49d6cfdd06d8d9a234f5e59849b47199e52a0355479563c76896edd91ca7c04e 621448e4a383b6bcba18f2b522331c6f79764db97a73d596d92308f36a2b5add 7da2b98047bf4812b37f670b7a75b1b0ccd414802a3c59e564fe0437d23964da 939b12fcce7c902fff5730a6cde141311baf0a322e9334cf1dd13230c68e7794 b23e50aa8217e033f01bfe6c52e651a3d169a202e6949a4d0d7c5a4ad145a857 d187fe363c737c1c3babe56649a39a1dc1d0da4cc7aef65e4782ba0c801e5079 d5a45f2dac9346b72a23fe10c07dc4ce234e7e577fd6c2e471464276651df1f9 e584d0e379aa3fcb0c7f9de3106ae4234d88ceca407a9645a4edcf57b9202cce

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Cybergate-7114776-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 13
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: MSQM
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: MSQM
                12
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Realtek Audio
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Adobe Starter
                12
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0H0N0B4G-P8H0-63SU-QBB1-QXKN5M1261DQ} 2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0H0N0B4G-P8H0-63SU-QBB1-QXKN5M1261DQ}
                Value Name: StubPath
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1C7T55HW-D326-IWQK-6087-652774G5V2RN} 2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1C7T55HW-D326-IWQK-6087-652774G5V2RN}
                Value Name: StubPath
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0KWTNM33-D745-1P14-D1BA-224TD37L2DP8} 1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{86TIP765-B0E5-AB86-L87O-3R28QFSJGN0J} 1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: Policies
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: Policies
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Audio
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Audio
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0KWTNM33-D745-1P14-D1BA-224TD37L2DP8}
                Value Name: StubPath
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{86TIP765-B0E5-AB86-L87O-3R28QFSJGN0J}
                Value Name: StubPath
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6W6SH85E-GESR-7C8G-187D-4M6664523332} 1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6W6SH85E-GESR-7C8G-187D-4M6664523332}
                Value Name: StubPath
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{G718OU16-FJJG-TVIB-LQ35-WINSRC80H3GD} 1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{G718OU16-FJJG-TVIB-LQ35-WINSRC80H3GD}
                Value Name: StubPath
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{41LU5C5I-NQ05-2KS6-7E2G-P3AD1GREFY8T} 1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{41LU5C5I-NQ05-2KS6-7E2G-P3AD1GREFY8T}
                Value Name: StubPath
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{216555Q4-64KR-BMG3-55K7-2354V88S0LSE} 1
                MutexesOccurrences
                _x_X_BLOCKMOUSE_X_x_13
                _x_X_PASSWORDLIST_X_x_13
                _x_X_UPDATE_X_x_13
                Pluguin12
                Pluguin_PERSIST12
                Pluguin_SAIR12
                ***MUTEX***1
                ***MUTEX***_PERSIST1
                ***MUTEX***_SAIR1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                187[.]58[.]232[.]1812
                52[.]8[.]126[.]801
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                rainoide[.]no-ip[.]org12
                www[.]server[.]com1
                Files and or directories createdOccurrences
                %TEMP%\XX--XX--XX.txt13
                %TEMP%\UuU.uUu13
                %TEMP%\XxX.xXx13
                %APPDATA%\logs.dat13
                %SystemRoot%\SysWOW64\Microsoft13
                %SystemRoot%\SysWOW64\Microsoft\svchost.exe12
                %SystemRoot%\SysWOW64\Microsoft\svchost1

                File Hashes

                19f9ab1a6f01c5bb060fd865f165d48789f6b6c561960071823b6fcfbddc733b 40fc7ace7357cb61cb7ad47e655d7d33c0952cbea1fae151f969eca85deea68d 6b185c176128cf98a5241c3d10d0486cb3b4c3a8877d7831beed7088b688ee93 889728767005bed83d50f8ac92d4f8685be74f71155537c011dbdfb5da861b26 949809f505011d5b9aacc19fde3bead211004bce92921a460afe8e8f57b92923 ad8f56bddd8a0cae565c243ff0e4422781f78cc3033763d2a9100e32c2ffe98c b3b914069bb60dab4a0679f912c43f77a3c4bf71804fcbd5085646336dc41908 b3ded4b6a12a5a232816b33546167fa3e90eb78ac2876d1c6b4adaad4b75abc1 c5d0479add616c17dfdef957dc106522ff40bebd08ab070b0941474715a29dfb c7f2645df614351360457a892f9849df80155330e10449d4448d357c3d717ceb dc416c86df2bad0adde036bda83db1fbcac13036a2ea7f73453597e7a3d5788c ee13ecb06987aeef5bef6de64e0e5439b44f07f9f0783d8cdb6ace3fa950a6a1 f2a2dc50a052bc4a25cc8fcdd235d89286fec24beede6f6cb78b7641162bec0e

