Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Vulnerability Spotlight: Remote code execution vulnerability in E2fsprogs

$
0
0

Lilith [^_^] of Cisco Talos discovered this vulnerability.

E2fsprogs contains an exploitable remote code execution vulnerability in its directory rehashing functionality. This set of programs is often considered essential software for many Linux and Unix
machines and ships by default on most Linux systems. An attacker could exploit this vulnerability by causing an out-of-bounds write on the stack, which would then allow them to execute remote code on the victim machine.

In accordance with our coordinated disclosure policy, Cisco Talos worked with E2fsprogs to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

E2fsprogs e2fsck rehash.c mutate_name() code execution vulnerability (TALOS-2019-0973/CVE-2019-5188)

A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information. 

Versions tested

Talos tested and confirmed that versions 1.43.3 - 1.45.3 of E2fsprogs are affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 52570, 52571




Threat Source newsletter (Jan. 9, 2019)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

We’re back after a long break for the holidays. And 2020 is already off to a fast start as tensions continue to rise in the Middle East.

We’ve gotten a lot of questions about whether customers and users should be concerned about cyber attacks from Iran after they’ve exchanged missile strikes with the U.S. But the reality of the situation is, if you haven’t already been preparing from attacks for state-sponsored actors, it’s already too late. We run down our thoughts on the situation here.

We also have our first Beers with Talos episode of the new year out, where the guys run down the top threats of 2019 and talk about what lessons we learned.

Upcoming public engagements

Event: Talos Insights: The State of Cyber Security at Cisco Live at Cisco Live Barcelona
Location: Fira Barcelona, Barcelona, Spain
Date: Jan. 27 - 31
Speakers: Warren Mercer
Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. We are responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In this talk we will perform deep analysis of recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies.

Cyber Security Week in Review

  • The U.S. Department of Homeland Security issued a warning this week asking American organizations to prepare for potential cyber attacks from Iran. State-sponsored actors from the region were expected to respond after the U.S. killed a high-profile Iranian general in a drone strike. 
  • Even though the U.S. and Iran seemed to walk back from their threats of physical retaliation against one another Wednesday, the threat of a cyber attack still lingers. Many researchers are using this discussion as an opportunity to remind defenders that a proxy cyber war has been raging for years between the two countries.  
  • International currency exchange marketplace Travelex is still recovering from a ransomware attack earlier this month. The attackers, believed to be Sodinokibi, have requested a $6 million extortion payment. 
  • The city of Las Vegas says it successfully thwarted a cyber attack that could have shut down many of its government operations. Officials said they first detected an intrusion on Jan. 7 and removed the malware before any damage could be done. 
  • Mozilla released an emergency update for the Firefox web browser that fixes a bug attackers were exploiting in the wild. CVE-2019-17026 is a type confusion vulnerability that could allow an attacker to write data to or from memory locations that are normally closed off. 
  • The popular social media app TikTok puts users at risk of having their accounts completely taken over with just an SMS message. A chain of vulnerabilities could allow an attacker to infect a user’s mobile device, then gain access to the user’s TikTok account and remove, add or edit videos. 
  • California’s privacy law went into effect at the start of the new year, leaving many massive companies scrambling to clean up some of their privacy policies. Under the new law, a user may ask most major internet companies to disclose what personal information they store on the individual and how the company may profit off it.  
  • A new update to Google Chrome is expected to cut down on notification spam. Chrome is changing its notifications API so the notifications are less intrusive, and to make it more difficult for cybercrime groups to exploit them. 
  • The FBI is once again asking Apple to unlock iPhones for them. The agency is attempting to access the devices, which belonged to a man who committed a mass shooting at an American naval base. 

Notable recent security issues

Title: Cisco patches dozen vulnerabilities in Data Center Network Manager
Description: Cisco released multiple security advisories last week announcing patches for 12 vulnerabilities in the Data Center Network Manager software. The software allows users to manage their Cisco switches and fabric extenders. Three of the vulnerabilities disclosed (CVE-2019-15975, CVE-2019-15976 and CVE-2019-15977) could allow an unauthenticated, remote attacker to bypass authentication and carry out a variety of malicious tasks with administrative privileges on an affected device.
Snort SIDs: 52530 - 52547

Title: Buffer overflow vulnerabilities in OpenCV  
Description: Cisco Talos recently discovered two buffer overflow vulnerabilities in the OpenCV libraries. An attacker could potentially exploit these bugs to cause heap corruptions and potentially code execution. Intel Research originally developed OpenCV in 1999, but it is currently maintained by the non-profit organization OpenCV.org. OpenCV is used for numerous applications, including facial recognition technology, robotics, motion tracking and various machine learning programs.
Snort SIDs: 50774, 50775 (By Dave McDaniel)

Most prevalent malware files this week

SHA 256: d73ea76f6f07f96b337335213418b58e3fbc7e4b519fec0ef3fbd19c1d335d81 
MD5: 5142c721e7182065b299951a54d4fe80
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Service
Detection Name: PUA.Win.Adware.Flashserv::1201

SHA 256:5fc600351bade74c2791fc526bca6bb606355cc65e5253f7f791254db58ee7fa
MD5: 121e1634bf18768802427f0a13f039a9
Typical Filename: AA_v3.exe
Claimed Product: Ammyy Admin
Detection Name: W32.SPR:Variant.22fn.1201

SHA 256: 1c3ed460a7f78a43bab0ae575056d00c629f35cf7e72443b4e874ede0f305871
MD5: c2406fc0fce67ae79e625013325e2a68
Typical Filename: SegurazoIC.exe
Claimed Product: Digital Communications Inc.
Detection Name: PUA.Win.Adware.Ursu::95.sbx.tg

SHA 256: d8b594956ed54836817e38b365dafdc69aa7e07776f83dd0f706278def8ad2d1
MD5: 56f11ce9119632ba360e5b3dd0a89acd
Typical Filename: xme64-540.exe
Claimed Product: N/A
Detection Name: PUA.Win.Tool.Coinminer::100.sbx.tg

SHA 256:c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

Threat Roundup for January 3 to January 10

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 3 and Jan. 10. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Trojan.Razy-7505643-0 Trojan Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypts the data, and sends it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
Win.Dropper.Tofsee-7492214-1 Dropper Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages to infect additional systems and increase the overall size of the botnet.
Win.Packed.Ursnif-7489213-0 Packed Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
Win.Packed.ZeroAccess-7489468-1 Packed ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click-fraud campaigns.
Win.Ransomware.TeslaCrypt-7501245-1 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
Win.Dropper.Upatre-7491797-0 Dropper Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
Win.Dropper.TrickBot-7490964-0 Dropper Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Packed.Formbook-7491272-1 Packed Formbook is an information stealer that attempts to collect sensitive information from an infected machine by logging keystrokes, stealing saved web browser credentials, and monitoring information copied to the clipboard.


Threat Breakdown

Win.Trojan.Razy-7505643-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
11
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\SETTINGS\LEAKDIAGNOSISATTEMPTED 7
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
3
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\0748AF3992DE6E3AA7B386B7F6C08EF2.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\1C3DDA8020173A5B45A7C80CFC8B0298.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\0748AF3992DE6E3AA7B386B7F6C08EF2.EXE
Value Name: LastDetectionTime
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\B4F3AEA9F95879ABBE9B311B5AB9FC30.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\2AA87EE2B7BAA7D413CC747537A867A2.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\1C3DDA8020173A5B45A7C80CFC8B0298.EXE
Value Name: LastDetectionTime
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\EB9064AF85850CF7B3485B2A911798D7.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\B4F3AEA9F95879ABBE9B311B5AB9FC30.EXE
Value Name: LastDetectionTime
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\2AA87EE2B7BAA7D413CC747537A867A2.EXE
Value Name: LastDetectionTime
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\EB9064AF85850CF7B3485B2A911798D7.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: goodsStartup key
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\6035E0F59A5169E7C59129A3CDBD076E.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\6035E0F59A5169E7C59129A3CDBD076E.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: goods
1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\0786B90DA12B29B5CC97621DCC78FA3E.EXE 1
<HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\0786B90DA12B29B5CC97621DCC78FA3E.EXE
Value Name: LastDetectionTime
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: mrke
1
MutexesOccurrences
Global\14c64321-2d62-11ea-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]12[.]20610
172[.]217[.]9[.]2257
172[.]217[.]5[.]2386
104[.]16[.]155[.]363
77[.]88[.]21[.]1583
172[.]217[.]10[.]461
172[.]217[.]10[.]331
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
smtp[.]yandex[.]com3
whatismyipaddress[.]com3
doc-00-6c-docs[.]googleusercontent[.]com1
doc-0s-9s-docs[.]googleusercontent[.]com1
doc-14-60-docs[.]googleusercontent[.]com1
doc-0k-c8-docs[.]googleusercontent[.]com1
doc-00-5o-docs[.]googleusercontent[.]com1
doc-10-6c-docs[.]googleusercontent[.]com1
doc-04-bg-docs[.]googleusercontent[.]com1
doc-04-6c-docs[.]googleusercontent[.]com1
Files and or directories createdOccurrences
%APPDATA%\pid.txt3
%APPDATA%\pidloc.txt3
%TEMP%\holdermail.txt3
%TEMP%\holderwb.txt3
%HOMEPATH%\desktop\product.pif2
%TEMP%\bhv61AB.tmp1
%TEMP%\bhv8DF6.tmp1
%HOMEPATH%\Orkende1
%HOMEPATH%\Orkende\Recomm.pif1
%TEMP%\bhv5953.tmp1

File Hashes

3031363a67eca33c68892ed7529803bbaa926a6f371204eeaa8ca205501d8cac 34b978969d994134de71dd45996dc5d10516e534e23a2abb8537a1c548ac1c93 51e97032af43de44947d564ee43a9b43278312873caaa4bbd7d3e4f7ec00eb89 58962a9133651591f2d4df22589d1cdd4f7cee175f70c7d47c5a854a5264ec98 5be87b343f2d3af80883ed4deb795c0ae8f7e0ae4ba08a6bbac5b3e4659d0341 6bd1baae5ba600ff4ece4523e53bf9818bcc381a56664e3104c1c317d6f5a3bc 6dfdb201ddd46c8f2ded273f3c8ed6c5beca63196b5428fe388f59faaac79597 731aa2659852eb9b98d573b3f59436b49c15492d8df94e18da5a8f4c41f48fbe 79acdd5ea559b2e7e29fa6b47ca1053e11dbaadf540fc2b140aca89d1539d17e 8fa302841d886e0198c96d76d93399f5905844f424b255e6707a74ea610c55ce cdaef1b003e82f8994dd616103781125fca98ec097ee79830c2262f41158237a

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Dropper.Tofsee-7492214-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 192
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
175
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 158
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
68
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\wpdjiqwl
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: Type
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: ErrorControl
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: DisplayName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: WOW64
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: ObjectName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
Value Name: Description
11
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\lesyxfla
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LESYXFLA
Value Name: Type
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LESYXFLA
Value Name: Start
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LESYXFLA
Value Name: ErrorControl
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LESYXFLA
Value Name: DisplayName
11
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\LESYXFLA
Value Name: WOW64
11
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]55[.]5[.]250192
43[.]231[.]4[.]6/31192
85[.]114[.]134[.]88192
239[.]255[.]255[.]250175
46[.]4[.]52[.]109175
46[.]28[.]66[.]2175
78[.]31[.]67[.]23175
188[.]165[.]238[.]150175
93[.]179[.]69[.]109175
176[.]9[.]114[.]177175
192[.]0[.]47[.]59174
172[.]217[.]12[.]164159
74[.]125[.]192[.]26/31140
67[.]195[.]204[.]72/30135
168[.]95[.]5[.]116/31134
172[.]217[.]197[.]26/31122
172[.]217[.]10[.]67116
216[.]146[.]35[.]35110
212[.]227[.]15[.]40/31104
104[.]47[.]54[.]36102
208[.]76[.]51[.]51101
168[.]95[.]6[.]60/3097
98[.]136[.]96[.]92/3195
31[.]13[.]66[.]17493
98[.]136[.]96[.]74/3191
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa192
microsoft-com[.]mail[.]protection[.]outlook[.]com192
schema[.]org175
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org175
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org175
mta5[.]am0[.]yahoodns[.]net175
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net175
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net175
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org175
whois[.]iana[.]org174
whois[.]arin[.]net173
coolsex-finders6[.]com173
bestladies[.]cn173
bestdates[.]cn173
bestgirlsdates[.]cn173
hotmail-com[.]olc[.]protection[.]outlook[.]com171
eur[.]olc[.]protection[.]outlook[.]com127
mx-eu[.]mail[.]am0[.]yahoodns[.]net125
ipinfo[.]io118
nam[.]olc[.]protection[.]outlook[.]com93
mx6[.]earthlink[.]net91
pkvw-mx[.]msg[.]pkvw[.]co[.]charter[.]net88
charter[.]net87
mx0[.]charter[.]net87
msn-com[.]olc[.]protection[.]outlook[.]com72
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile192
%SystemRoot%\SysWOW64\config\systemprofile:.repos192
%TEMP%\<random, matching '[a-z]{8}'>.exe188
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>158
%HOMEPATH%59
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)59
%SystemRoot%\SysWOW64\wpdjiqwl11
%SystemRoot%\SysWOW64\lesyxfla11
%SystemRoot%\SysWOW64\mftzygmb10
%SystemRoot%\SysWOW64\piwcbjpe10
%SystemRoot%\SysWOW64\zsgmltzo10
%SystemRoot%\SysWOW64\yrflksyn10
%TEMP%\<random, matching '[a-z]{4,9}'>.exe9

File Hashes

03dfa2a7b5722d6fa2f2f85287c8bea67b2ae1c8be2d9de90b33c2b4dd3c0f42 07314be6c87366f215030d7a2af42440f8a2a187e782ad975a476a84aa389fe1 0862506904a93aba08781be3d9b5189c8cc01bc5fd86d9a4881bd114449502b7 088fe0b34e1db5b9010adb26a2380aa6faf53165f9e2d7d986fd0bc6be614f9e 0ad21f45614d3112c1201ff8a5b3fe702b4943e39ab9d8bc4f38362565c373d5 0b2c1eebcd3f136c556a8568541d589f691dbe6fb450fa708e9774f4ca72fb67 10d2a79f8c199a6ce16b0e3fd4a911524cc2ece755daf67c04f0d3118dfb3498 11e2d71f1dab632b58c9ab60a48c51854d59df47456a97ff9ef59c72b607229c 136e082449131aae0a3e28c21c99aaef24a9d1709cae71daee0e154bf2b45d9f 144d2f639c9dafd40f48b72980609cb018ca83a360b7e24fede6023e0e742397 16f778581e678fdd5e21442d3d55bcc4415271ac94ed0d31c2efd40c772f26ec 1733e36d0e55b369c97e387fa74da22462fbf1858b09befb5de125d9523e3d41 1756a1f4ce0593f80b857ed9a654c656dac96d3405a566dc38737e0a79bc194d 188389b2163b98dbb96edf4000496dacc062f2a6ae2dd021a3f49742d36a2e0b 189f32c3d78e9b129d62bb4e40b3693da216cc371018d5ce4ef2356a94ca4f6e 18f25a4e071f993b9ceac935a3814d7667e42c46d22ea9e8ccd7c4a3f0087f7b 1a747af4f485eb3c8c475c9dcd9cac9d7fe279f3f45777d793572c4927e07ffa 1af4c3359d224c2ad2006db3c9786afdeeb90404ab91ec7c63467092264e2183 1c1d1c939fd6d3e6a77c2fa342f2c39433eea8f9d3c749ecee42e287734bd330 1c69825459d03fb13956e1a0f40e485731fbe96e48efe1abc765db537fec77ba 1d3aecb8b67bd70634fbffcf15b5e21ef0ee95627d296e78caf3f07842820d9a 1d9d2d4000df6baadc93db56dbdc783c9db35a047be86bed8d4bfaacb33b6a9c 1f42ceba5e533e7aeb5395e1db11ef780b02e44c8cde237394b663b816da69b4 1ff0ce00b3cc5e3223e31501e16302b44ae24981b4b61f3500bdba2f671a057f 20f52e7aa1ee2e27dffcb75eb1e207681dbe2f72d44b0f4d2f66498102d8cf8e
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella



Win.Packed.Ursnif-7489213-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
18
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
18
MutexesOccurrences
Local\https://vars.hotjar.com/18
Local\https://www.avast.com/18
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]221[.]50[.]12218
152[.]199[.]4[.]3318
23[.]221[.]49[.]7518
23[.]221[.]50[.]10218
104[.]107[.]26[.]21418
13[.]109[.]156[.]11818
65[.]55[.]44[.]10917
157[.]240[.]18[.]3515
104[.]107[.]18[.]9115
38[.]126[.]130[.]20215
192[.]42[.]119[.]4114
13[.]107[.]21[.]20013
172[.]217[.]164[.]13613
23[.]196[.]81[.]17613
204[.]79[.]197[.]20012
204[.]2[.]197[.]20212
72[.]22[.]185[.]200/3112
172[.]217[.]197[.]156/3112
172[.]217[.]6[.]20611
172[.]217[.]12[.]13611
172[.]217[.]11[.]3611
172[.]217[.]10[.]1411
169[.]54[.]251[.]16411
23[.]201[.]42[.]24711
23[.]201[.]42[.]16111
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
googleads[.]g[.]doubleclick[.]net18
www[.]googletagmanager[.]com18
www[.]google-analytics[.]com18
stats[.]g[.]doubleclick[.]net18
connect[.]facebook[.]net18
www[.]googleadservices[.]com18
ib[.]adnxs[.]com18
avast[.]com18
static[.]avast[.]com18
secure[.]adnxs[.]com18
mc[.]yandex[.]ru18
dev[.]visualwebsiteoptimizer[.]com18
amplifypixel[.]outbrain[.]com18
pixel[.]mathtag[.]com18
tr[.]outbrain[.]com18
amplify[.]outbrain[.]com18
ajax[.]aspnetcdn[.]com18
img-prod-cms-rt-microsoft-com[.]akamaized[.]net18
az725175[.]vo[.]msecnd[.]net18
script[.]hotjar[.]com18
static[.]hotjar[.]com18
c[.]s-microsoft[.]com18
assets[.]onestore[.]ms18
a[.]tribalfusion[.]com18
www[.]avast[.]com18
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\www2.tmp13
%TEMP%\www3.tmp13
%TEMP%\www4.tmp13
%HOMEPATH%\Favorites\Links\Suggested Sites.url13
%HOMEPATH%\Local Settings\Application Data\Microsoft\Feeds\FeedsStore.feedsdb-ms13
%HOMEPATH%\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms13
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A4A1A128-768F-41E0-BF75-E4FDDD701CBA}2
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B40C43F1-F039-44D2-AEB7-87F5AF8ABC3D}\ProxyStubClsid322
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{06EEE834-461C-42c2-8DCF-1502B527B1F9}\Instance\PropertySetStorage2
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1FE6762-FC48-11D0-883A-3C8B00C10000}2
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3CCEDF7-2DE2-11D0-86F4-00A0C913F750}1
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}1
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A7EE7F34-3BD1-427f-9231-F941E9B7E1FE}1
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{06EEE834-461C-42c2-8DCF-1502B527B1F9}\Instance\PropertySetStorage\{000214A0-0000-0000-C000-000000000046}\141
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{06EEE834-461C-42c2-8DCF-1502B527B1F9}\Instance\PropertySetStorage\{000214A0-0000-0000-C000-000000000046}\21
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f237df9-9ddb-47ad-b218-400d54c286ad}1
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A4A1A128-768F-41E0-BF75-E4FDDD701CBA}\InProcServer321
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{81397204-F51A-4571-8D7B-DC030521AABD}\InprocServer321

File Hashes

0ad051eb62410a3fe8d776a69f29a46fe609ea59c2adfe061811dc9ace3e40e9 17cfe796a3b8017bf83d2c302ec9507317abac0191cdf835d2d0d1a75d33b991 18b5f4e21612aadfed4e72cdef1356009fb1614535b62a4e39463f8cea9ace03 2013ff55ccdd16e36eccebe50b0587b6f2f37e333442be1552b50c41cbfe48d4 241ab82dccad5b9670c445509841c6aebf69de45815c3d9951f15be158b8ece5 270f970f0cfda8e8c61a73b2aab71fd51755ad911b8173f5aac4cdb5961ba8a5 3016c699d4c8c7affedc18f5cb4aadb30676a9c3081dee913b43b84737949708 31a02187883766f2eec0edc6479b8cd793c8e8eec658fe56b33581a76d9953f8 365acef54f3733520717314466c86aa978cbf08c37d1f9f0a90bbbea42b3f8f3 5ba3ea5868ddef74a57fff2c5ded68f17b08458876881161a7af9eb32438779d 5c486b96a5f273819baa9a010700f088ce3f707c87088a50e699ee6dedd0b117 611e95e1a1a352d6cb1a6106b0e69565b065de6d68dbe5c41d49c2ebfa637dd6 7a8b53746144a903954535791ef7c5038834af3cd1eec8c0dae8b28f609859bf 7fd6f59c5c23ea12adf5975e56730a52558799ae7a330ef40e552a4353a8d6e3 8220634b1969f5a06e3b5adff2dbae0356608a91e5162fccdd247f1571a2a4b2 9a20d2755608e7cf98a090f30b166779318f0a08747631fccc9393de15ed33cc 9b6503731468ce3922f5aec73e22a81489ddcf6124d86eeb2fc05cb7c2f4527f b062f5f376af3972c8386343b27fb1e5947afb66c5c0741cced2d317f5261158 b2c7bc0dece9bed221c3fe88b9dce2313b036b9a3f5982b5bfa91961efb7bdaf bb8d733fa6ca4ef01d8b44d098902e781359cdd36a4418538a504082b3b95fe6 cecc5dd05c51a6740730b775dc4af3d579b498880de7899b272d6225fb96cb44 e6bd801ae1e976ff76409d2b28d00d15f50e5819c3c5bbc54eb4ac9752f87435

