Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Microsoft Patch Tuesday — Oct. 2019: Vulnerability disclosures and Snort coverage

$
0
0











By Jon Munshaw.

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 60 vulnerabilities, nine of which are considered "critical," with the rest being deemed "important."

This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software.

Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.

Critical vulnerabilities

Microsoft disclosed nine critical vulnerabilities this month, eight of which we will highlight below.

CVE-2019-1333 is a client-side remote execution vulnerability in Remote Desktop Services (RDP) that occurs when a user visits a malicious server. An attacker could exploit this vulnerability by having control of a malicious server, and then convincing the user to connect to it — likely via social engineering or a man-in-the-middle attack. An attacker could also compromise a legitimate server and then host malicious code on it, waiting for a user to connect. If successful, the attacker could gain the ability to remotely execute code on the victim machine that connected to the server.

CVE-2019-1238 and CVE-2019-1239 are remote code execution vulnerabilities that exist in the way VBScript handles objects in memory. These bugs all could lead to memory corruption in a way that would allow an attacker to execute arbitrary code on the victim machine. An attacker could exploit these vulnerabilities by tricking a user into visiting a specially crafted, malicious website through Internet Explorer. They could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that utilizes the Internet Explorer rendering engine.

CVE-2019-1307, CVE-2019-1308, CVE-2019-1335 and CVE-2019-1366 are all memory corruption vulnerabilities in the Chakra Scripting Engine inside of the Microsoft Edge web browser. An attacker could use these bugs to corrupt memory on the victim machine in a way that would allow them to remotely execute arbitrary code. A user could trigger these vulnerabilities by visiting a specially crafted, malicious website in Edge.

CVE-2019-1372 is an elevation of privilege vulnerability on Azure Stack when the Azure App Service fails to properly check the length of a buffer prior to copying memory to it. An attacker could exploit this vulnerability to copy any function run by the user, thereby executing code in the context of NT AUTHORITY/system, which could allow the attacker to escape a sandbox.

There is also CVE-2019-1060, a remote code execution vulnerability in  Microsoft XML Core Services.

                Important vulnerabilities

                This release also contains 51 important vulnerabilities.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                These rules are: 51733 - 51736, 51739 - 51742, 51781 - 51794

                Vulnerability spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

                $
                0
                0

                Jared Rittle and Patrick DeSantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

                There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, the majority of which can cause a denial of service. The Modicon M580 is the latest in Schneider Electric's Modicon line of programmable automation controllers. The majority of the bugs we will discuss exist in the Modicon's use of FTP.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Schneider Electric to ensure that these issues are resolved and that an update is available for affected customers. Talos previously disclosed a separate round of vulnerabilities in this product in June.

                Vulnerability details

                Schneider Electric Modicon M580 FTP cleartext authentication vulnerability (TALOS-2019-0827/CVE-2019-6846)

                An exploitable information disclosure vulnerability exists in the FTP functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An attacker can sniff network traffic to exploit this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 mismatched firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0825/CVE-2019-6844)

                An exploitable denial of service vulnerability exists in the FTP firmware update functionality of the Schneider Electric Modicon M580 Programmable Automation Controller firmware version SV2.80. A specially crafted firmware image can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 malformed firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0824/CVE-2019-6843)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially crafted firmware image can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 FTP incomplete firmware update denial-of-service vulnerability (TALOS-2019-0823/CVE-2019-6842)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially crafted set of FTP commands can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 FTP firmware update loader service denial-of-service vulnerability (TALOS-2019-0822/CVE-2019-6841)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update service function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially ordered set of FTP commands can cause the FTP loader service to enter a waiting state, resulting in an inability to update device firmware via FTP. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 UMAS cleartext data transmission vulnerability (TALOS-2019-0826/CVE-2019-6845)

                An exploitable information disclosure vulnerability exists in the UMAS functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An attacker can sniff network traffic to exploit this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 outdated firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0847/CVE-2019-6847)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An outdated firmware image can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can use default credentials to send commands that trigger this vulnerability. There is no explicit patch available for this vulnerability, but Schneider has released a mitigation.

                For more information on this vulnerability, read the complete advisory here.


                Schneider Electric Modicon M580 TFTP server information disclosure vulnerability (TALOS-2019-0851/CVE-2019-6851)

                An exploitable information disclosure vulnerability exists in the TFTP server functionality of the Schneider Electric Modicon M580 Programmable Automation Controller. A specially crafted TFTP get request can cause a file download, resulting in disclosure of sensitive information. An attacker can send unauthenticated commands to trigger this vulnerability. 

                For more information on this vulnerability, read the complete advisory here.

                Versions affected

                Talos tested and confirmed that the Schneider Electric Modicon M580, BMEP582040 SV2.80, is affected by these vulnerabilities. TALOS-2019-0847 affects the same version if it's downgraded to SV2.10.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49982, 49983

                Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

                $
                0
                0

                Cory Duplantis and Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.

                Cisco Talos recently discovered multiple remote code execution vulnerabilities in NitroPDF. Nitro PDF allows users to save, read, sign and edit PDF files on their machines. There are two versions of the product: a free and a paid version called “Pro.” The paid version offers several features the free one does not, including the ability to combine multiple PDFs into one file and to redact sensitive information in the file. These bugs all exist in the Pro version of the software.

                In accordance with Cisco's vulnerability disclosure policy, we are disclosing these vulnerabilities without a patch from NitroPDF due to the expiration of our 90-day deadline.

                Vulnerability details

                NitroPDF jpeg2000 ssizDepth remote code execution vulnerability (TALOS-2019-0814/CVE-2019-5045)

                A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF Page Kids remote code execution vulnerability (TALOS-2019-0819/CVE-2019-5050)

                A specifically crafted PDF file can lead to a heap corruption vulnerability when opened in NitroPDF, version 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF ICCBased color space remote code execution vulnerability (TALOS-2019-0817/CVE-2019-5048)

                A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF CharProcs remote code execution vulnerability (TALOS-2019-0816/CVE-2019-5047)

                An exploitable use-after-free vulnerability exists in the CharProcs-parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use after free. An attacker can craft a malicious PDF to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF jpeg2000 yTsiz remote code execution vulnerability (TALOS-2019-0815/CVE-2019-5046)

                A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF stream length memory corruption vulnerability (TALOS-2019-0830/CVE-2019-5053)

                An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that version NitroPDF, version 12.12.1.522 is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49906 - 49911, 49948 - 49950

                Talos takes home top research honors at Virus Bulletin conference

                $
                0
                0

                By Jon Munshaw

                Researchers from Cisco Talos brought up the top award at this year’s Virus Bulletin conference.

                Talos received the Péter Ször Award— named for the prolific security researcher who was a longtime contributor to Virus Bulletin and passed away in 2013 — for our research into several DNS-related attacks over the past year.


                The award “aims to recognize the best piece of technical security research published each year,” according to Virus Bulletin, and was awarded at the annual Virus Bulletin conference last week. It is widely considered the most prestigious award in the field of threat research. Szor was one of the pioneers of malware research, publishing several original findings on threat hunting and spending time working at Symantec, McAfee and Pasteur AntiVirus. Talos researchers Paul Rascagneres and Warren Mercer were in attendance to receive the award, and also presented their research at the conference.



                Virus Bulletin specifically honored Talos for the article “DNS hijacking abuses trust in core internet service,” which covered the campaign we called “Sea Turtle.” In the post, we outlined the work of a state-sponsored attacker that manipulated DNS to unknowingly send users to malicious websites.

                “This research not only details the specific activities of the Sea Turtle actor, it also highlights the weak spot DNS is in the global internet infrastructure,” Martijn Grooten, the editor of Virus Bulletin, said. “Though the award is given for this specific research, one should also note that these authors are very prolific contributors to the threat intelligence conversation.”

                DNS is a major foundation of the internet, and any attacks on it or manipulation of that system have the potential to undermine the trust users have in the internet. Based off this attack, we emphasized that nation-states should avoid targeting DNS as part of any cyber attacks, and called on world governments and the security industry to agree on the standard that DNS and the organizations that control it are off-limits, and to push back against any attackers that target the system.

                Sea Turtle targeted public and private entities primarily located in the Middle East and North Africa, even going after national security organizations. Talos believes these attacks could have begun as early as January 2017. At least 40 different organizations across 13 countries were compromised during this campaign.

                The actors behind Sea Turtle used DNS hijacking to trick users into visiting malicious websites. In these kinds of campaigns, the attackers illicitly modify DNS name records to point users to an actor-controlled server. The Department of Homeland Security even issued an alert on these kinds of attacks on Jan. 24, warning that an attacker could redirect user traffic and obtain users’ encryption certificates to then re-use inside the user’s organization’s domain names.

                This wouldn’t be Talos’ only foray into the world of DNS. In July, we discovered Sea Turtle was still active, utilizing a likely new DNS hijacking technique to go after additional victims. This time, Sea Turtle compromised a country’s code top-level domain (ccTLD) registry, which manages the DNS records for every domain that uses that country’s code. They then used that access to compromise additional government entities.

                DNS attacks are not going to go away any time soon, and if actors continue down this path, it could be very dangerous for the internet at large. We appreciate Virus Bulletin highlighting the importance of this research and the hard work of all our researchers who assisted with it.

                New IDA Pro plugin provides TileGX support

                $
                0
                0
                By Jonas Zaddach

                Overview

                Cisco Talos has a new plugin available for IDA Pro that provides a new disassembler for TileGX binaries. This tool should assist researchers in reverse-engineering threats in IDA Pro that target TileGX.

                We started developing this tool after the VPNFilter campaign last year, where attackers targeted hundreds of wireless routers across the globe. During our research of this attack, Talos researchers came across several sophisticated malware samples targeting Tilera's TileGX processor architecture. Processors based on TileGX are used in many small and home office routers (SOHO), which were the primary targets in VPNFilter. The analysis toolset for this architecture is quite limited: objdump is capable of disassembling the ELF binaries but more sophisticated and easier-to-use tools such as IDA Pro and Ghidra are not.

                This prompted us to look into developing an IDA Pro processor module. As libopcode —, the library powering objdump — already has support for the TileGX architecture, it seemed obvious to build the module on this library, instead of trying to write our own instruction decoder. Due to speed considerations, that also meant developing a processor module in C++, as opposed to most online available open-source processor modules written in Python. Luckily, the IDA Pro SDK has good source code examples of processor modules, which were a great help.

                The resulting processor module provides a working disassembler for TileGX programs. It is not the fastest at the moment, and due to the binutils dependency, it currently only compiles on Linux, but it should help any reverse engineer who has to look into threats targeting the TileGX architecture.

                Building and installing

                You can either download the pre-compiled plugin provided by us and copy it to your IDA Pro installation's plugin/ folder or compile the plugin yourself. As mentioned before, both are available only for Linux, as building on Windows or MacOS is not supported yet.

                The build process has been tested with IDA Pro 7.3 on Linux (Ubuntu 18.04). We recommend to use the same environment. After downloading the source code from github. Create the file idacfg.mk in the source code directory with the following content:

                idabin=<PATH TO YOUR IDA INSTALLATION>

                idasdk=<PATH TO YOUR IDA SDK DIRECTORY>

                Then run:

                make -f Makefile.linux install

                to build and install the plugin.

                Usage

                Start ida64. Select "Tilera Tile-GX" as processor in the dialog when opening the malware file. Accept to change the processor type. Enjoy the the TileGX disassembly.



                Talos is releasing this alpha version knowing that it may contain a few bugs and can be improved upon in the future, but we still wanted to share with the community in the early stages. Please see the source code for where to send issues, bug reports and feature requests. Feel free to contact the author if you run into issues. We would also like to thank Igor Skochinsky from Hex-Rays who helped Talos hunt down a bug during the build process.


                Threat Source newsletter (Oct. 10, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It’s that time again to update all your Microsoft products. The company released its monthly update Tuesday, disclosing more than 60 vulnerabilities in a variety of its products. This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software. We’ve got a rundown of the most important bugs here, and all our Snort coverage here.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                P.S., we have to give ourselves a pat on the back for the researchers who took home the top honors at the Virus Bulletin conference, winning the Péter Ször Award.

                Upcoming public engagements with Talos

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Event: Talos at BSides Belfast 
                Location: Titanic Belfast, Belfast, Northern Ireland
                Date: Oct. 31
                Synopsis: Several researchers from Talos will be on hand at BSides Belfast to deliver four different talks. Martin Lee will provide a general overview of the benefits of threat hunting, Nick Biasini and Edmund Brumaghin will walk through a recent wave of supply chain attacks, then, Brumahin and Earl Carter will deliver their “It’s Never DNS....It Was DNS” talk, and, finally, Paul Rascagneres walks through his recent research into attacks on iOS.

                Cyber Security Week in Review

                • Apple released the new Catalina operating system this week, and it comes with several new security features. However, researchers have already discovered a series of vulnerabilities, including memory corruption and buffer overflow. 
                • The U.S. government is increasingly using the exploitation of minors as an argument for anti-encryption measures. But security experts are concerned this could mislead the general public about the benefits of encryption. 
                • An Iranian hacker group believed to be behind an attack on a U.S. presidential candidate is now turning their attention toward the researchers who outed them. The group known as “Charming Kitten” set up a web-mail page designed to compromise security experts. 
                • Twitter says it’s used emails and phone numbers attached to two-factor authentication to deliver targeted ads. The social media site says it does not know how many users were affected. 
                • Apple removed an app from its store that protestors in Hong Kong used to track Chinese police presence. This was just the latest move from the Chinese government to put pressure one U.S. businesses in relation to the ongoing unrest in Hong Kong. 
                • The FBI misused its own data to vet their own employees and other American citizens. A recently unsealed court document revealed several instances where the agency improperly used information to run queries on certain individuals, all eventually discovered by the United States Foreign Intelligence Surveillance Court. 
                • The GitHub code repository is currently facing backlash from its employees over its partnership with the U.S. Immigration and Customs Enforcement (ICE). GitHub is reportedly preparing to renew a contract for ICE to license its GitHub Enterprise Server. 
                • Security researchers found another swath of apps on the Google Play store that deployed malware onto users’ devices. The apps, which disguised themselves as video games and photo editing services, were actually trojans, adware, spyware and data stealers. 
                • A new report from the U.S. Senate’s Intelligence Committee states that Russia’s disinformation campaign to influence U.S. elections is nowhere near over. The study also points out that many of these campaigns specifically target the African American community. 

                Notable recent security issues

                Title:Microsoft discloses 60 vulnerabilities as part of monthly security update
                Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 60 vulnerabilities, nine of which are considered "critical," with the rest being deemed "important."
                This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software.
                Snort SIDs: 51733 - 51736, 51739 - 51742, 51781 - 51794

                Title: Multiple vulnerabilities in Schneider Electric Modicon M580 
                Description: There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, the majority of which can cause a denial of service. The Modicon M580 is the latest in Schneider Electric's Modicon line of programmable automation controllers. The majority of the bugs exist in the Modicon's use of FTP. Schneider Electric Modicon M580, BMEP582040 SV2.80, is affected by these vulnerabilities.
                Snort SIDs: 49982, 49983

                Most prevalent malware files this week

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: ce8cb7c8dc29b9e4feab463fdf53b569b69e6a5c4ab0e50513b264563d74a6ac
                MD5: 0e02555ede71bc6c724f9f924320e020
                Typical Filename: dllhostex.exe
                Claimed Product: Microsoft® Windows® Operating System
                Detection Name: W32.CoinMiner:CryptoMinerY.22k3.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201 

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201 

                Beers with Talos Ep. #63: The third law of thermodynamics

                $
                0
                0


                Beers with Talos (BWT) Podcast episode No. 63 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Sept. 27, 2019 

                We are missing Matt and Joel this time, so Mitch, Craig and Nigel are taking you through this episode. We cover some recent posts from Talos with Divergent and Tortoiseshell. Turns out, people get a bit excited when you target U.S. veterans with malware — even other malware authors thinks that’s scummy. That takes us into a chat about social engineering in general, and we end up talking about some interesting stuff with unpatchable vulnerabilities and why deleting /var on install could be described as "a bad idea" for a Google Chrome update.

                The timeline:

                • 01:00 — Roundtable: Hammering off your thumb...guess who did that one?
                • 09:30 — Divergent LO(BYOL)Bins: Bringing NodeJS with you does not a LOLbin make
                • 19:45 — Tortoiseshell: Social engineering vets looking for jobs makes you a special kind of scumbag
                • 34:00 — Social engineering and Newton’s third law
                • 38:30 — Selecting VPN providers that don’t make you the product
                • 45:00 — Unpatchable BootROM zero-day in iPhones, and let's delete /var!
                • 52:30 — Closing shots and parting thoughts

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Threat Roundup for October 4 to October 11

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 4 and Oct. 11. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Dropper.TrickBot-7288419-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Dropper.Qakbot-7287972-0 Dropper Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
                Win.Trojan.Emotet-7287811-0 Trojan Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Worm.Vobfus-7198158-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                Win.Dropper.Upatre-7196259-0 Dropper Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.