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Nymaim-7112030-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                25
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}25
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}25
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}25
                Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}25
                Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}25
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                grkokxuhgk[.]net24
                utjawtkqtw[.]com24
                glgythylattw[.]in24
                xdqhf[.]com24
                kcrrrqnoan[.]com24
                bweyobzofdy[.]com24
                xukgvscceju[.]in24
                luewnrtwhigf[.]in24
                zwhgvnfdb[.]com24
                bxsfawcpsgwl[.]com24
                hwhskkbdlc[.]in24
                uxwauildd[.]pw24
                cogkyi[.]com24
                tqsxnfi[.]net24
                jvelkgcftqy[.]pw24
                uihmdwnvp[.]com1
                wnucbhflcr[.]in1
                bpgfuc[.]in1
                zrhqhmghjx[.]com1
                sdwnmtsxtjcf[.]pw1
                rfvztqxsfiz[.]net1
                cofuvrdr[.]in1
                kdhlszxotsd[.]in1
                arnkxqhjjs[.]in1
                fanshg[.]in1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %ProgramData%\ph25
                %ProgramData%\ph\fktiipx.ftf25
                %TEMP%\gocf.ksv25
                %ProgramData%\<random, matching '[a-z0-9]{3,7}'>25
                %APPDATA%\<random, matching '[a-z0-9]{3,7}'>25
                %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>25
                %TEMP%\fro.dfx23
                \Documents and Settings\All Users\pxs\pil.ohu23
                %TEMP%\bpnb.skg4