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP




Win.Packed.ZeroAccess-7489468-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\TRACING\KMDDSP
Value Name: FileTracingMask
55
<HKLM>\SOFTWARE\MICROSOFT\TRACING\KMDDSP
Value Name: ConsoleTracingMask
55
<HKLM>\SOFTWARE\MICROSOFT\TRACING\KMDDSP
Value Name: MaxFileSize
55
<HKLM>\SOFTWARE\MICROSOFT\TRACING\KMDDSP
Value Name: FileDirectory
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Start
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: DeleteFlag
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: DeleteFlag
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
Value Name: Start
55
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Type
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: ErrorControl
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Type
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: ErrorControl
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: DeleteFlag
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Type
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: ErrorControl
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Type
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: ErrorControl
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000010
Value Name: PackedCatalogItem
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000009
Value Name: PackedCatalogItem
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000008
Value Name: PackedCatalogItem
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000007
Value Name: PackedCatalogItem
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000006
Value Name: PackedCatalogItem
55
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000005
Value Name: PackedCatalogItem
55
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
94[.]242[.]250[.]64116
64[.]210[.]151[.]3255
178[.]32[.]190[.]14255
91[.]207[.]60[.]2215
71[.]229[.]165[.]7515
201[.]231[.]100[.]11715
71[.]239[.]117[.]1429
66[.]41[.]70[.]148
71[.]63[.]0[.]2357
98[.]224[.]77[.]37
83[.]15[.]111[.]387
76[.]180[.]80[.]1347
24[.]73[.]24[.]1917
46[.]45[.]5[.]2407
67[.]185[.]179[.]46
98[.]230[.]137[.]1236
69[.]80[.]173[.]916
75[.]66[.]129[.]2056
69[.]117[.]29[.]1636
190[.]36[.]183[.]1366
77[.]126[.]70[.]1666
98[.]203[.]164[.]2536
67[.]240[.]46[.]2085
72[.]200[.]101[.]795
68[.]97[.]172[.]875
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
promos[.]fling[.]com55
Files and or directories createdOccurrences
\@116
\L\eexoxfxs116
\cfg.ini116
\systemroot\assembly\GAC_32\Desktop.ini55
\systemroot\assembly\GAC_64\Desktop.ini55
%System32%\LogFiles\Scm\e22a8667-f75b-4ba9-ba46-067ed4429de855
%SystemRoot%\assembly\GAC_32\Desktop.ini55
%SystemRoot%\assembly\GAC_64\Desktop.ini55
\systemroot\assembly\temp\@55
\systemroot\assembly\temp\U55
\systemroot\assembly\temp\cfg.ini55
\systemroot\system32\consrv.dll55
%System32%\consrv.dll55
%SystemRoot%\assembly\temp\@55
%SystemRoot%\assembly\temp\cfg.ini55
\systemroot\system6455

File Hashes

024be6e3a83461f6084ade9ef26da705de0e7eeceebbd55ca5289a7396dcf280 02a6714aebbfef68f0528f10414a2fd8a8338243e05992d0c28d68383e1dc1a1 05597af5ff2dd97b20b7c57e4c3cd48cae1a4d2c7cd1c4ac920a6f1185a65900 0712314c985a7cc479d0cbcdcf06c886ba2d7fc79d89cf4efc56a137235eb379 0808ec44505b3130a5dde6e81c75f473f44a288d1134fff680394534283fce87 08b18f2eb8b1fb422adfb52d482f9d9bb3f4a24d18f89a186ed2865181f6b551 0b675bae551f40fe43934915324927652e35fa3089dcc911345478fc96338a3c 0d6aea5357e88970db6f5c226a2a888e1c7f1c5f20146087952612c06d064b4e 15d09a26dec6c151966a24bfebd38fb67c8397a06c3bf1702eb4702a871a9e2c 1744dd32bcf9cd45cfec1f4334de1df340129a555e12f73c740e02f7fe7b469c 1ac467786827d37bc69e30617fa2b14fa8903f68f73022e727caa634379490b2 1c9dc1eb7cb0191101faa393854592a440d6df736f07a767138df22c1f809c8d 1d34f5231571a20d3229e850bb786f6148dab477ca4a0169a0af3acf2d2ce71d 243ccb0ec0007367fc4e21dea982be68d6f32e6cdcafbd11e10768cb912a914b 2460096ab6403840c5de8a19dc1706cf2dc416cc9e3ab701275853d66eb7e142 24ec81e3c8a7247c0fa2292906afccc1d47b81412cfaf021dc22be067530e944 2b275de3b1d0f2786c58f17a0d2607a47dade5151046f255eea2f9da20a03c9c 311c8b6b2d2150fff040363e23fdca221be64cae3ad34d9b3dfacd396ed48fc6 330719fd8491c5abc9fd90c7e27310cb72d331222c5caaf4671525d48e4b1026 35ba7b85dd5146c275b74b7b09ef62985ba9db0d1e1f2771b6990d53ed965d52 37240db16c496c45552715904b84ce5cc2c1e01ebbcf519a7e0bee4cc73f08bd 39bf409ea1d861dfed811fa6c0aee2767aff44d96fffb4f3e552db1add1ed7fc 3b3d6c01a983c835152e169e092be6193bce78c22b41cda5e573e5330235aac6 3e6c74185843c930a9b5ea041a5a3eef7d9ae80a31e3a67e0c235b5090e64afb 3fcf02116eab251a35b6a9dba981edb13ba59701f0b52ca1521fd2dbff350477
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP




Win.Ransomware.TeslaCrypt-7501245-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\XXXSYS 15
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: addon_v57
15
<HKCU>\SOFTWARE\XXXSYS
Value Name: ID
15
<HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'> 15
<HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'>
Value Name: data
15
MutexesOccurrences
z_a_skh495ldfsgjl293534515
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]20[.]239[.]1215
64[.]140[.]157[.]15715
157[.]119[.]94[.]20215
104[.]27[.]31[.]899
104[.]27[.]30[.]896
3[.]225[.]189[.]105
3[.]229[.]167[.]1154
54[.]83[.]91[.]423
34[.]195[.]145[.]1452
3[.]93[.]124[.]541
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
en[.]wikipedia[.]org15
www[.]torproject[.]org15
www[.]hugedomains[.]com15
vostorgspa[.]kz15
p4fhmjnsdfbm4w4fdsc[.]avowvoice[.]com15
bledisloeenergy[.]com[.]au15
polyhedrusgroup[.]com15
todayinbermuda[.]co15
nn54djhfnrnm4dnjnerfsd[.]replylaten[.]at15
www[.]buildenergyefficienthomes[.]com15
mosaudit[.]com15
buildenergyefficienthomes[.]com15
akdfrefdkm45tf33fsdfsdf[.]yamenswash[.]com15
Files and or directories createdOccurrences
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I0ZU5JT.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I478AKJ.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4FI238.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4FKVBH.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4QK3KJ.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I5QX7W9.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I77RW1L.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I7J37KF.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I9NSD58.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IANXEE8.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IC5NB1M.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ID60W3E.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IIUTK07.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJE160U.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IKAVPAE.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IL2NS3P.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$INKC8CM.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IP8M1EE.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IPDP9E0.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ISIYA4I.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IV54ALI.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWK2JPN.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWYYKMD.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXC3P46.txt15
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IZ7KADN.txt15
*See JSON for more IOCs

File Hashes

00de6704e49ec7e8b570b95410704c0d3d81c727c688d06afe68e4f8f4e4b8e6 079ab9339f5b1ccf429dbf4426350c311adc6bdeeb3a003970d052088dcdaabf 4b7a8b7ffac89faa52034d12821a9e20bfd987adcdcbdba29d6daaca44ef9325 6352e2794884e3c090f6ec14ec8c870fdc6d4cde61f518c44ed5bae2916e67c8 69a0539a87e7a9fe382cf4c504c3d02bf6ee4cd6a5e20098ed619da8975480ee 70311b0da413a17ed6c5f300adcd7757301346300693823ba4e1e7845901c1b8 7f1a0f921a5132b1329dbdbfadc83eec6568ad151d1c33da89a4aaf0a5e5c0c2 a7ba5bb407c401764b9af3e22b005962431d5446f1c8ba468ab71a7ed1033299 b8dd6020265dc28fa74d1708e2238cc227791dace690699db22cbb3ba6c1d64c bd9a8d8d2c8e1d426959e7022ecd26b7001998aba2617e13deac573d16208916 c7a8125f64e0c8d4133263f901855d1ef0ecea2e083c10782e4cfbbe8b334e79 dca1535c72840c4a47886ee0e23437fc560a4fea29c9c62f63a58726d21a565b e010d87d8cb503b316a2dc3e064b99178b7040a213251ce49e58fd0d23c6cef5 eb6259dd5f1ed9540edc3e0e9944e08145b9514320cd65c26612b32b92fa6885 f347dc8de7cefff44e6127fcfd035c08d31439a6f4951dd92549bdd6400b60aa

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Upatre-7491797-0

Indicators of Compromise

IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
93[.]185[.]4[.]9025
104[.]20[.]17[.]24210
98[.]214[.]11[.]2536
66[.]196[.]61[.]2186
98[.]246[.]210[.]276
81[.]90[.]175[.]75
216[.]16[.]93[.]2505
76[.]84[.]81[.]1204
217[.]168[.]210[.]1224
84[.]246[.]161[.]474
85[.]135[.]104[.]1703
24[.]148[.]217[.]1883
81[.]93[.]205[.]2513
81[.]93[.]205[.]2183
62[.]204[.]250[.]263
173[.]248[.]31[.]13
87[.]249[.]142[.]1892
98[.]209[.]75[.]1642
194[.]228[.]203[.]192
24[.]220[.]92[.]1932
176[.]36[.]251[.]2082
109[.]86[.]226[.]852
95[.]143[.]141[.]502
68[.]55[.]59[.]1452
188[.]255[.]239[.]342
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
icanhazip[.]com25
Files and or directories createdOccurrences
%TEMP%\tywy22.txt24
%TEMP%\tywyaven.exe24
%TEMP%\t4930.tmp1
%TEMP%\vimazet.exe1

File Hashes

01152de6c7c348fa9716c3d760744689eb85386303593e6100f6532bd3fc2cb3 01cb3cbad05c3b0b186b604f32cb00a3ceced74ead26affe5b4fb1867d48be01 02f4933753d850d1774b56cbd35c994b6b7dd9b971fd45c34f5677f90b281b6a 062720c82d1bef7558b0a4675b9539a23afddf252ede24b5d54edfba2a758ca5 06f92e4b684161224f68388d8d4ca35d113682fadeb2e100072dfa8d43413101 09589d82d2f9460fe3d33b726794d41a93b672dbaed8e5f397350b7714649cd7 09f38837949bbee74dd5da5fce7a92d7f21168f7e43345bbd19f5cbfde8f6f69 0c45c58eab16df4d5bff14dad957f91d5785a09836560bc3bd681c27e012b1b8 0d774c5ac17521abec32a11e81317fed5f7c163d82ec7f9e1065c86834458cfe 0d90667089d17e2924b00e5207a357156e9076dfa3dab3f2e7dc5737135053a9 0e36b813e84b27ff1c1b770fffbf4175c7c39bbe499804c9c27565ed4a9518fa 0fa25c7c007f337ab5ba699a2611c47ff41a8ba74cb83fa1ffde097e7408f8ed 10c863059e4910501e1deea44279a5402e93796098230511c65be09f8f47eb82 1356d0345699b8766d5c8de5d61cb47fd63dc3f42fe2280a2c413a8d7f97c1c8 13f7895a32eb09a5016a408819dce9c95a4149888ad708c0232e0659e2ca06e3 14178c54d283e6579242e90df7c4dae8af71ff4594c834e3cc7a275588f561b7 14e727de9a56e79b9dcaf48cc9751d4cb447f16d839d705c628640857d0e6e13 1535d470effa0af601719b9ef64e615f321e4db52ee4b7bb05def6d501884fbc 16b232d226ca18447e1f1671538607fe5be412e935b930bcde73ff46e0b2890f 186a59f2954d3d213a26308386be80f2b503e08882324ab559490330700fc24a 1d2374db5ee92385e49fbaef9ef694361877cdffa4b51d8fd8d37e6272dfad57 1e1bdd6ddb3c256c79024eccdb2de6b0861a2a86e13f3f03cf1f378e2cdc9d36 1fcbef293371203729eca2c9491641a03b2330c9be11b438f84db0e996e5b78c 2119922518bc437c7d5fd7d7205929089a9ed9333cdff97bb214808f37e86dd7 211bdc6613fc3e691ac70d215a8a9edd5f0ebb85bb4f24d6e293fb21894a0b1b
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Dropper.TrickBot-7490964-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST\S-1-5-21-2580483871-590521980-3826313501-500
Value Name: RefCount
1
MutexesOccurrences
Global\316D1C7871E1022
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
181[.]113[.]28[.]1465
188[.]120[.]254[.]685
195[.]123[.]220[.]1785
198[.]23[.]209[.]2014
104[.]20[.]17[.]2423
119[.]252[.]165[.]753
78[.]24[.]223[.]883
188[.]165[.]62[.]343
164[.]68[.]120[.]603
69[.]195[.]159[.]1582
190[.]214[.]13[.]22
5[.]2[.]70[.]1452
185[.]213[.]20[.]2462
185[.]141[.]27[.]1902
185[.]177[.]59[.]1632
216[.]239[.]38[.]211
200[.]21[.]51[.]381
200[.]127[.]121[.]991
181[.]129[.]104[.]1391
18[.]213[.]79[.]1891
45[.]125[.]1[.]341
23[.]20[.]220[.]1741
45[.]137[.]151[.]1981
5[.]182[.]210[.]1091
51[.]89[.]115[.]1241
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
icanhazip[.]com3
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org2
checkip[.]amazonaws[.]com2
wtfismyip[.]com2
api[.]ip[.]sb1
ipinfo[.]io1
Files and or directories createdOccurrences
%System32%\Tasks\System Network Extensions22
%APPDATA%\adirecttools22
%APPDATA%\adirecttools\data22
%APPDATA%\adirecttools\settings.ini22
%APPDATA%\ADIRECTTOOLS\<original file name>.exe22
%TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt21
%TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp21
%APPDATA%\adirecttools\Data\pwgrab641
%APPDATA%\adirecttools\data\pwgrab64_configs\dpost1
%APPDATA%\adirecttools\69ab1bb7084669cf84cc43537b700264.exe1
%SystemRoot%\TEMP\~DF8EC46E2629511EB8.TMP1
%APPDATA%\adirecttools\runme.exe1
%SystemRoot%\TEMP\~DF5EC233074AA93A3C.TMP1
%SystemRoot%\TEMP\~DF4BEDA5BB57A455AF.TMP1
%SystemRoot%\TEMP\~DFCE2B4CA7595FDB1F.TMP1
%SystemRoot%\TEMP\~DF771B5AE6CE965D7A.TMP1
%SystemRoot%\TEMP\~DF21C4C13A90F8FECB.TMP1
%SystemRoot%\TEMP\~DF2EDE8F31D379304B.TMP1
%SystemRoot%\TEMP\~DF887620F0BF482816.TMP1
%SystemRoot%\TEMP\~DF6B5F6A59497674CC.TMP1
%SystemRoot%\TEMP\~DFA8D4CB1355CC2A5F.TMP1
%SystemRoot%\TEMP\~DF326643DA3623EF2B.TMP1
%SystemRoot%\TEMP\~DF2334856A166D2B71.TMP1
%SystemRoot%\TEMP\~DF862A67F04082D9B3.TMP1
%SystemRoot%\TEMP\~DFC53480C7F7651844.TMP1
*See JSON for more IOCs

File Hashes

0245c1658f2c7d9989431954aeeae75907cd70d94d45137c6d03d1c77463779f 11a8ffc0df227cb681971a11904bf83d3a72a52aefd1335df4202115ccabe4a1 17db3888319bac8bdc2fa0c33c3125dca7f8b2f9ff39dfe8b16882c3babd5273 26e223b88abca88510d861698e8468675e7fc8fac1199a554d4fdd2cff91197d 4517232ad858b209e6a6fb873e2a8665a85c91506b1ded4c518e751fc7adacb2 65371d42ff1b2db3b211c5f180f411a2621679225dab602ed0d47a496287ff4c 691f1b9988bde02160172a8ed8d0e242cc25d8fd205839887140330ebff862f5 6b4f93bb3fc3aeb71591f7fd237367905898b62f3a08580d8ed691fa06f6734d 6e2ab21ca9e1bb545bee1a66190cd9786d9d2d376b47864715b121ed8ccb3d33 7055bef3d19a836529109b5037e4ce63e9f3c8d8f9e5b8daba57880b9ca5cb5e 7996ea4f4f2a2d9e2152eaefba2fc9077c33fc5a1848b2ec4e6a69e54ef7fba3 82aef9ea980b0fd2fb268be8fc8ebdf14b9150df5c167aa29ddcd464afc2014c 8d9c8ef971a707651456e085f7420e45463d77dbefeab733d381685500f4a027 9363001b83b189a7ebdefcebe844bbbe29e1db03e49fa642bc9530f345d65283 9971b48ee31acc1d33d3a28b3527f3039c5a633d0f0cb6b3422d3b1d219221f0 9e1d70348303b0480a64a03d82b2d011d1a51a5f106024e670f12acc64478b44 a6068b4a752629e61dff03d86cf8bf9141f52e22a8267c0de469fe5d2e5b65de ae0e55999d7f5ae1be0a7132b2e972fc04c95c653f214f3f59ce30fc4e2f57af b4c41107cda5716a098e22be19101e15e3e577e3d6cc8570a4e81e0f6cf24ae1 c693ddb405dcc6831f489f499ece83aae83d27226694bfc390b5059f0849bc2e e0d95256f1587f75b9e0e632e92b88561d4441cb559d7b3944e3152669a28f92 ea15e0fd9d3c825cd2c2217ab150fb7cee86cf5b0a3e411c6c621084199bbb10

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Packed.Formbook-7491272-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE2 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000001 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000002 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000003 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\0A0D020000000000C000000000000046 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\13DBB0C8AA05101A9BB000AA002FC45A 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\33FD244257221B4AA4A1D9E6CACF8474 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\3517490D76624C419A828607E2A54604 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\4C8F4917D8AB2943A2B2D4227B0585BF 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\5309EDC19DC6C14CBAD5BA06BDBDABD9 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\82FA2A40D311B5469A626349C16CE09B 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\8503020000000000C000000000000046 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9207F3E0A3B11019908B08002B2A56C2 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9E71065376EE7F459F30EA2534981B83 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\A88F7DCF2E30234E8288283D75A65EFB 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\C02EBC5353D9CD11975200AA004AE40E 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\D33FC3B19A738142B2FC0C56BD56AD8C 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DDB0922FC50B8D42BE5A821EDE840761 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DF18513432D1694F96E6423201804111 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\ECD15244C3E90A4FBD0588A41AB27C55 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\F86ED2903A4A11CFB57E524153480001 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\{D9734F19-8CFB-411D-BC59-833E334FCB5E} 27
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\{D9734F19-8CFB-411D-BC59-833E334FCB5E}\CALENDAR SUMMARY 27
MutexesOccurrences
8-3503835SZBFHHZ29
Startup_shellcode_00629
KN7MSAA2BUECxyHz29
S-1-5-21-2580483-1060363276272021
S-1-5-21-2580483-20086266016112
S-1-5-21-2580483-11486266016111
S-1-5-21-2580483-14646266016111
S-1-5-21-2580483-21166266016111
S-1-5-21-2580483-13926266016111
S-1-5-21-2580483-19926266016111
S-1-5-21-2580483-13806266016111
S-1-5-21-2580483-5846266016111
S-1-5-21-2580483-11206266016111
S-1-5-21-2580483-21006266016111
S-1-5-21-2580483-16166266016111
S-1-5-21-2580483-10126266016111
S-1-5-21-2580483-9726266016111
S-1-5-21-2580483-14406266016111
S-1-5-21-2580483-14606266016111
S-1-5-21-2580483-9566266016111
S-1-5-21-2580483-18086266016111
S-1-5-21-2580483-8886266016111
S-1-5-21-2580483-102036327627201
S-1-5-21-2580483-20366266016111
S-1-5-21-2580483-108436327627201
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
162[.]213[.]250[.]16910
173[.]0[.]50[.]2106
217[.]160[.]0[.]554
192[.]155[.]190[.]843
172[.]247[.]92[.]193
199[.]59[.]136[.]2303
184[.]168[.]221[.]322
198[.]54[.]117[.]2162
198[.]54[.]117[.]2112
23[.]20[.]239[.]122
184[.]168[.]131[.]2412
217[.]160[.]0[.]1542
74[.]208[.]236[.]1142
199[.]59[.]138[.]2302
74[.]117[.]219[.]1982
198[.]54[.]117[.]2181
198[.]54[.]117[.]2121
198[.]54[.]117[.]2151
184[.]168[.]221[.]361
185[.]230[.]60[.]1951
85[.]159[.]66[.]621
97[.]74[.]42[.]791
172[.]217[.]5[.]2431
208[.]100[.]26[.]2451
3[.]234[.]181[.]2341
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]allixanes[.]com10
www[.]travelcards[.]site6
www[.]orlandohouston[.]com5
www[.]xn--4qw729d[.]com5
www[.]davekachman[.]com5
www[.]iqama[.]info5
www[.]reserveforcespolicy[.]com5
www[.]enjoquotes[.]com4
www[.]online-rfs-billing[.]info4
www[.]imtrainee[.]net4
www[.]ildolce[.]store4
www[.]elgranretodeseve[.]com4
www[.]arnaud4k[.]com4
www[.]digital-spot[.]net4
www[.]casalukre-co[.]com3
www[.]jingrunxuan[.]com3
www[.]hzwhedu[.]com3
www[.]zxhckj[.]com3
www[.]thehouseofthedrone[.]com3
www[.]24hourautolocksmith[.]company3
www[.]kingofthenorth[.]tech3
www[.]aurora-health-ua[.]com3
www[.]prokat[.]site3
www[.]riicko[.]com3
www[.]hugedomains[.]com2
*See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe29
%APPDATA%\KN7MSAA227
%APPDATA%\KN7MSAA2\KN7log.ini27
%APPDATA%\KN7MSAA2\KN7logrc.ini27
%APPDATA%\KN7MSAA2\KN7logri.ini27
%APPDATA%\KN7MSAA2\KN7logim.jpeg26
%APPDATA%\KN7MSAA2\KN7logrv.ini26
%ProgramFiles(x86)%\Ygl8drb1
%ProgramFiles(x86)%\Ygl8drb\config9rs4ano.exe1
%TEMP%\Ygl8drb1
%TEMP%\Ygl8drb\config9rs4ano.exe1
%ProgramFiles(x86)%\Ymnlhitch1
%ProgramFiles(x86)%\Ymnlhitch\helpcfsd4ho.exe1
%TEMP%\Ymnlhitch1
%TEMP%\Ymnlhitch\helpcfsd4ho.exe1
%ProgramFiles(x86)%\Kpfyl1
%ProgramFiles(x86)%\Kpfyl\helpex9l_rep.exe1
%TEMP%\Kpfyl1
%TEMP%\Kpfyl\helpex9l_rep.exe1
%ProgramFiles(x86)%\Gbbcdufw1
%ProgramFiles(x86)%\Gbbcdufw\vgaxjwtjt.exe1
%TEMP%\Gbbcdufw1
%TEMP%\Gbbcdufw\vgaxjwtjt.exe1
%ProgramFiles(x86)%\L1b6h1
%ProgramFiles(x86)%\L1b6h\systrayybihc.exe1
*See JSON for more IOCs