                Threat Breakdown

                Win.Dropper.TrickBot-7288419-0

                Indicators of Compromise

                MutexesOccurrences
                Global\316D1C7871E1064
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                190[.]152[.]4[.]21017
                37[.]228[.]117[.]1469
                31[.]184[.]253[.]379
                181[.]113[.]20[.]1866
                185[.]222[.]202[.]2226
                51[.]68[.]247[.]625
                194[.]5[.]250[.]825
                51[.]254[.]69[.]2445
                91[.]132[.]139[.]1705
                116[.]203[.]16[.]954
                189[.]80[.]134[.]1224
                203[.]23[.]128[.]1684
                46[.]30[.]41[.]2294
                37[.]44[.]212[.]2164
                216[.]239[.]38[.]213
                185[.]248[.]87[.]883
                138[.]59[.]233[.]53
                190[.]154[.]203[.]2183
                187[.]58[.]56[.]263
                177[.]103[.]240[.]1493
                200[.]21[.]51[.]383
                5[.]230[.]22[.]403
                200[.]153[.]15[.]1783
                198[.]27[.]74[.]1462
                146[.]196[.]122[.]1672
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org12
                ip[.]anysrc[.]net4
                api[.]ip[.]sb3
                ipinfo[.]io3
                checkip[.]amazonaws[.]com2
                wtfismyip[.]com2
                api[.]ipify[.]org2
                www[.]myexternalip[.]com1
                ident[.]me1
                Files and or directories createdOccurrences
                %APPDATA%\netcloud64
                %System32%\Tasks\netcloud free disk64
                %APPDATA%\netcloud\settings.ini64
                %APPDATA%\netcloud\data\systeminfo644
                %APPDATA%\netcloud\data\pwgrab642
                %APPDATA%\netcloud\data\pwgrab64_configs\dpost2

                File Hashes

                01665c3044d0c07559850f4c63b0e83a75d377d47cbb024109af959ab07a84ab 029d508d8b0b8d85d4e9409b4fce7d1e77278e9c287ea413bfc6ef74b04f3f62 02b56e22b5b87c10e1aaa55a64d023c146705bec60a05f663383c58ad2d46ec9 04915554da413b0eec1c972c40dd73f01494e0babbb952511bc471831f09d66a 07037779cf0fd1203023ab1c5d0ca29103ec20b86ef4a1352e0eae887522aaf5 0b0812b19376da99480f2eaa6ef5c50b0ddef28e861d58f72ea2f321d8d5f4a7 11b52fd22db6a8407a7b185bbff4731813f3e5ade255545b0c5aa75e71001d40 139682b035166c0554038c7a3d41d21c1224ca4d8a1f3dc2fdc78b5d162980a3 1452da4d87422fbce37fa81c0357b9093120f39849a39a6b49529d2e88c24601 15e767c8416fff66195618b591a2a2869b42075a81962d760e644504ecbccd7d 1bcc2e0e40cb671020249c818d9580345498198e06e83242ec54c5666c13eeac 1f64de67c63364947a52b85977c30e101cb27151c9d21759db0a7ea2d20d1c76 1fd9de5a0da8baf970b071eec8072dbe8e166c52a520252a7bad4c6cccdb6f5a 2211518528d8df3b3a37b83807f27b3c48e8dc68e427be3d693775dd9281d3dc 2329e7a18e95750266b5865d2cebb2b0ab2db296e99735b1fcf174eabd0364bc 25ed6d3f3dcaa2fb50d9b98b4b18ce5552b8e7f7edb34036dbe223a0e594c61e 28d5358cee665b777f608ab2994f09baeea9f98a53f7631dc18412b58e279e79 2c5e9d6e2caf1b7d0b3d34eefe3f6cba433c5f4d9cb1056788efba86d64070c7 2cb27358ab67c8b99b3ef38653c6e529daf2782415ee4025977853dbecba4135 2fcd6ec5753d814c537cf1d8c0bd40fd71da35fc0daa3464c71061feabccc003 3899c0d52fb831b58971b8cc3676b819623c3cdf394404441e9e3fc5149f2924 39812d745606743e797291736409505e7c8fee6708f1b9cdfd81db696b045f0b 3c0fdeaf8672109d78f05a5409aa4d1a64970e0317d00dce93c2f850ed315444 3ce742d661cf7896361b4419bffe4b457db5996bb437e386ac8725a32ea3775c 3cfd3b1da2d19d3d79479a35570aa2f8c53c5a865307ae39c45dbab34ecd1eb3
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Dropper.Qakbot-7287972-0

                Indicators of Compromise

                MutexesOccurrences
                <random, matching [a-zA-Z0-9]{5,9}>9
                <random, matching [a-fA-F0-9]{10}>6
                NO_HIDE2
                Global\eqfik1
                Global\epieuxzk1
                Global\ulnahjoi1
                Global\utjvfi1
                Global\siexlcvo1
                Global\3e356201-e784-11e9-a007-00501e3ae7b51
                9a1e0bdf466b43e51e62125b6de07886Ð÷# Administra1
                Global\zmzqw1
                Global\hzquyt1
                Global\orprmhqn1
                llvmspnzmgf1
                Global\emiudb1
                siexlcvo/W1
                Global\okqxsvm1
                hnqgbtxnpbgb1
                Global\awfury1
                Global\mesgra1
                Global\esute1
                Global\caypop1
                azvfitrmerda1
                Global\yweieuzg1
                Global\lajpa1
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                69[.]241[.]80[.]1628
                69[.]241[.]74[.]1708
                69[.]241[.]108[.]588
                69[.]241[.]106[.]1028
                209[.]126[.]124[.]1737
                66[.]96[.]134[.]316
                66[.]7[.]210[.]1906
                65[.]182[.]187[.]526
                181[.]224[.]138[.]2405
                69[.]64[.]56[.]2445
                162[.]144[.]12[.]2415
                208[.]100[.]26[.]2343
                64[.]34[.]169[.]2443
                108[.]61[.]103[.]1753
                193[.]28[.]179[.]1053
                12[.]167[.]151[.]78/313
                216[.]58[.]217[.]1422
                195[.]22[.]28[.]2222
                173[.]227[.]247[.]502
                12[.]167[.]151[.]892
                12[.]167[.]151[.]812
                195[.]22[.]28[.]1991
                173[.]227[.]247[.]491
                173[.]227[.]247[.]341
                173[.]227[.]247[.]591
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                jacksonville-a[.]speedtest[.]comcast[.]net8
                stc-sjos-01[.]sys[.]comcast[.]net8
                stc-fxbo-01[.]sys[.]comcast[.]net8
                www[.]ip-adress[.]com8
                stc-hstn-03[.]sys[.]comcast[.]net8
                boston[.]speedtest[.]comcast[.]net8
                houston[.]speedtest[.]comcast[.]net8
                sanjose[.]speedtest[.]comcast[.]net8
                jacksonville[.]speedtest[.]comcast[.]net8
                wpaoyqevfvmqquvpfwo[.]com3
                ageanrzekiycakzrswcq[.]com3
                utglavlafksmzfcniumfwwbm[.]biz3
                wyrlmssiybtkxemblgkturpw[.]net3
                qguuivkqppwohlzzvjv[.]org3
                ohfckvgylddiulbtgcrdijtpl[.]org3
                zhkclrrbgufzsgljzohs[.]com3
                evvedpvqyno[.]net3
                cyiynudufvqmswxgtdkgyal[.]org3
                fmncuwynktocekwqmthsr[.]net3
                hrmmnxigwodcsbqhcezedv[.]net3
                ohnzjsjoyxmkfpafaouujked[.]biz3
                rpagfveavil[.]com3
                ocqfamsdr[.]org3
                sso[.]anbtr[.]com2
                tnqnpjthcwhhit[.]biz2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Siexlcvoi\siexlcv.dll1
                %APPDATA%\Microsoft\Siexlcvoi\siexlcvo.exe1
                %APPDATA%\Microsoft\Eqfikq1
                %APPDATA%\Microsoft\Eqfikq\eqfi.dll1
                %APPDATA%\Microsoft\Eqfikq\eqfik.exe1
                %HOMEPATH%\APPLIC~1\AuthHost_86.exe1
                %APPDATA%\Microsoft\Emiudbm\cemiudb32.dll1
                %APPDATA%\Microsoft\Emiudbm\emiud.dll1
                %APPDATA%\Microsoft\Emiudbm\emiudb.exe1
                %APPDATA%\Microsoft\Emiudbm\emiudb32.dll1
                %APPDATA%\Microsoft\Emiudbm\qaodxae.exe1
                %APPDATA%\Microsoft\Siexlcvoi\csiexlcvo32.dll1
                %APPDATA%\Microsoft\Siexlcvoi\siexlcvo32.dll1
                %APPDATA%\Microsoft\Siexlcvoi\u\siexlcvo.exe1
                %APPDATA%\Microsoft\Caypopa\caypo.dll1
                %APPDATA%\Microsoft\Caypopa\caypop.exe1
                %APPDATA%\Microsoft\Caypopa\caypop32.dll1
                %APPDATA%\Microsoft\Caypopa\ccaypop32.dll1
                %APPDATA%\Microsoft\Nkswhk\cnkswh32.dll1
                %APPDATA%\Microsoft\Nkswhk\nksw.dll1
                %APPDATA%\Microsoft\Nkswhk\nkswh.exe1
                %APPDATA%\Microsoft\Nkswhk\nkswh32.dll1
                %APPDATA%\Microsoft\Teubkce\cteubkc32.dll1
                %APPDATA%\Microsoft\Teubkce\ojpgopoc.exe1
                %APPDATA%\Microsoft\Teubkce\teubk.dll1
                *See JSON for more IOCs

                File Hashes

                00ff1db58b6f1e59ab2c2bf8e56160505a45d4a81f6fe1eaa929e64fb1721579 064778a5c62de64d9209efd2a1d07d51e5bba27dec7304adb16cb0f477990da7 10498726da41ce76941828ba2645cd142d14345730ed27ef477ef3360776b70e 1550ddeb6bedfa869544e6acff1b99deef5ed36c5d3e53bb8c54a7dfc1ee7979 16e32d59b24b270c97fc9003ce99d52bbd5d2f8f71066a7ae89489b70230b6ea 2a4d5212548373f2036751006f472fd59796cb1f3ea0a5e3b00ff257dda42d90 2a98486961a037fc69ad76a352cdbd94b9e9b20e935ea2223632616af9cf9164 2f8eaa9d09eea245e077d855496d325833f431c565b0caf376694a20786a360d 33e8352baa3fd5c8657f950f6853c852ab5bc7a8738ef0100393e8840170f689 3c671a2c98bad1d21523542d92d3e7e64f10dc11b71ad877a12d3c716f79d6c5 3ed342a425980d09017f40042c3bc38c995f80b25ebc0ce54f57aa247a399972 433da825e9d75917a8e935ce67e352de3300c2276b8e1e4088ad353f1dc563cd 4567101b5264de0d437095f3dad638f1f663eca77eb737f1c8188133786c42a3 49a262416b8af5718487c966f6d328f12b7dd39c4e48c1d12ec99eb6f67b5bf7 5008602076bc658f669bcbdcdcdae8ac0db03df3d67d59cc8a594916c7e0eab7 546fe2283bec932d0e579545928b7c61aa4865891ae2ae270311cb43d37f24fc 5694eba592c8d2dc736d820dfe10f1cb70fc613595349358e67651b04f8d5f9c 5873b0a3726c51faf9e15170f2cc2cf907da40bd6535886c2f4cc5eb4d1b677f 5a779b62299bf87288404f408ffd1ca26ffb365a1a80a3f0be02634dbb6b0acd 61e897720193eb60766425f7952795081b220bd3fcb84693d127ae08cdc7fd77 64a7ea2afabd89b89154b3e9165e4821194657eaa2df6f3c05513ac57f4269a1 67d275ebe2e3e3653d1a9dfc9e68abe38adaca68e30d4335e974fe9393ed1166 7103e2d1e6b0cb025ba011e3b71b959beb9dba33e919d22ce710703b0cecc9d3 7173180702f16103ff9e12dc30a4d35ffe8e59fed07a9b85b1a8051cccc3443c 75294d7224051e0fc6f7a583941ed6be64270f2296f01a2f907c475bcc604296
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Trojan.Emotet-7287811-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Type
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Start
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ErrorControl
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ImagePath
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: DisplayName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: WOW64
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ObjectName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Description
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL 13
                MutexesOccurrences
                Global\I98B68E3C13
                Global\M98B68E3C13
                Global\M3C28B0E413
                Global\I3C28B0E413
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                80[.]11[.]163[.]13911
                85[.]54[.]169[.]14110
                185[.]14[.]187[.]2014
                45[.]79[.]188[.]674
                63[.]142[.]253[.]1224
                67[.]225[.]229[.]553
                193[.]70[.]18[.]1442
                193[.]252[.]22[.]862
                17[.]36[.]205[.]742
                212[.]227[.]15[.]1422
                213[.]180[.]147[.]1452
                52[.]96[.]40[.]2422
                62[.]149[.]157[.]552
                217[.]116[.]0[.]2282
                62[.]149[.]128[.]1792
                173[.]194[.]68[.]108/312
                82[.]223[.]190[.]138/312
                62[.]28[.]40[.]1551
                82[.]223[.]191[.]2281
                84[.]232[.]4[.]631
                5[.]56[.]56[.]1461
                37[.]187[.]56[.]1661
                134[.]0[.]12[.]481
                213[.]0[.]77[.]511
                208[.]91[.]198[.]1071
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                smtp[.]office365[.]com2
                smtp[.]outlook[.]com2
                smtp[.]1and1[.]es2
                mail[.]comcast[.]net2
                mail[.]1und1[.]de2
                outlook[.]office365[.]com2
                smtp[.]one[.]com2
                smtp[.]orange[.]fr2
                smtp[.]serviciodecorreo[.]es2
                mail[.]gmx[.]net2
                smtp[.]poczta[.]onet[.]pl2
                mail[.]aruba[.]it2
                pop3s[.]aruba[.]it2
                smtp[.]pec[.]aruba[.]it2
                smtp[.]myfbmc[.]com1
                mail[.]amazon[.]com1
                smtp[.]amazon[.]com1
                mail[.]bellnet[.]ca1
                mail[.]hotmail[.]es1
                smtp[.]ogicom[.]pl1
                smtp[.]my[.]tnt[.]com1
                mail[.]pec[.]it1
                mail[.]kovalam[.]es1
                smtp[.]myslide[.]cn1
                smtp[.]tepore[.]com1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe12
                \TEMP\yc3qjv_812.exe1
                \TEMP\njrfqcj58z_23190.exe1
                \TEMP\b2_13022603.exe1
                \TEMP\5tnlmwuu_6728847347.exe1
                \TEMP\feqxn9l_08751690.exe1
                \TEMP\u1p1rr_2846411837.exe1
                \TEMP\93cumzh_740237.exe1
                %SystemRoot%\TEMP\DFFB.tmp1

                File Hashes

                0d2fcaa55a4fa60ddb207a884d8708616afe216172606cb34428696d94d02b55 1d79c23865675ea988e8da616d87729fc029e3da8655a452ec8603c2645ed29c 1eda8a1b220b335de0e0dcc4b1c370f063d3bb8179e78e1aa5aa07d97182e50e 2f2fde0c36731205d5c8139450b3e65c99c4b101632f9e5b359d241bd39bc854 4f525a377c92170b4e0fdb377d84e7046be3fabf13020542889dabfceb3f3290 6e0ff7d8aabe7604957239a4217e8acd18261216c6fd4447c3e3ea061062bad5 7999aecb854548554573e807e3099b3285ffa31244668bda61a60ca02763de48 c2b0637eaa88c02f22d551ece7de3220d4888a7882676fd7b51c6c577140ce51 ce8949e5a1b41b1b1ff2d6d432aef7af6db3c4308b4e58839b9e6958846cd24e d5128c8528eaf67f71aa26c53db2b9035ee95849f03ab991ae9805bf4c07f496 e142a57f84461cad1faea965d00decb6ed53eb65fc884acd52ffede5454d1a4e e28a38d8fdd96021b0391fc8a2f0e88da19143a6084ab6a64ff93fdb1d2c9ee2 fe84dbdcefa7c810abd780e0ca47c5bdfaa8c27146b810e2d784d1b00a077aa0

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Win.Worm.Vobfus-7198158-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xaawee
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: juemauy
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: zltip
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wkxid
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: leohuow
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: kuoova
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: vjdoq
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: beyuk
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baeuqo
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: lieagu
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: juohoah
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: taeele
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baaqaic
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wmquoz
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: qeodux
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ziiluet
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mrlot
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: coawi
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ceqav
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: gejay
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baule
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xeezua
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mouzui
                1
                MutexesOccurrences
                A23
                Global\d11cb3c1-e7ca-11e9-a007-00501e3ae7b51
                Global\02adca01-e7cb-11e9-a007-00501e3ae7b51
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ns1[.]videoall[.]net23
                ns1[.]videoall[.]org23
                ns1[.]player1532[.]com23
                Files and or directories createdOccurrences
                \autorun.inf23
                \$RECYCLE.BIN.lnk23
                \System Volume Information.lnk23
                \Documents.lnk23
                \Music.lnk23
                \New Folder.lnk23
                \Passwords.lnk23
                \Pictures.lnk23
                \Video.lnk23
                \<random, matching '[a-z]{4,7}'>.exe23
                %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe23
                E:\$RECYCLE.BIN.lnk22
                E:\autorun.inf22
                E:\x.mpeg22
                E:\System Volume Information.lnk22
                E:\Music.lnk22
                E:\Passwords.lnk22
                E:\Pictures.lnk22
                E:\Documents.lnk22
                E:\New Folder.lnk22
                E:\Video.lnk22
                E:\<random, matching '[a-z]{4,7}'>.exe22
                E:\RFJ.ico1
                \RFJ.ico1
                E:\baaqaicx.exe1
                *See JSON for more IOCs

                File Hashes

                09be96cf7eaf5a8b9e6231dc9f5760df58907a9c8dfb996e406361c3c72e5aa7 0c114b0894e482f57f0909cbd8b8dced3a8d6b20ec50139ccafdc81c1f21d6f2 107add01286993501566a44c448e321e27d3dadef2e2b62162b158cee42f4b80 210c1a435f47d5bca6300a4a323aa416e8edd2855946a9b5dc13f525e2061122 261ba2deae2f40205c12ecaa69ac285e3db2669ace697f4f52006aaca3046137 2642ae8489bf119064a09e9919cf06f92bc5b5882613c673745ffe89b34c2f43 30e340533c70f200d86348c10c78164a165e17a88f62b344e2b76f035386beae 323f9bcc53cdf71e937974d6523174ebb74151af8928d1148d0476c13b3e1622 37d2c4a0c7b4640261d4eae7bfe234eb4029a5686589e96fa78d9da20bf2add8 408680beb42a3d4123ca4136cb02431efdb2efd112d546a378dfea96dd042f5d 423ddc412baf3a6aa9637d6258b7309f08ed1e1bc9c2dddc30cc25732998e42c 46a8888ab48c79a9bdef4cf4ff58f5f58feb8ad6e3926a6ee98f7ea1dc2b383a 4e8f5a3497e7263ad12bdb242fdcbbd9c2d1ff85e862b263ce4b4d138f00002c 5642cb5f8c9d9115143cf67b67b50327dc6ac07c78e87334f52d3a89ef7e855c 575c4e03f446b9ae91769cc7be8b7cc8aa451d607615a69ac0797190240f0bff 5c3a99fa29ab5917f2facf4383dd6284c2fd4c93c0aa9a16cf5a8b605ce3521c 605712812595a21fae8b728974d328ecc2811792cec2f0808653d2ea8ee556c2 610519390720b741a8b2de2686575141bf8839473abdc06ffa9ecfd7efb88a3c 640f88b445819b50d801f63bba996635c07883cf245ddca2f39b592ce07d0a30 777a8c8f5ffa5c992ea0991e99b6be9f6ed560768154f6273f42c2547e6454ab 7f285a63779f27c9793b5fdcdcc9f8e8d48207298cb4c3cd18e27889c2dd052a 8232b50475cf369b325dc6866d6b88c27245faf7e572a3629b5c0ad3a88cbd72 84b677c976458077b79120064fe7aa275ad33d19d7651425f3faf6cd717fc520 8536b9a9da4f0b6930ed148166800147062e93f6c31ad70f61eb7ed174383c80 89f1ede2d77a45043f2ce760265d21a512f5e5b011cde43f76c3b968214530e5
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella


                Win.Dropper.Upatre-7196259-0

                Indicators of Compromise

                Files and or directories createdOccurrences
                %TEMP%\szgfw.exe43

                File Hashes

                0209860624b9650a80e8e7ccd913c68bbd5e4be9e503c2a1b554c6b3b94861a1 0755dff6699aebb40a37368f78ed9a7b66d3e24d039af8cdd2ad13b8ef969273 0e2cb655432353bc5f362692d75f76b1deb6d4c339db1eacb671731c5f23a733 1191f1f7a73c262102b8ec25f2aecefc26eef287e55934e608ba510b45bff3db 11aa23a13c9a53dae82684af6adf9835fe027550d5b9bfd21604ab1261c97224 25f1eb50680c50626387a6e2c28a9278172dadbb61113f984a9c0074db4a3514 35588e1d2203194ae0524d551d9a5d45bccbfbd9ef226a25e223c4e626db8e7e 37715e5cfc32e42ccd741a8ca0b17276c76b9d28c2ab4ab4edc4ba712cfe98a4 47b69664dd70b8ed9e0f369640f4dfd27a5a33b8bd3d83d572b667551d6465cd 47cbf5466f14bacd5dae7a217a85673048245844e39d081ce4009aa8bbdf0743 48b14ad94dbfe648d7ef4cbce8debeec6b009d9972cb026f7f4ecfea72ae380d 4c6c1e0eb3b508e3bd525b4ce71a1309d231b218f7172bfb5da57a93a050ab5c 4d30d13f5454bc30c92643657d4113a4008e09cd06491e1f73801a14b5415cf5 50bf198fb00ff18f6b08b9aff48c8b5ffcc85cc0dcda23a0359f413113fd6207 51cd17e592d2ebadfd3f15ca6b542f78b2adb4f26b7eaf8c254e849ee141bcc4 52f3ac52e9e2e9ebaba6da86ea629ad07b2017a44a5be6f66a576853341cc1ca 5cdc406d0cfc60b4a6b5cce5411932f250bcf7c60863e71111f461130c2d942f 607473f50e64388087985abb0bb05caa8688a1a17c25607508bb2a3a8a62fc13 607ac8ad70dc43765ea3954c09b2dbe320f7dbe4fe9fee9b07fab9e855aef37b 6516b8c920ae407765804372470187aa6749d1f598e87b7dbe8bf47291039568 658f7d3524bc9db586321be2fb22b1d832cd6f80328dcdbecdfc2734ff45487a 6812985cee6342855219205500bd1bb53300d552f17b88dbeeab1cdad32e55bf 6be61289884c2bd01ddade32649d23fac7bc0ba4591f3eed911101eb44c5181b 6f8ed68f17904767ecd16b1cb1943caa8f474912bffc930082e64512fa48f96f 75c817a4d49bc40781537143aabad6f0496129120503b7276854e9db15b4a965
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (17383)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Excessively long PowerShell command detected - (3263)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Madshi injection detected - (2949)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Kovter injection detected - (1750)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Atom Bombing code injection technique detected - (577)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Process hollowing detected - (512)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Gamarue malware detected - (158)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Dealply adware detected - (149)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Installcore adware detected - (79)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Aggah malware dropper detected - (61)
                Aggah dropper technique has been detected. The Aggah campaign has been observed dropping Azorult, LokiBot and other malware families. Aggah employs phishing and process hollowing to infect victim machines.