                File Hashes

                01fbd952fe57f673aea818e12a0aa675c9e29e1ba0f85d28645a926f3df4f7f4 028423fc9b5fb8f3fc0f985e43b703ce05e69a3828f7152dda5d6e6bc3175da7 05263f754c5456ad772dd2448b85e9fefd1c4204f12391d8068bcba7cc388c53 0b51bc5550062212ed1ac0a7099235e2fd0296b93446106b0220fab519fd634e 143c9de178660a194d5e22ba45bd7d1d56d3f286eb16ff9a1206cbbecaf811a1 2dbd752e0cb2b3b1d20fa8e714281b8856fc121b4a2670937f7956f90dfe9ecd 3180f041ff1ccd52f829f222e5d124935a11bc3aa9fc908e3ce93f84e1ec49dc 3f88dae29802bbbd85c175ce34b40b4bf34f884768b6669a91981f374bd1cd1f 441649516eb75a61f2ca4d0570dd2e201c6528b452ce7bc04c5120a5b36ee090 485e521ef0299ede43da514cdf8992bddc95529209889e562d0cab884bf71cdd 54875c46bc6795dd22af5760a5452f3814a5b6827ed996d6a475ec95b9107626 645c58460c7d1b0ef4769d505492eb5a9bba5efadf9f6a456313df72bf706eda 6802f2b005b9e02f395117ce2f753d98d239d9271825871105cca11f86764ada 8519328e272602bc7117a7c9da2c00e40e8d45a97528ed3fa7c86f2fdeb9b679 862346823cef73fdd9a155b84edb2feb180a61390a3817ef97fa272cb01d7994 95556cf5e5a160d2940014413d4948bc4877a127ce142bf27a7295ca212e48ae 991bd9883c36b2fdf326418d6ec660c6a5d57e88f2355a49a5c69b2490c848b3 9d30abaa088f71f0914d083a8c6232e37e1fb13bdb495c6d3b1485b50f764e42 b0eb5e5599605584271a1513740039d6cfc363d7203e8654d9ece9d7df1b06a2 bc11794224c3dba73fefc8be9bea7ddc8782db3e3173467a1726e02588e56019 c3120a24f20ecedf04b17c71bc7f1588d1daa776ea66b1b85f713ffe7136c944 c9017faf332ab5c93fadda86db30d7e6b6a67afd6aa0cf1334b1744e16497b69 d0f6e3867416053747e82117e4cf5b5dd1a0f573316ddf6d1716465726bbb215 e1797282c01e2bcf9e03707136cfc60bfdee5818cb1ec59984befd55de4c6719 eae1547bca1f3c4425f9ea295ee6cebef5a6815ed6348107cb23cccbfd8fb1e0
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Malware.Tofsee-7112026-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config3
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ErrorControl
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: DisplayName
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: WOW64
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ObjectName
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Description
                16
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES 16
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config0
                16
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config1
                16
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config2
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ImagePath
                10
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\ibpvucix
                3
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\tmagfnti
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\vocihpvk
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\fymsrzfu
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\qjxdckqf
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\haoutbhw
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\piwcbjpe
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\slzfemsh
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\yrflksyn
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\cvjpowcr
                1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                239[.]255[.]255[.]25016
                69[.]55[.]5[.]25016
                172[.]217[.]11[.]3616
                46[.]4[.]52[.]10916
                176[.]111[.]49[.]4316
                85[.]25[.]119[.]2516
                144[.]76[.]199[.]216
                144[.]76[.]199[.]4316
                43[.]231[.]4[.]716
                192[.]0[.]47[.]5916
                74[.]6[.]137[.]6516
                172[.]217[.]7[.]13216
                98[.]137[.]159[.]2716
                95[.]181[.]178[.]1716
                168[.]95[.]5[.]11615
                74[.]125[.]141[.]2715
                74[.]125[.]193[.]2615
                67[.]195[.]228[.]10914
                212[.]82[.]101[.]4613
                168[.]95[.]5[.]21613
                67[.]195[.]228[.]11113
                67[.]195[.]230[.]3613
                69[.]31[.]136[.]512
                212[.]227[.]17[.]812
                213[.]209[.]1[.]12912
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]in-addr[.]arpa16
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org16
                250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org16
                mta5[.]am0[.]yahoodns[.]net16
                250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net16
                whois[.]iana[.]org16
                250[.]5[.]55[.]69[.]bl[.]spamcop[.]net16
                whois[.]arin[.]net16
                250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org16
                microsoft-com[.]mail[.]protection[.]outlook[.]com16
                honeypus[.]rusladies[.]cn16
                marina99[.]ruladies[.]cn16
                sexual-pattern3[.]com16
                coolsex-finders5[.]com16
                super-efectindating1[.]com16
                msx-smtp-mx1[.]hinet[.]net15
                hotmail-com[.]olc[.]protection[.]outlook[.]com14
                msx-smtp-mx2[.]hinet[.]net14
                mx-eu[.]mail[.]am0[.]yahoodns[.]net13
                mx-aol[.]mail[.]gm0[.]yahoodns[.]net13
                eur[.]olc[.]protection[.]outlook[.]com13
                web[.]de12
                etb-1[.]mail[.]tiscali[.]it12
                mx-ha02[.]web[.]de12
                msa[.]hinet[.]net12
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%16
                %SystemRoot%\SysWOW64\config\systemprofile16
                %SystemRoot%\SysWOW64\config\systemprofile:.repos16
                %TEMP%\<random, matching '[a-z]{8}'>.exe16
                %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>16
                %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)16
                %TEMP%\edtpwsx.exe1
                %TEMP%\ondzgch.exe1

                File Hashes

                1c331b81428107c325673ea4b19acdff598772d9e1069e09ca92cb88d223c326 1c916b795f49331678816ef6cfba0dbdbddd4b92a421e086ab2fe2ea095d10e9 398c23230679c69942c5d64c7aaf0e9e8ca3434d54559871f3a3a24fbd9ffa3c 4d660a6519c258074627f7d30a4878e15a4e621bd79f21a34f4550c54ef38c4e 5f4bd5a0728432e4731b9d2606bacb05d7c6f10ad926735f3e4d9dee10791f85 7d96ef5dfba65346fa3ffbcd23016f21e0a523e2215e963f21cc8c939c2e35a0 9bf983cc999b2a3bd029e21e445bca85853b58d66247c7221157fab41fbd19d8 9e5897942fac812b74be41b06b5e1cd1ff4e9fd9b71d10aadca3d5f368cda0d1 a8adbab4a72506f7343b7ff78a028fd26ec944a1d4de846ee0bf9651196d7724 a8f74812b66b89f9c0450b2f565d3ba2b417e7e10514618c3306de37749af886 ad34ec4764147faaee82935e142eedfe5569f88ef81195281539075a0f3c91ac b4f6aa14eb833c83413f72a4e901d0e92c7da45828c5438594693f68c2a3ebfe b75a2838b93b6ec47b27bd5c9798386775e9a3dfcac5c3562a7ff139eaa14ce3 be8a71e6dfa63485be4a848cf6d0bc1da15b20fb9735e0c0ed08e346840096e0 d62553c4ef53220d32af9e5eb1a0accca3ca6aac7e9f3539119fec0718edd65b f095b72dc6ba5c3c3f2e410d0f1766a8f6ebbecec1a4914b957f9a7225cc6c00