File Hashes

0146d4a89836ecc12759c33a85d60c3867a35b7ee468041fb26b0610ef76e54f 046bebb1052d11ee3db2b5c8cbf3e2f1dd509a2aa73e53f4ffb18d39985165cf 049fa135806899faa44ce50ba918331d0ea0aeb8aa6db5012117bfc794f57759 058392f97319e50bbd2172ab46255c892e12ee0b7948e6ce0420012eb85e7e35 07387a7c05fcaf63b03673bd92d634fcd13e1784fb6adcc6c2b8cf7154c07e55 07c11047e72c8f52c1f5c422fc5b7ed49225259012c813c2bc5a8827bcf5f752 0d49120f2ce8cc77ea769c79a1ab5c7669cb58c07de1a95f08549d2665529df1 0d8e415c487a6ced2680bcb31834fe282b914f09ac167dfb4f1685af0b529c35 0da9443c8aacb9e4757b81deeaeedc7b96766020522ed9992d7b9ce3e0eb5130 0de2930e0fd1d971aa98b219ce6dc3f36b07d8441b7abd0d663a63dd77cfbf37 163d07cf0a756800c6ce5be998331fdffa75081f5f669bbb6149eb0e89744043 1c64787e6ef766f7d9b8cc99deb128d45b89d02accacb3dac1e2ad076f5139eb 208a5ebc7af4b8d15e157e9115f4617a2b3e021a868367b3e7bb0bde69170911 2655a1ee89ed4101f552ce1b75b9d711ee5c6217e63cf6ce8e23086844c839e9 2a13033c3b6b7299bd795ce5c34bbba17a8de80d4d957e4d547ef1ae2ba728b4 2e98ffc7f5bab8e3f2085beba2ecc912f038c9a66a5f6b9ec7d8e0f2eca2fcbc 2fb1d73ee16fea837612ff0d9c89a934e5520310f9a06397f7e2c1a0c1604694 30545b09c38a284d95310d71822427e0bc0b69dcaeb3d316f2fe39decfb8c006 3064e41052d6dfa7c354a6e8c405ae2c1d09e48fa9e82dc4e8faee1f4bebdd4d 352c218b502f9db9eb8a56d8d6515c3fbe51298e29fe3878731a037885dc7f7b 356aa1a0e39cd24ed61ca8c1d6658a91c9dd8dbd2663ce90b5db2b793fe12e01 36fd577a0a6354cae84ff7a6bc3b21159f24cd0b8eff3482ba7c8278b4a89b27 3a14a285394c39842beaf312d02de42ab02c679e47cb6a40c3b900f196ba4e2d 3aa7710feab8dd35997e03ad650a5bae2f19de1d82e2a7fef032815d946e21ee 3d2f8ca93b256a27067969eda8d4fca7559e38b8af59a79c40c40c55f06b53d2
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (17518)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Process hollowing detected - (353)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Kovter injection detected - (269)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Gamarue malware detected - (158)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (90)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (88)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Excessively long PowerShell command detected - (87)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Corebot malware detected - (23)
Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
Reverse http payload detected - (19)
An exploit payload intended to connect back to an attacker controlled host using http has been detected.
Fusion adware detected - (11)
Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.

New Snort rules protect against recently discovered Citrix vulnerability

$
0
0
By Edmund Brumaghin, with contributions from Dalton Schaadt.

Executive Summary


Recently, the details of a critical vulnerability affecting Citrix Application Delivery Controller and Citrix Gateway servers were publicly disclosed. This vulnerability is currently being tracked using CVE-2019-19781. A public patch has not yet been released, however, Citrix has released recommendations for steps that affected organizations can take to help mitigate the risk associated with this vulnerability. Successful exploitation of CVE-2019-19781 could allow a remote attacker to execute arbitrary code on affected systems.

This vulnerability, which is a directory traversal vulnerability, affects multiple versions of these products. Since the public disclosure of this vulnerability, several proof-of-concept (PoC) tools have been publicly released that can be used by adversaries to scan for vulnerable systems and attempt to exploit the vulnerable condition to achieve remote code execution. There have been multiple public reports of mass-scanning and exploitation activity already being observed in the wild. As such, it is important that organizations are aware of this vulnerability and take steps to ensure that they mitigate the risk of attacks against their environment.

Talos coverage for CVE-2019-19781


Talos has developed and released coverage for this vulnerability in the form of Snort and Firepower signatures. These signatures have been available since Dec. 24, 2019 and can be leveraged by organizations to protect their affected systems from possible exploitation attempts until an official patch is publicly released.

Snort SIDs: 52512, 52513

Microsoft Patch Tuesday — Jan. 2020: Vulnerability disclosures and Snort coverage

$
0
0











By Jon Munshaw.

Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 49 vulnerabilities, eight of which are considered critical.

This month's security update is particularly important for its disclosure of two vulnerabilities related to a core cryptographic component in all versions of Windows. CVE-2020-0601 could allow an attacker to use cryptography to sign a malicious executable, making the file appear as if it was from a trusted source. The victim would have no way of knowing if the file was malicious. Cyber security reporter Brian Krebs says the vulnerability is so serious, Microsoft secretly deployed a patch to branches of the U.S. military prior to today.

January's update is also the last that will provide free updates to Windows 7 and Windows Server 2008/2008 R2.

Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.

Critical vulnerabilities

Microsoft disclosed eight critical vulnerabilities this month, all of which we will highlight below.

CVE-2020-0603, CVE-2020-0605, CVE-2020-0606 and CVE-2020-0646 are all remote code execution vulnerabilities in the .NET and ASP.NET core software. All four of these vulnerabilities can be triggered if a user opens a malicious, specially crafted file while using an affected version of .NET or ASP.NET Core. If successful, an attacker could then execute arbitrary code in the context of the current user. These bugs exist in how the software handles objects in memory.

CVE-2020-0609 and CVE-2020-0610 are remote code execution vulnerabilities in the Windows Remote Desktop Protocol Gateway Server. An attacker could exploit these bugs by sending a specially crafted request to the victim's system RDP Gateway via RDP. This vulnerability is pre-authentication and does not require any user interaction.

CVE-2020-0611 is a remote code execution vulnerability in the Windows Remote Desktop Protocol client. This vulnerability can be triggered if a user visits a malicious, specially crafted server. An attacker would need to trick the user into connecting to this server, either via a malicious file or a man-in-the-middle technique. The attacker could then execute arbitrary code on the victim's machine.

CVE-2020-0640 is a memory corruption vulnerability that exists in the way the Internet Explorer web browser handles objects in memory. An attacker could use this bug to corrupt the victim machine, and then gain the ability to execute arbitrary code. A user can trigger this vulnerability by visiting a malicious, attacker-controlled web page in Internet Explorer.

                Important vulnerabilities

                This release also contains 41 important vulnerabilities, three of which we will highlight below.

                CVE-2020-0601 is a spoofing vulnerability in Windows CryptoAPI. The specific component, crypt32.dll, improperly validates Elliptic Curve Cryptography certificates. An attacker could exploit this bug to spoof a code-signing certificate and secretly sign a file, making that file appear as if it is from a trusted source. A malicious actor could also use this vulnerability to conduct man-in-the-middle attacks and decrypt confidential information.

                CVE-2020-0616 is a denial-of-service vulnerability in Windows due to the way the operating system handles hard links. An attacker needs to log onto the victim machine to exploit this bug, and then run a specially crafted application that would allow them to overwrite system files.

                CVE-2020-0654 is a vulnerability in the OneDrive app for Android devices that could allow an attacker to bypass certain security features. If the user access a link to a file on a OneDrive folder a certain way, they could bypass the passcode or fingerprint requirements for the app.

                The other important vulnerabilities are:

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                These rules are: 52593 - 51596, 52604, 52605

                Stolen emails reflect Emotet's organic growth

                $
                0
                0
                By Jaeson Schultz

                Introduction

                Emotet has a penchant for stealing a victim's email, then impersonating that victim and sending copies of itself in reply. The malicious emails are delivered through a network of stolen outbound SMTP accounts. This relatively simple email-man-in-the-middle social engineering approach has made Emotet one of the most prolific vehicles for delivering malware that we have seen in modern times.

                Cisco Talos continues to monitor Emotet, constantly detonating Emotet samples inside of the ThreatGrid malware sandbox and elsewhere. We witness in real-time as email that purports to be from Emotet's victims begins to emanate through Emotet's network of outbound mail servers. Vigilant monitoring of both stolen SMTP credentials and outbound email allows Talos to extract meta-information regarding Emotet's latest victims and provides insight into networks where Emotet is actively spreading.

                One of the most cunning aspects of Emotet's propagation is the way they use social engineering of personal/professional relationships to facilitate further malware infection. When receiving a message from a trusted friend or colleague, it is quite natural for recipients to think, "I can safely open this email attachment because it is in reply to a message I sent, or from someone I know." Any person or organization who has sent an email to an Emotet victim could be targeted by Emotet's propagation messages. The more interaction with the victim you have, the more likely you are to receive malicious email from Emotet. Like a meandering watering hole attack, this is how Emotet crosses organizational boundaries with the potential to affect entire industries or even countries.

                Increased targeting of U.S. military and government

                Emotet continues to infect individuals and organizations all over the world, so to say that it is "targeted" would be a stretch. However, if a person has substantial email ties to a particular organization, when they become infected with Emotet the effects would manifest in the form of increased outbound Emotet email directed at that organization.

                One of the most vivid illustrations of this effect can be seen in Emotet's relationship to the .mil (U.S. military) and .gov (U.S./state government) top-level domains (TLDs). When Emotet emerged from its summer vacation back in mid-September 2019, relatively few outbound emails were seen directed at the .mil and .gov TLDs.

                But sometime in the past few months, Emotet was able to successfully compromise one or more persons working for or with the U.S. government. As a result of this, Talos saw a rapid increase in the number of infectious Emotet messages directed at the .mil and .gov TLDs in December 2019. Now that Emotet is back from their Orthodox Christmas vacation, that trend has continued into January 2020.


                The emails are coming from inside the house!

                Looking at the individual messages sometimes allows us to determine the identity of the Emotet victim and whether that victim is internal or external to the recipient organization. After all, Emotet wants recipients of its messages to recognize who the message came from as part of their social engineering efforts. Unfortunately, this doesn't work 100 percent of the time, because some of the messages sent by Emotet strips the original victim's personal data and drops the TLD in an attempt to impersonate only the organization. This results in the unintentionally comical reduction of domains like "us.af.mil" to simply "Us.af."



                However, more often, Emotet will leave the contact information for the individual victim inside the propagation email. The message may also include the contents of a previous email exchange between the two recipients, just to add extra authenticity. For example, the following message was sent by Emotet to an individual working for U.S. Sen. Cory Booker. The From header and signature generated by Emotet both suggest that this message originated from an infected colleague at "booker.senate.gov."



                Another issue that is often overlooked is the exfiltration problem presented by Emotet. Users who have their email stolen and sent to Emotet's command and control (C2) infrastructure may have lost control over sensitive data and communications. For now, Emotet is content using this data to enhance its social engineering approach, but they could just as easily be reading/parsing the contents of these messages and acting/trading on the information contained therein.


                Conclusion

                If an organization in close proximity to yours becomes infected with Emotet, you can expect to receive an increased volume of infectious email messages addressed to your users. If Emotet infects any of the users inside your domain, then the volume of Emotet email destined for your network will increase. Many of these email messages arrive via hijacked email threads, so there is no simple pattern that anti-spam systems can use to identify and eliminate these messages. More advanced anti-spam systems, such as IPAS, will still be able to successfully filter Emotet messages. However, all technical systems no matter how robust must always be supplemented by educational efforts and awareness training for your users.

                Coverage

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), andMeraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Foxit PDF Reader

                $
                0
                0

                Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

                Cisco Talos recently discovered four remote code execution vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular program for reading and editing PDFs. The software supports
                JavaScript to allow for interactive elements in PDF files — all of these vulnerabilities exist in the JavaScript capabilities of the program. An attacker could exploit any of these bugs by tricking the user into opening a malicious PDF in Foxit PDF Reader.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Foxit to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Foxit PDF Reader JavaScript field action validate remote code execution vulnerability
                (TALOS-2019-0915/CVE-2019-5126)

                An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information. 

                Foxit PDF Reader JavaScript field action OnBlur remote code execution vulnerability (TALOS-2019-0920/CVE-2019-5131)

                An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information. 

                Foxit PDF Reader JavaScript createTemplate invalid page code execution vulnerability (TALOS-2019-0935/CVE-2019-5130)

                An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information. 

                Foxit PDF Reader JavaScript field keystroke action remote code execution vulnerability (TALOS-2019-0934/CVE-2019-5145)

                An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information. 

                Versions tested

                Talos tested and confirmed that these vulnerabilities affect version 9.7.0.29435 of Foxit PDF Reader.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52046, 52047, 51949 - 51952, 51737, 51738

                Beers with Talos Ep. #70: Semper Vigilantes - Strategic Defense in a Cyber Conflict

                $
                0
                0
                By Mitch Neff.

                Beers with Talos (BWT) Podcast episode No. 70 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Jan. 6, 2020

                There is a looming cyber conflict on the horizon between the U.S. and Iran. We use all our time this week to discuss the situation at hand and take a hard look at what you should have already done foundationally. The crew offers insight and analysis of what nation-state cyber conflict looks like and what you can do to elevate your security strategy to the next level in an uncertain time of increased suspicion.

                The timeline:

                • 00:45 — Roundtable: CATS! and other weird things.
                • 11:00 — Iran rundown: Framing the situation and how nation-state actors work
                • 17:50 — A period of increased suspicion; taking alerts to the ground
                • 22:30 — Offense is tactical, but defense is a strategic game
                • 29:30 — Lessons learned from NotPetya
                • 35:30 — Beyond just the basics and defense-in-depth
                • 41:30 — Open-source and lower-cost defense options
                • 44:10 — Closing thoughts and parting shots

                Links and resources:

                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com


                Threat Source newsletter (Jan. 26, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                This wasn’t your average Patch Tuesday. Microsoft’s monthly security update was notable for a few reasons. For starters, it’s really time to give up Windows 7, since this is the last free update Microsoft will issue for the operating system.

                There was also a vulnerability that made headlines for leaving Windows open to cryptographic spoofing, which could allow an attacker to sign a malicious file as if it came from a trusted source. The bug was so severe that Microsoft even reached out to the U.S. military ahead of time to issue them an early patch. For more on Patch Tuesday, you can check out our roundup here and our Snort rule release here.

                Elsewhere in the vulnerability department, we also released new Snort rules to protect users against some notable Citrix bugs that have been used in the wild.

                And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

                Upcoming public engagements

                Event: Talos Insights: The State of Cyber Security at Cisco Live Barcelona
                Location: Fira Barcelona, Barcelona, Spain
                Date: Jan. 27 - 31
                Speakers: Warren Mercer
                Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. We are responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In this talk, we will perform a deep analysis of recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies.

                Cyber Security Week in Review

                • Apple once again denied the FBI’s request for the company to unlock an iPhone belonging to someone involved in a criminal investigation. The agency is attempting to access a device belonging to a man who shot and killed multiple people at a naval base last year. 
                • This caused U.S. President Donald Trump to enter the fold. Trump tweeted that he was unhappy with Apple denying law enforcement access to devices "used by killers, drug dealers and other violent criminal elements.” 
                • More than two weeks after a ransomware attack, foreign currency exchange service Travelex is finally resuming normal operations. The company recently said it was making “good progress” on recovery and was expecting customer-facing systems to return soon. 
                • The Travelex attack prompted the U.S. government to release a new warning that users need to update their VPN services as soon as possible. Vulnerabilities disclosed last year in Pulse Secure VPN leave users open to cyber attacks similar to the ransomware infection on Travelex, according to the U.S. Cybersecurity and Infrastructure Security Agency. 
                • The Democratic party in Iowa says it will still use a mobile app to report primary election results, despite warnings that it is a security risk. Election judges will use the apps to count polling results during the presidential primaries and report those results on their mobile devices, though officials say there will be paper backups to verify the results. 
                • The estimated cost of a recent cyber attack on the city of New Orleans is above $7 million, $3 million of which the city says it will recoup from its cyber insurance policy. Officials say it will still take months to rebuild their internal network, and departments are still digging out from having to manually carry out many functions for weeks. 
                • The U.S. election security czar warned that attempts to interfere in the U.S.’ upcoming presidential election will be more sophisticated than ever. Shelby Pierson said at a recent presentation America is tracking several hacking groups, including a recent effort uncovered to breach a Ukrainian company at the center of President Donald Trump’s impeachment trial. 
                • A critical vulnerability in a popular WordPress plugin leaves more than 300,000 sites open to attack. An attacker could exploit a bug in InfiniteWP to log in as an administrator on any affected site.  
                • Android devices infected with the Faketoken malware began sending offensive SMS messages last week. It sends these messages to foreign numbers, potentially costing the victim money based on their carrier’s policies. 
                • The U.S. may invest more than $1 billion into researching alternatives for 5G to avoid working with Chinese tech companies Huawei and ZTE. Legislation submitted in the Senate urged America to counter the Chinese government’s investment in the telecom space.

                Notable recent security issues

                Title: Microsoft patches 49 vulnerabilities as part of Patch Tuesday
                Description: Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. Patch Tuesday covers 49 vulnerabilities, eight of which are considered critical. This month's security update is particularly important for its disclosure of two vulnerabilities related to a core cryptographic component in all versions of Windows. CVE-2020-0601 could allow an attacker to use cryptography to sign a malicious executable, making the file appear as if it was from a trusted source. The victim would have no way of knowing if the file was malicious. Cyber security reporter Brian Krebs says the vulnerability is so serious, Microsoft secretly deployed a patch to branches of the U.S. military prior to today.
                Snort SIDs: 52593 - 51596, 52604, 52605

                Title: ZeroCleare wiper malware deployed on oil refinery 
                Description: ZeroCleare, a wiper malware connected to an Iranian hacker group, was recently deployed against a national oil refinery in Bahrain. An upgraded version has been spotted in the wild, according to security researchers, which can delete files off infected machines. The latest attacks match previous attacks using this malware family, which have gone after other targets connected to Saudi Arabia. Concerns over Iranian cyber attacks have spiked since the U.S. killed a high-profile Iranian general in a drone strike.
                Snort SIDs: 52572 – 52581

                Most prevalent malware files this week

                SHA 256: 1c3ed460a7f78a43bab0ae575056d00c629f35cf7e72443b4e874ede0f305871
                MD5: c2406fc0fce67ae79e625013325e2a68
                Typical Filename: SegurazoIC.exe
                Claimed Product: Digital Communications Inc.
                Detection Name: PUA.Win.Adware.Ursu::95.sbx.tg

                SHA 256: d73ea76f6f07f96b337335213418b58e3fbc7e4b519fec0ef3fbd19c1d335d81 
                MD5: 5142c721e7182065b299951a54d4fe80
                Typical Filename: FlashHelperServices.exe
                Claimed Product: Flash Helper Service
                Detection Name: PUA.Win.Adware.Flashserv::1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: da231330efd623bc7d116ed233828be88951b9df7cc889e747d31279bdf2c2a0 
                MD5: 4a4ee4ce27fa4525be327967b8969e13
                Typical Filename: 4a4ee4ce27fa4525be327967b8969e13.exe
                Claimed Product: N/A
                Detection Name: PUA.Win.File.Coinminer::tpd

                Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

                JhoneRAT: Cloud based python RAT targeting Middle Eastern countries

                $
                0
                0

                By Warren Mercer, Paul Rascagneres and Vitor Ventura with contributions from Eric Kuhla.


                Updated January 17th: the documents do not exploit the CVE-2017-0199 vulnerability.
                 

                Executive Summary

                Today, Cisco Talos is unveiling the details of a new RAT we have identified we're calling "JhoneRAT." This new RAT is dropped to the victims via malicious Microsoft Office documents. The dropper, along with the Python RAT, attempts to gather information on the victim's machine and then uses multiple cloud services: Google Drive, Twitter, ImgBB and Google Forms. The RAT attempts to download additional payloads and upload the information gathered during the reconnaissance phase. This particular RAT attempts to target a very specific set of Arabic-speaking countries. The filtering is performed by checking the keyboard layout of the infected systems. Based on the analysed sample, JhoneRAT targets Saudi Arabia, Iraq, Egypt, Libya, Algeria, Morocco, Tunisia, Oman, Yemen, Syria, UAE, Kuwait, Bahrain and Lebanon.

                What's new? The campaign shows an actor that developed a homemade RAT that works in multiple layers hosted on cloud providers. JhoneRAT is developed in Python but not based on public source code, as it is often the case for this type of malware. The attackers put great effort to carefully select the targets located in specific countries based on the victim's keyboard layout.

                How did it work? Everything starts with a malicious document using a well-known vulnerability to download a malicious document hosted on the internet. For this campaign, the attacker chose to use a cloud provider (Google) with a good reputation to avoid URL blacklisting. The malware is divided into a couple of layers — each layer downloads a new payload on a cloud provider to get the final RAT developed in Python and that uses additional providers such as Twitter and ImgBB.

                So what? This RAT is a good example of how a highly focused attack that tries to blend its network traffic into the crowd can be highly effective. In this campaign, focusing detection of the network is not the best approach. Instead, the detection must be based on the behaviour on the operating system. Attackers can abuse well-known cloud providers and abuse their reputations in order to avoid detection.

                Opsec and targeted countries


                The fact that this attacker decided to leverage cloud services and four different services — and not their own infrastructure — is smart from an opsec point of view. It is hard for the targets to identify legitimate and malicious traffic to cloud provider infrastructure. Moreover, this kind of infrastructure uses HTTPS and the flow is encrypted that makes man-in-the-middle interception more complicated for the defender. It is not the first time an attacker used only cloud providers.

                User-agent #1

                User-agent #2

                User-agent #3

                Even while using these services, the authors of this JhoneRAT went further and used different user-agent strings depending on the request, and even on the downloaders the authors used other user-agent strings.

                We already published a couple of articles about ROKRAT (here, here, here and here) where another unrelated actor, Group123, made the same choice but with different providers.

                The attacker implemented filtering based on the keyboard's layout.