                Checkrain fake iOS jailbreak leads to click fraud

                $
                0
                0
                By Warren Mercer and Paul Rascagneres.

                Introduction


                Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. However, this site just prompts users to download a malicious profile which allows the attacker to conduct click-fraud.

                Checkm8 is a vulnerability in the bootrom of some legacy iOS devices that allows users to control the boot process. The vulnerability impacts all legacy models of the iPhone from the 4S through the X. The campaign we'll cover in this post tries to capitalize off of checkra1n, a project that uses the checkm8 vulnerability to modify the bootrom and load a jailbroken image onto the iPhone. Checkm8 can be exploited with an open-source tool called "ipwndfu" developed by Axi0mX.

                The attackers we're tracking run a malicious website called checkrain[.]com that aims to draw in users who are looking for checkra1n.

                This discovery made headlines and caught the attention of many security researchers. Jailbreaking a mobile device can be attractive to researchers, average users and malicious actors. A researcher or user may want to jailbreak phones to bypass standard restrictions put in place by the manufacturer to download additional software onto the device or look deeper into the inner workings of the phone. However, an attacker could jailbreak a device for malicious purposes, eventually obtaining full control of the device.

                This new malicious actor Talos discovered claims to provide the checkra1n jailbreak. The site even claims to be working with popular jailbreaking researchers such as “CoolStar” and Google Project Zero’s Ian Beer. The page attempts to look legitimate, prompting users to seemingly download an application to jailbreak their phone. However, there is no application, this is an attempt to install malicious profile onto the end-user device

                Jailbreaking iOS devices has been around since the launch of the first iPhone in 2007. These are a rare commodity in the iOS world, with Apple moving to patch most software defects swiftly. This can mean a user remains on older versions of iOS at the cost of security to keep their jailbreak — a dangerous proposition. Some users want to jailbreak their devices because it allows them to perform a lot of additional actions on their devices that Apple has locked down. This can be simple tasks like SSHing (remotely accessing) the iOS device, changing icons and themes on the iOS device, and also for illegitimate use such as pirated software and games.



                Checkrain fake website and iOS profile


                When a user visits the fake website, they are first presented with a download button.



                The checkm8 exploit (and, by consequence, the checkra1n jailbreak) only impacts iOS devices running on the A5 to A11 chipsets. The fact that the website mentions the A13 device is the first indicator that this website is not legitimate. Additionally, the website proposes the user can install the checkra1n jailbreak without a PC, when in reality, the checkm8 exploit requires the iOS device to be in DFU mode and is exploitable via the Apple USB cable.

                With this fake Checkrain[.]com iOS jailbreak, the user is asked to install a "mobileconfig" profile on their iOS device obtained from hxxps://checkrain[.]com/checkra1n.mobileconfig note the SSL certificate used is LetsEncrypt generated certificate and also the name "checkra1n" is the real name of the available jailbreak. The real checkra1n website does not use an SSL certificate. This is another step the actor has most likely employed in an attempt to draw the user in.

                Once the app is downloaded and installed, a checkrain icon appears on the user's iOS springboard. The icon is in fact a kind of bookmark to connect on a URL. This icon may look like an app from the user's perspective, but it actually doesn't work like one at all on the system level. Here is the installed profile:



                This is to allow the user to "click" the jailbreak app and thus prepare the iOS jailbreak. This is just a fake jailbreak being used via the profile the user just installed. When we look into the profile, we can identify the malicious activity:



                This is making use of the Apple developer function "Apple Web Clip," which causes a web page to load in full screen with no search bar, no address/URL bar and no bookmarks. This merely displays the hxxps://checkrain[.]com/jb webpage which provides a fake jailbreak experience.



                Fake jailbreak experience


                Take a look at the video below to see the full actions of this webpage.

                This webpage is also configured to fingerprint users to ensure they are accessing it from an iOS device. If you visit the website using a desktop browser, it delivers the following error message:



                The video shows the whole process, and in the end, you will notice multiple redirects occurring on the user's iOS device. This ultimately occurs in click-fraud, resulting in multiple verification chains and then finishing on an iOS game install, with in-app purchases available.

                The chain used in this processes through several ad-tracking, verification, geolocation and, finally, campaign delivery. In this case, it downloads from the Apple store an iOS app called "POP! Slots," a slot machine game.

                The fake jailbreak process tells the user to have fun for seven days to ensure their unlock completes.



                This is obviously nonsense — the user will merely provide more interactive sessions through the gameplay, which may result in additional revenue for this attacker.

                Domain information


                We identified several countries that could have fallen for this fake website using Cisco Umbrella. The main concentration was in the U.S., but with many other countries throughout the world being potentially targeted.



                The U.S., U.K., France, Nigeria, Iraq, Vietnam, Venezuela, Egypt, Georgia, Australia, Canada, Turkey, Netherlands and Italy were all targeted nations for this campaign.

                The domains were all registered within 24 hours of the checkra1n[.]com official website. The attacker even clearly followed information on popular sites like Reddit, ensuring they remained vigilant and updated their website.



                Conclusion


                This malicious website simply leads to click fraud. But the same technique could be used for more malicious and critical actions. Instead of a "web clip" profile, the attackers could implant their own MDM enrolment. We previously discovered iOS malicious MDM campaigns here, here and here. We strongly recommend to never install an unknown profile from the internet.

                Talos recommend the following methods to check if your phone has additional profiles or is enrolled in an MDM platform:

                1. Users can view restrictions set by MDM profiles in Settings > General > Profiles & Device Management > [MDM configuration] > Restrictions

                2. Users can also check which applications have an MDM profile installed on their device in Settings > General > Profiles & Device Management > [MDM configuration] > Apps.

                Note: If you do not have any PROFILE & DEVICE MANAGEMENT menu option available, this means the phone is currently not enrolled in an MDM, nor are there any additional profiles trusted on the phone.

                Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution

                $
                0
                0


                Aleksandar Nikolic of Cisco Talos discovered this vulnerability.

                Cisco Talos once again would like to bring attention to a remote code execution vulnerability in Adobe Acrobat Reader. Acrobat, which is one of the most popular PDF readers on the market, contains a bug when the software incorrectly counts array elements. The same code present in the previously disclosed TALOS-2018-0704 and TALOS-2019-0774 could trigger this vulnerability, allowing the attacker to potentially execute remote code. Adobe previously patched those two vulnerabilities, but the fixes did not cover all possible cases.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Adobe Acrobat Reader DC text field value remote code execution vulnerability redux (TALOS-2019-0860/CVE-2019-8183)

                A specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC, version 2019.012.20035. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page. The vulnerability in this advisory is the same as TALOS-2018-0704 and TALOS-2019-0774, as it wasn't properly patched to cover all cases.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that Adobe Acrobat Reader DC, version 2019.012.20035, is affected by this vulnerability.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 48293, 48294

                Threat Source newsletter (Oct. 17, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It’s rare that iOS jailbreaks make it onto the scene. Apple is usually able to patch them out quickly. But a recent exploit is actually unpatchable, and researchers are racing to release tools that can allow users to jailbreak their phone. But malicious attackers are also trying to capitalize on this opportunity. We recently discovered a malicious site that promises to offer a jailbreaking tool, but it actually just conducts click fraud and installs a malicious profile onto the user’s device.

                This week, Adobe released its third patch for a vulnerability we discovered earlier this year in Acrobat Reader. An attacker could exploit this bug to gain the ability to execute arbitrary code on the victim machine.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: Talos at BSides Belfast 
                Location: Titanic Belfast, Belfast, Northern Ireland
                Date: Oct. 31
                Synopsis: Several researchers from Talos will be on hand at BSides Belfast to deliver four different talks. Martin Lee will provide a general overview of the benefits of threat hunting, Nick Biasini and Edmund Brumaghin will walk through a recent wave of supply chain attacks, then, Brumaghin and Earl Carter will deliver their “It’s Never DNS....It Was DNS” talk, and, finally, Paul Rascagneres walks through his recent research into attacks on iOS.

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Cyber Security Week in Review

                • Postage service provider Pitney Bowes was hit with the Ryuk ransomware, briefly taking some of their systems offline. The attack also impacted some U.S. Postal Service services. 
                • Baltimore plans to buy a $20 million cyber insurance policy in the wake of a ransomware attack earlier this year. The policy includes incident response coverage, business interruption loss and ransom payments.  
                • The U.S. reportedly carried out a cyber attack against Iran on Sept. 14 in response to an attack on a Saudi Arabian oil facility. Military officials say the attack was meant to reduce Iran’s ability to spread what they called “propaganda.” 
                • Two Moroccan activists were targeted by the Pegasus spyware. The human rights defenders received numerous SMS messages containing links to malicious websites, relying on zero-days in iOS to exploit their devices. 
                • Google’s new line of Pixel phones will allow its AI to automatically transcribe voice notes— even if the device is offline. The company said all translation happens directly on the device. 
                • An ATM malware that forces the machines to spit out all the cash they contain is spreading across the globe. A new report suggests that these so-called “jackpotting” attacks are on the rise this year, though they are not widely reported on. 
                • Mozilla says it is beefing up Firefox’s security to protect users from code injection attacks. The web browser will no longer utilize inline scripts, improving the “about” protocol. 
                • The Chinese government is promoting a mobile app that may allow them to spy on more than 100 million citizens. The app is even mandatory among government workers and communist party officials. 
                • An underground, online marketplace selling stolen credit card numbers was hacked. Roughly 26 million credit card numbers were rescued from “BriansClub,” 8 million of which were uploaded this year. 

                Notable recent security issues

                Title: Apple WebKit opens users up to malicious advertising 
                Description: Multiple vulnerabilities in Apple's WebKit are allowing attackers to serve users' malicious advertisements. This campaign affected the Google Chrome and Safari web browsers on iOS and MacOS, but the vulnerabilities were all patched out in Apple's latest series of security updates. All the ads centered around the user's specific mobile carrier, hoping to entice them to visit malicious websites. The vulnerabilities would allow the ads to break out of any sandboxes in place.
                Snort SIDs: 51821 - 51824, 51831, 58132 (By John Levy)

                Title: Remote code execution bug in vBulletin 
                Description: A now-patched vulnerability in the popular service vBulletin is allowing attackers to completely take over sites that use the software. vBulletin powers the commenting functions for many popular sites. An attacker could exploit this vulnerability to gain the ability to remotely execute malicious code on any vBulletin server running versions 5.0.0 through 5.5.4. This bug was initially dropped as a zero-day by an anonymous user, but has since been patched by the company. The Snort rules below prevent any attempt to inject code into the server using this bug. Marcos Rodriguez wrote these rules.
                Snort SIDs: 51834 – 51837 (By Marcos Rodriguez)

                Most prevalent malware files this week

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5 
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: Eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A 
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A
                Detection Name: W32.46B241E3D3-95.SBX.TG 

                Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTube

                $
                0
                0


                Yuri Kramarz of Security Advisory EMEAR discovered these vulnerabilities. Post by Jon Munshaw.

                YouPHPTube contains multiple vulnerabilities that could allow an attacker to carry out a variety of malicious activities. Specially crafted, attacker-created web requests can allow an attacker to inject SQL code into the application in some of these cases. YouPHPTube is an open-source program that can allow users to create their own, custom video sites. The software is meant to mimic popular websites such as YouTube, Netflix and Vimeo, according to its website. If successful, an attacker could use these vulnerabilities to gain the ability to exfiltrate files in the database, steal user credentials and, in some configurations, access the underlying operating system.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with YouPHPTube to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details


                YouPHPTubeEncoder base64Url multiple command injections (TALOS-2019-0917/CVE-2019-5127, CVE-2019-5129)

                Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3, a plugin for providing encoder functionality in YouPHPTube . Specially crafted web requests can cause commands to be executed on the server. An attacker can send a web request with parameters containing specific parameters to trigger these vulnerabilities, potentially allowing exfiltration of the database, user credentials and compromise the underlying operating system. Unlike the other vulnerabilities outlined in this blog, an attacker does not need credentials to log in to exploit this bug.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/pluginSwitch.json.php multiple SQL injection vulnerabilities (TALOS-2019-0911/CVE-2019-5121, CVE-2019-5123)

                Exploitable SQL injection vulnerabilities exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube/plugin/AD_Server/view/campaignsVideos.json.php id SQL injection vulnerability (TALOS-2019-0910/CVE-2019-5120)

                An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6 Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/subscribeNotify.json.php user_id SQL injection vulnerability (TALOS-2019-0909/CVE-2019-5119)

                An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/subscribe.json.php SQL injection vulnerability (TALOS-2019-0908/CVE-2019-5117)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/videoAddNew.json.php SQL injection vulnerability (TALOS-2019-0907/CVE-2019-5116)

                An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/commentAddNew.json.php comments_id SQL injection vulnerability (TALOS-2019-0906/CVE-2019-5114)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system. 

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Researchers tested and confirmed that versions 6.2, 7.6 are affected by TALOS-2019-0908, TALOS-2019-0907 and TALOS-2019-0906, TALOS-2019-0909, TALOS-2019-0910 and TALOS-2019-0911. Version 7.6 is affected by TALOS-2019-0917.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 51587 - 51592, 51597 - 51599, 51600 - 51602, 51608 - 51610, 51924 - 51928

                Threat Roundup for October 11 to October 18

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 11 and Oct. 18. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Malware.Zusy-7288173-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
                Win.Trojan.Lokibot-7288215-1 Trojan Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
                Win.Worm.Esfury-7292180-1 Worm Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.
                Win.Malware.Emotet-7292844-0 Malware Emotet is one of the most widely distributed and active malware families today. It is a modular threat that can deliver a variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Packed.Gozi-7329531-0 Packed Gozi refers to a family of banking trojans dating back to 2006 with many well-known descendants and variants, including as Ursnif, Dreambot, Vawtrak, and GozNym. Its primary purpose is to steal login credentials for financial institution websites.
                Win.Virus.Neshta-7330232-0 Virus Neshta is file-infecting malware that also collects sensitive information from an infected machine and sends it to a C2 server.
                Win.Malware.Gootkit-7333291-0 Malware Gootkit is a banking trojan particularly interesting due to the anti-analysis techniques that it employs. It has received several updates that implement new procedures for evading automated analysis and hindering reverse engineering efforts.
                Win.Dropper.Remcos-7334963-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. Remcos is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Dropper.Trickbot-7340237-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                Win.Malware.Bublik-7340719-1 Malware Bublik is a downloader that targets Windows hosts. Although it's primarily used as malware to distribute various banking trojans, it's also capable of extracting and exfiltrating sensitive information from the host.