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Malware.Trickbot-7112005-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                3
                MutexesOccurrences
                Global\VLock25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                116[.]203[.]16[.]956
                216[.]239[.]34[.]215
                194[.]87[.]92[.]1844
                188[.]137[.]122[.]834
                185[.]158[.]115[.]754
                185[.]158[.]115[.]494
                216[.]239[.]32[.]213
                216[.]239[.]38[.]213
                216[.]239[.]36[.]213
                185[.]158[.]115[.]873
                188[.]137[.]122[.]683
                195[.]133[.]146[.]1563
                94[.]242[.]206[.]2043
                198[.]27[.]74[.]1462
                50[.]16[.]229[.]1402
                194[.]87[.]232[.]1462
                23[.]21[.]121[.]2191
                104[.]20[.]17[.]2421
                54[.]243[.]147[.]2261
                54[.]235[.]124[.]1121
                104[.]20[.]16[.]2421
                23[.]23[.]243[.]1541
                3[.]224[.]145[.]1451
                34[.]196[.]181[.]1581
                23[.]23[.]83[.]1531
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ipinfo[.]io6
                ip[.]anysrc[.]net6
                api[.]ipify[.]org5
                myexternalip[.]com3
                icanhazip[.]com2
                ipecho[.]net2
                checkip[.]amazonaws[.]com2
                wtfismyip[.]com2
                elb097307-934924932[.]us-east-1[.]elb[.]amazonaws[.]com2
                checkip[.]us-east-1[.]prod[.]check-ip[.]aws[.]a2z[.]com1
                Files and or directories createdOccurrences
                %APPDATA%\winapp\Modules25
                %System32%\Tasks\services update25
                %APPDATA%\winapp\client_id25
                %APPDATA%\winapp\group_tag25
                %APPDATA%\winapp25
                %APPDATA%\WINAPP\<original file name>.exe25
                %SystemRoot%\Tasks\services update.job23

                File Hashes

                00c98d727a85576416dba2a3a68010f986ae276935435e6d9eb02d33fb71b3a3 0143365726dffade4573b49e8c816d414c8ca96567a8163cbb714a4b9c18df2d 051eeb1a5f4ef84caff3c5a7abcebb1839569516480df43c929aba282eb8ecb2 0fff84cfd0c674f7d55a39cb6be3bb7fccb3549dbfd9bc8f8b4c8c6307cc5102 112a18bcbc8424b2bdb7ea574f5696288d28a28dda3f0aaa9894a84285c932aa 11513df12b19240af3485b6b0d0c871c305e2644e6503770baf8fb2949542462 19910cf1b0fb40f8143c459e93a6110393b502de81646ed7685c7a0766e4823d 2807fea0af4c94116f0677eb94d798b6f40c3a3cc50ed8d2d2184a061ce30904 292920637d78485e4053b4a056d569f2e17cb8ab531f3372d18402c35fd735bf 30938782dd1ae8ff1a35c17821860745f613a5267e18171e7336d1c6d5f5b6b1 30f321827bea98609847dc047de756f7b86074bb3f5c6e4c7875f25db5dcd627 362d936eebd48241b9e3b6ae0f8650365af42aa307320438ae170862750b2a08 3dd50fe971d7256311dab97ac7afeb0a6ec91de2feccb125eb09ac8a22947005 3e98c771dd86669152fb58cfc0ecd7d264426ebe125ee4d96893efad5af5d236 3ecf64c343752bfbed1a8984cfb207309133df964da0b2e086509e8aed167a66 541729295b97eaa2ec3a566c2095b5e4c03239d9b1235d4a2b6331f3dd986f75 639adafd87d067c1cc5c5d1be870f3800e719637dab20e435f379fc86b268d15 653fc5565b1e8746ddaa507722815fc225ce5c327fa69dbbdaf8924880197035 6809cf34ac7fa454a8d8c25482c7a9acb44be1222bc89f2d478a953d93f63f3d 74547a954562f29ea05230900daab9c043e088fd1a38cb2d077ba4624ef51523 7a7029415edf56936d5eaf003f413a0b778fbc279168cc7cc5e3166a14aaf69a 7be5520d05f7f6afc0dbdf945faa7c93dbc3d3394a6fc8fc30532a6d241f10a1 7bf167e2fd1ad3b45e42fcfce427c702cdb4df6e96602a183fee57d777140a18 854124fe1ae699a3dfd99b89a0b44101e74039ea8f06c781254f4aeca07b7013 8a58ff91b277c4b10565d90fa8e0d847759276fa77983762337dc6bf916aa78e
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Gh0stRAT-7109635-2