                Keyboard layout check

                The malware is executed only for the following layout, the country is based on the Microsoft website:

                • '0401' -> Saudi Arabia
                • '0801' -> Iraq
                • '0c01' -> Egypt
                • '1001' -> Libya
                • '1401' -> Algeria
                • '1801' -> Morocco
                • '1c01' -> Tunisia
                • '2001' -> Oman
                • '2401' -> Yemen
                • '2801' -> Syria
                • '3801' -> UAE
                • '3401' -> Kuwait
                • '3c01' -> Bahrain
                • '3001' -> Lebanon




                Malicious documents


                Decoy document


                We identified three malicious Microsoft Office documents that download and load an additional Office document with a Macro. The oldest one from November 2019, named "Urgent.docx," is shown below:



                Initial decoy document

                The author of the document asks to enable editing in English and in Arabic.

                The second document from the beginning of January is named "fb.docx" and contains usernames and passwords from an alleged "Facebook" leak:



                Second decoy document

                The more recent document is from mid-January and alleged to be from a United Arab Emirate organization. The author blurred the content and asks the user to enable editing to see the content:



                Third decoy document

                Macro loading


                In the three documents, an additional Office document containing a Macro is downloaded and executed.  The documents are located on Google Drive.





                Malicious documents on Google Drive

                Infection workflow


                Stage No. 1: Malicious template on Google Drive


                The template located on Google Drive contains a macro. The macro contains a virtual machine detection technique based on the serial number of the disks available in the victim environment. Indeed, some VMs do not have serial numbers and the macro is executed only if a serial number exists. A WMIC command is executed to get this information on the targeted system.



                Macro WMI check

                If a serial number exists, the rest of the code is executed. The purpose is to download an image from a new Google Drive link:



                Image download

                It is interesting to note that the filename of the downloaded image is randomly generated based on a dictionary: Array ("cartoon," "img," "photo"). The filename will be cartoon.jpg or img.jpg or photo.jpg and the image usually depicts a cartoon.

                Stage No. 2: Image file on Google Drive


                The image file is a real image with a base64-encoded binary appended at the end.

                Image No. 1

                The malware author has a curious sense of humor.

                Image No. 2

                The base64 data and image are separated by the "****" string:


                Image and payload separation

                The decoded binary filename is also randomly generated based on a dictionary: Array ("proc", "chrome", "winrar"). It can be proc.exe or chrome.exe or winrar.exe.

                Stage No. 3: Autoit file


                The decoded base64 data is an AutoIT binary. This binary downloads a new file on Google Drive.



                AutoIT downloader

                The filename is also randomly generated based on a dictionary $ARRAY[5]=["prc","winrar","chrome","sync","COM surr"].

                Stage No. 4: Python RAT using cloud providers


                The final payload is a remote access tool (RAT) written in Python. We named this RAT "JhoneRAT." The Python code is wrapped into an executable using pyinstaller. It uses minimal obfuscation applied only on variables and function naming.



                RAT startup

                The RAT starts by launching three threads. The first is responsible for checking if the system has the targeted keyboard layout — this is exclusively in Arabic-speaking countries. The second will create the persistence and, finally, the last one to be started is the main cycle for the RAT. As we explained before, the RAT targets specific countries by checking the keyboard's layout. In fact, this is one of the first checks it performs when it is executed. The persistence is achieved by adding an entry with the name "ChromeUpdater" to the 'Software\\Microsoft\\Windows\\CurrentVersion\\Run' .

                Command and control communications


                This RAT uses three different cloud services to perform all its command and control (C2) activities. It checks for new commands in the tweets from the handle @jhone87438316 (suspended by Twitter) every 10 seconds using the BeautifulSoup HTML parser to identify new tweets. These commands can be issued to a specific victim based on the UID generated on each target (by using the disk serial and contextual information such as the hostname, the antivirus and the OS) or to all of them:



                Command fetching



                Command parsing

                The exfiltration, however, is done via other cloud providers. The screenshots are exfiltrated via the ImgBB website:



                The remaining commands send feedback by posting data into Google Forms:



                Finally, the RAT is able to download files encoded in base64 on Google Drive:



                Feature-wise, the RAT has three commands:

                • Take a screenshot and upload it to ImgBB.
                • Download binary disguised has a picture from Google Drive and execute it.
                • Execute a command and send the output to Google Forms.

                Anti-VM, anti-decompiler and no header


                The attacker put a couple of tricks in place to avoid execution on virtual machines (sandbox). The first trick is the check of the serial number of the disk. The actor used the same technique in the macro and in the JhoneRAT. By default, most of the virtual machines do not have a serial number on the disk.

                The attacker used a second trick to avoid analysis of the Python code. The actor used the same trick that FireEye in the Flare-On 6: Challenge 7: They removed the header of the Python bytecode. It can be perfectly executed without the header, but tools such as uncompyle6 need this header:

                $ uncompyle6 final2

                ImportError: Unknown magic number 227 in final2

                Additionally, the generated code by uncompyle6 varies depending on the version and the impact is important.

                Here is a condition generated with uncompyle6 version 3.3.5:



                The same code generated with uncompyle6 version 3.6.2:



                Based on our analysis and the behaviour of the executed malware, the correct interpretation is the first one based on the oldest version of uncompyle6.

                For this specific condition, it is important because it's filtering on the keyboard layout to identify the targets.

                Conclusion


                This campaign shows a threat actor interested in specific Middle Eastern and Arabic-speaking countries. It also shows us an actor that puts effort in opsec by only using cloud providers. The malicious documents, the droppers and the RAT itself are developed around cloud providers. Additionally the attackers implemented anti-VM (and sandbox) and anti-analysis tricks to hide the malicious activities to the analyst. For example, the VM or the sandbox must have the keyboard layout of the targeted countries and a disk serial number. This campaign started in November 2019 and it is still ongoing. At this time, the API key is revoked and the Twitter account is suspended. However, the attacker can easily create new accounts and update the malicious files in order to still work. This campaign shows us that network-based detection is important but must be completed by system behaviour analysis.

                IOCs

                Docx:

                273aa20c4857d98cfa51ae52a1c21bf871c0f9cd0bf55d5e58caba5d1829846f
                29886dbbe81ead9e9999281e62ecf95d07acb24b9b0906b28beb65a84e894091
                d5f10a0b5c103100a3e74aa9014032c47aa8973b564b3ab03ae817744e74d079

                Template:

                6cc0c11c754e1e82bca8572785c27a364a18b0822c07ad9aa2dc26b3817b8aa4

                Image:

                7e1121fca3ac7c2a447b61cda997f3a8202a36bf9bb08cca3402df95debafa69

                PE Autoit:

                b4a43b108989d1dde87e58f1fd6f81252ef6ae19d2a5e8cd76440135e0fd6366

                PE Python:

                4228a5719a75be2d6658758fc063bd07c1774b44c10b00b958434421616f1548

                URL:


                hxxps://drive[.]google[.]com/uc?export=download&amp;id=1vED0wN0arm9yu7C7XrbCdspLjpoPKfrQ

                hxxps://drive[.]google[.]com/uc?export=download&amp;id=1LVdv4bjcQegPdKrc5WLb4W7ad6Zt80zl

                hxxps://drive[.]google[.]com/uc?export=download&amp;id=1OlQssMvjb7gI175qDx8SqTgRJIEp5Ypd

                hxxps://drive[.]google[.]com/uc?export=download&id=1d-toE89QnN5ZhuNZIc2iF4-cbKWtk0FD

                hxxps://drive[.]google[.]com/uc?export=download&id=1kbHVkvPIjX49qJ62TBz6drW2YPiiaX2a

                hxxps://twitter[.]com/jhone87438316

                Threat Roundup for January 10 to January 17

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 10 and Jan. 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Win.Trojan.Chthonic-7516291-1 Trojan Chthonic is a banking trojan derived from the Zeus family of banking malware. It is typically spread via phishing emails and attempts to steal sensitive information from an infected machine. Chthonic has also been observed downloading follow-on malware such as Azorult, another information stealer.
                Win.Dropper.Upatre-7524255-0 Dropper Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
                Win.Malware.TrickBot-7524669-1 Malware Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Doc.Dropper.Emotet-7540598-0 Dropper Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails. Talos recently discovered an uptick in Emotet distribution. For more, click here.
                Win.Packed.njRAT-7532636-1 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
                Win.Malware.Cerber-7533438-1 Malware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns other file extensions are used.
                Win.Packed.Barys-7532466-0 Packed This is a trojan and downloader that allows malicious actors to upload files to a victim's computer.
                Win.Packed.Razy-7532659-0 Packed Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypt the data, and send it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
                Win.Packed.Dridex-7532883-1 Packed Dridex is a well-known banking trojan that aims to steal credentials and other sensitive information from an infected machine.

                Threat Breakdown

                Win.Trojan.Chthonic-7516291-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Start
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 2827271685
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 2827271685
                11
                MutexesOccurrences
                Frz_State11
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                40[.]91[.]124[.]11111
                208[.]100[.]26[.]24511
                40[.]67[.]189[.]145
                20[.]45[.]1[.]1075
                40[.]90[.]247[.]2102
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]update[.]microsoft[.]com[.]nsatc[.]net11
                trokelnopartunofroner[.]com11
                mplusworldofficeupdates[.]com11
                imaginyourselfuafe[.]com11
                ltdcommprovvetverify[.]com11

                File Hashes

                085b7d3df5bdf13484ad58dc9b34431a98117f0d267ac3aba91cfc0b384ea35f 11185553d3e040f23efc0b0d1a9f0dc813e76cdb84174efcc785193c6d525535 149e6ff5bb2d0d3abdc7fabd4e3f6be1c563e4b57e035ee30b71a7d04c02ef8f 6fb1c35d7c0cf7f33a162c4c4eb99d6c5866880318db7781a34d9e005264985e 72c636ace54abacf4eb3e6e3a4c695e6c2c160dc6097666b249df34f46489b97 7ccdcf694abe81e19e7afc091d2b614872695e6cd9d90abab21622689bf5555d 8549f3a0383c7d65c869c0eba84960011afe71eb501eb90921066992f0b03833 9116b4c639cedb801e6b9a4891cf5af8e61a7d2f1e54390858f0f5e63dff8f42 9b3ad135a115671e8c960f353dd1805a6bbcedb2f9bf866f366bd9410a601862 e03e7f3f2d272bb18bfd138006cadf905b0fd45028327a3ec556ef1cba7c96fc e8da03e309d09fbe36a215769cf0f4b3f8b93cbf3137db0d4db77ce4bde4e534

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Win.Dropper.Upatre-7524255-0

                Indicators of Compromise

                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                91[.]211[.]17[.]20128
                173[.]216[.]240[.]5627
                38[.]124[.]169[.]18727
                188[.]231[.]34[.]13027
                176[.]108[.]102[.]7627
                104[.]20[.]17[.]24219
                104[.]20[.]16[.]2428
                174[.]96[.]234[.]861
                69[.]77[.]155[.]31
                38[.]124[.]169[.]1781
                38[.]123[.]202[.]31
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                icanhazip[.]com28
                Files and or directories createdOccurrences
                %TEMP%\PRTY8D97.txt27
                %TEMP%\prityviewer.exe27
                %TEMP%\scsiAFCF.log1
                %TEMP%\scsvii.exe1

                File Hashes

                00592846d2880dfa06ea2bb489b90c1a626bc62664e6933cbcb163cea32e1b70 006c6f0e053a633347afb8e2dc1c5f9a3c732fe654844b32c8efa7fb1b6929f7 0105ed02beac29702244d7f1f2b727d3c53e49590626773e5eefb154d626e469 0120db2a1e9c321da2c654f924c48d44f8db9c32e5cecf62f782e5fd3750ed6d 01a44cd682b97252135d9afb72061db7e8ceb87530de59b081bc13481492dbe5 01d5a8081730c45cd3c16bed3572ac37f767422435975961e783eada059f9f57 0246b510696d6e82f4ef63bd567d00fde0b1a5d8c84b5461a53003c9dbf0a507 0293c190511688dd93a031763139557febc330bb1800334e37d14d0c63ecd466 0349359919a3db6665112c77b8687ad370dfb99bd592a8af0efd7fb32e94d9c4 03b212420fccffb3f96bdb68c7952c408ea8e36d0333d8e63048f8d086a88eec 0437d8df6d2cd8b97959b30c2bf8d875ca3832c055e7f26777459f6db0ccd451 04ab31cd4de8cb6313b676c2e511e3ac477c44dcfe9cfe4a62cf77ce81b1e1a3 04f9d97774c2545c681c1463aa5abcd09355e54345bb03e7cc4105ba1ed7303c 052e7d7d29ebb25c5ab42b7262ae657e20f727c48d63f1223503e3f03daa49ad 05f64082854e6332a3ca42f5b25b8c79569f0b03b84568f26bf997efdd334eec 0607df27c26a55485cfdd78c25ca4b02ff5ebdcde2f3bd5b9265eb366e94b6a5 064cb169eae962f176d84cf3ef074871410ca3bab11bf23ce64df46e036a5b7f 0669e65c645527ae11a544a4eea34fd7d4eb7e33a73b26b6dba3399e083b36c8 07ed2f34b113fb661022915db582d15f13c3734fe6ddda2ada51464f7213f192 09239e11b17a303b9e5f02bdd6b1fcf3fdd54de6ff94b3c49bec7b3230548673 092c3f850fa506c6439ac87a9107a0b5504c0025199d7fac8961c01f873adf82 094adba281d8f8a02207f46f90d4c284ce4f1ba47f1fce53d95a068017e9c159 0970d4111acc10bf407b0babfee1c184a604e6be22318f0474afdf50b26daa33 097bea67fb8fcc721538a887ac5a4c9214489cb7c61b278b2db997c17fc51442 0b291d9eebdd2055da99fd4bc56baad1ba06d87aae0e66e7ddfe9c23953c3a29
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.TrickBot-7524669-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\V1-TZEVE4 1
                <HKCU>\SOFTWARE\V1-TZEVE4
                Value Name: exepath
                1
                <HKCU>\SOFTWARE\V1-TZEVE4
                Value Name: licence
                1
                MutexesOccurrences
                Global\316D1C7871E1041
                Remcos_Mutex_Inj1
                v1-TZEVE41
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                188[.]120[.]254[.]6817
                78[.]24[.]223[.]8812
                198[.]23[.]209[.]20111
                185[.]177[.]59[.]16311
                5[.]182[.]210[.]10910
                181[.]113[.]28[.]1469
                164[.]68[.]120[.]608
                185[.]213[.]20[.]2467
                195[.]123[.]220[.]1787
                181[.]112[.]157[.]426
                146[.]185[.]253[.]1915
                5[.]2[.]70[.]1455
                188[.]165[.]62[.]345
                185[.]141[.]27[.]1904
                69[.]195[.]159[.]1583
                181[.]129[.]104[.]1393
                45[.]137[.]151[.]1983
                51[.]89[.]115[.]1243
                172[.]82[.]152[.]113
                172[.]217[.]9[.]2432
                52[.]55[.]255[.]1132
                190[.]214[.]13[.]22
                181[.]140[.]173[.]1862
                45[.]125[.]1[.]342
                79[.]174[.]12[.]2452
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                checkip[.]amazonaws[.]com4
                wtfismyip[.]com3
                www[.]myexternalip[.]com2
                api[.]ip[.]sb2
                api[.]ipify[.]org2
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org1
                myexternalip[.]com1
                icanhazip[.]com1
                ipinfo[.]io1
                Files and or directories createdOccurrences
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp42
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt42
                %APPDATA%\DirectTools\data31
                %System32%\Tasks\Direct Tools Update31
                %APPDATA%\DirectTools\settings.ini31
                %APPDATA%\DirectTools31
                %APPDATA%\DIRECTTOOLS\<original file name>.exe31
                %APPDATA%\gpuhealth10
                %System32%\Tasks\Task Gpu health10
                %APPDATA%\gpuhealth\data10
                %APPDATA%\gpuhealth\settings.ini10
                %APPDATA%\GPUHEALTH\<original file name>.exe10
                %APPDATA%\DirectTools\Data\pwgrab642
                %System32%\Tasks\shadowdev1
                %APPDATA%\DirectTools\data\pwgrab64_configs1
                %APPDATA%\DirectTools\data\pwgrab64_configs\dpost1

                File Hashes

                0267975d981105107f8003e7a84490d0871017449352a72ecf010ee3639d99b7 0eae61f5dde95c34cf6e6a225a55c8b34ad0149b4c92c96cac7e1dd67d7423d5 1100664b904de4aaeab06a193bb1f0d6e57f0ff0407a2a836e592751ebfac142 12707680fc20d5ed8f75ee6591f81c334a096c96d6866d1ac4caa719fc55ddbc 1c63d9a293d05e5f598a169969ffd39ba0739e17740ba5205323cfa9b2a692dd 209ee235c5ae5b120a8aca752b365519aa91531ef806ed32741f7058b4c4c4fa 2b952b15f735ae3852a5b1add3dfd56b51217b073064f3cccea83b145f3e2f09 2ea8f522a5a55daafca651634e4f269f4fe7e42f222bd92f732e8c3695667c69 2eb32d3912f7e2bff7827040a76cb5b4bee6e56cec7a09b751fbc04085cf87bd 324b9688d45acf12410b42e8ce2532f5a1d077361e905c9ef69bbc812d24a01f 43de46a37c7dc56a5919babc661e2fcfcd611f1d3ff92dbdcd5a61bfeea9b79f 4ab4a600b2c75dfda7438714bc6a2cc87123b95f21372bcdcf5aa33ff73dac74 4c2fdeacf1fccac0fcdc064a5ae38065950531b7f03c2c40b5068379a591394d 4ecc86000dcc587fdf491e6589961d9523b33aa85533f61638278f8f1fd537df 539e39809bcc3ace9256394c5ce3e7626c242d4580c3a15d0a1cc5eab75b4b9f 58b8be166449de4ea71a103e65d7c45e52cc8d6bd95ac0787eecfe8dd12f980f 5cbb5ace573160c815b2e56d85e8bf5092be22887f23e28af9c6fe3fef7039ab 6f1468021e0606d3021c19630e0bd05eb721111f00c2d203efae6bf23f617a1b 75d658a651fa2fdba6930d2a6b6d2ce7491a4b87d214eb830ea3f23cd329c011 76c73a2c8f85847cb72a1ddfe56a3e728598c3a47c94cce44bd9967237039ef5 7d45d177e653e36ae3fb598b0d17acc4895795712fa53c3deb5ba4137b30e73c 7ea58adcd3598f10aa2e81557b20e52db1ef0c89071c28cdc5143af8f9ec02be 87ad53b54453925c0ced0e0f71bbbec7ba9b08afb2f827642dc55e86c0dcb8e9 8b50aa0fc83663e01ddbd06ae779ea3fdf30eaa1a63d6ad385fdca3ec17fd6cc 8b8a7b9fdb397a75cd51d720e32aebc016b2b1947478311f39929a9a43de81b9
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Doc.Dropper.Emotet-7540598-0

                Indicators of Compromise

                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                100[.]96[.]181[.]7218
                100[.]94[.]213[.]15718
                100[.]74[.]125[.]24218
                100[.]74[.]241[.]3118
                100[.]117[.]63[.]6818
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]dailygks[.]com18
                idnpoker[.]agenbolaterbaik[.]city18
                dobrovorot[.]su18
                casiroresources[.]com18
                isague[.]com18
                Files and or directories createdOccurrences
                %HOMEPATH%\126.exe18
                %TEMP%\CVRE39.tmp1

                File Hashes

                0e42ea2ebecf3779a9341c0375c8b71f60a88801b3a717d8fe5dec4a2bbee37c 2853b45864dd97b3be97f9acfcc6be83c6024d9b4e5b48d6b56a8c622e106b5e 2c2254c79ef6d0fc9a3c4bb9b865a2694ba00b791042f6f806dc8ae48ff07fa3 35a6c928ace899581d72bbb94aecb90fc54a9ef85b852a12cc77ec1a7fd4a239 3cec47fd33c8debe5e4cee8126ce9d3c977ae39d9baf454f86dd73ba82a87076 3e73a141bcf5c7a18d8fdc94f34102c1e765c5b0f37ff11c1d122463c4629d38 5a0ddb6c22ebb84af02651396e07204801bee4889965dc943cf6e16035771b87 617c999b2244b6e1a787a80a64f8818ae99a0bbd3c5603f95bdc6682c399a1c1 66974cd3270a8bf0aa4af9105ce84960ae7c7425b120b0045624f2615dbcf842 67812a5d87377778d7c2586585d30d7ab4ab6c2c9334844004c12badd5b72eba 71c8341327d3285f1f3c7ad62fdc102fd6a662c68a2f3a98eac7d0d9f5d6ea7b 92ad35b60997f88c37b57dc1fbb525217375289fab05ea7ba5d6c67ed1d00edf 947dd402232ac165d5c9286e67996e725bfe0c530f969aacea44e7979676fb45 aeed3ac02a448f72ef07047693ee9292d68a54049923a1ec4a53694d517cf048 b29038b3debfd28466ba4ea6e626143187bcd998bf442048a56f4737eb0d85fd d1a0bf24f3c653cd6c7f75b8c51c92cec21fc74d04ce8749bf68a5ad7e40b151 d2be052e9a55cc6eada8d74f6b5c614584588797ee7107e17b2811fb47e3d724 eff598d5a0c0ecaa0d8243173520ef331e71fb60c33b94d24932219c9e27abb9