                Threat Breakdown

                Win.Malware.Zusy-7288173-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: F9E7DE7B
                43
                MutexesOccurrences
                F9E7DE7B43
                5D79E0A319
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]218[.]185[.]16223
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                spaines[.]pw8
                Files and or directories createdOccurrences
                %HOMEPATH%\AppData\LocalLow\F9E7DE7B43
                %APPDATA%\F9E7DE7B43
                %APPDATA%\F9E7DE7B\bin.exe43
                %APPDATA%\5D79E0A3\bin.exe23

                File Hashes

                035bcabbe75aa88cbb8dc016119ad2c1901ea759fb90b69eee45b3809e98f381 066b0fc2b1d64ddd9ff30b8046686a6cc8f43656e54f8301ddd7d3a1baf9170c 0a8cc8f4dc0dc5c04431546304d67187403caa684d60ff0787084fdde5d40abe 0c04864961c1edea6dd4231766af85f4031d3eae0756eec731bba81a98b46505 0f00ea06e5b2bc5801a0d4370facc65c0a51e00d810d9f6b16723629a1b7536b 0f91c67b52b53430a9bd2e1a9df5b151056cfee5f026c1da0b5e2342cf9c936e 107dff905969dbbe792ab5d170f2d47538afe49fa6c07f20b26f4de1edd88688 125e0437a1098570183dca847d7533461318214e4a5a746c5ed7933a1cc8d17d 130c0eeebc22bcc4fd4edf40239b66fc5d12d497c7a39851a580e82aa4433e9a 1746421b4db63c1a41a395541947fb44e9f889fd0ea62b9de6759b42c3f5e096 181be8f9157f806aea3f70181b143e12a8c95e85842f10dc31120db4dfb0e1a5 19af7d81cf89adf71bb0af50d6bfe4171b7454daaece6e2883aa08fa06629274 203bfb6936585624eaeefadb5ef6f0679663b09df0b46d9a9945936a787ab20b 2143c563658e9288b205d78775d73ab849ef5de550a398d6976e44c93988da98 217b3f26c0b5033615a26161c5f34b42ac6dc3c12385b9efcc5a6baab1ca0369 225ebaaeafb848823607654663516210377b0901e5e354c8603b9c8c2d85a650 28e5c75b145351bc1cc78829e43328a25d14028aff806947884e60940c8572f8 29ab42409df20428f7e03bce732c534698c260338e410985d112ce4410738579 2a94932f389d8c44cea94a8ac8099869312cd3337d81a423e58bcf041819f803 2b8c4770f8239882117c9e990e9a96aeb134d23be3f3cd147800594d4aad9992 2e668b329248a40c1f1dd54864023731d6862dce26efe70690d7e6ad9f2082f5 310a36c24661d877f07b3c6745efe7cf3d2480f7d43f1361cfe71ac3a6196068 43039465047c23211ef9831701d46fcb73effcf40ca7485c95a6d9c786ca6c5f 4b105589e8a96f695998816c224f250bcc02973f92bcbace3205487c75a4877f 4eb88671b506f84d1f3bd63c7e857e1082820f2d90aba7091a93bf70d9f6d290
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Trojan.Lokibot-7288215-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: D282E1
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ousehehehheheheh
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ngngngnngngngn
                1
                MutexesOccurrences
                3749282D282E1E80C56CAE5A16
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                185[.]55[.]227[.]1472
                5[.]160[.]218[.]882
                8[.]208[.]76[.]801
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                suksez-ab[.]com6
                versuvius[.]ru2
                novinsazvar[.]com2
                majidfathalibeygi[.]com2
                lapphuongshoe[.]com1
                pliykies8[.]net1
                orientsdelivery[.]xyz1
                arkhesol[.]info1
                Files and or directories createdOccurrences
                %APPDATA%\D282E116
                %APPDATA%\D282E1\1E80C5.lck16
                %HOMEPATH%\ousehehehheheheh\ousehehehheheheh.exe1
                %HOMEPATH%\ousehehehheheheh1
                %HOMEPATH%\ousehehehheheheh\ousehehehheheheh.vbs1
                %HOMEPATH%\ngngngnngngngn\ngngngnngngngn.exe1
                %HOMEPATH%\ngngngnngngngn1
                %HOMEPATH%\ngngngnngngngn\ngngngnngngngn.vbs1

                File Hashes

                11ce93263d26a1d77158f01d3964e36753a90e26487560b52e26658dd935d2f8 4e0b291e2ce71731179d297d11186265907fe73ae9feb6734d9520784dd643ab 6333008e4ed2f8af449faa9c222bf412733928a4dd0fb8011ef50d07f23bb926 6c5b6bd100bdbb0680c9bcefc4fddeec307400fcbef04bc8adaf466b99a3bd69 7a8ace6f25d06c3b91e5aeb33304576fda2ec9664caee9f1489bfd39392d927b 7ad49cca3a6db9a75954dc7d137ed702cf3b5102588e22234a53861d47df1371 842f8e3e24829467b0c4becd601cf310569cfc40320fef7242dd05d292c02bea 906215654e5e6e6cee920b8d245c0eb7dedcc35e923e0e50f1cb8091339ef420 930dea8f876d9f5f8f0d49886477b7d22fb72a73c5d22f01f0f0fb8fe674b076 9627bcfd08a534505001cb8e2e3166cba4e60dc20af10dfa50a00c24425447b3 9986a87b66047bca053c918b33d18c4779c25afa0badfdec5e15742c98cb214e 9e4101e8a41db4810e032fcf0c13eb3dc1213b0d864ab4a0b76183ee17ec6fa9 a84d17a5eb16dfc8202648bb9580a3381d71b567069efb68339607c2c3594e23 c3e63e52d9810263c08ae33457a8995f822d6159b61904e77c1d338fa4dd0513 f3c3be739e71786ca3a56d7570a109593ebedeec931be2eaca8b241a6d008dae f93b944b29282aa07065b9f34298db2b351cdbbe60c340984d6bb4bb822d9763

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Worm.Esfury-7292180-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GPEDIT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PRCKILLER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PORTMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PROCEXP.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PROCMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FILEMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FIREFOX.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CRASHREPORTER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UPDATER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HELPER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CHROME.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\OPERA.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SAFARI.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NETSCAPE.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCONFIG.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVNOTIFY.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVSCANAVSHADOW.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVUPGSVC.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVWEBLOADER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVWSC.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FACT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GUARDGUI.EXE
                Value Name: Debugger
                19
                MutexesOccurrences
                @0MPfV5@mqt«sL+EVQ@XPbGP9@19
                @0MPfV5@mqt sL+EVQ@XPbGP9@17
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                50[.]23[.]131[.]23513
                104[.]28[.]24[.]17911
                67[.]202[.]94[.]937
                67[.]202[.]94[.]947
                104[.]28[.]25[.]1795
                67[.]202[.]94[.]864
                173[.]192[.]200[.]703
                35[.]231[.]151[.]72
                208[.]100[.]26[.]2511
                5[.]79[.]71[.]2051
                5[.]79[.]71[.]2251
                206[.]189[.]61[.]1261
                35[.]229[.]93[.]461
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                widgets[.]amung[.]us19
                whos[.]amung[.]us19
                dns[.]msftncsi[.]com19
                www[.]whatismyip[.]org19
                z-9-4-0-l-n-x-5-6-g-6-4-y-1-u-6-f-8-e-1-2-m-h-z-k-l-5-q-3-j-7-[.]xz5-af-fj-o4-it-ok-n-9j-zjg-pz9x-1z-zekv-y4f-acg-cq3v-j[.]info3
                7-0-3-h-m-a-v-l-c-b-3-z-q-d-7-p-k-7-r-7-a-9-b-t-n-2-v-y-o-y-9-[.]5-68-wk-5g-z2-pu6-e5x-4h-yij-yx-duv-wpx-2r8-7vc-ox-4q-u[.]info3
                l-r-j-5-m-2-x-1-n-9-4-3-y-1-5-1-2-2-r-o-s-i-6-d-x-6-6-k-p-n-y-[.]rb-e-e3-j-fi-1-il-h-il-3e-z-u-r-u-lk-h-wm-3-6-g-0o-s-dx[.]info3
                www[.]kryptoslogic[.]com2
                n-0-2-q-l-1-3-3-y-7-4-9-p-q-r-9-9-h-f-u-9-7-4-y-8-g-2-9-v-z-u-[.]81r-x7-tr2p-7c-5lk-huxs-0wq-bma-0wvi-2y-a8s-elw-hv-o0-6[.]info2
                8-5-q-5-9-a-2-t-5-z-7-8-v-m-r-9-0-3-4-6-0-5-h-m-a-8-6-b-z-4-5-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                y-n-f-3-8-5-3-5-1-7-9-k-i-7-z-8-8-h-k-x-l-9-7-9-j-5-w-x-8-0-2-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                2-l-q-l-o-0-5-x-8-5-3-6-3-c-3-u-6-1-6-9-7-t-7-i-8-k-g-4-8-2-l-[.]mw9g-ns-k-q0-e3r-6s-23-m2wf-7xy1z0-c0u-5wc-g0rb-2-1-5-l[.]info2
                l-6-0-2-c-d-a-5-9-w-4-7-5-6-t-g-6-6-9-i-9-w-l-0-a-3-1-0-p-v-9-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                4-7-3-9-r-h-h-j-5-n-2-i-l-6-l-9-0-4-l-9-t-3-g-0-7-4-n-8-r-d-4-[.]rb-e-e3-j-fi-1-il-h-il-3e-z-u-r-u-lk-h-wm-3-6-g-0o-s-dx[.]info2
                c-0-r-5-0-5-c-7-i-z-v-4-2-j-5-n-s-1-6-d-y-z-8-r-8-s-5-j-y-t-2-[.]i-9t3-sy-7i-5j3-sf7-8z5-54-n8v7r-0-ih7-36992m-o3-0q-g-3[.]info2
                1-j-7-k-x-2-7-7-4-i-6-2-5-e-2-2-4-5-y-0-7-u-6-9-m-6-m-o-8-x-0-[.]h6y-aj-r6-ut0-jwl-9-th9-i4k-nt1s-sz4-mk4-ahr-hf8-yi-c-6[.]info2
                4-s-1-c-f-p-0-f-8-n-x-7-o-i-8-6-4-7-m-w-5-z-0-g-8-9-6-u-7-3-u-[.]2e-01j-y1a-zu-s-no-bq-q1p8-qjr-j1hr-nh8-22-af3q-7q-gu-7[.]info2
                k-1-e-b-0-x-j-0-i-8-p-o-5-r-8-m-0-3-3-f-2-k-c-8-6-6-q-s-3-7-d-[.]0-0-0-0-0-0-0-0-0-0-0-0-0-37-0-0-0-0-0-0-0-0-0-0-0-0-0[.]info2
                1-5-4-t-6-y-m-k-1-3-9-r-u-8-5-3-x-s-2-t-8-2-2-3-7-k-u-u-7-0-4-[.]p9b-8-na-5w-2z3-djmu-7pk-qy-0-bok-re9-ym-v9h-av-njx-2es[.]info2
                t-3-r-2-p-0-h-n-g-m-z-8-u-r-m-i-x-r-l-x-4-2-4-9-m-p-9-1-0-5-k-[.]81r-x7-tr2p-7c-5lk-huxs-0wq-bma-0wvi-2y-a8s-elw-hv-o0-6[.]info2
                2-g-6-2-s-x-7-7-x-7-c-s-a-a-q-5-d-9-3-a-7-4-3-4-0-8-u-u-e-9-w-[.]0-0-0-0-0-0-0-0-0-0-0-0-0-9-0-0-0-0-0-0-0-0-0-0-0-0-0[.]info2
                l-v-4-r-s-5-o-4-5-m-6-6-l-8-s-6-5-g-v-n-0-4-u-8-i-h-9-m-q-1-9-[.]h6y-aj-r6-ut0-jwl-9-th9-i4k-nt1s-sz4-mk4-ahr-hf8-yi-c-6[.]info2
                4-0-6-4-p-2-j-2-6-3-1-e-c-7-i-x-s-d-l-7-e-o-0-h-w-9-7-6-b-d-4-[.]v32c-to-5-8w-0yc-tzl8-h2a-7f-ezc-oxt1-7-8y-0elh-be-3k-d[.]info2
                4-i-0-0-q-y-s-3-3-y-6-9-9-9-3-s-p-9-b-e-z-p-b-9-4-8-3-t-g-0-u-[.]p9b-8-na-5w-2z3-djmu-7pk-qy-0-bok-re9-ym-v9h-av-njx-2es[.]info2
                k-h-4-2-o-5-8-0-z-g-3-j-3-2-3-0-n-h-o-v-1-d-u-j-i-s-2-o-i-r-h-[.]i-9t3-sy-7i-5j3-sf7-8z5-54-n8v7r-0-ih7-36992m-o3-0q-g-3[.]info2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \autorun.inf19
                \$RECYCLE.BIN .LNK19
                %System32%\drivers\etc\hosts19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\Desktop.ini19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe19
                %HOMEPATH%\Administrator119
                %HOMEPATH%\Administrator1\winlogon.exe19
                E:\autorun.inf18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-704618
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\Desktop.ini18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe18
                E:\$RECYCLE.BIN .LNK18
                %HOMEPATH%\Administrator1\VERSION.TXT2

                File Hashes

                094d75233bfdfc837e0b461eb47ef442277b022f102b8f6adc80e20ec0909e2b 0f32b4ed36c393942ae9177eb4b2acd977bb2283de1b3278256a24049c2e7b8f 14e3b621de29654add1fe1fe1a1770279330dfb1920cdd0bc92cdd0f8ca489f6 17ce758c92d7c785b153845c53809f7b04a77d6f0352dff7944057cb6ace4c8f 1a6aab3064593291c0696c1efd2ac2dcd5df96bf923ae7670562cfeac3ee5478 47f286283bb6d0451650d993e656cfe32c33fc547838b8fe7cfbf1f648694d1a 5a5c0a62f7d53b6b1ee826a5baf8ff0c39d35ce6817fbee78a6398355747042f 78d3586250c6c996c1412daf885e59ca954a77384ad4eda4028f2a81024dcf1c 7de79a67d497d9bb88af291e625b233a9972f2aae9cff137c6416689e50aed98 920e28b817c5d1376715b7654ee6c5476b6b80adff54bafe2f7c5f1d952f1bc9 a3ea1ebdf50099d17c429042c5c6faeb7a60d6f42d9256ce3e89a217fed81198 b4c81dcc370ebb3bb2361000a64e87d15939c1dc10beb740b577de29cd8dde93 b75e84103d3e74ab2ab1b3a0bab01e0272fd361ec808942a598a0165e169edb0 b7e13fae589f5403964e0169c1269c91ddd6a7e06f06404207ca4f61922fa30b ba4accd438dedd49930217bcd04cda2230e3a9d32d1f457ab98c50dec9dffa9e d3867c8d29d5f430de171e9269a1766ed9b0a565dd38bb01438f50fd7902c6ea d70d846815613e61511492bafcc00470c9af8579b1491fa9996a1f5267e47ce2 eae56ea32d876fa7b1559e6e005c9572f3ef8a84665ff660c3e21180f646d220 f4bbf7ec8be46bc611663482937506b1288b5f2d0b479df2d4aa24a5207435ba

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Emotet-7292844-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyEnable
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyServer
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyOverride
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: AutoConfigURL
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: AutoDetect
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecisionReason
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecision
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadNetworkName
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDetectedUrl
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                Value Name: CachePrefix
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                Value Name: CachePrefix
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                Value Name: CachePrefix
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Type
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Start
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ErrorControl
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ImagePath
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: DisplayName
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: WOW64
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ObjectName
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL 24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecisionTime
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\88-22-E5-B6-57-EE
                Value Name: WpadDecision
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\88-22-E5-B6-57-EE
                Value Name: WpadDetectedUrl
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\4A-80-98-B4-22-0C
                Value Name: WpadDecisionReason
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\4A-80-98-B4-22-0C
                Value Name: WpadDecision
                1
                MutexesOccurrences
                Global\I98B68E3C24
                Global\M98B68E3C24
                Global\M3C28B0E424
                Global\I3C28B0E424
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                74[.]125[.]192[.]108/3115
                82[.]223[.]190[.]138/3113
                17[.]36[.]205[.]7412
                193[.]252[.]22[.]8610
                62[.]149[.]128[.]17910
                213[.]209[.]1[.]144/3110
                62[.]149[.]128[.]200/319
                212[.]227[.]15[.]1588
                193[.]70[.]18[.]1448
                195[.]110[.]124[.]1328
                81[.]88[.]48[.]668
                62[.]149[.]157[.]558
                74[.]208[.]5[.]14/318
                86[.]109[.]99[.]70/318
                91[.]83[.]93[.]1058
                80[.]67[.]29[.]47
                107[.]14[.]73[.]687
                74[.]202[.]142[.]717
                212[.]227[.]15[.]1517
                62[.]149[.]152[.]1517
                86[.]96[.]229[.]28/317
                62[.]149[.]128[.]210/317
                37[.]187[.]5[.]827
                185[.]102[.]40[.]52/317
                70[.]32[.]94[.]587
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                smtpout[.]secureserver[.]net12
                smtp[.]1and1[.]es10
                secure[.]emailsrvr[.]com10
                smtp[.]orange[.]fr10
                smtps[.]aruba[.]it10
                pop3s[.]aruba[.]it10
                smtps[.]pec[.]aruba[.]it10
                smtp[.]serviciodecorreo[.]es9
                smtp[.]office365[.]com8
                smtp[.]secureserver[.]net8
                smtp[.]mail[.]me[.]com8
                pop[.]secureserver[.]net8
                smtp[.]1und1[.]de8
                smtp[.]libero[.]it8
                mail[.]aruba[.]it8
                pop3s[.]pec[.]aruba[.]it8
                mail[.]serviciodecorreo[.]es7
                smtp[.]outlook[.]com7
                mail[.]outlook[.]com7
                smtp[.]mail[.]com7
                mail[.]secureserver[.]net7
                pop[.]serviciodecorreo[.]es7
                smtp-mail[.]outlook[.]com7
                outlook[.]office365[.]com7
                smtp[.]aruba[.]it7
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\minimumpixelb.exe1
                \TEMP\5wgj1pj85exl95u.exe1
                \TEMP\zk_4987.exe1
                \TEMP\60hmsbnu_02.exe1
                \TEMP\5jg_9376.exe1
                \TEMP\cven8_6.exe1
                \TEMP\ifm_6.exe1
                \TEMP\uv1m953217in7u.exe1
                \TEMP\d6xka8_28.exe1
                \TEMP\z_0.exe1
                \TEMP\9_8776851.exe1
                \TEMP\5kn4h7rfngma.exe1
                %SystemRoot%\TEMP\8435.tmp1
                \TEMP\q_8103149.exe1
                \TEMP\m4tpybzlh_327464286.exe1
                \TEMP\15pk0i_09552197.exe1
                \TEMP\izp8se3tl3b.exe1
                \TEMP\2qcsdiacpc_27712037.exe1
                \TEMP\18k5b_0082228.exe1
                \TEMP\w_752582225.exe1
                \TEMP\43vcrfe61.exe1
                \TEMP\n0n_4621.exe1
                \TEMP\su1ygco.exe1
                \TEMP\ujtcb6ddd.exe1
                \TEMP\su4gvrcyup.exe1
                *See JSON for more IOCs

                File Hashes

                066d31cc0e6f45e89297334aad69cca12d60e9b4fe6aad341d08bcf6bce37c45 0fe2c7cfab6e55d92fcfe60d66e236bef5d44450c6ae7b759bf694f6097d935d 14bc54ea2759508a18c4e79734d328510897db0a2c71bd4ac2dffb34f99df2b2 1e4cdfb7252c74369fc5007e70c6746994f9e7a2e9f2f11b3012718b415d77a1 289c04314df3679f04bf1817fbf1589fb19dbd481f8c20daac8861068a7c5a32 2bc8c8cf127365a2a94bf47dc26ae14d11e62c38fd0df564bfc7867e025d94c1 3251a00155619dd1ba363b7fe477dab326fe791d2135129d3133c0cb716dd58b 4a98c1b48e25ed7a590d7fc89d65e07e40896e90c7977658c3bfcd8da7392181 52dae4128bb378dc4a877aab9287fc1ceb7576e1cc8506351a5679c6e9dd2e95 5e121e16757f3a3bafbc9b3e696de9473b4f1af5a314194cdfca68ab40332e9c 5ef1a5f4d7f7e3fd74392e514680e3439de5af3c1c818d560d82a62c77eb0a91 63cb6cd04a691f5af02e6a045cdf357e93ee8be5002100b90088b5dd65b24b70 640086c532c00aade40f11146f735fd3e969fe1565e5890800fe4b7551100523 68cb95f7e0d2a77e5a4832fb75243520a5ccc109849bbc933062379df4e7d164 9af3c4f8514d9c318ac90df6fc0e3a0278b41247ecd568b30a8266d0370f3eb0 ac8e332e3a99f1020e0cfeddfb672501d9da72d025d35c5edbcd0f347d5fb6a1 b5617d46830e9a3a362c97b9c6140c15c04b1dd64136ac1abf1dea3e65d83ccf b6c5d6655ef066545f8b9b8094c7347bf283e771b8f9b46b8e8f6e08144dcf13 b77f540a0cf278192870bab7fa677c0e858269ce1321814573934a6d095d89e4 cdbe742cd698ed504e7636811a13b8328c0a9905f4158fb25cde01dca66230fc d8614f65c65df8ca408d493fa9ef65894a84d9a49ddcb08be7b0798b670d367d db9ab62920e6a46ca2ed59de12132eb16c5c6205f3328a4d5a26cb52ae298ebb e6630adfc5882be333236fd4da6b8fb8c86866b4768b7914fa9102a3de3bc3b0 ee35b43c9bf1a9c24ab983a470e1cf5eb9508c741df45f5829c8d918a771b584

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella



                Win.Packed.Gozi-7329531-0

                Indicators of Compromise

                MutexesOccurrences
                Local\55C37268-60E9-964A-3299-E2046F3CC61372
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                193[.]183[.]98[.]6672
                51[.]15[.]98[.]9772
                192[.]71[.]245[.]20872
                172[.]104[.]136[.]24372
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                api[.]frame303[.]at72