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX 26
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX
                Value Name: MarkTime
                26
                MutexesOccurrences
                193.112.13.217:7788:Stuvwx26
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                193[.]112[.]13[.]21726

                File Hashes

                0cc11eb852f66920b4a4a35dc34b4e05f3612640b1963bd0ef8088022e2451f7 103960c11c696e1ed51771fec28b70d5cd0c1feb071575e4122827ac7541092b 1156fabd2305bd3ce5b218a59c3f3cfd99671dc8323fda13c156aebf26ee3ed8 11978ef69a330b0d4cc544f48bafbca5125019fe147fcaf2db0bd72fe94c4b4a 164c0c94d252f388ab7825a8bd9abf8cacc45cbf34281edb72951982874591ab 1af0bbdad437c6f711447ccb84444b92df5ba237acc0b33f6eebe0d48fd2f5a2 1ef070ae000ecca44fd13b1c3b642a7a5ef8894becc9a228f2aba33c04f267d5 24436d1687d5a814d3552f9fe6aed8d3778a66888508d1685d7c8c39d4b3b5a5 249cea1515c2c625b5e117a9495cce088f64dfe39dfab2b9d47d9071e2516900 2512e7506467e005bda030357121e832ff0dddc6a670ae4c732bac8345a0e2cf 265c64b98cd0d8515c829654ea931d751e9526b61f45f1d4799c41578f94534c 26f34567a93de01d7e6853e9ae31eb0f1848dee525b0ee605e1c1884accc4982 274d09e6e43dc96ba17a782a30afd525c972f3ad50e73655d8cbfe94ea97b481 2add1b8118caae8e35384758ffabf7fb9cd5eed7e7ae6189572f92993176cf7c 2c771b1e0003485b554e8014b428c9d53ad93d457c04c96b9e514f0f33e2e6ba 2cdd4e59d78f0a3537c1e1c5a7b9fb4c369a20d79a057568a51a2cbebb2f8241 2dae697a1aa350218fb9c4c6ed9d28caa9eff1ad7bfbd0feb32dc523e5c7baf9 3073891867551a6f111eb2f8af3e02729bf97627da4d019fc289433de4cfc35b 30fe5c510a0dc5ad89fcd66491ff24f605a90a2c4a53c67a9969fe15a4a5d0a7 313e7c484e87f221fe3e7af0aab2e17eac7c5a1f1a6c6fcf96140f1a24ba95ba 3176a16b8d3fdcd6162a24ea2979f82d8d1ec4bb98e15c299affd56704bf30d6 32824a80e061fa64a2cc928d3fbde4f742dfb22b4bd9daa13c2e5ab80697c836 333afdc84193d7b7b0d4d1c1e94fcd38426660db5f0fe8fb6dff57d0436a72eb 34e270be03c14465005a11e6eeca6c6c6437f24d9d0a120387cdc759519ad751 352d10cb6917a8bd67bd4054b5307ee38caa2ca63be034edda31371954fccb70
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Packed.Zeroaccess-7109532-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: DeleteFlag
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: DeleteFlag
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
                Value Name: Start
                19
                <HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32
                Value Name: ThreadingModel
                19
                <HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32 19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                19
                <HKLM>\SOFTWARE\CLASSES\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\INPROCSERVER32 19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Type
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: ErrorControl
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Type
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: ErrorControl
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: Type
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: ErrorControl
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: DeleteFlag
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Type
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: ErrorControl
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Type
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: ErrorControl
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000010
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000009
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000008
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000007
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000006
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000005
                Value Name: PackedCatalogItem
                19
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000004
                Value Name: PackedCatalogItem
                19
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                222[.]254[.]253[.]25419
                83[.]133[.]123[.]2015
                88[.]254[.]253[.]25415
                92[.]254[.]253[.]25415
                117[.]254[.]253[.]25415
                115[.]254[.]253[.]25415
                87[.]254[.]253[.]25415
                134[.]254[.]253[.]25414
                119[.]254[.]253[.]25414
                184[.]254[.]253[.]25412
                180[.]254[.]253[.]25412
                182[.]254[.]253[.]25412
                190[.]254[.]253[.]25412
                206[.]254[.]253[.]25412
                166[.]254[.]253[.]25412
                197[.]254[.]253[.]25412
                135[.]254[.]253[.]25411
                178[.]148[.]144[.]159
                74[.]194[.]69[.]929
                68[.]173[.]181[.]1919
                188[.]67[.]123[.]1009
                78[.]221[.]193[.]658
                198[.]96[.]34[.]468
                68[.]64[.]113[.]1048
                24[.]35[.]22[.]128
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                j[.]maxmind[.]com15
                uikvdwhrextuxymklwbrodjzhj[.]com1
                xikzzyxnfkaepapadgned[.]com1
                Files and or directories createdOccurrences
                \systemroot\assembly\GAC_32\Desktop.ini19
                \systemroot\assembly\GAC_64\Desktop.ini19
                %System32%\LogFiles\Scm\e22a8667-f75b-4ba9-ba46-067ed4429de819
                %SystemRoot%\assembly\GAC_32\Desktop.ini19
                %SystemRoot%\assembly\GAC_64\Desktop.ini19
                \$Recycle.Bin\S-1-5-1819
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f19
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\@19
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\L19
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\U19
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\n19
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f19
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\@19
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\L19
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\U19
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\n19
                \RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\@17
                \RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\n17
                \RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\@17
                \RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\n17
                %SystemRoot%\assembly\GAC\Desktop.ini17
                4.@ (copy)1
                8.@ (copy)1
                80000000.@ (copy)1
                80000032.@ (copy)1
                *See JSON for more IOCs