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Packed.njRAT-7532636-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: di
                22
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                22
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                22
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 9b900e9e6a204ac0d795c328b297a541
                1
                <HKCU>\SOFTWARE\9B900E9E6A204AC0D795C328B297A541
                Value Name: [kl]
                1
                <HKCU>\SOFTWARE\3E80006ED1A558F4A4E8C67B4482A653 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3e80006ed1a558f4a4e8c67b4482a653
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 3e80006ed1a558f4a4e8c67b4482a653
                1
                <HKCU>\SOFTWARE\3E80006ED1A558F4A4E8C67B4482A653
                Value Name: [kl]
                1
                <HKCU>\SOFTWARE\BAC5BD34B5EC131B955ED0D6686691C0 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: bac5bd34b5ec131b955ed0d6686691c0
                1
                <HKCU>\SOFTWARE\8B9C85CEA1B5BC95470D5B663265ABBA 1
                <HKCU>\SOFTWARE\EE265A490F50F82D7DA78B5AFC5D4BF1 1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: bac5bd34b5ec131b955ed0d6686691c0
                1
                <HKCU>\SOFTWARE\BAC5BD34B5EC131B955ED0D6686691C0
                Value Name: [kl]
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 8b9c85cea1b5bc95470d5b663265abba
                1
                <HKCU>\SOFTWARE\EE265A490F50F82D7DA78B5AFC5D4BF1
                Value Name: [kl]
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 8b9c85cea1b5bc95470d5b663265abba
                1
                <HKCU>\SOFTWARE\8B9C85CEA1B5BC95470D5B663265ABBA
                Value Name: [kl]
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: driver
                1
                <HKCU>\SOFTWARE\1BB40C47BEAE292B8957771D185E2963 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 1bb40c47beae292b8957771d185e2963
                1
                <HKCU>\SOFTWARE\E44B3D2D77E82BFAA8FBE232C3FAC08B 1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 1bb40c47beae292b8957771d185e2963
                1
                <HKCU>\SOFTWARE\1BB40C47BEAE292B8957771D185E2963
                Value Name: [kl]
                1
                MutexesOccurrences
                <32 random hex characters>22
                Random3
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                46[.]246[.]13[.]731
                41[.]97[.]3[.]2431
                41[.]102[.]190[.]2251
                91[.]109[.]176[.]61
                84[.]236[.]13[.]941
                41[.]226[.]95[.]2481
                197[.]167[.]16[.]2531
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                cadastroseguro2016[.]ddns[.]net3
                kounan-19[.]no-ip[.]org1
                sasbab[.]ddns[.]net1
                pubguk[.]linkpc[.]net1
                najor123[.]ddns[.]net1
                neonka99[.]ddns[.]net1
                no1
                skyfall2017[.]ddns[.]net1
                service-updater[.]hopto[.]org1
                eslam[.]no-ip[.]org1
                tigano0724[.]myq-see[.]com1
                ghostprocess[.]no-ip[.]info1
                taki[.]ddns[.]net1
                crazyevil3[.]ddns[.]net1
                systemo32[.]publicvm[.]com1
                rooowl1999[.]no-ip[.]biz1
                kamel23[.]noip[.]me1
                Files and or directories createdOccurrences
                %APPDATA%\svchost.exe4
                %TEMP%\server.exe4
                %TEMP%\<random, matching '[a-z]{4,9}'>.exe4
                %APPDATA%\server.exe2
                %APPDATA%\svhost.exe1
                %HOMEPATH%\server.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\16d577f1045ea00e0472332fe1885e1f.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\2eed382eb0cd52422d5fda835a5d88b5.exe1
                %TEMP%\pc.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\df76fe148f41309232d46b5526143610.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\8d580f86972cdfde2bbd41845bc851f9.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\32814b0ea96b317a805dd9174ee7c5c4.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ee28203cdc477e7ad13344342ffe1e0b.exe1
                %TEMP%\Internet Explorer.exe1
                %APPDATA%\winziy.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9b900e9e6a204ac0d795c328b297a541.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\3e80006ed1a558f4a4e8c67b4482a653.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\8b9c85cea1b5bc95470d5b663265abba.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\driver.url1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\driver.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\1bb40c47beae292b8957771d185e2963.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\e44b3d2d77e82bfaa8fbe232c3fac08b.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\c4d9b868e64e2ec7e7f1e04c6e64ac91.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\213668f5f21ad17f1b3d939134e17f24.exe1
                %APPDATA%\winx.exe1
                *See JSON for more IOCs

                File Hashes

                0462bc4b60370728471971b9326c2e1540370809292ffd6cb5791a61df705bf9 0b331c29e38da9fe5fe00f40e2af43a4ac960ce48539b34e6d506c3b54a49920 162616259b6591503807bda2b9228c88409f4a71c085bc4b39d5eef2b64213c9 1846cfe96f4733d9cc7620cff603abdf1c44fe2f84d34daa79c14b04a726357d 21f09de33d10673fb5f8c2f1cf5924f5b81019e037a44b7f151da61b84c85b0d 275e4d554f63db96a64bbca5f0b30ab96199c8595ea0c3c2d46a413f30387a2f 2b140d53ec1d99cc07662d85f14bae2a4e6cfea3b7d66da0b31be4ecd641bae1 2c55658cf368c0f4f16b9f142e6ee6adb91362c79eb5ecab77d93852b35b7599 3022c3729827f0f7ea739b18b073e6c488ce6481eedaae147cc33738401d131e 339e7b601f00ee4b80af2645e1e39a8b71901d328d1c56e4f42e7ba74f16b618 3d8b6537791fe4f05043a40cc0cff83fb5ae54396c40fded6daae018a7a03c0e 437d2adb9946aeb1e630619e4aa571149d2adedeea8f6d0c39c1bed21c4063cb 459304f70aa2e992bdaed0915ec96cda9c99c6edde30698197319f8fa40a4024 461ec9be4e72154e7faebde91b452dbf0c22281405f0966eeddf69330f91ad2d 51e865bd11fd5daff52c74c0072c6e713535d4a90d5b1398b78c806be1a59dc9 53b7c2eadbb2686d6bcfed439d656df597b396f0004b086a9aad6806e7810256 63779c53cc4ab5d02daadffdd2f7b93b3bfc1a137eb1e5a895d7e2b8393f42a5 6b1bbec6381d6c95ef40d1ddb1ffbc015777d30686d9ba4353857f35b5947e15 6e178460a0f54a86e71df31ac2e90ffbaaf00a41ce9722257613f33ed9acc892 79d129fd698fbf62084545a105e6bd3cc027435a42ae3eb48c3e62c6e2ec461e 80aab48e04978ab54b4a50bba68286d1f03af19b27e78e8263b360d10c7f5904 84bddfdc96745d0be34f31be3b7e4160db6e04fa7d7648ebf03b81807841bffb 86da48f0943d29d940c8ea86a26695026e0a3b5ff74c08cd1189d84e05a57d97 8789bba00344fcb155e891679121b770a4daabe0171a78fccbef5b92322f4105 8ac101bcbb0a30f23ff1f7fb341a3daaa7ff13f045c0e812ac9f6c5079ef82af
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Cerber-7533438-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: SuperHidden
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: Run
                25
                <HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
                Value Name: AutoRun
                25
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: SCRNSAVE.EXE
                25
                <HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 25
                <HKCU>\PRINTERS\DEFAULTS 25
                <HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\16000009
                Value Name: Element
                24
                <HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000E0
                Value Name: Element
                23
                <HKLM>\BCD00000000\OBJECTS\{926583E4-EF64-11E4-BEED-D6738078AD98}\ELEMENTS\250000E0 23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fsutil
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: fsutil
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: logman
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: logman
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: rasautou
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: EhStorAuthn
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: EhStorAuthn
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ntoskrnl
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: ntoskrnl
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: eventcreate
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: eventcreate
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: isoburn
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: isoburn
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: hh
                1
                MutexesOccurrences
                shell.{381828AA-8B28-3374-1B67-35680555C5EF}24
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                31[.]184[.]234[.]0/2525
                208[.]95[.]112[.]125
                69[.]195[.]146[.]1301
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ip-api[.]com25
                Files and or directories createdOccurrences
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}25
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\Component_0025
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\Component_0125
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\Component_0325
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\fsutil.lnk2
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\fsutil.exe2
                %System32%\Tasks\fsutil2
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\logman.lnk2
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\logman.exe2
                %System32%\Tasks\logman2
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\odbcconf.lnk1
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\odbcconf.exe1
                %System32%\Tasks\javaws1
                %System32%\Tasks\logagent1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\ARP.lnk1
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\ARP.EXE1
                %System32%\Tasks\perfhost1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\perfhost.lnk1
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\perfhost.exe1
                %System32%\Tasks\EhStorAuthn1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\verclsid.lnk1
                %APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\verclsid.exe1
                %System32%\Tasks\verclsid1
                %System32%\Tasks\rasautou1
                %System32%\Tasks\mfpmp1
                *See JSON for more IOCs

                File Hashes

                0c7e5bb1cee76e9863ce3b44c24eec38b1eb92892c5b60a833982516a54e9b76 28374ce7589aacac9039559d75f55b2fc82976fbb26e9fcbd4932ae9fba0ff59 358ef9b233660e1630b16cb46e59ca4e8e568aba5d18d2011d01531831656a4f 49b45cd004664bfa865adf65e6f0721c32e26855854ae36e1edbf807c70f6bda 52b992d21becd7be682c2922364a752c8175ef0061a7acd6f4edc077f80e82b1 5602333889bbd3667cb416a50968d930d482b2c85ceb1bea928378118f582d8a 622889cf94266b040d5fc4b648c5010da452d773d6af23eb6d92ef087e885de0 63920b6de768c6e2b2168c51b1e37ade32c2963c9ab270298a6a2c41d413b81f 674fabcda596680972f25c7a01401805f612211a6949231b6b0b51a7b4dc4bb6 75b7b2dbc574900f135e4b0e640ab9ba649309a8d6ad8dee502f24a777873bcf 79ad8ad6a72e5014dee5f21dc71d8dbb580aa2214f39680d990e5f9fae2c033a 80376654651c543804118148246ba881732d1c03312f3a5966bc750a5b9323d0 807a64e31851a9e6b31b848e8cf3f98aee708c3f9fb202083380dbb6c01e1ab6 90a475321d0b15ea933d816290542ba4eaf96b24275d5ad89f54f2e2986a1c6e 91c10c1d3338faa90223e12db01178109fee544d1cdd598c9e6eb2441df372df a36b78449ee435b25af5f6af94ef15831ad257e5d311ebb21d5ed65fb13ac9d3 b54d186c102b61025a31209381847c9a92cbcc3de0180b85c1acd14eaf4543ac c4a92d2271b389d943298c11e93283ea32565956a7d36497de0efdbc41c050c5 c51909551fe0e12ac55b976834ec5e529819b9865afa470bc39ca19ebc50855f d85fd7e3a234d353f00bb58d8630e67de2e654ce33fbe13e1a11c74f3840ebdd db39d08dd5b947bff9410e63a7a120aea4ea8c466af50ffc14c42e8d19df14c8 de64250a40802d3495fa2b0d6deac9ea159652e4e7b3c52d54abe55d986f0973 e6e307c6d4abeb1aa62f20c16cd0bf9cfc667ee945d4e6e7332e475d922c70af e6fa6eca90b0231944129a2b9573ac03c019a788f91044cc50e743b0dd0fd9fa f75b4f1eb4715ad1f6289df06ae3f1ef5e992fa36e4cdebd27ccdb6106945076

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Packed.Barys-7532466-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                26
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: dbe70bc52631c4df155a4a1a865cf25d
                26
                <HKCU>\SOFTWARE\SHORTCUTINFECTION
                Value Name: NOiR
                14
                <HKCU>\SOFTWARE\SHORTCUTINFECTION 14
                MutexesOccurrences
                ~[P6Er7#4$&WJr83!]~26
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                41[.]38[.]1[.]861
                141[.]255[.]155[.]1771
                41[.]239[.]65[.]1891
                206[.]189[.]182[.]2121
                178[.]80[.]27[.]01
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                b10j[.]ddns[.]net1
                uploadapk[.]ddns[.]net1
                anadnjwan[.]zapto[.]org1
                xmu51k[.]ddns[.]net1
                youssefassd1[.]hopto[.]org1
                clivou[.]ddns[.]net1
                hack-qi[.]no-ip[.]info1
                camifer93[.]ddns[.]net1
                ronaldo20[.]no-ip[.]org1
                zabanahacker[.]no-ip[.]org1
                magicfuny12[.]publicvm[.]com1
                badr123[.]ddns[.]net1
                level[.]publicvm[.]com1
                rostom071995[.]ddns[.]net1
                microsoftstores[.]sytes[.]net1
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe26
                %TEMP%\DarkData.dat26
                %HOMEPATH%\Start Menu\Programs\Startup\svchost.exe21
                %TEMP%\Microsoft18
                %TEMP%\Microsoft\svchost.exe18
                \autorun.inf13
                E:\<random, matching '[a-z]{4,7}'>.exe12
                %TEMP%\dw.log9
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp9
                %LOCALAPPDATA%\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Cookies\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Network Shortcuts\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Printer Shortcuts\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Recent\WOrm.exe6
                %APPDATA%\Microsoft\Windows\SendTo\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Start Menu\WOrm.exe6
                %APPDATA%\Microsoft\Windows\Templates\WOrm.exe6
                \<random, matching '[a-z]{4,7}'>.exe6
                %HOMEPATH%\AppData\WOrm.exe6
                %APPDATA%\WOrm.exe6
                %HOMEPATH%\Contacts\WOrm.exe6
                %HOMEPATH%\Cookies\WOrm.exe6
                %HOMEPATH%\Desktop\WOrm.exe6
                %HOMEPATH%\Documents\My Music\WOrm.exe6
                %HOMEPATH%\Documents\My Pictures\WOrm.exe6
                *See JSON for more IOCs

                File Hashes

                004e01f888cb6241fc7da95d1798830ed0c52ea179b1ed0b2f71598e7d83fdc4 006261e3d8b0d00ae9f6596dd914440a19b1b0ab333533c03fd75c3e63f07f0d 022d2461933a4aafe67d8ddb3c5fd7f14eea9035dec79bea200ff1d57776762d 02de146284642091fd6104b2a09a0a5ffc92d51c28e8c492acecbd39fb0c30e0 033645d3516e2f25ddb3566c1eed8a6be6d3c023f7f0e98c868efa12483dfac3 04ce16123c1db27009dfd8a2546810c881a22b6eeed4697d64cb44af2e69e75d 0780a44389bf1a4cde74cc26d87cf3ee10ab0f19ba75dc941abacb0939f6c0fd 085a78af5d0146251a13bc743866fe4292d84a6c0753c6e6fcbb91d2c7826dfe 0887bb1422d2b1a80b0912816d2e776afe9db36ae392887c30dffb6950b39190 08d8cf4bd5635a6930758f7736259f230ff559ede4880d044aa4eaed47f37115 0b0c9946d82dba06fceda4ce8a8f2a8ad828adba44e630f4652a5784d4305e5c 0c85f4b989930dd44f791828bad61061e8ff325142e1dd275fa30295a343c051 0d638e32faab7502716a78610e97a4c55974ff1c648784aa66294f1e594cbe1f 0de13ccba02abce52ee48511d094b474fbf8807aa54ea316f86a83befe85a1b6 1081f90d1fa09214611b5e0255d714db254f502e945069e93973eb0f63d00208 12bd605a3b68b17d0279e5fd34cb2c9dee540f4eb1b248447d101c9199ebfaf5 12f1c270b4df8c8baa2eb194f85267da965450cf35696644d71d3835a3905e1b 13c397c69dd1c2357af059f5760a551567834c836b6d124e4e1ffee085feda80 1493472fd451f1109f5c245245469e6882f92d34610a6c468e3af5dd9acdac89 17b64ea8a52fce27bcd439a2762f6a8dff4235c10ca99a60722e481509e42b0b 1888096d2e773f3e1377ee329bf649d0032e384badd451731cc1f6cf7eb924ce 18a5f4a28bd04a9e6b7283aa80bfe4649e48cac3592f72fed511e10935c80678 18f55fa2f805d9a0aa51b6c6e934b9ea14d4c63fb578811dad1d7816e5758b71 1962b11c5701a4b591c219a30164708e42bad73e72a58b5896cfa48c0ad20ed5 1a91bfeb723c4ad729eea5e22da6f8afeecbdb990a18c3272e1fc92d7c94bdae
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Malware




                Win.Packed.Razy-7532659-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\7E3975E4EF230D7D9195 4
                <HKCU>\SOFTWARE\7E3975E4EF230D7D9195
                Value Name: 7E3975E4EF230D7D9195
                4
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                2
                <HKCU>\SOFTWARE\FECBD0A484C99B705CF7099E6CE11887 2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fecbd0a484c99b705cf7099e6ce11887
                2
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fecbd0a484c99b705cf7099e6ce11887
                2
                <HKCU>\SOFTWARE\FECBD0A484C99B705CF7099E6CE11887
                Value Name: [kl]
                2
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\AUTOUPDATE
                Value Name: LastSyncTime
                1
                MutexesOccurrences
                fca-1de3ff8451094
                jicaltapntot3
                gfgdgdfdgfggfdgfdgbfdbgdfbgdfbgfdbgdfbgdfbgdfbgdfbgdfgbdfgbdfgdfbdgfbgdfbgdfbgdbfgbdfdgbfgbfdvbvdgfdgfbvgdbfvdgfbvdgfvb2
                fecbd0a484c99b705cf7099e6ce118872
                022-1b90e6b10b981
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                51[.]15[.]40[.]8517
                177[.]75[.]44[.]413
                177[.]75[.]44[.]1472
                169[.]254[.]255[.]2551
                72[.]21[.]81[.]2401
                104[.]20[.]68[.]1431
                104[.]20[.]67[.]1431
                109[.]202[.]107[.]151
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                rentry[.]co17
                jhonjhon4842[.]ddns[.]net5
                pastebin[.]com2
                ctldl[.]windowsupdate[.]com1
                noregisterdomain[.]zapto[.]org1
                Files and or directories createdOccurrences
                %APPDATA%\explorer.exe3
                %TEMP%\explorer.exe2
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\fecbd0a484c99b705cf7099e6ce11887.exe2

                File Hashes

                04c3f0070bc08bafddfeb011497eb893c37f63397b535dcedee9e5ac89e246c3 0e754a806b2813874c47332e98a8c118bd1e33508b44ff0081ac36a48814d769 120924a5852db8a4333cf74fc1f067f51a70a996de994bc4ce727ff1377f6023 16ca75f09433409d790695af612f4ee560c265f3f084b6dc04bcbebff2ebe964 3a1a6f80ea8aa66ce456ab0cd452ad38e12b3c904432fedb5a0242c987f84c81 4ca2e3f2272455e38269d69d20dbb16c1572befe8b81a92c4acdae93341549d2 5c4dee777eb540663373b08b31b5d69d52fe9108317b21b697ea2487a2b8621d 747b1a101bb3a43a6c0b58fb8a50d8ac9777ea704911e7df27edf8c81ead883e 7f85c722bf97008aafd593730ccf252318ffb8ad00645aa0e13eab7d76c96687 8953d845fe687b2a8c5e92a0a7b2aa9dcb5c61dd271983194ef300476faee3de 95384877ed6e9a9e726ff1d18bd0fd137160e4943e0bebe59c7f7a8bfd3b25d8 b58590a3a09129a3a1e55195b0f1a39bb278a4ee1c21257aa2d74b425f09e649 c679ac377cc06ef337c78bcd3882b4e0ad5023d9649c1e37296f98252573bd57 d2e84fc71ada0566834f9dcd871b927c3e52603b73cf2bc0d923fbba79fc205f db7f08e2ae8fdb796d8420ef16ef539f2c8fe24ddabadf5a46cc7148b5c50e8a ded370384b5abe048734193ae8281852d2f68cf93cdec658bb0047ed7314c9a6 efa4ffb921031f5c2cd960f2d24e56140dd2c0d549e2a7b2ea69e4ab0cb47dae f24917e59deff96fe4107de88d80815c5aa45d3e7aa711ad772ea031bcfdcc1d f5c8e5e5303aedd99923c610e3b0ecd34095fdff10ae120d1be6648c5bdc3e89

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Packed.Dridex-7532883-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: trkcore
                12
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: DisableTaskMgr
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                Value Name: CheckSetting
                12
                MutexesOccurrences
                bxHV8AirRi1
                nN6zSKd5De1
                1aGmpK2Fpc1
                7hIVwzEnv11
                E6Q6j6YTV81
                Irun61Xn7d1
                JLSADdwil01
                NPXzzJejTH1
                WWN630213P1
                XPF1tOcJMb1
                2WpU6TmEPW1
                3ZJhaY3yr91
                5he85143TO1
                KjY7CSFqPz1
                R9uXS0pi9F1
                TV4I4E35W81
                eDiPKSpzC61
                yebXkefg8w1
                CCbi4gfgIs1
                OuaMk6vUKi1
                RiFp6vyARh1
                W6ArquGVYc1
                cLgrRVqAOx1
                rw74rlool51
                vxudb0VN9b1
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                172[.]217[.]11[.]4612
                104[.]20[.]67[.]1437
                104[.]20[.]68[.]1435
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                pastebin[.]com12
                www[.]4zjjwywndb[.]com1
                www[.]wyek9gljwv[.]com1
                www[.]dhpydj8zow[.]com1
                www[.]xy5xc1pa3f[.]com1
                www[.]dw4kr1pwbg[.]com1
                www[.]bz11msxwlf[.]com1
                www[.]65vxrzb8us[.]com1
                www[.]qiht7hodpf[.]com1
                www[.]gfuhlqwl2q[.]com1
                www[.]xdctdxp8w3[.]com1
                www[.]hfhfl9jloc[.]com1
                www[.]gvkkyn2d5c[.]com1
                www[.]womizyhbm9[.]com1
                www[.]zboz6h96hz[.]com1
                www[.]ssgj6cpx0k[.]com1
                www[.]rpy91utwrm[.]com1
                www[.]qeqvtkjksw[.]com1
                www[.]0ac8n2n5zb[.]com1
                www[.]eagzu4rlpm[.]com1
                www[.]0rfabtbv2r[.]com1
                www[.]abzze96jtg[.]com1
                www[.]wfajyuswse[.]com1
                www[.]d4ktsdbuhr[.]com1
                www[.]ep2iu65g3l[.]com1
                *See JSON for more IOCs

                File Hashes

                05afedd0b76f574373f858b854958c473482fcc6fa9736f0d447094605ad2102 0a3079b8c4963b26e74760337da6cb0b1a6c532cc524f4d0aae6dab1d52f7d75 0a4e162d4a11aa91ead63995af22c410b422b8b5af2038d4ef95d454c1d380e1 0f4f25d12a2729552a348fb33cd7374fbd5ce3bc53c8da873f3aa5026a7290ca 33991dbeb097cb0937ae9ea049418089b3437e7f4ef23cbcf26b906b1ab39d5b 79d11b3634c5a3dc51442b4e8cdf88d921f9d46273a55ac20cd1fa7d0d51c11d 919119268cb2b13ae638c6015822352d899cc39ea10959a86634c8bd2fc8912b 940eaff21163abfe8be6301e561e30a27f23800cb8bfe4a5df9a5ff7dbfb1d4f a31fdd57bc317cd8f6c4df0c6f75bcd25999d36f7cc665da9018672dfe55061c b5d15bb5d2a6bde41040d4b9d63e8cc1cfddf8669f5c1389c2aba584328dc27b e45c5802e6091e4602519853d81ad08f45969d574cfa3d1e36a6af8bd0daaaf7 f3475d70597f4f77ab542f79c295c120094f9dc35bddb706bfb80b1e8787a061

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (22771)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Process hollowing detected - (394)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Excessively long PowerShell command detected - (304)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Kovter injection detected - (181)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Dealply adware detected - (147)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Gamarue malware detected - (141)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (125)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Corebot malware detected - (22)
                Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
                Fusion adware detected - (13)
                Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
                IcedID malware detected - (10)
                IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.