                File Hashes

                0003b0a5bfd7488160015e4e0e81e2d2a61ea5f5db53cabd9b4a404be8412250 0551e4b2c94f0796f7bd0108a1415ddbbb1126b9ff489fc5467e7dc3ab602f9b 064409558cbc89bbff58cbd3baaad0227a15109d4771635deb4b4f5a7f226ff3 0c527506d50c4f105f4e85180c3f2e2db58d969303883e7fdda26673d7a9e460 0ef66832ac9e94ce9f81840d4a40fa5e65bab3d930ad93503fbd77de4b74559a 10b22994ffe103af6f1d690ba1abf3e13cec9712a913ff024d9d1c656b92dbc0 12e98f72b4b5e225a1d465a7b121f56360bc9fd6ad538d56ee774874e4159e97 135653620d85d3016638d83a2f863eb480bc5e5f113f45e357037aedc7dd045a 1bd260a766aef952a2bb52dc926af5042f7d0361a5d869a167465400ab4af823 1fbeca47536689cd3ab5b692171a6bd8c93cd21a2d327d107631ce98e85429bd 23e78be8e4244831011a7bd02e497d15cf8ab29b8fd647881418e664ff0ab4be 2be8b60b9bf8fc8f81e8c1ec54af862351e6428922f285d4c816d64aab86189a 2de56515f487b70c3ad879e784838da3efb0d3f44539c1eddd9ea218398a3335 3214ab12ebd572aff4147227140915d21f0c5ca0f3efb949cf6796356f6d4d11 33a74f4ec4ae12674a0079c6af7c22c059ca950690a82e1fd11e4bb1f3f21305 3509cf8e68799db2677703e49caea882b6d2c5971379ac0e8619aeb30876a2a8 384373f044464197697af0c96e2028a6d76875524d6bf6650ff68a5e5e92eabf 3bf729f719580998bd65e13d02129e96efdd74448f84c504829f418ed87607e3 3ce58e9e556c87216307495378b2b1d0eb61517771b9bb10426a2ab7d14aeefe 3da63842c752a0c705180cea273b0b397ebb3cd9b8e6087401db14fe254a44ff 3e41a7ae208fa0e8cf28a8610533dd2ef965062f38577af2c35dd8f8950669bf 42ce932aae9b15b7deaf92694fb5a4db12f0bf9936da2f1d06c7a20714af3ca0 47109959af2b7fee21af66b6eeaf948ad4bb28c7428f59c9bb90ac7ea3753f24 48f89fac46dcc1f813d87d4cbedbae83d90f660558718e52bdcad554d71ecd35 49cf6e4d3589018819869dc3cd1733a1b3c42326b52cc0e48edafe113593019c
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Virus.Neshta-7330232-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\CLASSES\EXEFILE\SHELL\OPEN\COMMAND 25
                MutexesOccurrences
                MutexPolesskayaGlush*.*svchost.comexefile\shell\open\command‹À "%1" %*œ‘@25
                Files and or directories createdOccurrences
                %TEMP%\tmp5023.tmp25
                %SystemRoot%\svchost.com25
                \MSOCache\ALLUSE~1\{90140~1\DW20.EXE25
                \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe25
                \MSOCache\ALLUSE~1\{91140~1\ose.exe25
                \MSOCache\ALLUSE~1\{91140~1\setup.exe25
                %ProgramFiles(x86)%\Microsoft\Office14\1033\ONELEV.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\1033\SETUP.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\ACCICONS.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\BCSSync.exe25
                %ProgramFiles(x86)%\Microsoft\Office14\CLVIEW.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\CNFNOT32.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\GRAPH.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\GROOVEMN.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\IECONT~1.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\INFOPATH.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOHTMED.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOSYNC.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOUC.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSQRY32.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSTORDB.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSTORE.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\NAMECO~1.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\OIS.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\ONENOTE.EXE25
                *See JSON for more IOCs

                File Hashes

                010a8e1d056b6a79142ec8abc46ae9bcd54c914f62d453370e4b74e75076b1e0 017ebabf7dc178eea75e6a5c9fe393a2f04bee2739e1d8d8085ceb4f6cf536c8 01e63cc8ed89f76c54a66baf631072f275ca0b4d90f316b3582325637260c206 1077dd3eae47e67505ddbfca24db29cc86a8272f4cd292dc134f8b3abfac2350 1d62a3dc5a827604e330ff1ee26dd32786b2b371adec06bc136c4d02dc31d3a1 1e5802bd82d8f5944e573720a81ba56de336600e576c8b6b095d1130b61c5e16 22b47cc60096f63ec4e90f65a710013688d51f6e1350df7165fe78eabc289973 24cd7a38f026dd924b59253c62616dec2bc20498ee7226be8a00bcfa1631e164 2d3c192dd31356f05dd53a8b0d489a48bbb28e0dfc02be3337e572d5b6e78ad5 2df99a6334f489425dbe0e0cb2b84e2fc708ead88e4bfcf8773bd614f16ab97b 321019b6ce05ad99ae59065d7c18f8ea6467809973eaf57b01e7482c6701e1ad 34bc860348e7b7600d41043ff0b613b93c91e3d079a066f7cd7e3a25998fb0e5 34d03297d8dfaaad8b61b26b2b45287da4a3b252a47bc9fd64bcd4cb1478f2c7 364f32c03907258b42fdd69dc0015a130e1604398d86ae4302d912bfdcf7e129 376fa4f35782601e163d4d8f8aca8589ab4b44d44b89bf13c50c639809976b87 400e12d8203bbafff024427b8287ccbc580060b4c2518127364e559b6c1dbc5b 411d9aad484f849527e3c0ea7c3f08cf5ceae2d62766c5de08fdd16e33154516 425de37d3bb1fcbac8b837fb625b5fc76c9ca2403a298faef8587aef28b0c4a9 4305e15188cc8a790513b9dd280706b13a4c3ecd53e79d7ad2c51177b3685676 496fb4b66415e7269cc6f20be797434401d94876757f6a5e0e1e0732fb27dc41 4ddb68f739d10596394f5ddc102ae1cd688630d98f58317ee50aba958d4cc6be 54a789da6eb9b456025487c386077e168b96e99682b2ede1f3d2a5609b1410e9 5845d3c49fd007012f5ee92b271757221d53eb948ecb6acacb924e5c2a8845c3 5a675fced512cadb2971f8d23d8d66aecae3c62e54cdbf110aae55facf609aee 5b3da2505153ca4146151f8d7de873868ce3041487c343cf5a43a30fd223cbe4
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Gootkit-7333291-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\IEAK 26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS
                Value Name: Count
                26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS
                Value Name: Section1
                26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY 26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS 26
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_14
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_15
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_16
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_17
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_18
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_19
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_20
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_21
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_22
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_23
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_24
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_25
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_26
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_27
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_28
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_29
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_30
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_31
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_32
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_33
                2
                MutexesOccurrences
                ServiceEntryPointThread26
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                109[.]230[.]199[.]134
                208[.]91[.]197[.]913
                31[.]214[.]157[.]1623
                185[.]189[.]149[.]1742
                176[.]10[.]125[.]872
                192[.]35[.]177[.]641
                185[.]212[.]44[.]2091
                185[.]158[.]249[.]461
                185[.]212[.]47[.]971
                109[.]230[.]199[.]2481
                31[.]214[.]157[.]141
                109[.]230[.]199[.]1801
                185[.]158[.]248[.]1331
                194[.]76[.]224[.]1231
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                me[.]karysmarie[.]me2
                adp[.]mjmentertainment[.]com2
                kkillihhy[.]top2
                picturecrafting[.]site2
                otnhmdmwnz[.]top1
                tics[.]cibariefoodconsulting[.]com1
                roma[.]simplebutmatters[.]com1
                me[.]woodlandsareareview[.]com1
                top[.]hymnsontap[.]com1
                adp[.]reevesandcompany[.]com1
                bud[.]ttbuilders[.]com1
                pic[.]picturecrafting[.]com1
                me[.]kaleighrose[.]me1
                it[.]its1ofakind[.]net1
                me[.]jmitchelldayton[.]com1
                me[.]thebellamyfamily[.]me1
                Files and or directories createdOccurrences
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp1
                %ProgramData%\{d781e3a1-e512-422f-aa6c-27428437cbc4}.lock1
                %TEMP%\TMP2834788.tmp1
                %TEMP%\markwde316.tmp1
                %TEMP%\TMPwde316.tmp1
                \uv\04F28BB8-14801
                \uv\04F8C430-14801
                \uv\051EE940-8521
                \uv\051EEAC0-8521
                \409494144.inf1
                \409494162.inf1
                \409494248.inf1
                \409494334.inf1
                \409494418.inf1
                \409494444.inf1
                \409494588.inf1
                \409494628.inf1
                \409494124.inf1
                \409494190.inf1
                \409494298.inf1
                \409494658.inf1
                \409494820.inf1
                \409494840.inf1
                \409494920.inf1
                \409494996.inf1
                *See JSON for more IOCs

                File Hashes

                02b5fd5e99d5df445989bdf6fc390c6a91868627931a215ffe4b7c0c6575d3d2 087e3e740b260ad83ba5881be43822ecccf5bcefc3c3246a62d8f5cb11065891 0a75195584a2ff98ff416153d7ae3c5f470201bacae816a9040e1545ad1ed71c 0a98f18e5602852de2a00e1d4e4b87a9aa73bada595e14b7d05844aa85a0cb3a 0e6f4226f190a84de26df937557d624fb130e4a0b0e692a494a937d144506433 0ed33f996aa50dc73876f30aec07446dcaa0384c2c8268478a7857724c118759 195932578c922415b99e2e292acbaf32133de4727384f5860c9c5d59436ce671 20d12b744bd651c35171626f1ce6d85bd9a3362acfee4f91934da6f7d4414cce 26f188069d3f42e5a0e5f217e807703347d46c84953ccd4d39e897dd0d4ac45e 279306903e6702c79e229db28bb3d119de8641c8ad4bb24bd0e9da7559440b36 29e776ef6349ee6f4d37aa5b099b7b6abb433d950e8ec04f25069813178a2f72 3e8167eb0553a7be23864cd48db852623c95b884682df95c13c196bec9122bc7 417d2f400fb2c53c28407632edf46189f4cb4482cf5b323b55b3d75312c954dd 4957073bcc69c602b3fd1e4c98f4cc8937ebfce5f61756db4d1021a9039a5be5 5c077e0950fdd99df11e389d2b830f241b35efdfb9dc6522b457c66fd64b79a0 60a751e56901c1b593e3a58c1e0770b9fbefb83c8e75433fdbc16e55c21cebc8 73541008d1f6fbbfb7321f39ff083398d4f5ee86bde9eca2574e67a952c7a37f 76ea09817ea2aba02f6b6701ebd786adfd0a02b42ac53a51b1f334245f21004d 7a2ae75210913c882e0f6d848bfc06d729b7d0c6faf1c42ea9dec67da18c41e4 7eb13e84eac78a616ef498adb7fad002e912fbdd699891a8b0da63f224a7c277 877b0ef2e019d8f102373c6a09975c84053eb5705b8e8d4508e0b4b9418b458f 9da94873a87609b0c6471981b57fc4e6a8abe1b649e571a0eaffbaa80f4b4961 c96b2b221a2071b92cc21f75edfb0fea967271b8d15bedfece0ab686ad6431a7 d3c1a8df4b8112ebf3c3edc53ebe8adb3680accebc243040b3d438a4e5489f2a d6fbd9d2e70a77a6bfa308ef2ce0d8ad13266a4a41ed59089a52c2ee7e550bfc
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Win.Dropper.Remcos-7334963-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ 25
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ
                Value Name: licence
                25
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ
                Value Name: exepath
                25
                MutexesOccurrences
                Remcos_Mutex_Inj25
                Remcos-8N5JSJ25
                TreeSee25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]91[.]197[.]9125
                185[.]158[.]249[.]8825
                108[.]168[.]157[.]7025
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                pearlsolutions[.]com25
                finnanlinks[.]com25

                File Hashes

                0164052cd74b2d406c5503faf58f1794d6ba14092b7a9fa9509bc8a85eae01cd 24175b88c78d6089ee1dac7875b71c6194c5292d826911050bde8ebc55b4491f 24d2b912a0ffbde3afbef7e4460693ae84976b689ae7a150b914fb09a7551b13 2ccb899ef52566bceb4d8e09163dd21291624a73b5ad554fd58f920434af9076 2f260e1c62dd6ce1d6c042bd488881d4b562ee1990d20cc383866fd6f805abdc 47232b513efbd2c6fcd3dd1778aa00ca018710c8afd597d238ab1c94433747c4 47a9af0fcc8f26b71865398d4cf372b2d8005f5b93cf75233f44439da9378beb 4cf3770d9c9b2ea152ccf677f4f03e46fd6ee497362fa1a9fbd4d6994ec48244 556c8f046af879ab852ab13e2cde6ebf653fa436840bde821c4b7b26cc626f73 5a5b57e664e35d5528b3c9c32b7123861125e5b6789a7699e076821e0eaece10 65573233fca2347e6aa28de9caec5f49d3ff0f5b844aa1d672d822970228d8f0 6eebb872f1c301f54c77849a128e5500a7e3cfaafee2513004fabaf880bb75f9 7d2b477f6a2ae69257c9626cd87ca89b741b0397e2b4743194b1e95d802637d4 7e559c9077c5b416db0fcd99cfee7e9fa80212ed53b0bef7c37c00373c7e2cc2 81685e6e788710a878b16cb2febbc7cff3f8bf5905811fc392e840da73f79b50 8e4638e4d6cc97ebc401533a5bd4cd22ccaca17a584f24610040aff5e8ffa64e 9996145757ae9e7ca9fc01709e3b597be530d189f50fe2955db438dde9f07c77 9f01d27ac72c5194859d657ee8b024786469661cc65b29cf795b66d10fb35770 b03eece2320b96ba1c1057f3adead7c347626f6f45e867af798f03a78d030fe9 b0894a209477e906130c6a493a8d34cde4ae16442753c2513053f4e33a39ca80 b29bd09e5a11bb8b46ca1363f3455d66057c8bd24f3ea6a643851d288ee0239c b6c098d02c8eceaf072fdf7b91c832a0c86e529a7c276fbc28ed2c242053a35a c5ff8271d4820962d7ad72526ae7aca7b7df84e2cab249dcff099f4bfa740bc1 c9e5d6fbd34df45539a162af73ce141406c182cb072e92a7a815762ff90dcd4f caffbaf16f0fa50066efc7435b21330c05b2b3ca602253558e4bf30cb0ddad67
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Dropper.Trickbot-7340237-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                9
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: RefCount
                5
                MutexesOccurrences
                Global\316D1C7871E1042
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                185[.]79[.]243[.]3711
                185[.]222[.]202[.]222/317
                172[.]217[.]3[.]1156
                200[.]116[.]199[.]105
                194[.]5[.]250[.]82/315
                45[.]142[.]213[.]585
                66[.]55[.]71[.]115
                46[.]30[.]41[.]2294
                31[.]184[.]253[.]374
                185[.]244[.]150[.]1424
                45[.]66[.]11[.]1164
                176[.]58[.]123[.]253
                104[.]20[.]16[.]2423
                190[.]154[.]203[.]2183
                187[.]58[.]56[.]263
                36[.]89[.]85[.]1033
                181[.]113[.]20[.]1863
                94[.]156[.]144[.]33
                109[.]234[.]34[.]1353
                45[.]80[.]148[.]303
                177[.]103[.]240[.]1492
                185[.]65[.]202[.]1272
                200[.]21[.]51[.]382
                186[.]42[.]185[.]102
                107[.]22[.]193[.]1672
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org11
                www[.]myexternalip[.]com6
                ident[.]me3
                icanhazip[.]com3
                api[.]ipify[.]org3
                api[.]ip[.]sb1
                wtfismyip[.]com1
                46igeuohbyzeokpe[.]onion1
                Files and or directories createdOccurrences
                %APPDATA%\HomeLan42
                %APPDATA%\HomeLan\settings.ini42
                %System32%\Tasks\Home lan application42
                None41
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt20
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp20
                %APPDATA%\HomeLan\data\pwgrab645
                %APPDATA%\HomeLan\data\pwgrab64_configs\dpost5
                %APPDATA%\HomeLan\data\systeminfo645
                %APPDATA%\HomeLan\data\psfin641
                %APPDATA%\HomeLan\data\psfin64_configs\dpost1

                File Hashes

                01639c6060f371a5c4d063bcc5827577b2fc0f4c7576e018493f0f2fbaa0971c 051c1d65aa3f07c6f0c12177e66db74593cf19187a5d5279a1060215d1fd693f 0a62e631b10f9a4c3b2e18b2e1cd891de5617ed77d3486a895d5b0e300f9c03a 0b0958d9893a048f798947d43f40a8e73c39a58314ca54efcfd9b44c2fbf70c2 0dedc6c5d7f16e280b91f0fcc39776e5a81a9256679039ccf766ad47c3280107 123624171e54c4fb17187cee3bba2a42beceb6e14a533d3f678b4b79322e5ecc 176555c1164babd31c1b5cf572f04e4ae9272f749c34da82450f34496f2e38ae 19040036454f1ed997841efb79601c14ad4ddbfe8716d792645f02ad639cc4c5 19067755e33f789405fff9be3a0083fe46a9f723cbd478d8b4fc7eee02e1747b 1ab1b32131737818d95fd57c3878ad2c5ed5319915fa570742d3f72ba77a3618 1b8aa6a3db661ceba43b3e564536502e8babe78050236f35261865ab5227369c 2258ed23ff9b9999e542fd9adec574a2ea7aaa25cb72dbcd03853f74d64f10ae 24e6854a3138b45709bf7144f1e4abb69f86722a828cfd563a8b27e1dab95a9f 277a447321a678f7bc82683fab3e4b52b2a7288be76b87c014a0c33e3a187cff 2c4dda46da1f5943ee7caee3ce42454e53364371763e2bb84d4831c87636ee40 3302b6b60869d67af98b83e9a795afa6fe3ac3cfd492ff89ed284eb04dcd8a31 33111cf63f3781a3be253cfd560fef13904a80d95e0484d8be3e2515a050cf78 33528d4f9144d9f5882ad5a29602e0068d2f88926908d7fb464ec4faa502b261 351385b5ba3932321d3f830fa7accb71317832be3362636dc4e53b4ad8dc7c8c 36d985f970096d5ac23193d3d564f51402b0d815ebf3490c46b90daca05c5796 3e2e719d3c8a79ad31df38e3d8071268325cc9de90cb1d9374da205196085640 410702470b3719dba334d8e86e53560c307f9220ef0598829690d6e2f09eb8ca 414c44aedca4bf53ea9594795e50512895bb5bc84df5718111de6dc3b935baad 4d8b363440ac876738d71a5822cc49b54d6466afb05a91e69f1bfc2e20a6f5a1 4e26ef3e451e37ce362fd98f6d4ab8f6d6ee581c58094a963a594e322a0aa3be
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Bublik-7340719-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 14
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Intel Network Service
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Media Networking Device
                3
                MutexesOccurrences
                V8x14
                muipcdraotse14
                S3xY!14
                Global\<random guid>6
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                195[.]137[.]213[.]6714
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                vps573[.]intelbackupsvc[.]su7
                vps531[.]intelbackupsrv[.]su7
                j13[.]bull-quantum-media[.]su3
                j35[.]evil-quantum-servers[.]su2
                j65[.]coax-quantum-media[.]su2
                j16[.]fast-quantum-servers[.]su2
                j67[.]fast-quantum-servers[.]su2
                j30[.]bull-quantum-media[.]su1
                j71[.]evil-quantum-servers[.]su1
                j52[.]coax-quantum-media[.]su1
                Files and or directories createdOccurrences
                \Autorun.inf14
                E:\Autorun.inf14
                E:\TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}14
                E:\TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}\tmpmount-t285019593.bin14
                \TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}\tmpmount-t285019593.bin14
                %SystemRoot%\SysWOW64\igfxcn86.exe11
                %SystemRoot%\SysWOW64\wmpnd86.exe3