                File Hashes

                64f81a35325dd38c136a632f0e23d167407a0c4963a70761d4ab5707775f0d23 67ebc3153ede004c1af8b82ecd6f4713573f4c29b4a84c0500d761f483ad9172 688db1253d2dcdaf11bb2e8f03790dea9b10625b14b20531f4ea108801066f62 78951871e9a63fa3907da13165bab1119addd1ce8a3b376afae47b532e5d3653 7d8a67472d130e64d41205a7c1e5263b4fe6a4c6dc2b413618fd9e38ce47f536 8eea2b29e69058398957d5972b62b47947d090c2610bcd45ee593fa92bf25004 91fff0045ed0ac9433217ee7dd1f5ede0554588995892e026044d8d9f9371e1a 9a254fc4e4ca669bab5ad0a830ab43a9ebee6b835fdf794f76a8575d2ca8d548 9db192e4eced11fc3f84d6d8f6302e0230798993bc2b9efca6170428fba13906 a1335dcc4001df7691151413c8c1280dcda1a28a5bd21e82673de4d7560116b7 a2f377e3ff205bc71b5c2a88957578d2a6fb9d390d7ba19fa5117fb0f17736b3 c11c70ca57c92e7224b2c011bb8559d5214ff644fec730a52e02eee172a8a043 c443515f2c11f9cce0be0bd88532bd2b0885d2836bb0b5abb4c2e9198bb2121b d17a1fb8e452ae4fce1f2763a32b209b6663c600dcf253fd1e943e481ca90e63 dcfd777c230140e79392ba5adf4f6aa9ae249d68eb18cf2ba3b74eca47a2b3c2 df6e0399978745daad9974c24eecc3859740bc2e2ece4a7ec970cefcdd5a5bbe eb5d5d7b8119f0819a9f00bd20e3c200e9e938a7705bcad0afc86f254d62a78c efbf80ac6287c82b3231e87957271cadf5c5130eeea7b2e456ffa8b002cbde62 f12f6a6b3358a8dee157fa6bc7170d94cbf2e6f890c86791af20c1a841c01c17 f77e3f0bf61edecfc8f50904e19b9746ba78be95520288d824b61777b04649c6