                Vulnerability Spotlight: Bitdefender BOX 2 bootstrap remote code execution vulnerabilities

                $
                0
                0

                Claudio Bozzato, Lilith Wyatt and Dave McDaniel of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

                The Bitdefender BOX 2 contains two remote code execution vulnerabilities in its bootstrap stage. The BOX 2 is a device that protects users’ home networks from a variety of threats, such as malware,
                phishing IOCs and other forms of cyber attacks. It also allows the user to monitor specific devices on the network and limit their internet access. These vulnerabilities could allow an attacker to gain the ability to arbitrarily execute system commands.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Bitdefender to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Bitdefender BOX 2 bootstrap download_image command injection vulnerability (TALOS-2019-0919/CVE-2019-CVE-2019-17095, CVE-2019-17096)

                An exploitable command injection vulnerability exists in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. An unauthenticated attacker should impersonate a remote nimbus server to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Bitdefender BOX 2 bootstrap update_setup command execution vulnerability (TALOS-2019-0918)

                An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. To trigger this vulnerability, an unauthenticated attacker can send a series of HTTP requests to the device while in the bootstrap stage.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that version 2.0.1.91 (in bootstrap mode), 2.1.47.42 and 2.1.53.45 (in production mode) of Bitdefender BOX 2 is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 51929, 51948

                Breaking down a two-year run of Vivin’s cryptominers

                $
                0
                0

                News Summary

                • There is another large-scale cryptomining attack from an actor we are tracking as "Vivin" that has been active since at least November 2017.
                • "Vivin" has consistently evolved over the past few years, despite having poor operational security and exposing key details of their campaign.
                By Andrew Windsor.

                Talos has identified a new threat actor, internally tracked as "Vivin," conducting a long-term cryptomining campaign. We first began linking different samples of malware dropping illicit coin miners to the same actor in November of 2019. However, upon further investigation, Talos established a much longer timeline of activity. Observable evidence shows that Vivin has been active since at least November 2017 and is responsible for mining thousands of U.S. dollars in Monero cryptocurrency off of their infected hosts.

                Vivin has shown to rotate the use of multiple cryptocurrency wallet addresses, in addition to altering the delivery chain of their payloads, over different time periods of activity. An interesting aspect of the actor's delivery method is their use of modified pirated software as their initial attack vector before the samples move on to common "living-off-the-land" methods at later stages of the attack. Vivin makes a minimal effort to hide their actions, making poor operational security decisions such as posting the same Monero wallet address found in our observable samples on online forms and social media. Nor do they discriminate in their targeting, attempting to capitalize on general user behavior, rather than targeting, to generate as large a victim pool as possible.

                Despite the market downturn for cryptocurrency values in 2018, cryptomining remained a popular attack method for malicious actors throughout 2019 and heading into 2020. Over the course of last year, Talos Incident Response observed a number of cryptomining attacks, some of which potentially involved higher coordinated cybercrime groups and collaboration between multiple different threat actors. While more sophisticated actors certainly pose a significant threat, organizations should remain cognizant of the additional threat posed by less advanced actors employing wide or unrestricted targeting. Talos has previously documented one such actor, "Panda," illustrating their potential for long-term exploitation of their victims' resources and their resilience from being deterred from future action. These attributes make Vivin, and other actors like them, legitimate risks to organizational resource abuse and potential data theft.


                The tactics, techniques, and procedures (TTPs) used by Vivin expose the actor's campaigns to multiple potential points of mitigation. Some of these include good systems hygiene such as preventing the use of pirated software on endpoints, proper event logging and monitoring, and systems resource monitoring. Other mitigation strategies involve a more active defense. For example, blocking the URIs used by the mining pools and the malware's intermediate stages. Detection signatures can also prevent the XMRig miner from being dropped and executed on targeted hosts.

                What's new?
                This is yet another reminder that malicious crypto mining still has a major spot on the threat landscape and, judging by this actor, are successful and long standing campaigns. This actors use of pirated software as a mechanism for malware delivery isn't often seen, but can be highly effective.

                How did it work?
                This actor used pirated software as an initial infection vector, masquerading their malware as popular software. Once the initial infection was completed "Vivin" quickly moved to common Windows tools. This actor has been successful pivoting their infrastructure and wallets as needed to maintain effectiveness.

                So What?

                • Pirated software is dangerous and can be riddled with malware. Keeping it off your enterprise network will help mitigate the risks actors like "Vivin" present.
                • Adversaries are increasingly leveraging LoLBins and organizations need to ensure they are capable of detecting and preventing attacks that leverage them, without hindering productivity.
                • There is still significant money to be made from malicious crypto mining and actors are going to continue to deliver it, through any means necessary.
                • Operational Security (OpSec) is difficult and adversaries make mistakes, this is another example of how those mistakes can be leveraged in analysis.

                Technical case overview

                Vivin has been observed slightly altering their TTPs over time. Because of their propensity to use commodity malware tools, Vivin's moderate changes are most likely due to incremental changes in these tools, such as the use of an updated or new packer, tweaked methods of obfuscation, and structural changes in PowerShell code, among others. However, the same baseline execution flow is observable in all of our available samples. The following technical description is largely based on samples observed in the cycle of activity beginning in November 2019.

                Initial infection occurs through the execution of malware made to resemble commonly used productivity software, tools, and games. These files were all likely obtained through pirated software forums and websites. Many of the samples are packed as self-extracting RAR files which extract and install what appears to be the actual software and covertly drop malicious files. The pirated software from our observed sample run contains a second stage payload that is written to \AppData\Local\Temp as "setup.exe." Upon successful execution, the observed samples dropped both a JavaScript ("setup.js") and VBScript ("dllm.vbs") file to the victim host's \AppData\Local\Temp and \Windows\Start Menu\Programs\Startup folders.

                As part of this execution chain, the malware also reaches out to "csrss.publicvpn[.]com," a known malicious domain, to establish a TCP connection. During our analysis, the sample did not receive a response. The prevalence of this domain and others that are lexically similar within other sample runs associated with Vivin lead us to believe that these hosts act as a form of command and control, but we do not currently have enough information to glean its exact functionality and purpose. Nevertheless, the response failure does not hinder the rest of the sample's execution. Finally, in addition to immediately running the malicious script, the dropper also creates a job using Windows Task Scheduler. This job, called "anydesk"[1] in all of our samples, executes the dropped script every 30 minutes:
                c:\windows\system32\schtasks.exe /create /sc minute /mo 30 /tn anydesk /tr c:\users\{username}\appdata\local\temp\setup.js
                The malicious script contains an obfuscated PowerShell command that executes a number of cascading PowerShell calls and additional payload stage downloads. In the sample Talos originally discovered, the command reaches out to "pastebin[.]com/raw/gc5dfjh9," a page containing a URL of a supposed image file at "www[.]m9c[.]net/uploads/15758872491.jpg." This file is actually raw text containing additional PowerShell commands and the ASCII representations of further payloads.

                These PowerShell commands reflectively load an included malicious .NET assembly. The sample then calls the "exe" method of the "Hackitup" class shown below, which performs more deobfuscation, in addition to some additional logic checks through more chained method calls, such as whether it's running on a 32- or 64-bit architecture. Finally, it constructs the configuration options to be loaded and executed with its final payload by invoking "cmd.exe."
                The final payload is a packed variant of the XMRig cryptominer. Examination of the reconstructed PE file reveals that it is compressed with UPX. Additionally, the miner is launched with a common configuration that we were able to extract from the binary as shown in the figure below. XMRig is set up to use a maximum of 80 percent of the host's CPU resources with the "CryptoNight" algorithm in order to mine the Monero cryptocurrency. The extracted configuration string also contains Vivin's Monero payment address, which Talos used as a starting point to track this actor.
                Vivin's malware employs a fair amount of obfuscation and evasion techniques throughout its execution. First, the initial droppers either install some form of the expected pirated software or they attempt to mimic a fake installation with paths that are named for associated programs. For example, our "PhantomPDF" sample installed to "F%3A/Software/Adobe/" which is neither Adobe softwares' or PhantomPDF's default install path. Furthermore, PhantomPDF is not developed by Adobe, but Adobe is arguably the most popular name associated with PDF software, thus the installation and execution paths may fool those not paying close attention. Second, the source code in the dropped JavaScript and VBScript files are heavily manipulated for obfuscation. Third, the .NET assemblies are reflectively loaded in order to keep additional files from being written to disk, in addition to their source code also being heavily obfuscated. Finally, all of the observable XMRIg payloads were packed using UPX.

                The actor also used multiple methods of persistence to keep the XMRig mining software on the victimized hosts. Windows Scheduler was used to create the job "anydesk" to execute setup.js every 30 minutes. The sample copied various sources of execution: setup.exe, setup.js, and dllm.vbs to \AppData\Local\Temp in order to have them persist on disk. Additionally, the malware sample created startup items in two separate locations, thereby enabling re-execution of the malware following any system restarts. One startup item was created by writing dllm.vbs and setup.js to \Windows\Start Menu\Programs\Startup. The other was established by adding dllm.vbs to the "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" registry key. While none of these methods are particularly sophisticated, the amount of redundancies created could make it difficult to fully clean the XMRig miner off of the victimized system.

                While all samples and execution chains Talos found associated with this actor dropped XMRig as their final payload, there were additional variations observed in some of them. For example, other samples dropped a VBScript file as their intermediary although it performed the same functional role as our original sample's JavaScript file. Some samples simply contained only one referenced PE file at the PowerShell stage and hid their XMRig payloads inside of the reflectively loaded .NET assembly as base-64 encoded strings. One of the more interesting samples first checked to see if it had access to "MSBuild.exe." However, the sample that contained this check still only attempts to run the XMRig launch command to cmd.exe, rather than attempting to compile the next stage on the host or use the inline task function execution as other malware has been observed doing when attempting to access MSBuild. Finally, some XMRig payloads used a dropped JSON configuration file rather than specifying them on the command-line or packing them into the final XMRig binary.

                Tracking Vivin

                Talos assesses with high confidence that Vivin's campaigns are indiscriminate, meant to infect as many hosts and extract as much money as possible. Upon too much exposure, Vivin rotates the wallet address used along with potentially updating their infrastructure used. The actor's activity exhibits a general lack of operational security (OpSec). They have been observed publicly posting the wallet IDs used in the malicious samples on social media sites such as Reddit. The actor also reuses the same or slight variations of the same username for a number of online accounts, including services used in the execution chains of the cryptomining malware. At the time of writing, Talos has observed three separate aliases directly linked to the actor, although they are all lexically similar.

                We located the first username Talos linked to the actor through a Reddit post claiming the same Monero wallet address found hardcoded in our original sample's XMRig payload as their own. Further investigation into the user's posts revealed additional wallet addresses and an ongoing interest in various aspects of Monero coin mining, XMRig configurations, and the efficiency of different mining algorithms. The same user also posted about having issues with their account for the "minexmr[.]com" mining pool, the same pooling address used in the configurations of the XMRig payloads. A GitHub account also uses the same username as the Reddit account linked to Vivin that contains a forked repository of the XMRig coinminer source. Additionally, this user follows other accounts that house numerous repositories for file crypters, rootkits, process-hollowing, and other tools commonly used in malware packing and distribution. Finally, the two other aliases were found as users on Pastebin that had uploaded raw text links pointed at image and file hosting sites. These site links contain the PowerShell scripts used in the intermediary stages of Vivin's malware.

                Talos originally began tracking Vivin by investigating a suspicious PowerShell command found in our AMP telemetry. However, this was not the original source of infection. By reconstructing a timeline of event execution surrounding the initial PowerShell command, we traced the original dropper back to what appeared to be a pirated installation of "Foxit PhantomPDF." After locating the initially executed file within this installation, dynamic and static analysis confirmed it as the infection source. After tracing the file write operations for the software installation, we believe the dropper had been downloaded onto the victim host through BitTorrent. The parent process for this in our original sample references the uTorrent BitTorrent client. Additional evidence supporting this includes a user going by one of Vivin's aliases uploading files to torrent forums and sites with the same or similar names of the malicious samples seen in the wild and that have been associated with the actor's malware infrastructure. Here's one example:

                At the time of writing, Vivin remains active. After gathering pivot points and identifiers linked to to the actor, we broadened our investigation into additional ongoing activity and reconstruct patterns of historical activity through open source research and other data sources. We first saw this activity on Nov. 20, 2017. But because this date was a "last seen" value, Talos believes that Vivin's activity goes back further. The actor maintains multiple cryptocurrency wallet addresses, some of which have shown to go through cycles of dormancy and activity. Other associated wallet addresses have already been banned from mining pools under suspicion of botnet activity.

                Talos observed two recently active cryptominer wallet addresses linked to Vivin. The first, "45VgqBWVhgu5LHSafj4q5sB3wuYXGvrSs5N9KLH5Tijze9NbsvUSaaSjVk1vuGBMwY2eXEHtQf95CULQHGQbghU21x4aWLY," we found hard-coded in our original sample's XMRig payload. As shown in the figure below, this wallet first showed minimal mining activity on Oct. 29, 2019. Around Nov. 10 the hashrate associated with this wallet constantly increased at an almost linear fashion until Nov. 30, 2019. After the 30th, the hashrate drastically reduces to about 20 percent of its peak and has continued to operate at about that level until Dec. 9. Interestingly, the drop in this wallet's activity occurred only a couple of days after Talos began blacklisting the discovered infrastructure and assigning malicious dispositions to known associated samples. A smaller second drop in activity occurs again on Dec. 9 and continues to steadily diminish.
                The second wallet, "434PuVPN5tQ6xQA7pdB7NsNTJHWvUD5tL7rmsX7uzJgNdCAx7wo4yESiy51aqCcr13ZoYb3TFq3zw11BFQJiF1tnHibZ6EA," was found through an OSINT investigation into Vivin's online accounts and activity. The same Reddit user previously linked to Vivin also posted this wallet payment address in the MoneroMining subreddit in the later part of 2018. Further investigation revealed that this wallet has been in use at least as far back as Nov. 20, 2017, when it was active in the mining pool "dwarfpool." Activity associated with this wallet address once again resurfaced on Dec. 9, 2019. This time, the address is being observed on the "minexmr" mining pool, illustrated in the figure below, the same pool as our first active wallet address linked to Vivin.
                There are two noteworthy observations here. First, the timing of its new activity. Remember that the first wallet address' second significant decline began on Dec. 9, the same day of this wallet address' resurgence. We believe that the convergence of this date likely signifies a point of infrastructure turnover, where no new effort is being made into actively proliferating malware using the first wallet address and active operations now using the second address. As previously discussed, Talos believes that Vivin operates their active campaigns in cycles, in addition to recycling wallet addresses after too much exposure. The timing and evidence observed between these two wallet addresses lends further credence to that assertion.

                Secondly, the latter wallet address shows a total hashrate orders of magnitude above Vivin's other active wallet. This could indicate a much higher infection rate and proliferation of malware tied to that specific address. At the time of writing, Talos has not yet observed any specific samples in our telemetry directly tied to the second wallet address; however, data from VirusTotal does link it to a cryptominer submitted back in December 2017. Talos will continue to monitor our telemetry and data sources for malware samples and related infrastructure linked to Vivin's ongoing activity.

                Mitigations

                Fortunately, Vivin's lack of sophistication, and the nature of cryptominers in general, afford multiple avenues for detection and prevention. One area of mitigation deals with methods for systems and user behavior monitoring. Restricting the use of pirated software on organizational hosts and networks could mitigate against the initial attack vector observed in this investigation and other malware in general. Torrent sites and pirated software have long been easy distribution avenues of malware for illicit actors. Systems and network monitoring can be used to send alerts when associated behaviors are found. For example, monitoring for excessive or abnormal resource usage on endpoints could indicate cryptominer activity. Vivin set their miners to utilize up to 80 percent of a system's CPU resources.

                Prevention of unnecessary and/or unauthorized system-level changes can help mitigate against intermediary stage behavior, such as PowerShell execution chains, in addition to persistence tactics used by Vivin, such as creating startup objects and scheduled tasks on victim hosts.

                Another area of mitigation involves more active detection and prevention strategies. URIs used by Vivin's malware can be blacklisted and blocked at the network level, such as the image host links used to download and deploy the malware's intermediate stages, IP addresses associated with command and control infrastructure, and the domains used to connect to the mining pools themselves. Additionally, signatures and other detection content used by antivirus and other endpoint security services can detect and prevent miner applications like XMRig from being illicitly installed on systems. Further recommendations on mitigating this type of threat can also be found by reviewing the Cisco Talos whitepaper, "Blocking Cryptocurrency Mining Using Cisco Security Products."

                Conclusion

                The length of historical activity by Vivin, the multitude of wallets and malware execution infrastructure, and the actor's somewhat flippant attitude towards operational security suggests that the Vivin will attempt to continue their operations for the foreseeable future. Perhaps more telling is the actor's willingness to continuously roll over their infrastructure over a long period of time. As evidenced before, if enough of their infrastructure gets exposed, Vivin will likely abandon the iteration of malware, their execution chains, and potentially switch mining services.

                It is easy to want to dismiss non targeted attacks and less sophisticated threat actors as inconsequential; however actors like Vivin remain viable threats to organizations. Among the wallet addresses Talos was able to link to Vivin, they have already mined thousands of dollars worth of cryptocurrency. The substantial growth in hash rates for the actor's Dec. 9 campaign also suggests that they could be significantly improving their delivery methods and infection rates. Aside from siphoning resources from organizations, the malware used to drop XMRig could also be modified for data theft, credential harvesting, and other malicious activity. Talos will continue to monitor activity by this actor and update or expand this post with any additional information.

                Coverage


                Ways our customers can detect and block this threat are listed below.


                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such as this automatically.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), Cisco ISR, and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IOCs

                IPs

                116[.]203[.]234[.]128
                116[.]203[.]29[.]111

                Domains/URLs

                pastebin[.]com/raw/gc5dfjh9
                pastebin[.]com/dr9bzymZ
                mmc[.]publicvm[.]com:8002
                csrss[.]publicvm[.]com
                csrss[.]publicvm[.]com/Vre
                csrss[.]publicvm[.]com:8094/Vre
                csrss[.linkpc[.]net
                csrss[.]linkpc[.]net/Vre
                lsass[.]publicvm[.]com
                mstsc[.]publicvm[.]com
                spoolsv[.]linkpc[.]net
                winlogon[.]publicvm[.]com
                dwm[.]publicvm[.]com
                www[.]m9c[.]net/uploads/15743593161.jpg
                www[.]m9c[.]net/uploads/15723243711.png
                www[.]m9c[.]net/uploads/15723168051.png
                www[.]m9c[.]net/uploads/15572403801.jpg
                www[.]m9c[.]net:80/uploads/15621655811.jpg
                ddl3[.]data[.]hu/get/210358/11615096/Loader.jpg

                SHA256s

                aa6fa5b51a2e54a1aef50bc9ba3eb41b88b1834e867f09d2c8e29c0d41691ae6
                2b48269eec1a294a52049cbd35ebd6f6097e1c486d60febe836378714657978a
                da6908445649d30aff3f6ac9d9ec11c5f52c888c867ede766993c0fe731295fe
                51f9a6d7574361bcf49962e2471a1d096db6c0d713ae07485b2791e74134513c
                5dc7239df2e9fb497335cc846e09dfdd024e7345c44a96693022bedd240954de
                4ac6131d639aa802302ab4cf32b959f9ab5ec76752cc297eb380d5c23d4a68f2
                f476867d8152fcf0cb989b0e2c935db87c37162af33350874d671f99154752cf
                8b7c197efab6f6c40b51df125d00e3de211ebb5123ee876f1992f03401559cda
                31ac877d8c2c2a897eaff36b17d755466b8612ad2661510dd6b0d9484a2b1f6f
                8aa5d523158838bf58a80744f031192314215a3d4c32c4f8644f93370828825b
                ea647990182d7d3ac82ff9b6c99ed70a10473da16bc55eadb76131f78ed65fb9
                79557c6d190d7daf34f10c7929facf56838ab27a5925f6f5197e1c0cbd660de3
                524fbc5fff1e91adcd4c72ce83b7f33fa424acefafb198f1701484cedc17c590
                9d7f2684a4efdb4738527d37b7995a40d819909d08e7443a6583231a1454b50b
                705646f923a2412757bae71b60de0fef31284756768a59ef2057eaee7dfafe9f
                a115451603cf9687c8c46945432033a942b4cd46a4209868e226e25a1a2e0ee1
                d343e4b99b9cdaf2e7fc2283dda0e7e07cedf4bccf7f53869f2806b14113ab7d
                4b71cc1af01417d8b17f1158bbfa53e0bb09a7dc16bbdf3edd8f2f99b8fc667d
                f23ce16ad18907f0aa6957640dbe960daeaa33c714d0ca9f204a98800edc2df4
                9d7066f441a5a3df894d018143ae2778175f18408c2fbab52442ed4ad178ae8f
                25cc942e230b357a43297a8172a6700098b6ae152ef00acaa7e6a2c0fa07497d
                5331924e1e5a634e55e7a3daaff3d5204eff50c4dc166d4d9d516510fb91fa4e
                198a045c55710f8d32141c72e69b2cdd6c7a60b29ac9776046257897d612ceca
                47928d09921466ddf1597e1ef7e8ac12397df7e616cd0c1710f4fa8a6384b439
                d03054261a521440a7cfe281bd7d14f92610b54906df1dced8dbe6bc00e40029

                Cryptocurrency Payment Addresses

                Currently Active
                45VgqBWVhgu5LHSafj4q5sB3wuYXGvrSs5N9KLH5Tijze9NbsvUSaaSjVk1vuGBMwY2eXEHtQf95CULQHGQbghU21x4aWLY

                Currently Not Active
                44WzjC6ERyR7CMDXpkgVeGH9Tj4fnBeAuCdcaH79NkMPhKr3bQRKMKtJhzfhrmXJJ42sdFvAvg4b3L7zaYTwigeqBt9jDrQ

                4589o168fmkBrMVoR3qPQyXiDR3w9EFa3DajGUjY38MKLiaR4N5HbdFT7hw3iEh2mRZsABYvkgcFWaW5crPJQtVZ9ihwutP

                4AbjKdQkedGZXvzm6VxMJb1zLB2CAmCmXdoCisRsQFAUPs4TWFePDUcZzk5ui4EdZXT3uaXXtssqPCoKQPTz7PeZNkKASkm

                434PuVPN5tQ6xQA7pdB7NsNTJHWvUD5tL7rmsX7uzJgNdCAx7wo4yESiy51aqCcr13ZoYb3TFq3zw11BFQJiF1tnHibZ6EA

                Vulnerability Spotlight: Multiple vulnerabilities in some AMD graphics cards

                $
                0
                0

                Piotr Bania of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

                Multiple vulnerabilities exist in a driver associated with the AMD Radeon line of graphics cards. An attacker can exploit these bugs by providing a specially crafted shader file to the user while using
                VMware Workstation 15. These attacks can be triggered from VMware guest usermode to cause a variety of errors, potentially allowing an attacker to cause a denial-of-service condition or gain the ability to remotely execute code.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with AMD and VMware to ensure that these issues are resolved and that an update is available for affected customers.