                File Hashes

                0d105c7c5ac13e3840a816cd229b19305655df295c9bafaefe23bff7e337feeb 16d64ea86143cbf62c020f313c87210c12775011368bc5add13a4a7f059d5beb 1ee966faa45a71c137856951731912e1523e8ae5bce27d40bacf53c3650398f2 2315e6edf1fcbd389e9eaae91af5e2a259a57a7b72392444da732ad896fe8fa0 24f246aafdbe4e6b1e8a209e1b1a8370e27a8c1966e5abe924a67fb9ba56d3ca 38b11c4bb0aa58d0d1ecab7aea4c4154c0202cea808c829176a43bd96ab98c12 3b6ce3103a80773196a7b5a98fb22a348a6b26feaca7180fc162e3a7aa18e14b 44615537516d7b38ce0f36a25f0a1ddc79b624a8132288cf24efacb193ef9fbe 497edec65e55215f67734aeb317f2e426238de6fe587050c5b0aa7589749ba1f 568ac42883664e6e3626b5cb47920fa29f76daa8ffc707a321092a2b5aeda070 710a0f2bf3915c8bcd56e7e019c945094356d513022a7973a024a2469041cd43 7c387616f2b369799db06728f44c01c24187545e2c0fb7850889dd63f181dfc6 817ec74768baf0c4772a072188e0c6016991208266d165bf409ca3aec8efd5d0 9557cbe21cb18643397a2a40ab7cd245536c396b83857c19ba630936b6def5fd 9f658c498057ac8c372f1eaf28c49d821ffd1ef409858127d387c6a2e2696c90 a74379225d10237dc3175bbec1dcfb8b3b01c0d44b4e2149bc5139306a9188d1 aedf45d7c403502528b581d16253b2e113ed90032fdb304a3fef3350503c90be b8796b91c089d9487a2969ff3675cfed0565820bfe1fd20e529c2c474e0b550d bd96928db2ce25f1c86d64b355fc551c4a31fd72af567cc05d402d06bd12c3b8 c3d16015a4791380211dd51c0a90b3042d5820d2afd9dfe935fd94160c0e7dac c51fd0b0190e9a1b9356b5870dceb055edb9788e5706b7da1d1ed5d737e6980d d335b629182955cfbef363b4cad3462342e573e205a8c2defea842b6f004755c e396ba55fd116b35179f392cc24edc5f348cdf28d2bbbd1704ea0df8e77ea535 e46c7b72ff1458e2a0937c445029063a88e2af9833e034f5ff539a3efc26e44b edf4eb3860904170a2b5ce8cac27db7dcc7f676f5dd9d767f63ce2cabcee3d99
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (26364)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Madshi injection detected - (3206)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Process hollowing detected - (1973)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Excessively long PowerShell command detected - (1169)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Gamarue malware detected - (190)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Kovter injection detected - (100)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Atom Bombing code injection technique detected - (83)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Installcore adware detected - (70)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Special Search Offer adware - (46)
                Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.
                IcedID malware detected - (34)
                IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.

                Gustuff return, new features for victims

                $
                0
                0
                By Vitor Ventura with contributions from Chris Neal.

                Executive summary


                The Gustuff banking trojan is back with new features, months after initially appearing targeting financial institutions in Australia. Cisco Talos first reported on Gustuff in April. Soon after, the actors behind Gustuff started by changing the distribution hosts and later disabled its command and control (C2) infrastructure. The actor retained control of their malware since there is a secondary admin channel based on SMS.

                The latest version of Gustuff no longer contains hardcoded package names, which dramatically lowers the static footprint when compared to previous versions. On the capability side, the addition of a "poor man scripting engine" based on JavaScript provides the operator with the ability to execute scripts while using its own internal commands backed by the power of JavaScript language. This is something that is very innovative in the Android malware space.

                The first version of Gustuff that we analyzed was clearly based on Marcher, another banking trojan that's been active for several years. Now, Gustuff has lost some similarities from Marcher, displaying changes in its methodology after infection..

                Today, Gustuff still relies primarily on malicious SMS messages to infect users, mainly targeting users in Australia. Although Gustuff has evolved, the best defense remains token-based two-factor authentication, such as Cisco Duo, combined with security awareness and the use of only official app stores.

                Campaigns


                After Talos' initial report, the Gustuff operators changed their deployment redirections. When those were blacklisted, the actors eventually disabled the C2, but they never totally stopped operations. Several samples were still around, but the hardcoded C2 was not available. A new campaign was detected around June 2019, there were no significant changes the malware. The campaign was using Instagram, rather than Facebook, to lure users into downloading and installing malware.

                Domain hits in June

                The Instagram-related domains are used for the initial infection, using the exact same method of operation as before.

                But a new campaign spun up at the beginning of this month, this time with an updated version of the malware. Just like in the previous version, any target that would be of no use as a potential target is still used to send propagation SMS messages. Each target is requested to send SMSs at a rate of 300 per hour. Even though the rate will be limited to the mobile plan of each target, this is an aggressive ask.

                Domain hits in October

                This method of propagation has a low footprint, since it uses SMS alone, but it doesn't seem to be particularly effective, given the low number of hits we've seen on the malware-hosting domains.

                Targeted applications

                Just as before, this campaign mainly targets Australian banks and digital currency wallets. This new version seems to target hiring sites' mobile apps.

                One of Gustuff's capabilities is the dynamic loading of webviews. It can receive a command to create a webview targeting specific domains, while fetching the necessary injections from a remote server.
                Request                                                                      Result
                During our investigation, we received a command from the C2 to target the Australian Government Portal that hosts several public services, such as taxes and social security. The command was issued before the local injections were loaded (using the changearchive command). The injections were loaded from one of the C2 infrastructure servers. This command is not part of the standard activation cycle and was not part of the injections loaded by the version we analyzed in April.

                This represents a change for the actor, who now appears to be targeting credentials used on the official Australian government's web portal.

                Technical analysis


                This new version of Gustuff seems to be another step in its planned evolution. This malware is still deployed using the same packer, but

                there are several changes in the activity cycle, which take advantage of functionalities which either where already there or where being prepared. One of the changes in the behaviour is the state persistency across installations.

                ID file

                During the activation process, the malware attempts to create a file called "uu.dd" in the external storage. If the file exists, it will read the UUID value stored inside it that will be used as an ID for the C2. When this happens, the malware won't go through all the activation process. Instead, it will receive commands from the C2 immediately. This file already existed in previous versions. However, the behaviour described above was never observed.

                The main API follows the same philosophy. Gustuff pings the C2 at a predetermined interval, which will either reply with an "ok" or it will issue the command to be executed.

                The targeted applications are no longer hardcoded in the sample. They are now provided to the malware during the activation cycle using the command "checkApps." This command already existed on the previous version, but its usage during the activation cycle was not mandatory.
                checkApps Command

                The list of anti-virus/anti-malware software that Gustuff blocks as a self-defense mechanism is now also loaded during the activation cycle.

                Example of applications is blocks (not full list)

                These changes in the Gustuff activation cycle indicate that the actor decided to lower the malware static analysis footprint by removing the hard-coded lists. Both commands already existed in the communication protocol and could have been used in runtime.

                Command                                                                                   Result

                During the activation cycle, the malware now asks the user to update their credit card information. The difference is that it does not immediately show a panel for the user to provide the information. Instead, it will wait for the user to do it and — leveraging the Android Accessibility API — will harvest it. This method of luring the victim to give up their credit card information is less obvious, increasing the chances of success, even if it takes longer.

                The communication protocol now has a secondary command execution control. Each command is issued with a unique ID, which is then used by Gustuff to report on the command execution state.
                Command execution control
                This allows the malicious actor to know exactly in which state the execution is, while before, it would only know if the command was received and its result. This new control mechanism also generated the asynchronous command capability. The malware operator can now issue asynchronous commands that will receive feedback on its execution while performing other tasks — "uploadAllPhotos" and "uploadFile" commands are two of such commands.

                With these changes, the malicious actor is obtaining better control over the malware while reducing its footprint.

                This version of Gustuff has substantial changes in the way it interacts with the device. The commands related to the socks server/proxy have been removed, as have all code related to its operation. This functionality allowed the malicious operator to access the device and perform actions on the device's UI. We believe this is how the malicious actor would perform its malicious activities. We believe that after collecting the credentials, using the webviews, the actor would use this connection to interactively perform actions on the banking applications.

                This functionality is now performed using the command "interactive," which will use the accessibility API to interact with the UI of the banking applications. This method is less "noisy" on the network, since it takes advantage of the C2 connection, rather than creating new connections.

                The command "script" is also new. This is a very simple command with huge potential. Gustuff starts a WebChromeClient with JavaScript enabled. Afterward, it adds a JavaScript interface to the webview, which will allow the execution of methods defined in the malware code.
                JavaScript scripting

                By default, the WebView object already has access to the filesystem, which is not an additional security risk in this context, allows the operator perform all kinds of scripts to automate its tasks, especially when the script also has access to commands from the application.

                Conclusion


                This is an evolving threat, and the actor behind it seems to want to press on, no matter the level of coverage this campaign gets. Instead, they changed the malware code to have a lower detection footprint on static analysis, especially after being unpacked. Although there are no changes in the way it conducts the campaign, Gustuff still changed the way it uses the malware to perform its fraudulent activities. The main target continues to be banking and cryptocurrency wallets. However, based on the apps list and code changes, it is safe to assume that the actor behind it is looking for other uses of the malware.

                Coverage

                Snort

                SID: 51908-51922

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such as this automatically.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IOCs

                IP

                88.99.174[.]142
                88.99.175[.]152
                88.99.170[.]43
                88.99.170[.]141
                78.46.201[.]36
                88.99.174[.]140

                Domains

                instagram-shared[.]pw
                instagram-shared[.]store
                instagram-shared[.]info
                instagram-share[.]com
                intagram-share[.]com
                instagram-shared[.]net
                instagram-shared[.]com
                video-hd33[.]site
                video-hd30[.]site
                video-hd29[.]site
                video-hd24[.]site
                video-hd20[.]site
                video-hd18[.]site
                video-hd17[.]site
                hd-video5[.]site
                hd-video4[.]site
                video-hosting[.]site
                video-hd1[.]site
                video-hd[.]site
                hd-video1[.]site
                homevideo641a[.]cf
                homevideo651a[.]cf
                homevideo5-23b[.]ml
                homevideo631a[.]cf
                homevideo611a[.]cf
                homevideo4-23b[.]ml
                homevideo641a[.]ga
                homevideo3-23b[.]ml
                homevideo54-1a[.]ml
                videohosting32-e[.]cf
                videohosting23c[.]cf
                videohosting62-b[.]tk

                Hashes

                5981f8ec5b35f3891022f1f1cdbf092c56a9b0ac8acbcd20810cc22e7efb5e0b - SexyJassica.apk
                03d1a55ce6879d79239db32c2c8e83c4a3e10cb9123d513ce7fd04defb971886 - gscptzorx.jar
                3027fbd59b8dd25dcabd21800d8e8ab3222a1ae3e2d268857def4311bb01ea2e - gscptzorx.dex
                b13e6d70b07d6127d803d2374ebfb1e66a3b4cfd865cc2eb0e45455401be527e - flash
                65a7d4f9b3549198b008a089d0c8feb30c5409efc52e8a496f503fa262a6e922 - flash2

                CISO Advisory: Governance & Risk Management

                $
                0
                0
                Businesses are built on risk. No matter how prepared they are, there is no guarantee that any decision will result in the expected outcome. But through good management, the likelihood of success can be improved.

                In the first in a series of CISO Advisories this paper address Governance & Risk Management as a fundamental part of any cyber security strategy.

                Download the paper here.

                Access the series introduction and index here.

                Cisco Talos helps CISOs get back to basics with advisory series

                $
                0
                0

                At Cisco Talos, we try to build detections for every threat we see to provide customers with a portfolio capable of identifying and stopping threats at various stages of an attack's lifecycle. Deploying the best suite of layered security tools is an integral part of protecting an organization. But we recognize the difference between a successful cyber security program and an unsuccessful one is dependent on more than having the right security products. Successful programs are multi-disciplined, built on fundamentals, and are risk-aware.

                In our research and investigations, we often observe sophisticated attack techniques. But typically, even well-funded and highly targeted attacks rely on victims who aren't following some of the basics of security. Implementing best practices alone won't protect you against all adversaries. They will raise the bar for attackers by some amount, but with enough resources, attackers can find a way in. Following the basics allows you to develop more advanced techniques and approaches to stop more advanced adversaries.


                We work with security executives across the industry and understand the many different challenges that they face. Some of the basics, like writing and enforcing policies, maintaining an available and effective operational security infrastructure, protecting company and customer data, or establishing effective relationships all require different strategies and resources. Security execs balance these responsibilities against not only external attackers, but also the needs of staff, other executives, and boards of directors. The challenges may be plentiful, but the right plan built on strong fundamentals will protect your organization from cyber attacks.

                Based on our conversations with executives and research into the latest threats, Talos is rolling out a series of short, non-technical posts for the executive security community. We'll structure our conversation around the following pillars of information security that should resonate with executives:

                • Governance and risk management
                • Security architecture
                • Asset & vulnerability management
                • Endpoint protection
                • User management
                • Third parties & the supply chain
                • Incident response
                • Monitoring & audit
                • Data protection & recovery
                • Secure configuration
                • Advanced threat hunting

                We'll talk about the problems CISOs are facing today, what a CISO should know about these areas, and the proper ways to respond to those problems. We'll reference applicable Talos research and reference established standards and compliance controls. Whether you're a freshman security executive or seasoned professional, we want to facilitate a conversation on topics that matter to you.

                We'll update this blog post with the full catalog of topics as they're published. Released posts in this series so far include:
                1. Governance and Risk Management


                Threat Source newsletter (Oct. 24, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                Never assume that a malware family is really dead. We’ve done it time and time again with things like Emotet, and Gustuff is proving it once again. The banking trojan, after we first discovered it earlier this year, is back with a version 2, targeting a new round of victims and deploying new anti-detection techniques.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: Talos at BSides Belfast 
                Location: Titanic Belfast, Belfast, Northern Ireland
                Date: Oct. 31
                Synopsis: Several researchers from Talos will be on hand at BSides Belfast to deliver four different talks. Martin Lee will provide a general overview of the benefits of threat hunting, Nick Biasini and Edmund Brumaghin will walk through a recent wave of supply chain attacks, then, Brumaghin and Earl Carter will deliver their “It’s Never DNS....It Was DNS” talk, and, finally, Paul Rascagneres walks through his recent research into attacks on iOS.

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Cyber Security Week in Review

                • Popular VPN service NordVPN confirmed a rumored data breach this week. Researchers first reported that the company left an expired internal private key exposed, which could allow anyone to start their own servers and disguise them as legitimate NordVPN servers. 
                • The U.S. military continues to search for skilled hackers as it thinks about the future of cyber warfare. U.S. Cyber Command was even recently elevated to be considered one of America’s 11 “unified combatant commands.”  
                • Amazon’s Echo and Kindle devices are open to a Wi-Fi vulnerability that could allow attackers to conduct man-in-the-middle actions. Malicious users could carry out denial-of-service attacks, intercept information sent to the devices and decrypt information processed by the victim machine. 
                • Security experts are critical of members of U.S. Congress who entered an ultra-secure area with their cell phones. Republicans were attempting to disrupt a hearing regarding the impeachment of U.S. President Donald Trump, entering an area that has restrictions against using mobile devices. 
                • An internal memo says the White House’s wireless network could be open to attack. The Trump administration is forcing out many longstanding IT staff, which a report says could leave the White House vulnerable to a “network compromise.” 
                • Researchers discovered a Vietnamese student was behind 42 malicious apps uploaded to the Google Play store. The apps would eventually display malicious apps a few minutes after users initially opened them. 
                • Apple removed 17 malicious apps from its iOS store. The apps all contained malicious trojans that would eventually carry out click fraud and delivering malicious web pages. 
                • Business-to-business payment provider Billtrust says it is still recovering from a ransomware attack. The company has yet to disclose the exact strain of the malware, but says most of its services are back online roughly a week after initial infection. 
                • Democratic Congressional representatives introduced a new bill this week to strengthen the security of internet-of-things devices. The measure would establish a new panel of experts that would create “cyber benchmarks” for IoT devices.

                Notable recent security issues

                Title: Gustuff V2 
                Description: The Gustuff banking trojan is back with new features, months after initially appearing targeting financial institutions in Australia. Cisco Talos first reported on Gustuff in April. Soon after, the actors behind Gustuff started by changing the distribution hosts and later disabled its command and control (C2) infrastructure. The actor retained control of their malware since there is a secondary admin channel based on SMS. The latest version of Gustuff no longer contains hardcoded package names, which dramatically lowers the static footprint when compared to previous versions.
                Snort SIDs: 51908 - 51922

                Title: Attackers use malicious GIFs to attack WhatsApp
                Description: The WhatsApp messaging app contains a double-free vulnerability. An attacker could exploit this vulnerability, identified as CVE-2019-11932, to carry out a variety of malicious activities, including memory leaks and arbitrary code execution. The exploitation of this bug requires the attacker to send a WhatsApp user a specially crafted GIF. These rules prevent attackers from carry out remote code execution through these GIFs.   
                Snort SIDs: 51953 - 51956 (By Tim Muniz)

                Most prevalent malware files this week

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A
                Detection Name: W32.46B241E3D3-95.SBX.TG 

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5 
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: Eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A 
                Detection Name: W32.Generic:Gen.22fz.1201

                Beers with Talos Ep. #64: Your problem isn’t complex, it's simply complexity

                $
                0
                0
                By Mitch Neff

                Beers with Talos (BWT) Podcast episode No. 64 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Oct. 10, 2019 

                This episode lives up to its name, by trying to only take on a minimal topic and then becoming completely convoluted. We start off with an extended roundtable (I even cut like half of it out) and then start talking about the trials and tribulations of making things too complex — from software to network design. If the devil is in the details, then the danger is in there being too many of them. We take two simple examples — PDF readers and a trip to the doctor's office — and look at how the complexity jammed into the tech around these two things is where things become disturbingly dangerous.