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Trojan.Shiz-7108197-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT
                Value Name: 67497551a
                18
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: 98b68e3c
                18
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: userinit
                18
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: System
                18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: load
                18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: run
                18
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: userinit
                18
                MutexesOccurrences
                Global\674972E3a18
                Global\MicrosoftSysenterGate718
                internal_wutex_0x0000012018
                internal_wutex_0x0000042418
                internal_wutex_0x0000047418
                internal_wutex_0x000004a018
                \BaseNamedObjects\Global\C3D74C3Ba17
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                23[.]253[.]126[.]5818
                208[.]100[.]26[.]25118
                104[.]239[.]157[.]21018
                45[.]77[.]226[.]20918
                198[.]187[.]30[.]24914
                35[.]231[.]151[.]712
                13[.]107[.]21[.]20010
                35[.]229[.]93[.]469
                204[.]79[.]197[.]2008
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                MAMASUFEXIX[.]EU18
                FODAVIBUSIM[.]EU18
                LYKONURYMEX[.]EU18
                qetoqolusex[.]eu18
                PUPUCUVYMUP[.]EU18
                vocupotusyz[.]eu18
                gaherobusit[.]eu18
                MAGOFETEQUB[.]EU18
                RYCUCUGISIX[.]EU18
                KEJYWAJAZOK[.]EU18
                puvewevodek[.]eu18
                gahyfesyqad[.]eu18
                MAVEJYKIDIJ[.]EU18
                lyvevonifun[.]eu18
                rydopapifel[.]eu18
                kemimojitir[.]eu18
                CIQUKECYWIV[.]EU18
                FOXOFEWUTEQ[.]EU18
                tucyzogojat[.]eu18
                JEJYKAXYMOB[.]EU18
                QEKUSAGIGYZ[.]EU18
                tuwypagupeb[.]eu18
                FOBATESOHEK[.]EU18
                NOVOMYFEXIJ[.]EU18
                dixyjohevon[.]eu18
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %TEMP%\<random, matching [A-F0-9]{1,4}>.tmp18
                %SystemRoot%\AppPatch\ffiqrh.exe1
                %SystemRoot%\AppPatch\jshtht.exe1
                %SystemRoot%\AppPatch\akumbd.exe1
                %SystemRoot%\AppPatch\rkhhmxr.exe1
                %SystemRoot%\AppPatch\pvsvlhr.exe1
                %SystemRoot%\AppPatch\hcbpdh.exe1
                %SystemRoot%\AppPatch\suupehv.exe1
                %SystemRoot%\AppPatch\atvoia.exe1
                %SystemRoot%\AppPatch\xyovdf.exe1
                %SystemRoot%\AppPatch\qoatnug.exe1
                %SystemRoot%\AppPatch\stfvdxf.exe1
                %SystemRoot%\AppPatch\crsadq.exe1
                %SystemRoot%\AppPatch\iqxtlwt.exe1
                %SystemRoot%\AppPatch\vgabmas.exe1
                %SystemRoot%\AppPatch\cxglomg.exe1
                %SystemRoot%\AppPatch\mrfdmsf.exe1
                %SystemRoot%\AppPatch\eodhsml.exe1
                %SystemRoot%\AppPatch\bjihnwq.exe1

                File Hashes

                15e38b549194635dbbce0ddc2fa97744992498292843924d0ef12fb1804a285c 90fb3fc2fa229953c808954a8eec46b36f1edc0f41ab088c82ea755ffa3c43c2 9ca9c80c7aef1de747e8fb0fbe2fdabe0242862341eac562799b96f94830bd7a a798d57162ee4fac07d2e23a16f9d0557d39f6c615a33add2a8f570177ae250e b45da6a6c26ccecac46deeceed64bea1dc7753ebbd6fb93ad33048e0f8587f95 ba8e2507b98e11681912eb982779c5791bfd084f1683d0ec211f187c04444b4b bf6c06b4720c871f38fe90fc4c2dd2a17fd3879b37668facd78f433309123094 c0b1f1dcd503c8e254cbc80478848db14d2ab731df0a3d3cd185d5df43727d54 cab99b6945c6ee017c2297f13f5962ff2be066c3c9f4b812f1183334ab133de0 cefb5097f6431abfd8ecaa842f8fd18e7c37b585c90ed7dab5cc58c985f327ce d736eb2fa68eb8da82c3823e90bee6fb374f00d59b5ce26df9a8f8f6e807bf39 e4c8b631c928eec873f54c2811315e48962a8f5e067e3f820e22fbfbb04755eb e7df207595977cf6802d5d039c76a91ace32521f290d115c06325bb8a72ce18e ea0ea261f2a0211dc179b23bf18609749df13f024db3384cf1f7f54d09a3e21d ea9b003f2dd1f2293add17f6607370a130d3efff27d55c5068c7ac8abcbfb76b eeb8342fd7c3ee5b7bb9b714899dc0b2b97597562022015b9d1d2464e7cd55d3 fce2a9dee62b71966aca7874ff8f37066a0323c73e5e524162b36b114a92894f fdbae139d64ee88eacf6ade8b366666432bc944430ab7dd0cf1af7156cb7d316

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (1553)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Kovter injection detected - (1465)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Process hollowing detected - (1288)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Madshi injection detected - (1157)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Trickbot malware detected - (742)
                Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                Dealply adware detected - (417)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Gamarue malware detected - (151)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (75)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Excessively long PowerShell command detected - (72)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                PowerShell file-less infection detected - (67)
                A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

                Beers with Talos Ep. #59: The tardy episode

                $
                0
                0



                Beers with Talos (BWT) Podcast episode No. 59 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded 8/2/19 - Yes, I know what today’s date is. We got really busy last week and I am sorry that the podcast is late. Really, I wish I wasn’t writing these notes at 12:#0r4-j3pofw…. What? Anyway, we talk about malvertising and dig into that ecosystem a bit looking at some of the competing priorities (hint: none of them are your privacy). We also discuss BlueKeep making its debut in Canvas and surely soon to follow in other fine pen testing platforms. We use that opportunity to review a little bit of RDP knowledge and defense. We’re recording again tomorrow and I really don’t want to hear what my co-hosts will say if this isn’t out by then, so I’m going to go hit publish now.