                Vulnerability details

                AMD ATI Radeon ATIDXX64.DLL shader functionality constant buffer denial-of-service vulnerability (TALOS-2019-0913/CVE-2019-5124)


                An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.50005. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

                Read the complete vulnerability advisory here for additional information.

                AMD ATI Radeon ATIDXX64.DLL MOVC shader functionality denial-of-service vulnerability (TALOS-2019-0936/CVE-2019-5147)

                An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13003.1007. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

                Read the complete vulnerability advisory here for additional information.

                AMD ATI Radeon ATIDXX64.DLL MAD shader functionality denial-of-service vulnerability (TALOS-2019-0937/CVE-2019-5146)

                An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13025.10004. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

                Read the complete vulnerability advisory here for additional information.

                AMD ATI Radeon ATIDXX64.DLL shader functionality VTABLE remote code execution vulnerability (TALOS-2019-0964/CVE-2019-5183)

                An exploitable type confusion vulnerability exists in AMD ATIDXX64.DLL driver, versions 26.20.13031.10003, 26.20.13031.15006 and 26.20.13031.18002. A specially crafted pixel shader can cause a type confusion issue, leading to potential code execution. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that these vulnerabilities affect AMD ATIDXX64.DLL, version 26.20.13025.10004 running on the Radeon RX 550 series of graphics cards, while running on VMware Workstation 15, version 15.5.0, build-14665864 with Windows 10 x64 running as the guestVM.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52008, 52009, 52050, 52051, 52367, 52368

                Threat Source newsletter (Jan. 23, 2020)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                Despite tensions starting to fizzle between the U.S. and Iran, people are still worried about cyber conflict. What would that even look like? Is it too late to start worrying now, anyway? That’s the main topic of the latest Beers with Talos podcast.

                You should probably know this already, but you should actually never count out any type of cyber threat. Despite the declining popularity of virtual currencies, we are still seeing adversaries who want to hijack victims’ computing power to farm them. Take Vivin, for example. The latest cryptominer actor we discovered has been active since 2017, and is just getting started with its malicious activities in 2020.

                Over at the Snort blog, you’ll want to keep an eye out for some changes we have coming to Snort.org. We’ll spare you the details for now, but please bear with us if the search function isn’t working correctly for you or you see anything else wonky on the site.

                And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

                Upcoming public engagements

                Event: Talos Insights: The State of Cyber Security at Cisco Live Barcelona
                Location: Fira Barcelona, Barcelona, Spain
                Date: Jan. 27 - 31
                Speakers: Warren Mercer
                Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. We are responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In this talk, we will perform a deep analysis of recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies.

                Event: A World of Threats: When DNS becomes the new weapon for governments at Swiss Cyber Security Days 
                Location: Forum Fribourg, Granges-Paccot, Switzerland
                Date: Feb. 12 - 13
                Speakers: Paul Rascagnères
                Synopsis: In this presentation, Paul will present two threat actors Cisco Talos has been tracking who are manipulating the DNS system. On Jan. 22, 2019, the U.S. DHS published a directive concerning this attack vector. We will present the timeline for these events and their technical details. One of the actors is behind the campaign we named “Sea Turtle.” This actor is more advanced and more aggressive than others we’ve observed in the past. They do not hesitate to directly target registrars and one registry. The talk will break down these two actors and the methodology used to target the victims.

                Cyber Security Week in Review


              • United Nations officials are investigating the hacking of Amazon CEO Jeff Bezos’ cellphone. Bezos reportedly watched a malicious video in 2018 that was infected with spyware, allowing a malicious actor to spy on his device for nine months until February 2019. Two security experts say in their findings that the hack is said to have originated from the Saudi Arabian government. 
              • A new survey from NPR and PBS found that the spread of misinformation is Americans’ top concern heading into the 2020 presidential election. This ranked far above foreign interference (15 percent) and problems at the polling place (5 percent). 
              • Technology company Citrix released another round of patches for a critical vulnerability in Application Delivery Controller and Citrix Gateway. Attackers have already exploited the bug to install malware on Citrix servers after proof-of-concept code was leaked in December prior to patches being ready. 
              • U.S. President Donald Trump and Attorney General William Barr renewed a pressure campaign on Apple this week, calling again on the company to decrypt iPhones belonging to criminal suspects. The recent argument centers around a phone belonging to a man who killed multiple people on a naval base last year. 
              • Meanwhile, a new report states that Apple dropped a previous plan to encrypt iCloud backups after the FBI complained. The decision came more than two years ago but is just being brought to light now. 
              • Google also took a shot at Apple this week, preparing a research paper that states there are multiple vulnerabilities in the Safari web browser that puts users’ data at risk. Even if a user was to opt out of location tracking, the bugs could be exploited by third-party companies to obtain “sensitive private information about the user’s browsing habits.” 
              • Foreign currency exchange service Travelex says its first customer-facing services are back online, weeks after a ransomware attack. The company still maintains that there is “no evidence that any data has left the organization.” 
              • Intelligence Community Threats Executive Shelby Pierson says the U.S. government learned from its mistakes in 2016 and is prepared to more quickly disclose threats to U.S. elections. Former President Barack Obama’s administration came under fire for taking too long to disclose what it knew about Russia interfering in the 2016 presidential election.  
              • Microsoft is warning of a critical vulnerability in Internet Explorer that’s being exploited in the wild, though no patch is available as of Thursday morning. An attacker could exploit this vulnerability to corrupt memory in such a way that they could execute arbitrary code in the context of the current user. 

              • Notable recent security issues

                Title: Microsoft cryptogrophy vulnerability lingers after Patch Tuesday
                Description: The U.S. National Security Agency released a warning late last week, urging users to update their Microsoft products as soon as possible to fix a vulnerability in its cryptographic certificate-signing function. Attackers could use this bug to sign a program, and make it appear as if it is from a trusted source, without the user ever knowing about the adversary’s actions. A security researcher was even able to create a proof of concept “Rick Rolling” the NSA’s website to display a popular internet meme. The NSA’s statement says that it believes “the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable.”
                Snort SIDs: 52617 - 52619

                Title: Emotet continues to grow, spike in spam to start off 2020 
                Description: Emotet continues to infect individuals and organizations all over the world, but Cisco Talos recently discovered a new relationship between Emotet and the .mil (U.S. military) and .gov (U.S./state government) top-level domains (TLDs). When Emotet emerged from its summer vacation back in mid-September 2019, relatively few outbound emails were seen directed at the .mil and .gov TLDs. But sometime in the past few months, Emotet was able to successfully compromise one or more persons working for or with the U.S. government. As a result of this, Talos saw a rapid increase in the number of infectious Emotet messages directed at the .mil and .gov TLDs in December 2019.
                Snort SIDs: 51967-51971, 52029

                Most prevalent malware files this week

                SHA 256:85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.85B936960F.5A5226262.auto.Talos

                SHA 256: 1c3ed460a7f78a43bab0ae575056d00c629f35cf7e72443b4e874ede0f305871
                MD5: c2406fc0fce67ae79e625013325e2a68
                Typical Filename: SegurazoIC.exe
                Claimed Product: Digital Communications Inc.
                Detection Name: PUA.Win.Adware.Ursu::95.sbx.tg

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: c0cdd2a671195915d9ffb5c9533337db935e0cc2f4d7563864ea75c21ead3f94 
                MD5: 7c38a43d2ed9af80932749f6e80fea6f
                Typical Filename: xme64-520.exe
                Claimed Product: N/A 
                Detection Name: PUA.Win.File.Coinminer::1201

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
                MD5: 799b30f47060ca05d80ece53866e01cc 
                Typical Filename: mf2016341595.exe 
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201

                Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

                Threat Roundup for January 17 to January 24

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 17 and Jan. 24. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Win.Packed.TrickBot-7541396-1 Packed Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Dropper.Qakbot-7541405-1 Dropper Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
                Win.Packed.Nymaim-7542552-1 Packed Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Malware.Azorult-7541464-1 Malware Azorult is a banking trojan that attempts to steal credit card data and other sensitive information to facilitate cybercrime.
                Doc.Malware.Emotet-7544675-1 Malware Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Worm.Vobfus-7541859-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                Win.Trojan.XpertRAT-7550253-1 Trojan XpertRAT is a remote access trojan that provides an attacker with the ability to access an infected machine remotely and has the ability to steal sensitive information like usernames and passwords. XpertRAT has been around since 2011 and consists of a core component and multiple modules, all written in Delphi.
                Win.Trojan.Upatre-7549404-0 Trojan Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
                Win.Packed.Passwordstealera-7544289-0 Packed This malware has the ability to harvest stored credentials, keystrokes, screenshots, network activity, and more from computers where the software is installed.

                Threat Breakdown

                Win.Packed.TrickBot-7541396-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: RefCount
                2
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                Value Name: Blob
                1
                MutexesOccurrences
                Global\316D1C7871E1040
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                95[.]181[.]198[.]15124
                79[.]174[.]12[.]24522
                195[.]123[.]240[.]8116
                185[.]62[.]188[.]8312
                181[.]140[.]173[.]18610
                5[.]182[.]210[.]10910
                185[.]99[.]2[.]14910
                85[.]143[.]219[.]23010
                23[.]95[.]231[.]18710
                176[.]119[.]159[.]2049
                198[.]23[.]209[.]2018
                5[.]2[.]76[.]1228
                146[.]185[.]219[.]318
                198[.]8[.]91[.]106
                92[.]63[.]105[.]1386
                5[.]182[.]211[.]446
                164[.]68[.]120[.]605
                181[.]129[.]104[.]1394
                51[.]89[.]73[.]1594
                216[.]239[.]38[.]213
                181[.]113[.]28[.]1463
                176[.]58[.]123[.]252
                116[.]203[.]16[.]952
                52[.]44[.]169[.]1352
                52[.]55[.]255[.]1132
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                teene[.]site6
                checkip[.]amazonaws[.]com4
                api[.]ipify[.]org3
                ipinfo[.]io3
                ident[.]me2
                ip[.]anysrc[.]net2
                api[.]ip[.]sb2
                ipecho[.]net2
                2cdajlnnwxfylth4[.]onion2
                www[.]myexternalip[.]com1
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org1
                myexternalip[.]com1
                icanhazip[.]com1
                wtfismyip[.]com1
                Files and or directories createdOccurrences
                %System32%\Tasks\Task Gpu health40
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt40
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp40
                None39
                %APPDATA%\DirectTools\data25
                %APPDATA%\DirectTools\settings.ini25
                %APPDATA%\gpuhealth15
                %APPDATA%\gpuhealth\data15
                %APPDATA%\gpuhealth\settings.ini15
                %APPDATA%\DirectTools\Data\pwgrab642
                %APPDATA%\DirectTools\data\pwgrab64_configs\dpost2
                %APPDATA%\DirectTools\data\pwgrab64_configs1

                File Hashes

                0143ebd2f87acf44bf4b8dc9f03ba00e7eff4d2a723e93bfb7c628a83b993f9a 06951826498d418e5f0ca33112d2cb607d738e9ccb08feaa1ce3427bffa22600 06fce1e6e9c3187d9cf087c6fe4034785f1ffaccbe9b500e424dcc03946a83da 0a1a547185e396fa877b82e7cbc716fe682a95588914944246f0b18c8828bf8f 0addc7b9d5e37d663277cdc9c15fa001ed5db6fa59263a5869b5aed99180ef02 0e4b9cea532791a825d4774d95580827667bff1e75f83b936d0e5cc3ab7236e6 16a0f1a7a0fe7277e4ef69b214b48a0c7f6a96fee6c78bf979b92fb97aed3c83 1f42082ee2954a70c60d15886366307ccacbb8080f03daa536e3fae361a46f4d 20ec1ae9bf3e33e2321f10cb230cc543792b94ecfaf358847b6b85e6d03af17f 297e4bd8eb28b69336a5d05abefd50985f7f5161c1bb08dd54a287a85123f856 2a1494652183e00b35e5566123fa3a2b3d73f9ac8a686258b4905a47a5354488 30b023cc4b072dfdef48929f92bbf283d112a92d03698b58b4c4fea402912c82 31ef497ec1ba5f2a858c92732416cff7bc1a1cdfaddef2ec539b09bbf9e83369 34610185ae8d7ccb60c2c536a2a1ed17be1b4741d2f88206f874276309b439ac 364252d2f0111a2d1bb24aaae430f57ae07c6209682b3567d5c99bbc73a2ce26 3826b709fd3add9b91d37828209ca8b8c05aa60ca2c34d82be1f4260b8188f83 38b5cf64a8cb8099d5c24d82ddd981f00941126c53b999906ddab7b4eff05b11 3c4bf379d34de653845d1efc59eb441388e99aa7e72137b5964d74467d58013f 3e206f84c4467a51a246ada113646b8dd79aebec8b2ecbd515434335db48f6f0 4172720904201256e209df95026384a4a46c1cd5f7910aa7d309633b747e37da 45a2a54c9228d8aef0ef8599c21b2b51bb4163aa02982a205c2fee36c9ffd5e3 47e90d2bd50809df1e9b1b8bc97883dbfa277a760914179cc8f8e54b58290852 4d13f83b56a619c0c34d5fa2fd1c3376ed3c3b837d626599983be29a0e31cc00 4d3eb4806824008f979eae543f41cc90e1e7dd47d95b70bb98984454974d0865 52e86752e9af7aec9c31ea3f3bb224ad02966c11bf7ef73e0eeaf4c247fd2a51
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                ThreatGrid




                Win.Dropper.Qakbot-7541405-1

                Indicators of Compromise

                MutexesOccurrences
                ocmwn22
                Files and or directories createdOccurrences
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt22
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp22
                \TEMP\437d5b4d9e4c5d8ab4615871f9e7830c.exe1
                \TEMP\385ece7d547122fba5d712c7495a6721.exe1
                \TEMP\c09a343a545e0f9e36444a847e3ad5ac.exe1
                \TEMP\c78811efdd2612e5ca25249df2cf7600.exe1

                File Hashes

                0aea1de8b679fe547239de586664d4693f8cc6cef89340b3fb161c09630f6b14 1118a488e6f39981fb9b24b1bbf3dcd9c0bde2ca79353ad231427a96e951340e 15a4c8dc1980650038b2e8823807746cadb6f106737719e8e8c14b3fcea0b8d4 1e24651cd82da5234ef6dc48f67ea123889fab0dcfe9d41c9d9e4aaba7016786 1ea2902b3b1245d195b86c48a72ea70591877f99beeb622c20bb8ec672ce2daf 298c9f7d8fb46cbf8d3d59a9b145ebbc1c27cb507e4290cd37f02e6754225ddf 2a389b7f20979df29d32ecbcfb0c290891aea90d483f29f95617c2b06dc72670 3617f78b320d1e2efa260579b7d7df9beb37fc47c4bb7d5f320d7675f18894ed 3754ca2f4e3057827092577b1385fde7f07a53f12c6ddc3d6fd5f0f9d6a1239c 457b9bd110b9ada83477e9e1b578663cc3fa5e9d8d0eea8eb41bca51ed11fe09 4c1c055f423adc3d2eed4a54602bf607ccf2562f498aca8b1f1e7e23e1054373 6e2382936ba75dc342bec4ddee3bfc1f3a608f9dfaf3146c9a23d6e3551d6e3f 8e01ab60655a87bdc2a3b56bdc84a50e1c4079555218f28ff6fdc6e1ac109e92 a73e870268c6baa9b6c1f646b7b56d96655b0e2af784be9b5de3dd618c0e8fde bec8eb12798277e788ee835a6da3873fac69a68fb9796d2f248b9b3162285869 c0a8971ffec59c7987826d4ba03fbe539263b92f90718dbdabf6cc382531e417 c78e50570a2d04460be294f5bf5626d03b21c177aa0271e0597baea65caaa2b2 ca0e1deff6b8bcdb9bd5a170529339c6582e78deaa5153db86098fe65664f7e2 cd64755ab2a51aeeefe9afb202ddc84b7f04570271f27630eaf8ea76811937a0 d119ff32920eb407b85a23c825b67454444c0b5097deae743ab8f774f5416d28 d1c307f7b14523f3fa68fbbe0c41b39c40c3a8a27db996d4b952cb7fc183a42b dd722366c1a992ad2e014c2eacb856e76f7677acee045ed552ae3b2ee05e2e99

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                ThreatGrid




                Win.Packed.Nymaim-7542552-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK 15
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                15
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}15
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}15
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}15
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}15
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}15
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}15
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}15
                Local\{888E04DB-EDDB-D2EC-5F32-1719D74FA2E0}15
                Local\{D876A547-0EDD-4A55-0873-9F0D6D3719FB}15
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                fzncuowwstw[.]pw15
                wawrgrtjcdr[.]com15
                ochirxt[.]net15
                klcbberl[.]com15
                fxcskhwr[.]in15
                vpbcco[.]net15
                mrbhs[.]pw15
                wiztdyzp[.]com15
                eqbrnmigl[.]in15
                csuaibcneix[.]net15
                lnulxvsvvl[.]pw15
                szthbpsn[.]pw15
                nokuznpxbypo[.]com15
                tthzpuipne[.]pw15
                juxrdizkivk[.]net15
                hcjihn[.]in1
                omcbnlos[.]net1
                voxrdn[.]net1
                zbztpauc[.]pw1
                caojbfvum[.]net1
                dkzexx[.]net1
                npdcqoxaepfz[.]net1
                ljhafrwlf[.]in1
                vauordi[.]com1
                bfeqxicrqaxp[.]pw1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %ProgramData%\ph15
                %ProgramData%\ph\fktiipx.ftf15
                %TEMP%\gocf.ksv15
                %ProgramData%\<random, matching '[a-z0-9]{3,7}'>15
                %APPDATA%\<random, matching '[a-z0-9]{3,7}'>15
                %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>15
                %TEMP%\fro.dfx12
                \Documents and Settings\All Users\pxs\pil.ohu12
                %TEMP%\bpnb.skg1
                %TEMP%\haqhxh.vsz1
                \Documents and Settings\All Users\po\vikog.axh1

                File Hashes

                13faed74357cf5f5a66983ce864e49d8ab3d16dc0c4c04a95888fe6ff2580b5c 1e22dbdfbcafcef6e91099b7c345a52a4f59a92fe1f8d30e333bce0d92b7c850 2c22e368525024b26e7c7d1058260093a2f380373010e6e387bea75e325c613c 36799b98d45008973435f10c8e1ba40288b92d6199e4ecec16e40e918e44d58d 3f9a8d0d084d4640a73140faf01df696531c0a6d762309655c503718b412a081 4a70f8df27631b3f76c1a6d520aa53983484e442dd79155d20101fae271e98c5 63fe06736f3fe6ef3ae4c58c89cebc9f055872cab247a707490e3c4b41ca8ff7 9938f7621ae034d3b677c1dbebeb29fe57e1e8a275856aa404d2bca260c808a4 a315a6e21350c5a9811f5006b78ffc5906e5f0c2fc1ed31af8bfc7e056f12797 a66e66ef119cb1451ba006a49417432bc8700f096adff827d4ae7bf0dae07a67 acebcce1368e7a969746cae53715768a37620dc2cfd278f4cff2b891c0d9af6c c43573752804b8f215c95dcb4ab87985cfc87010bfe459e9ab836c8dacb86f5c ccd4a7ded8fa23a750dc9437399cdc6f84964fc0fe4106b2df67ad558014b9e9 e0e5fb674a45c8d4515294b2b591860679993da4a2c48f656f206fa874a5cb98 fd65221380cfca194a1dbd9351357ee2fd0c132784385ed1ff3141c5b19a6805

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                ThreatGrid




                Win.Malware.Azorult-7541464-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\PICTURE 20
                <HKCU>\SOFTWARE\PICTURE\PICTUREPROCESSINGTOOLSV1.0 20
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                Value Name: GlobalAssocChangedCounter
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1 10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: DisplayName
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: DisplayVersion
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: VersionMajor
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: VersionMinor
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: Publisher
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: DisplayIcon
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: UninstallString
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: URLInfoAbout
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: HelpLink
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: InstallLocation
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: InstallSource
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: Language
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: NoModify
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: NoRepair
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: InstallDate
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WOTSUPER 2.1
                Value Name: EstimatedSize
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BYTEDOWNLOAD PROTECT SERVICE 9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BYTEDOWNLOAD PROTECT SERVICE
                Value Name: Type
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BYTEDOWNLOAD PROTECT SERVICE
                Value Name: Start
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BYTEDOWNLOAD PROTECT SERVICE
                Value Name: ErrorControl
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BYTEDOWNLOAD PROTECT SERVICE
                Value Name: DisplayName
                9
                MutexesOccurrences
                d19ab989-a35f-4710-83df-7b2db7efe7c5{846ee340-7039-11de-9d20-806e6f6e6963}10
                A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A10
                Global\<random guid>10
                01B1CA98-EE2E-41B3-8A2F-F319643109E52
                None1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]83[.]52[.]4020
                103[.]91[.]210[.]18711
                45[.]139[.]236[.]1410
                23[.]106[.]124[.]14810
                45[.]76[.]18[.]399
                37[.]140[.]192[.]1539
                104[.]27[.]185[.]717
                185[.]99[.]133[.]1216
                37[.]140[.]192[.]1666
                88[.]99[.]66[.]315
                13[.]107[.]21[.]2004
                93[.]190[.]142[.]793
                208[.]95[.]112[.]13
                209[.]141[.]34[.]1503
                216[.]83[.]52[.]193
                104[.]27[.]184[.]713
                183[.]131[.]207[.]662
                216[.]83[.]52[.]202
                204[.]79[.]197[.]2001
                220[.]243[.]236[.]201
                220[.]242[.]158[.]121
                104[.]28[.]10[.]31
                204[.]188[.]226[.]981
                104[.]27[.]171[.]1061
                194[.]36[.]188[.]131
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                iplogger[.]org10
                silvergeoa[.]com10
                area[.]cyp360[.]com10
                installsilver[.]com9
                confirmssystems[.]com9
                passwordkernel[.]online9
                123321123[.]fun6
                scp46[.]hosting[.]reg[.]ru4
                ip-api[.]com3
                myprintscreen[.]com3
                fbinstall[.]cyp360[.]com3
                ok2
                js[.]users[.]51[.]la2
                ia[.]51[.]la2
                budison-oklarly[.]com2
                ac[.]681776[.]com2
                yip[.]su1
                megagemes[.]info1
                termscenter[.]com1
                cleand8yv0m6g[.]top1
                newbook-t[.]info1
                Files and or directories createdOccurrences
                \TEMP\d20
                \TEMP\d-shm20
                \TEMP\d-wal20
                %TEMP%\~atmp11
                %ProgramData%10
                %TEMP%\$inst10
                %TEMP%\$inst\2.tmp10
                %TEMP%\$inst\temp_0.tmp10
                \TEMP\config.ini10
                %ProgramFiles(x86)%\wotsuper10
                %ProgramFiles(x86)%\wotsuper\wotsuper10
                %ProgramFiles(x86)%\wotsuper\wotsuper\Uninstall.exe10
                %ProgramFiles(x86)%\wotsuper\wotsuper\Uninstall.ini10
                %ProgramFiles(x86)%\wotsuper\wotsuper\wotsuper.exe10
                %ProgramFiles(x86)%\wotsuper\wotsuper\wotsuper1.exe10
                %SystemRoot%\wotsuper.reg10
                %ProgramData%\freebl3.dll9
                %ProgramData%\mozglue.dll9
                %SystemRoot%\SysWOW64\config.ini9
                %APPDATA%\Mozilla\Firefox\Profiles\1LCUQ8~1.DEF\cookies.sqlite-shm9
                %APPDATA%\Mozilla\Firefox\Profiles\1LCUQ8~1.DEF\cookies.sqlite-wal9
                %ProgramData%\msvcp140.dll8
                %ProgramData%\nss3.dll6
                %HOMEPATH%\pwordkrn.exe6
                %ProgramData%\softokn3.dll5
                *See JSON for more IOCs