                The timeline:

                • 01:30 — Roundtable: Talos brings home the Peter Szor Award, getting Kenny g’s in an Uber, dino umbrellas
                • 18:30 — Complexity Kills
                • 27:30 — What’s up, doc? Where’s my data?
                • 47:00 — Closing thoughts and parting shots: Hinting at big things to come and Matt’s zero-sum karma

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Threat Roundup for October 18 to October 25

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 18 and Oct. 25. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Win.Dropper.Emotet-7355854-0 Dropper Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Malware.Ursnif-7355802-1 Malware Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
                Win.Malware.Upatre-7355650-0 Malware Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.
                Win.Dropper.Kovter-7352197-0 Dropper Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store it's malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. It has been used in the past to spread ransomware and click-fraud malware.
                Win.Malware.Trickbot-7352185-1 Malware Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                Win.Virus.Expiro-7350682-0 Virus Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
                Win.Malware.Tofsee-7349716-1 Malware Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                Win.Malware.Nymaim-7348211-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Malware.Cerber-7343756-1 Malware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.

                Threat Breakdown

                Win.Dropper.Emotet-7355854-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS 10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: ImagePath
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: DisplayName
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: WOW64
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SPOOLERIPSPS
                Value Name: ObjectName
                10
                <HKLM>\SOFTWARE\CLASSES\MFCCALC.CALCULATOR 10
                <HKLM>\SOFTWARE\CLASSES\MFCCALC.CALCULATOR\CLSID 10
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\PROGID 10
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\INPROCHANDLER32 10
                <HKLM>\SOFTWARE\CLASSES\MFCCALC.CALCULATOR 10
                <HKLM>\SOFTWARE\CLASSES\MFCCALC.CALCULATOR\CLSID 10
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LOCALSERVER32 10
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7} 9
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7} 9
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\PROGID 9
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\INPROCHANDLER32 9
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{62C4DD10-F45E-11CD-8C3D-00AA004BB3B7}\LOCALSERVER32 9
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\\PROGID 1
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\\INPROCHANDLER32 1
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\\INPROCHANDLER32 1
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID 1
                <HKLM>\SOFTWARE\CLASSES\WOW6432NODE\CLSID\\LOCALSERVER32 1
                MutexesOccurrences
                Global\I98B68E3C10
                Global\M98B68E3C10
                Global\M3C28B0E48
                Global\I3C28B0E48
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                45[.]33[.]54[.]7410
                54[.]38[.]94[.]1979
                173[.]194[.]68[.]108/318
                74[.]208[.]5[.]157
                193[.]70[.]18[.]1447
                172[.]217[.]10[.]837
                74[.]208[.]5[.]26
                74[.]6[.]141[.]50/316
                205[.]178[.]146[.]2495
                173[.]203[.]187[.]105
                173[.]203[.]187[.]145
                205[.]204[.]101[.]1525
                74[.]6[.]141[.]44/315
                17[.]36[.]205[.]74/315
                178[.]128[.]148[.]1105
                209[.]141[.]41[.]1365
                217[.]69[.]139[.]1604
                205[.]178[.]146[.]2354
                69[.]147[.]92[.]124
                65[.]55[.]72[.]1834
                159[.]127[.]187[.]124
                94[.]100[.]180[.]704
                94[.]100[.]180[.]1604
                23[.]227[.]38[.]644
                172[.]217[.]3[.]1154
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                secure[.]emailsrvr[.]com8
                smtp-mail[.]outlook[.]com8
                smtpout[.]secureserver[.]net8
                smtp[.]mail[.]com7
                smtp[.]mail[.]ru7
                smtp[.]aol[.]com6
                smtp[.]comcast[.]net6
                smtp[.]1and1[.]com5
                smtp[.]prodigy[.]net[.]mx5
                ssl0[.]ovh[.]net5
                mail[.]paypal[.]com4
                mail[.]mail[.]ru4
                smtp[.]dsl[.]telkomsa[.]net4
                mail[.]widatra[.]com3
                smtp[.]dropbox[.]com3
                outbound[.]att[.]net3
                smtp[.]emailsrvr[.]com3
                smtp[.]verizon[.]net3
                smtp[.]idmsa[.]apple[.]com3
                smtp[.]cox[.]net3
                mail[.]enterprisesolutioninc[.]com3
                smtp[.]mxhichina[.]com3
                mail[.]americashomeplace[.]com3
                smtp[.]fatcow[.]com3
                relais[.]videotron[.]ca3
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\spooleripspsa.exe1
                \TEMP\aatgsjewU4YpaJ.exe1
                \TEMP\4uwvBUGZ.exe1
                \TEMP\sqjjfdnz8obMXZL.exe1
                \TEMP\D9VaRGmZ.exe1
                %SystemRoot%\TEMP\D3F5.tmp1
                \TEMP\PdapKX6bjx.exe1

                File Hashes

                0bf9f6907fd3f6a3f5734b23120671230c480b03c96a1779348f9cdc49bb58f8 11f97585ad2aeb41f4c972b2e29523d4ca70cc4a065547d9abca659d2c3193d1 418ba2dbbda1d95428128998352856705040857f1008fbdf809cdeb7c174211f 9d8895333339dde00e8778e9181cfbf0df29e35c0dda842aa30ff7a44b96cd11 a3a3de174e94beb142799b6f03c84bfe4c563e287a6a5288bbd64ccc9910ce24 aea84511050a07ff22e621888f19921585485fd171228cc6ad723f4c1b90225f b988217de26056f0db1ba17940d5fc0e138c59fc46652d7b5046281f8152aa0b ca3889a38bf35766b0ad59605bd6d3f6c333309f690708a3b51f7e80cc32be85 d4363da6ccb0a0ef3c69010d7351a2d9459e4c5fef26fe00c240eb901125cd78 ddb191fb3328dd25f79f79133e821cdb36590a80cabb1e6a1206fd11a19445ec

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Ursnif-7355802-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: api-PQEC
                10
                <HKCU>\SOFTWARE\MICROSOFT\IAM
                Value Name: Server ID
                10
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: Client
                10
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                10
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                10
                MutexesOccurrences
                Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}10
                Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}10
                Local\{B1443895-5CF6-0B1E-EE75-506F02798413}10
                {A7AAF118-DA27-71D5-1CCB-AE35102FC239}10
                {<random GUID>}10
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]67[.]222[.]22210
                172[.]217[.]10[.]11010
                172[.]86[.]121[.]11710
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                resolver1[.]opendns[.]com10
                222[.]222[.]67[.]208[.]in-addr[.]arpa10
                myip[.]opendns[.]com10
                Files and or directories createdOccurrences
                \{4BC230AC-2EB3-B560-90AF-42B9C45396FD}10
                %APPDATA%\Microsoft\Dmlogpui10
                %APPDATA%\Microsoft\Dmlogpui\datat3hc.exe10
                %TEMP%\<random, matching [A-F0-9]{3,4}>10
                %TEMP%\<random, matching [A-F0-9]{3,4}\[A-F0-9]{2,4}>.bat10
                %TEMP%\<random, matching [A-F0-9]{4}>.bi19
                \TEMP\4F03FE~1.EXE1
                %TEMP%\CE0E\6707.tmp1
                \TEMP\69E08A~1.EXE1
                %TEMP%\47D0\A3E8.tmp1
                \TEMP\85FD74~1.EXE1
                %TEMP%\903.bi11
                \TEMP\906352~1.EXE1
                \TEMP\A11B56~1.EXE1
                %TEMP%\3634\1B1A.tmp1
                %TEMP%\3E3E\1F1F.tmp1
                \TEMP\BB271B~1.EXE1
                \TEMP\C1C116~1.EXE1
                %TEMP%\8878\443C.tmp1
                \TEMP\CA13C5~1.EXE1
                %TEMP%\C9AC\64D6.tmp1
                \TEMP\D66D2E~1.EXE1
                \TEMP\E4F5F1~1.EXE1

                File Hashes

                4f03fe32e46386a2379e65b631e786cdeeec223017069d2731a723e4d2c50393 69e08aa34638b3b213dc3c7f7a188e4d56685ca8abd4bfa97f575757a1f4bc12 85fd74ee1f19173597c3995376c31c617c0cd615d1d4e862edbe2459200397ed 90635217dd43e1ccfc8c25aef6619b1a929b5e7d1800b9cebd8686d052243611 a11b566c7bd562cb4cdee2c1bc92313a11ebdacf4fdde58c224eb7eac0e6faf1 bb271b6725170345188008dfb90069c9f741b93cf0a504a9c70f177c2dd670cb c1c1165edb4b0853d6433961aec1b54982fe3273a094d53bb1b2f23e9f6713de ca13c5fb577c3a218a3be31c59145137e11b4c7188839b7962a3ce3e7d6277ec d66d2ea9744ca077c3dc76c303a284c1d2b863151931ddcce656fb35a52289e6 e4f5f19e945a41ad8f0ec7e9c35b23ea039a5a2bdaaf8e42a78c8f86b231334e

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Upatre-7355650-0

                Indicators of Compromise

                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                83[.]136[.]254[.]578
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                cardiffpower[.]com8
                Files and or directories createdOccurrences
                %TEMP%\hcbnaf.exe18
                %TEMP%\hgnddkje.exe17

                File Hashes

                0001e614c453604df0274956181e30350b7d6b1b91a169efdcbfee9a14a17626 01cd20d9212c000b7d8d97c47029b1b487050ead1b65e1c9c34e475f0f178add 055c1293bfc73671ac423aca35488dc3ec7510523695b8bf50d2f52e625680b7 1abc3b0481dc17e7aa7176b87605503b0baa9e340b4c5e673597fd06725f72f8 1f1db1372645d08bf117d2154ef9f67a2163295900b6311e4cd2268669601c1c 27e9f49d26c1202470242da4fe53199b74f525ee13bee5b34b1d613f2d5f2983 4200aca5bfb24f7b02cbcd39c7d6f4c773ed34eec17ac11ad9d5cee5aaba1940 669b62caaa55cf04de326355b319e16f481092c8098b418f9f2b09051b5e9088 8412bf5346bedec07e58c31bd15ddd98d31e8686c9f870444b2bbd1c8b527cb7 9476469b243db70017ef61c6da483e516516380136a4799015a4ef056e9f1742 9fe8e8a4818e3d63741c4c21ebb9e240d1a26573614162c0b313246b387ef13d a9d192a121401a7bb63b4fb403f346153090f239ff0761d2f12d12b7bc49741f bcecb26d7f81aa151a5d2f74f91029a6b1160bc02f431b3c617971ecdeb9e79b e0b5ae5ad859b17ee532cb274f952ee18254fe941b3d8a129fddda85c65225fb f480866abfdfd00f7c4a383f1acc9cdd01915d67fed1db367e8dd1cb41171983 f4968453af8a196794abe13cca1747da16b15850c99428778c9a1f6609ca22db fbd5dcf3f1a93947cb72d9b9d48189810c630d32e94b6f2bbb1811a349e1fb00 fc51c46b56c0a23b400789cd2408a8e8f0204ebb544a410298578c277227cea9

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Dropper.Kovter-7352197-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: iexplore.exe
                25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: iexplore.exe
                25
                <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: regsvr32.exe
                25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: regsvr32.exe
                25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: ab87b5d3
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: ab87b5d3
                25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: 626beb1a
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: 626beb1a
                25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: 52e3fdae
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: 52e3fdae
                25
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 25
                <HKCU>\SOFTWARE\3E7DC3D9A3 25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3 25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: 13faecd5
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: 13faecd5
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: 214fab25
                25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: 214fab25
                25
                <HKCU>\SOFTWARE\3E7DC3D9A3
                Value Name: 89d39e9a
                25
                <HKLM>\SOFTWARE\WOW6432NODE\3E7DC3D9A3
                Value Name: 89d39e9a
                25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3f88794a
                25
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: f50e45da
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3f88794a
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
                Value Name: CheckSetting
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
                Value Name: CheckSetting
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
                Value Name: CheckSetting
                25
                MutexesOccurrences
                4C2A424BDFE77F0825
                Global\377DB1FA5041B00C25
                2CAEEF5D79FF2C9625
                5F02253DDD3215C125
                0F8579C06C8A73E715
                Global\148FEA91D04ADF7315
                35A61B8070E50AA315
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                82[.]21[.]65[.]831
                166[.]141[.]185[.]1631
                93[.]229[.]231[.]1371
                142[.]250[.]246[.]731
                159[.]182[.]203[.]1311
                63[.]121[.]210[.]1941
                42[.]97[.]167[.]1531
                113[.]179[.]182[.]2251
                156[.]34[.]80[.]751
                218[.]64[.]159[.]2311
                182[.]94[.]255[.]581
                84[.]226[.]162[.]671
                212[.]123[.]72[.]1641
                183[.]74[.]168[.]2141
                20[.]118[.]2[.]201
                168[.]141[.]179[.]1811
                114[.]97[.]61[.]1211
                201[.]32[.]115[.]2361
                108[.]124[.]8[.]1641
                212[.]246[.]227[.]791
                68[.]6[.]254[.]1611
                159[.]133[.]144[.]1961
                16[.]215[.]96[.]1941
                189[.]183[.]233[.]1951
                60[.]194[.]81[.]711
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]cloudflare[.]com2
                cpanel[.]com1
                httpd[.]apache[.]org1
                cp[.]aliyun[.]com1
                netcn[.]console[.]aliyun[.]com1
                bugs[.]launchpad[.]net1
                manpages[.]debian[.]org1
                files[.]ofile[.]com1
                www[.]zerodistance[.]fi1

                File Hashes

                015d420249c90969fc15bd3c81839c05242c68e42135bc6e04743f16c3db8247 119e68e1ed3d764e9ccedbffb4e2adc1522b9a9c4672c8a52c70d3b75af919f1 19595e9e80a2da27c682814726e373d7207e6681b9a4b96a5744736976342f46 1fc7d5d27d4817cacae040833970a636a41a6cfe9fa783de92cdad2e93a620ac 21f75f1a46cc68cde8bc7cc10d63bca95a561268ad49d943afc8ca177cc89184 26555d26c4afce1e035031d293aab4acdb12a77530b375421be6e0bb80742057 41ce8bc25ec1a3bf85e346656cdfdcd1eaa4070c3783d133f25ffcebf55bb6d8 423e4d33687cb3e6fe4ebce6d36fa2d0b94006b28ad08de89fa2d2be2db4046a 533b055f7be13fe6c40eb49bebf93901b22ea3ada9babf100675c7ca53cd0c03 605ea58c8282dc5ef581f31b24647d463562d646a5be2004a174773416ec106c 6181608294d3482931e3a65f1e7c63182327076506e1c7c51583b57ef115d8ed 69ba2b3868404234ead2f364cbbfd1a13af9da0fbfa77845a09e06525f3c107f 72e70aa9877033cdf9c6d77f767545cd1365f7034a4da22c823eea4d60eb1bee 76d567e13a7cb9d97682944975accbeb0c4f3f6858ab84f64af849c4d5df25bb 8136ceed3bc05c0ebe9b0ac8bb9c9925eb781f6fa4a994c976f3ff24f692e962 91f71c8b5385d7441e2f8b82ce5be7f17a9c9fddd431c45dafab309d2fd76145 9218ea373d7322c49a3248b94b13366499f23d30b1f17ea63c3c19fe788376a6 97603c7315e26964dd15bdfb9a5932340271a949352364ebcb694282dd282ed1 9e7ce5f193afa02fc3165a34366981a34a1685deaf2b249f4fb089c8a25e77fd a318a5c36defbd74a7ad1ef3cca3670dadb918d692ce1e97c62b8022bb5a7ee6 c36a861e05aac4fa885836f60b871cc116085e05351d8a1a586db85dc902786f d0120bc8873d60781fd8a0640ce9d37a2f8daefc90747196ba70f4e7b5af41c1 d1fe8fea741f9758292df1b335ed203c4f9f6ec462690dd7338f043a01ffae8c d89115020458a087bb71f7f338e8b5cc9182c98d6559cf0573c5a87304fdd65b dfe7a1d91600e7bde92d16deb4a3bee5da7c01391d55f3e03c57e817d7bff7c6
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Trickbot-7352185-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: DeleteFlag
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                23
                MutexesOccurrences
                Global\316D1C7871E1023
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                200[.]122[.]209[.]788
                176[.]119[.]156[.]2256
                31[.]202[.]132[.]225
                190[.]0[.]20[.]1143
                152[.]89[.]245[.]2093
                103[.]122[.]33[.]582
                181[.]143[.]17[.]662
                45[.]160[.]145[.]2162
                37[.]44[.]212[.]1792
                80[.]173[.]224[.]811
                119[.]92[.]23[.]2031
                201[.]184[.]69[.]501
                190[.]109[.]178[.]2221
                68[.]186[.]167[.]1961
                45[.]160[.]145[.]111
                185[.]255[.]79[.]1271
                45[.]160[.]145[.]1791
                117[.]204[.]255[.]1391
                103[.]87[.]48[.]371
                195[.]123[.]237[.]1551
                190[.]109[.]169[.]491
                Files and or directories createdOccurrences
                %APPDATA%\browser\settings.ini23
                %APPDATA%\browser23
                %System32%\Tasks\BrowserStorage23
                %APPDATA%\BROWSER\<original file name>.exe23

                File Hashes

                0627afe0eb7517208d514c54b83436885eae259fa984bd6dbcfeb788ce5f2b80 0e21da4e3c8dfd077454f417b8b602b281887dbc487cce3e60a508b03ec7a897 2820d3a726768ac98f7357f182fa0f27e63743c025a40025f316a281dbecfe66 4e6f460398ab227ece450409e1343665b73a73f1c330b9ebbb8a03c8c2171f1b 587e038e8e3bf1e2a4005a89dea96f084d2e6a2c89ab0eea9c3a112997e48c1e 66b9b21677bfbb131aaab959f603091db4ce740a92c2376d84df43343b2de68d 69b4a369319e0c9c16fee1fe7db6f5ccc20076e4296a000f92f756ef1cb31533 756bf7440aa067883f18db9c567fa11c45aa9a7ee05e86bd2f759a726500d90d 80096a877332490f8e5d303906335e5420e8a95f90109c08596330ab0d77cf8a 843019efa320b08991d64ce99faaa5a254af828f6f8be64715f6e5f3833769be 877f01088ac912f8e7cfffd81b86ba21d8eeaccb5e3f675fd5299efab7e8fc5f 8fc61570c2e05fd746da7e7e14d9558afe38b0f00e6ccf2c43e0fd46247fb8f2 9706de7a46a3a13ba3275aa583ac70b31071a8fb30e3bd1061ceb0c3ea6532fe a5eb7f6a1d253fe60bf02e19a8858fd80dc4a7358f660d84fa85b6f6e011b11e bd26a6bd3d52b26c66f1b3503b0dd901a68318a66caa846d77fde10ad6f9668a c84b91da836a003057d90123e25cbaec576a20d1f98c621d777de47cdfdd40e3 cad65e1ce6ec9e36e8073c79a0a406997ed825e65af3952e55ea9c44c6e39122 ce5393632e1c0adb91af5ffc8a6b486141cb895a3b762b853ebfdb3518563dbf d0e9f2ba27da2bee48617c219a2a5e4b2db9d96b5e19ac16098384c3bb36c65f d54747ba18aec6ee4a9670148fd420dab486992f37df1e577abd9bc4d5dd2eb6 dd5ae9ad15a51845b317b83ba6d0bf2f010b2dfae3c85e7099b95c9bb0ea09a0 f79bac124531d2050d668a510e074930f5c1c9af7997a9513a8f16eb7549a8b7 fc061e1261397c24a7d074a7cac01e74af9f47b6300911f3734104c1557928d8