                The timeline:

                • 01:18 - Roundtable - No one cares about security, end of the dark times is neigh, Cockney Joel
                • 11:50 - Malvertising - how it works and how to stop it (hint: block all the ads)
                • 31:30 - BlueKeep in Canvas - a review in RDP vulnerability
                • 45:00 - Parting shots and closing thoughts

                Some other links:


                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler) and Nigel Houghton (@EnglishLFC).

                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Vulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ indoor camera

                $
                0
                0

                Lilith Wyatt and Claudio Bozzato of Cisco Talos discovered these vulnerabilities.

                Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most advanced internet-of-things devices, the Nest Cam IQ Indoor integrates Security-Enhanced Linux in Android, Google Assistant, and even facial recognition all into a compact security camera. It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan. Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary. It is important to note that while the weave-tool binary also lives on the camera and is vulnerable, it is not normally exploitable as it requires a local attack vector (i.e. an attacker-controlled file) and the vulnerable commands are never directly run by the camera.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Weave and Nest Labs to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Nest Labs Nest Cam IQ Indoor Weave TCP connection denial-of-service vulnerability (TALOS-2019-0810/CVE-2019-5043)

                An exploitable denial-of-service vulnerability exists in the Weave daemon of the Nest Cam IQ Indoor, version 4620002. A set of TCP connections can cause unrestricted resource allocation, resulting in a denial of service. An attacker can connect multiple times to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Nest Cam IQ Indoor Weave legacy pairing information disclosure vulnerability (TALOS-2018-0797/CVE-2019-5034)

                An exploitable information disclosure vulnerability exists in the Weave legacy pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted Weave packets can cause an out-of-bounds read, resulting in information disclosure. An attacker can send specially crafted packets to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Nest Cam IQ Indoor Weave PASE pairing brute force vulnerability (TALOS-2018-0798/CVE-2019-5035)

                An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker can send specially crafted packets to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Nest Cam IQ Indoor Weave KeyError denial-of-service vulnerability (TALOS-2018-0799/CVE-2019-5036)

                An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packet can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Nest Cam IQ Indoor WeaveCASEEngine::DecodeCertificateInfo denial-of-service vulnerability (TALOS-2018-0800/CVE-2019-5037)

                An exploitable denial-of-service vulnerability exists in the Weave certificate loading functionality of the Nest Cam IQ Indoor camera, version 4620002. A specially crafted weave packet can cause an integer overflow and an out-of-bounds read to occur on unmapped memory, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Openweave Weave tool Print-TLV code execution vulnerability (TALOS-2018-0801/CVE-2019-5038)

                An exploitable command execution vulnerability exists in the print-tlv command of Weave tool. A specially crafted weave TLV can trigger a stack-based buffer overflow, resulting in code execution. An attacker can trigger this vulnerability by convincing the user to open a specially crafted Weave command.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Openweave Weave ASN1Writer PutValue code execution vulnerability (TALOS-2018-0802/CVE-2019-5039)

                An exploitable command execution vulnerability exists in the ASN1 certificate writing functionality of Openweave-core, version 4.0.2. A specially crafted weave certificate can trigger a heap-based buffer overflow, resulting in code execution. An attacker can exploit this vulnerability by tricking the user into opening a specially crafted Weave.

                Read the complete vulnerability advisory here for additional information.

                Nest Labs Openweave Weave DecodeMessageWithLength information disclosure vulnerability (TALOS-2018-0803/CVE-2019-5040)

                An exploitable information disclosure vulnerability exists in the Weave MessageLayer parsing of Openweave-core, version 4.0.2 and the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packet can cause an integer overflow to occur, resulting in PacketBuffer data reuse. An attacker can send a packet to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that version 4620002 of the Nest Labs IQ Indoor camera is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49843 - 49855, 49797, 49798, 49801 - 49804, 49856, 49857, 49813 - 49816, 49912

                Viewing all 1927 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>