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Virus.Expiro-7350682-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
                Value Name: Start
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
                Value Name: Type
                16
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
                Value Name: Start
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
                Value Name: CheckSetting
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
                Value Name: CheckSetting
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
                Value Name: CheckSetting
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
                Value Name: CheckSetting
                16
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
                Value Name: CheckSetting
                16
                MutexesOccurrences
                kkq-vx_mtx116
                gazavat-svc16
                kkq-vx_mtx6716
                kkq-vx_mtx6816
                kkq-vx_mtx6916
                kkq-vx_mtx7016
                kkq-vx_mtx7116
                kkq-vx_mtx7216
                kkq-vx_mtx7316
                kkq-vx_mtx7416
                kkq-vx_mtx7516
                kkq-vx_mtx7616
                kkq-vx_mtx7716
                kkq-vx_mtx7816
                kkq-vx_mtx7916
                kkq-vx_mtx8016
                kkq-vx_mtx8116
                kkq-vx_mtx8216
                kkq-vx_mtx8316
                kkq-vx_mtx8416
                kkq-vx_mtx8516
                kkq-vx_mtx8616
                kkq-vx_mtx8716
                kkq-vx_mtx8816
                kkq-vx_mtx8916
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE16
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe16
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.exe16
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.exe16
                %CommonProgramFiles(x86)%\microsoft shared\Source Engine\OSE.EXE16
                %ProgramFiles(x86)%\Microsoft Office\Office14\GROOVE.EXE16
                %ProgramFiles(x86)%\Mozilla Maintenance Service\maintenanceservice.exe16
                %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe16
                %SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe16
                %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.log16
                %SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{33EC2C09-9668-4DE7-BCC0-EFC69D7355D7}.crmlog16
                %SystemRoot%\SysWOW64\dllhost.exe16
                %SystemRoot%\SysWOW64\msiexec.exe16
                %SystemRoot%\SysWOW64\svchost.exe16
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.vir16
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.vir16
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\ose.vir16
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\setup.vir16
                %CommonProgramFiles(x86)%\microsoft shared\Source Engine\ose.vir16
                %ProgramFiles(x86)%\Microsoft Office\Office14\groove.vir16
                %ProgramFiles(x86)%\Mozilla Maintenance Service\maintenanceservice.vir16
                %SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.vir16
                %SystemRoot%\SysWOW64\dllhost.vir16
                %SystemRoot%\SysWOW64\msiexec.vir16
                %APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\extensions\{ec9032c7-c20a-464f-7b0e-13a3a9e97385}\chrome.manifest16
                *See JSON for more IOCs

                File Hashes

                356d00dc8ff16fb18f68ccf4f622ab551979b6e14fb802a5c7f394038e19b384 40601e6f4ecb0879bf458b2ce1912ca780b723f971a6cf7c0dd900dd97ff024c 598726fe4b882d2510f3d05d60d58627fd9cf7b90d26187c344a5d9e27902588 5fb45cd8e75ac1418c72843ab892622ebcf9b6c744b5373bd79d825ddb202814 6ef92eff4e1fa8f4093880e24a99341fbe6f9365437920f995af24a73c73a71a 701ae8d2647c886f84c538a9846abdc98ebab9adf994143e17b298f7a6158085 7450df6862c201f3954495ee2b9e1f18b699b7a050cfbfe41db2f68c04b46d76 84f35b43d4f36e1135ce90853af4b5ee0bc1b4969740e4abb2551f067027c9ee 86e65f10866176f9b20bfb6b6b793d743576f532e811e638c4a6fa238e17c900 9739ae5c12dce410017a5ca6be2f169e97d23da942eaf85e0f365a33035478a4 9ce9ec31b261d6ecd124f6b5b2b408ae1b17ca78aea5287ea2b93e1ecfb76e8e a3c8e47460067b1733559dbbc2d7245a569e3e4aa67b36c67c74ca7f64511d26 acc76ce4ad9708b1a0562fcf8cc27c1ba06e9cbac781b438bdf6b57bd775d3dd c0f4595ecff664a7d0ec7669a084128915c9a01a4ba058ccb4c4ea04c636fe25 e35f51fc7fe79189d163f04b9f083bc2f0127b72645045693d864e6d0e4004af f5e1a8f1c48cd0cda719e7da167f91c3e0696f4a259a22b0160763b7aeacf602

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Tofsee-7349716-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Start
                32
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Type
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ErrorControl
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: DisplayName
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: WOW64
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ObjectName
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Description
                28
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ImagePath
                20
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                4
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                4
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Start
                4
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                4
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\kjsstakc
                3
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\jirrszjb
                3
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\qpyyzgqi
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\fennovfx
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\wveefmwo
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\cbkklscu
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\ihqqryia
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\dcllmtdv
                2
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\vuddelvn
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\lkttubld
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\xwffgnxp
                1
                MutexesOccurrences
                {<random GUID>}4
                Global\VLock3
                Frz_State1
                Sandboxie_SingleInstanceMutex_Control1
                18550D22-4FCA-4AF2-9E8E-F0259D23694F1
                b7969e9f21991
                <32 random hex characters>1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                103[.]248[.]137[.]13328
                111[.]121[.]193[.]24228
                104[.]47[.]54[.]3617
                104[.]47[.]53[.]3611
                40[.]113[.]200[.]2017
                40[.]112[.]72[.]2054
                40[.]76[.]4[.]154
                5[.]9[.]49[.]124
                144[.]76[.]133[.]384
                45[.]63[.]25[.]554
                89[.]18[.]27[.]344
                87[.]98[.]175[.]854
                104[.]215[.]148[.]633
                5[.]135[.]183[.]1463
                45[.]32[.]28[.]2323
                141[.]138[.]157[.]533
                45[.]63[.]99[.]1803
                108[.]61[.]164[.]2183
                45[.]56[.]117[.]1183
                96[.]90[.]175[.]1673
                104[.]238[.]186[.]1893
                84[.]201[.]32[.]1083
                185[.]133[.]72[.]1003
                193[.]183[.]98[.]1542
                23[.]94[.]5[.]1332
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                microsoft-com[.]mail[.]protection[.]outlook[.]com28
                ponedobla[.]bit4
                myexternalip[.]com1
                ipecho[.]net1
                checkip[.]amazonaws[.]com1
                nekfad[.]xyz1
                Files and or directories createdOccurrences
                %TEMP%\<random, matching '[a-z]{8}'>.exe28
                %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>28
                %TEMP%\<random, matching '[0-9]{4}'>.bat28
                %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)27
                %TEMP%\<random, matching '[a-z]{4,9}'>.exe7
                %APPDATA%\By\By.exe4
                %APPDATA%\winapp\client_id3
                %APPDATA%\winapp\group_tag3
                %System32%\Tasks\services update3
                %APPDATA%\winapp3
                %APPDATA%\WINAPP\<original file name>.exe3
                %APPDATA%\winapp\qtmld.exe1
                %APPDATA%\HNC\User\Common\90\Fonts\Fontlist\signons.exe1
                \container.dat1
                %LOCALAPPDATA%\589ff121627b2b278b78a4a16bbdac82a879c8081
                %LOCALAPPDATA%\589ff121627b2b278b78a4a16bbdac82a879c808\container.dat1
                %SystemRoot%\Temp\1676.bat1
                %SystemRoot%\Temp\atfjtxxz.exe1
                %TEMP%\updbb837023.bat1
                %APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\compatibility.mik1
                %APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\cookies.wic1
                %APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\extensions.exe1
                %APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\webappsstore.oty1
                %APPDATA%\MozillaMaintenanceServiceu1
                %APPDATA%\MozillaMaintenanceServiceu\MozillaMaintenanceServiceu.exe1
                *See JSON for more IOCs

                File Hashes

                074af81963d44e82625056fa1772e2ab6e8b5bbfb58919c4ed4fea1e22df0a58 0d84479eb9868d33fc22a93e8f8a8555dc80c38a00197017bc86e91b3af9da9c 0f6a235a6e9a6eb292a6c5ada9043ad1efde537f19598849682f1eeb0d828e75 173100397fab511b430ba1d2f417ed19fcaadfe3d8ca8e97af6a05432fbaf3a6 2b5f5d317466ee9c4b54b6d840c0cf0e76e9633640df3a9c8f041212239839d2 2e3e02ff35a656d7edfcf29878e501492d4529f68b90b9d2bfa56314f5ffac99 37c6a10dc539555beaef7b4f73418f6721a37b2dbd1f0cecd891381b779a2d22 38ae264016466acb3d215c1451898050580e2a5bbc41cfe6dc441ce9e9dc0690 39ae2c5a2c33d0182ac83cc4440fc1ff6d5c78e3f6a861d0cc2bbc67ec16d0a4 3a303bc815ab0032c143f191f949ff833b0cc31b4349de8460bb4efd7dc1d4d8 3d085c1a1719b6520867aa16997a3aaa214efb2bac1e3ba9f4365def6cd3425e 3ecff383a31433ee6ea3b4faf9a83ed88beba6836d73cf5e45c35c4b2da88fb5 49e4a03514e44969dfd0e0e9d8c6ab90aad572461e92de573ed07f2fd289e943 5099df074e08c348f605a2171b0bd2c0fd8d118eee0d2c53f70f148aa0819e3c 519e96344029271df9b3f758a6891f8342492e43f28efa02796880e8cfaedd70 51be864bb2a297d99bf04cea956400e088ff86029c0031aa9c42f0491efcb544 530d0f977e0f3f34e4876e145677280dc662ea1d84ceb23ba34c7406582bfc71 544d256e79b29963fdeb13a39843c9c40f346d1fb977927c9ede0b37d9bea71e 5d3796595808d10fc9953dc33085e88722a75238f478471cc3723e74b1fffc7f 5fa50f66fd754d9207960ddae6764e45bfb084e9134ac5c4e7755cb9a1e92825 62386fac16d57a15f34b0874a7125f20e21442da376eb7ca1eca86f9edd8cf48 63c93baef82f65d8b47634c77eb5c250ec0546e8f86395ecad2b96a0c6e726b8 655726d8f43ae4d74631cbd1dfcf0a9649461360ee402ae574cc48a2b869a913 6d7fd6fd6ef01477b0e3b075f3d0783ce9168abded6d237f4579987d3a02f744 770dba34f27b6d21d3857e54d9fbb22694428aa1d019b5da7e93d8bedcb1b92f
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Win.Malware.Nymaim-7348211-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK 9
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                9
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}9
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}9
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}9
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}9
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}9
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}9
                Local\{74966FCB-4057-0A33-C72F-DA1761B8A937}9
                Local\{457A7A9B-5537-F010-1620-E1BCC38A93D1}9
                Local\{<random GUID>}9
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                64[.]71[.]188[.]17813
                66[.]220[.]23[.]1148
                184[.]105[.]76[.]2505
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                qjgtlozoh[.]com14
                ezgouisk[.]pw9
                ryron[.]com1
                onubkqstb[.]com1
                jeajlfdtoua[.]in1
                ysxmebrfyg[.]net1
                oxfab[.]pw1
                bwapyvznpflh[.]pw1
                voszetuy[.]in1
                klspisvji[.]in1
                ofiracujrsdy[.]net1
                istpmxnf[.]net1
                sianowq[.]pw1
                gpkoz[.]pw1
                sdghuwtwxsm[.]com1
                uslrspq[.]pw1
                kwchhgmla[.]in1
                Files and or directories createdOccurrences
                %TEMP%\fro.dfx19
                \Documents and Settings\All Users\pxs\pil.ohu19
                %ProgramData%\ph9
                %ProgramData%\ph\fktiipx.ftf9
                %TEMP%\gocf.ksv9
                %ProgramData%\<random, matching '[a-z0-9]{3,7}'>9
                %APPDATA%\<random, matching '[a-z0-9]{3,7}'>9
                %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>9
                %TEMP%\bpnb.skg1
                %TEMP%\mlo.aqz1
                \Documents and Settings\All Users\ju\xcio.cxj1

                File Hashes

                3ef2abee25c7ba9f153048e3c400f2935e3e40f988e79b55d12843a90b85a2c1 5816c31cfc9208418279e80e661be48705b54eef97612e2a3acb6b43e1520707 6743826da7e312a954d21cffa0e795599c64ac484ab913da0516d9a8c27c7d8f 74eba0187ce6b3abbc20e1ab98c0732fbf79f680b65ecd7c45eafd81370d0e5e 8dcf86bd3796d59fa421e8b2c442355a72c8a58eb489bc268063c8823bc880ba 97950901d1a3cb6713d8e59e21b4312e3ebc98f0e67071590b0b0514a67cdf1e 98e61798ed2d611ddb45b515bb45fbdd8b45ca5820f50297b4a3152e20d6768b a6bedf7f7e6fa95b3181e466468ec1812227396d18b51e027ffd670fc4699d4d a97dc1afeec16c38f5d92e1096930bfa61a60a8c4ccd3f378f5eb6f27ac5a58d ae65aa4775949b46281b12ffccd29da2aa2ba9463b7a26b17d9170153da8ab85 aee701fe3b36b6441a17ae591f6272764dfaf1361d688ca353813e022b90b545 b8d7cf0c79024e1cd6564731df735059705896d635951019b21d3719a69e64e6 bfa4b25db8ca23842ea3c6d977668c6110b0ca23919b395864065f09e8f15638 c3791696930b1226ccc03537ee50cdf275069b39524b808e3857ae9e85d6ca15 c8f6c7ff30e91b7236802bffaa759ada33ad7963bd3401912d3df9c108205a10 d1c761853ebdfd063cbe19d1a6f5ca1823bef0f6c527064846e20f1c8df8c54e d913691cdc1b1140905af020364afbc3144989b7a7947332efb29ef95440597d de8ff7107c7566fa9d68c49f0808c2c47df83fabeaa99b70a2f30da9f6d4c1a1 deee1f14fe06f8ceac4f617cba37d027664b9bc171cf0f1a3fca9c78da4df525 e5210cb809f2f6c04d51994491cf29edcaadc338df7294051406e5dd6b0d2d8e eb5ac18bb9bbce53b7522955ee36eccc8d21c5347c54b3830c5085cb323b6838 f9f839ec0ee45b5bc8b2dc65ed2747c662de954d7b14d8d00cb1fc47878f513a fe76a31b8ac35d140fb815504c739f952bc9f1625f5d936e837af21e5f1c1b3b

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Cerber-7343756-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 28
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                Value Name: PendingFileRenameOperations
                25
                MutexesOccurrences
                shell.{<random GUID>}26
                shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                178[.]33[.]158[.]0/2726
                178[.]33[.]159[.]0/2726
                178[.]33[.]160[.]0/2526
                178[.]128[.]255[.]17917
                150[.]109[.]231[.]11615
                54[.]164[.]0[.]5513
                34[.]206[.]50[.]22812
                104[.]24[.]111[.]13511
                104[.]24[.]110[.]1356
                216[.]218[.]206[.]691
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                api[.]blockcypher[.]com25
                bitaps[.]com17
                chain[.]so17
                btc[.]blockr[.]io17
                bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com9
                hjhqmbxyinislkkt[.]1j9r76[.]top5
                Files and or directories createdOccurrences
                <dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.txt28
                <dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.hta28
                \I386\COMPDATA\EPSON3.TXT26
                %TEMP%\8f793a96\4751.tmp26
                %TEMP%\8f793a96\da80.tmp26
                \I386\COMPDATA\BOSERROR.TXT26
                \I386\RUNW32.BAT26
                %TEMP%\tmp1.bmp26
                <dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)26
                %TEMP%\d19ab989\4710.tmp25
                %TEMP%\d19ab989\a35f.tmp25
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp25
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp25

                File Hashes

                0571ddf62e8bcf0dfc91f61079145ef5a334ade39ffd45d7ce88b4cbe42a15d3 09606b24a726b8179417a36c9aca18f44ebcf98f2240fbb398b70c49090d050b 162012945f91033f3683b742d660795cc2e184f41d6db3a15703e38024ce7985 1974b3f6d08447d18279bce6cd737aec3438cbda3cc90d8fd625fdc9e06339eb 1f86d067251a326322db9afea633b6ef9419eb456eded355220fe590ea2f11c5 283bd9ce2b81146780f060c00fdb7e11701cb617a55b5b6e15217b8041fb5480 2b75044e81ecbee8f6da594a277e37d7a232e934ef9de81b8185e4c0213564a6 2dbf7bed5adcba2ce1f48736431a2041ec2c6a581a6edc4c0883f6394022316c 34012082527c5206f58fe4dc7ed65aa785864ffc57b69ef36a2684a0bd77df93 37ae3f37a90f62a3247ac2b2afaa2a7b7feca603fd9258a23be3b0c06fad3baf 394e282ad6f08c49e67258afb5be535d98ca35b2bffdfd4cc6f866ff909da21c 41dfd05edf2657153e9f265e5f41877660b0fe9b3d4c46d82a0560234fe7d911 54be4270379a47819af99f6b455af363531d0c035f6f645b0505240cbe2e18df 58a71b81fb151fc64383e7adad9aadab56188c8e5107fe157889b598d80331b9 5cde373946029302a628504ae7fe6c26037ba6c6e7cf575aa33258808dc7b4d3 5e3b677a238a772109ab8282964d0a7dc4a68e422471589eeb58dacf4f3b1917 5f5c89d4cae98e32d764146b5ea87879ed6c355171535e1ca1b65f8a5d2fc296 69747e554bef6e4fec803333c19df48b7317848feb58842849fdb3797d41f66c 6d1ed5c4c21f2f9fa42d1cede8411ae9347ae85c03a76dd212856187c66328b3 797adc29fe0dddbfb03aec9344dd2f93a702bb57920f35bd7decb92873b2ea86 79acc4d7034c595c35d2280281699064e114bc6ca7dcc461c2077a2d350f78c4 821923194cc976d5b0785d114769c85b473e7e7316f0bfab3e60f94404bd9a91 8232399d1c7350132d3347c6aeffcea06c38e6c8fbf3527399a51d7fc3bff1bb 831872753224405c5553a509d3ac4af91032d789cba67977e43e1b0b68abe543 91f928319c927531fb3c2863eefd2fff358a962887d8fd8deeeead74d3602562
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid


                Malware




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (69038)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Madshi injection detected - (2294)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Process hollowing detected - (321)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Excessively long PowerShell command detected - (304)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Dealply adware detected - (226)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Kovter injection detected - (183)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Gamarue malware detected - (156)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (88)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                PowerShell file-less infection detected - (49)
                A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                Reverse tcp payload detected - (38)
                An exploit payload intended to connect back to an attacker controlled host using tcp has been detected.

                Vulnerability Spotlight: Denial-of-service in VMWare Fusion 11

                $
                0
                0


                Piotr Bania of Cisco Talos discovered this vulnerability.

                Executive summary

                VMware Fusion 15 contains an exploitable denial-of-service vulnerability. VMWare Fusion is an application for Mac operating systems that allows users to run other OSs in a virtual environment, such as Windows and Linux. An attacker could exploit this vulnerability by supplying a malformed pixel shader inside of a VMware guest OS.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with VMware to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                VMware Fusion 11 shader functionality denial-of-service (TALOS-2019-0848/CVE-2019-5536)

                An exploitable denial-of-service vulnerability exists in VMware Fusion 11.1.0 (13668589). A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from a VMware guest and the VMware host will be affected, leading to a VMware fusion process crash on the host.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability exists in VMware Workstation 11.1.0 (13668589) with Windows 10 x64 as operating as the guest VM and macOS Mojave as the host.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 50502, 50503

                Viewing all 1927 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>