                File Hashes

                0034790f990238fe8e57d28800a8498bce5bdf3604cc56fc670ac5d65c6e5e08 249de6212474007cb9cf42a68939fae2f769f2097a57afa664a4780b2641228e 275eb1700ac5dbe3b62ce16a06409c4866728f72ee9e5c10f43beba094038475 48ab169b253421d2ece727161c6ff26c47836d5905fa685812010c6de4b75b27 681297a82e85822a1cb5a58296a515151f417bb8aafe5d4505d2219b4fe61438 70576eb8cd35093b1ef56da7fb39bf88f32c57f410484d613b5028cecbb1b0df 743238d01b2f968044ee2b175c61574aca518874c67201146f19df5a53c3b0d2 7e71eda28ecca392d6e86a9004c3bd38c7cbdf79399e90742feac5fa066aba66 a6abe3b046e8bdcfb33fa9776195fbb89a3e4218f6bb281aedd15f28fe1f4818 bad303ab4b68379128469e3be92d5bf3b23ec7bb285a260b1fadeead3fe43bbf bc55f494359805cc4d89f6812c3a1a14d593d9ead82267dcae7029dcbddebcab be2201940b246ae89cae4f6d0a691a1092289868230f1da85f9142d180709744 c66fe1a34cbe3a966ecbd1beb87b425e004a4a21f38bd483c2c10ef7c77e5e0b c8a3cb15adb8639ceaa0092b3a7f69f362cb48bcd96ffd18d362a38a1fbfff41 d39e3e47d12347b27f81a75751145bf6915b6a12caffa2dc4b0981666339c3bb e0b5780569ee0983401f373b03909ba27babc52c258eb150939e0b9d337de594 eaa8bbd1fee19574eeed935d8756223876c64d3ca49b372c04b98b6912108586 f34e64f4e7be7e6b2c665700ec513b4783e570a4de2087ac9511f152d812b2f5 f4b4158338fe30016fb7034b70bc3babcee3be21ea5c214451d83e3cb31233d8 fdbad2f7d47f6b60b5eb5a7110c150bc89932fdf47d224a4e31d8f091ee8dc58

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                ThreatGrid




                Doc.Malware.Emotet-7544675-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA 7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: Type
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: Start
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: ErrorControl
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: ImagePath
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: DisplayName
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: WOW64
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\FUNCSITKA
                Value Name: ObjectName
                7
                MutexesOccurrences
                Global\I98B68E3C7
                Global\M98B68E3C7
                Global\Nx534F51BC1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                190[.]17[.]44[.]487
                70[.]123[.]95[.]1807
                74[.]220[.]194[.]307
                59[.]120[.]5[.]1543
                100[.]66[.]142[.]613
                100[.]108[.]145[.]2003
                100[.]87[.]27[.]1803
                100[.]83[.]251[.]1313
                100[.]90[.]84[.]1063
                17[.]36[.]205[.]742
                74[.]202[.]142[.]712
                24[.]232[.]0[.]2272
                200[.]45[.]191[.]162
                74[.]202[.]142[.]98/312
                51[.]77[.]113[.]1002
                98[.]103[.]188[.]701
                200[.]107[.]202[.]331
                67[.]212[.]168[.]2371
                85[.]115[.]130[.]1011
                206[.]126[.]59[.]2461
                162[.]211[.]85[.]1711
                80[.]93[.]143[.]501
                203[.]130[.]9[.]81
                192[.]185[.]21[.]1501
                192[.]185[.]2[.]2051
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                jayracing[.]com10
                rcmgdev44[.]xyz3
                demu[.]hu3
                itconsortium[.]net3
                josemoo[.]com3
                smtp[.]prodigy[.]net[.]mx2
                smtp[.]fibertel[.]com[.]ar2
                smtp[.]infinitummail[.]com2
                smtp[.]arnet[.]com[.]ar2
                smtp[.]dsl[.]telkomsa[.]net2
                mail[.]1and1[.]com1
                smtp[.]tcc-la[.]com1
                smtp[.]indisa[.]cl1
                mail[.]cemcol[.]hn1
                mail[.]cobico[.]co1
                cowealth[.]com[.]tw1
                mail[.]an-car[.]it1
                mail[.]argo[.]ge1
                smtp[.]1und[.]de1
                mail[.]fracma[.]co1
                mail[.]castel[.]ge1
                smtpvip[.]reis[.]mx1
                mail[.]stscambodia[.]com1
                smtp[.]netvoice[.]com[.]ph1
                mail[.]mygrande[.]net1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\229.exe10

                File Hashes

                0c9ef55223b45ef57ef38a98bbb1675f4bb284af6a56f9157e4c86b864360719 412e213dd241031a172b48a422bbcf8e3e0b45e89a984fc45028fa96299f459a 42e61e25f4b3d2b57fa973344417602c6e43537eeef6f7fdf32f9d34bf8f3604 6c4c28356c53832f5ab0a5acc2a14f4f907188655dd315bf1e18581c4c48337e 70dc1946d77ef19522ccc9d18629e8777283a715d3fa055ff7f0559331db3e26 81c603712c753de8200c0cb6dd28d6b37ac2873b968bdf8929ca129d35195d4a ac2b7c9be4cf9cf5b2e4a564a5fa312243e665dd31463448c975f38664de56f2 ca1e6ff31df37242aa2e09a4cb29b7546dd408c0b0de26dd2a946183eea64b95 d676ecd3750ce75f42ed0c6958863e01ffbf92b5169c1899513b0affc952b9de dfe5f28fde5c483ba38aff7def0df3938ae4837acb81cba696f57159fa6fa0b6

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Worm.Vobfus-7541859-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 12
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: WindowsDefender
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: WindowsDefender
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: WindowsDefender
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: WindowsDefender
                7
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: update
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: update
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: update
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: update
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: BWOJ39VGEPRBJ
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: BWOJ39VGEPRBJ
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: BWOJ39VGEPRBJ
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: BWOJ39VGEPRBJ
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: IOAUWN4A3W4AA
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: IOAUWN4A3W4AA
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: IOAUWN4A3W4AA
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: IOAUWN4A3W4AA
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 8L9ROXIFMECH6
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 8L9ROXIFMECH6
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 8L9ROXIFMECH6
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 8L9ROXIFMECH6
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: HE8MRP3X92SVO
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: HE8MRP3X92SVO
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: HE8MRP3X92SVO
                1
                MutexesOccurrences
                <random, matching [a-zA-Z0-9]{5,9}>7
                HCQZLMB9VOLD1
                1HZYRMUIRQ1
                REYUIW9NA8LY1
                bv1lr789568351
                MUA192KRR0N1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                172[.]217[.]11[.]462
                172[.]217[.]9[.]2062
                188[.]138[.]114[.]611
                178[.]128[.]111[.]1831
                77[.]79[.]13[.]2041
                195[.]201[.]196[.]1151
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]altervista[.]org1
                divine-vps[.]com1
                moddersondazone[.]net1
                khant[.]info1
                applesupportforums[.]com1
                underground-logs[.]tk1
                www[.]emmek[.]altervista[.]org1
                khant[.]me1
                imscuh[.]com1
                rtrforums[.]com1
                tripsschool[.]netfirms[.]com1
                Files and or directories createdOccurrences
                %TEMP%\windefender.exe.jpg6
                %TEMP%\update.exe.jpg1
                %TEMP%\8c5gucto.exe.jpg1
                %TEMP%\f5qrnr2jfk.exe.jpg1
                %TEMP%\52qof1hoy2.exe.jpg1
                %TEMP%\dvpiit26.exe.jpg1
                %TEMP%\windefender.jpg1

                File Hashes

                171ab79cd58e2be6aeada2c137c8ab74eecf082ae2a80358e84fccd254bf760b 312b904aa6b90418558a7e9b8d25ad1f84a2ae413e542fb6a06b7aae9567957d 39154850d888f42f4a04fc19887691101aadda306311605b59aa0997ae9fd4cc 3bd1ed52b57837cbc2b072c23f9de501a7d0ed5bd3ce93d3ca7022aada5ea13f 4ca9d8cd2b950485301fb885cc1d954e7c91c03c4fd21209fe90d68426a0b073 594e3dde160ff061cabb630e7c6d8c9584e45f61bc446b03e3546d2104b25d1a 59656eb7ffde7b461f49735aa9717ab09ff883780522afa1de8d724928108b75 80f8410a8f0042edad98dc1636d6cbd6c989d5159454d86fc212eb647d413850 87a2371dc38ca7b11010496c3e4c908379596ddbd5b2eb0332817a8d18e71ea0 a92e67a93899f548c68b5d667650b0749a7ff56799ba7afd5d393bef97f946a5 e487727b0d5121e8efc6f51ffe24ce54e40f923b0d9916284b988efc4a57269e eb03d095df6d765469d088cefbd320b6cee40bc97cf1bd75ad46a115f2d3697b

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                ThreatGrid




                Win.Trojan.XpertRAT-7550253-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                13
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UACDisableNotify
                13
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\X 13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 13
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5
                13
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5
                13
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\X\RUN 13
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\X\RUN
                Value Name: NOME
                13
                MutexesOccurrences
                P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G513
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                joeing[.]dnsfor[.]me13
                Files and or directories createdOccurrences
                %TEMP%\Administrator.bmp13
                %APPDATA%\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G513
                %APPDATA%\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G513
                %APPDATA%\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5.exe13
                %APPDATA%\P4U8M5X3-N0E7-O7S5-B1Y3-J7Q6J4S0G6G5\ut13
                %TEMP%\Westminster8.exe13

                File Hashes

                2bc7aa28fb4cab2aa55e683fa452125a29fdeaf2c8a8ad09801581ac164f6e04 33151408dca938762e705906a4da851f01d38e05ea539bc4a6b56745d1464933 3464a96f3efe37c2c852c581576c75b5f7fce51e06473317e3a927867959cd9e 395a63b07a1275522ed8867d6402abba3b81bfcafedfdd4cc42d9d7b12b03868 45df177c92177a1766adb8e57b49b588f80d5534a84f0fc91d3ce296c7793052 75dc81fe9a84e7abecc35834a59574fa6975df9dafede10ec32090c054b2a7e4 8cd515edb041f9591d71885cf5e51253f9c0569fcfae06a73e14dbfef7d6f5ef 964354f86010cf35a07fc0e8ac11c0e653409338c42cfc132d8876b0fc64d3e7 a78e29a18072a0287261c696aac850b3a2f67087e1167f7b867eff84075655ab ab4e72ae86ecc5ec5fd7fe5e727ebc069c4803fd34e975c6054fa85cf4a73f8a af2f58c80a13d01953ff089503666772bbafa371fe61eadd8561aca0026ff856 ce56803cae1069908fc47087d6d8fbd1278ae72bc36966694e35da564822446e dc5771d054a00e41f0cceb59ab59bf154b5e56d6fbff9db7a2713a5728254bbb

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Trojan.Upatre-7549404-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: a2fc9eb
                8
                MutexesOccurrences
                qazwsxedc9
                Local\MSCTF.Asm.Mutexsssssssssssss18
                Local\MSCTF.CtfMonitorInstMutexsssssssssssss18
                Global\b54c4621-3b1b-11ea-a007-00501e3ae7b51
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                93[.]118[.]36[.]2358
                197[.]255[.]147[.]1468
                136[.]243[.]69[.]2208
                81[.]169[.]145[.]678
                178[.]254[.]50[.]1568
                202[.]172[.]26[.]268
                134[.]0[.]11[.]1258
                157[.]7[.]107[.]1748
                213[.]186[.]33[.]37
                46[.]105[.]57[.]1697
                166[.]62[.]113[.]1207
                46[.]30[.]215[.]337
                212[.]48[.]68[.]637
                208[.]117[.]38[.]1437
                5[.]39[.]73[.]1587
                3[.]114[.]58[.]1846
                37[.]58[.]63[.]2316
                81[.]19[.]159[.]646
                198[.]199[.]67[.]866
                185[.]227[.]80[.]586
                211[.]1[.]226[.]763
                192[.]35[.]177[.]642
                203[.]189[.]109[.]2402
                213[.]186[.]33[.]871
                46[.]166[.]187[.]641
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                schema[.]org8
                api[.]w[.]org8
                gmpg[.]org8
                recaswine[.]ro8
                pendletonforhouse[.]com8
                ecocalsots[.]com8
                www[.]riesa[.]de8
                gestes-argile[.]com8
                feuerwehr-stadt-riesa[.]de8
                treatneuro[.]com8
                national-drafting[.]com8
                dupdiesel[.]co[.]za8
                has-gulvakfi[.]com8
                domaine-cassillac[.]com8
                cerenalarmkamera[.]com8
                definitionen[.]de8
                eatside[.]es8
                takatei[.]com8
                www[.]takatei[.]com8
                themeisle[.]com7
                www[.]ovh[.]co[.]uk7
                plexipr[.]com7
                paintituppottery[.]com7
                viralcrazies[.]com7
                camlavabolari[.]com7
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\Start Menu\Programs\Startupx\system.pif8
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startupx\system.pif8
                %APPDATA%\a2fc9eb8
                %APPDATA%\a2fc9eb\ea2fc9.exe8
                %APPDATA%\8ddb21f\88ddb2.exe5
                %HOMEPATH%\HELP_FILE_430D48DC3.png1
                %HOMEPATH%\HELP_FILE_530D48DC3.html1
                %HOMEPATH%\HELP_FILE_530D48DC3.png1
                %HOMEPATH%\HELP_FILE_630D48DC3.html1
                %HOMEPATH%\HELP_FILE_630D48DC3.png1
                %HOMEPATH%\HELP_FILE_730D48DC3.html1
                %HOMEPATH%\HELP_FILE_730D48DC3.png1
                %HOMEPATH%\HELP_FILE_830D48DC3.html1
                %HOMEPATH%\HELP_FILE_830D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_130D48DC3.html1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_130D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_230D48DC3.html1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_230D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_330D48DC3.html1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_330D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_430D48DC3.html1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_430D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_530D48DC3.html1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_530D48DC3.png1
                %HOMEPATH%\Local Settings\Application Data\HELP_FILE_630D48DC3.html1
                *See JSON for more IOCs

                File Hashes

                04e7c9d7cb59d57085636e06d1e30098ab81f85805bc9ac6c4c9270d697d6e96 434ff7bfd6a752f3c56c20d8a7e8853a94e99be9d112442eed257ee42800e957 49a97e5e68d188e423af3eebe2b3a62d2a285006d42c5dfd10cfdbe534534c91 61e76a0e801cb7a30221f4075ec8c5fc733cc7b3d5bda520551b8bd053f101d2 8f237cc28360ef130227b92323a986c3136242600fc2188b92c48fad5df2f7fe 98db4c353cc79a3b9bfae516ab56fab19166d2fed1f108cbff33447cc2feac33 a27d8ad3e0ef1d792cc6504a41d3eaecf11802d03fdbfb08c811217759f2d965 de940e24beca778c6d8afd8b625eeaff0549342ce061fd75ce817d2d5add612c e67b98c9041d13d17904f65f875e840c7f40cbf60fdc25c0767fefc5c57cb634 eccb6d79ce6669a5e4fb1f394f920224fe40d0dd782c8dd12cf4004c81c32765

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Packed.Passwordstealera-7544289-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Quasar Client Startup
                12
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: java
                4
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Java
                4
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: error pending
                2
                <HKCR>\LOCAL SETTINGS\MUICACHE\\52C64B7E
                Value Name: LanguageList
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows startup
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: NET framework
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: steam
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\\WINDOWS
                Value Name: Id
                1
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\\WINDOWS
                Value Name: Index
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: NvDisplay
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                1
                MutexesOccurrences
                SwHHcMzPFPnmaghyKW2
                ymJAxrWzIz9Lmt1RL32
                UuCyPSySUiFSDdHPtO2
                sFWQsTLv8c5vk4jyO01
                tsgtBnaQMyDFZrUQIp1
                YsyBq3MBwCzQNk2qhM1
                q624fQPLA3sreuCLzt1
                N3og1f8lHLVNu6W30c1
                KckvHhqL1uihc4dCLw1
                RTzXcJcD26j9cGndLe1
                9uxtMjacj46ojfxw8Z1
                tmiYIVMkI1dD9zfRjT1
                hI0uR11aF8XGlij0wp1
                fJO2dbxEGn2ZNnVHEj1
                zqUBYqdAinRE5xYguS1
                RtX4BZD2nWkVu0prSe1
                HjjzZQZESOkAInyZch1
                cP20H0tkmTiytEkIEL1
                ixlUgkBMIocn8A96xU1
                yIKLaGMppBM6EDhhvU1
                mLvIMV7J1hOyksFGvj1
                hj0AV9bM5BIleznxOc1
                UQjK2wv6weKFSvAPxM1
                UrlxbiSJX7lUOpSRZs1
                JsMa39ctmfwcdenPhN1
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]95[.]112[.]152
                37[.]8[.]73[.]902
                192[.]69[.]169[.]251
                103[.]43[.]75[.]1051
                3[.]14[.]212[.]1731
                3[.]19[.]114[.]1851
                18[.]188[.]14[.]651
                103[.]136[.]43[.]1311
                103[.]73[.]67[.]701
                74[.]118[.]139[.]671
                213[.]183[.]58[.]521
                141[.]255[.]158[.]231
                80[.]66[.]255[.]1291
                95[.]59[.]113[.]1131
                109[.]230[.]215[.]1811
                185[.]248[.]100[.]841
                95[.]156[.]232[.]341
                88[.]150[.]227[.]1121
                23[.]249[.]161[.]1111
                36[.]84[.]57[.]2301
                36[.]84[.]56[.]391
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ip-api[.]com52
                swez111[.]ddns[.]net5
                scammer[.]chickenkiller[.]com2
                holaholahola[.]hopto[.]org2
                chrome[.]giize[.]com2
                niroshimax[.]zapto[.]org2
                0[.]tcp[.]ngrok[.]io1
                gingles[.]ddns[.]net1
                dhayan[.]ddns[.]net1
                sanchosec[.]ddns[.]net1
                apina123[.]duckdns[.]org1
                mlks[.]ddns[.]net1
                update1337[.]duckdns[.]org1
                ord1
                dike[.]duckdns[.]org1
                nirovitch[.]zapto[.]org1
                nume123[.]hopto[.]org1
                pilnaspuodas[.]ddns[.]net1
                danek56[.]ddns[.]net1
                windows13467[.]ddns[.]net1
                backtofuture[.]zapto[.]org1
                nerdicon[.]ddns[.]net1
                Files and or directories createdOccurrences
                %APPDATA%\Logs35
                %APPDATA%\Logs\01-17-202035
                %APPDATA%\SubDir28
                %System32%\Tasks\WINDOWSSYSTEMHOST22
                %APPDATA%\SubDir\Client.exe18
                %System32%\Tasks\Quasar Client Startup8
                %APPDATA%\<random, matching '[A-Z][a-z]{3,5}\[a-z]{4,6}'>.exe8
                E:\autorun.inf7
                \autorun.inf7
                %System32%\Tasks\java4
                %APPDATA%\<random, matching '[a-z0-9]{3,7}'>4
                %APPDATA%\SubDir\WinUpdate.exe2
                %SystemRoot%\SysWOW64\java642
                %SystemRoot%\SysWOW64\java64\java.exe2
                %System32%\Tasks\error pending 2
                %APPDATA%\SubDir\fileintl.exe2
                %System32%\Tasks\Windows Defender1
                %System32%\Tasks\Windows1
                %System32%\Tasks\Windows startup1
                %System32%\Tasks\WinSql1
                %APPDATA%\SubDir\WinSql1.exe1
                %System32%\Tasks\NET framework1
                %ProgramFiles(x86)%\SubDir1
                %ProgramFiles(x86)%\SubDir\Client.exe1
                %System32%\Tasks\RDPBlox Agent1
                *See JSON for more IOCs

                File Hashes

                02c9df3dec221cacfa6c97e91bee174af3022dac4588e3f494108b0cc5c9fe1e 03fa8b9de359535afb3af2914e2bd91d630b85a0596604501968b12f9187b1da 0624f9670f56e83ab5bbdf903879ffd0facb5b27b4bc53d16f5d4a560033cdf8 0668b26c7ab4e7adbdf98d515b0a58ae06f5e89d67e5c9fa02a9ee7bea8a477a 09666ba370e36246342d7093b6c63b5a8ef10966fa78b79bcf570659a0dd2f77 0c598a620e83a6e0ee892aa5090e2dbbf36dde886620647be8c27bab0b94859e 0ed3feae6696b3986ae492d85fef56e2ec226d7b010154470b433bfc357f861b 189c7ebae4cdd338f844ba5adc3ecc322294a7be438a3a72eea69468ac068eb3 192a0440574068fd9297086e0cf05a57d8ae4af03045d6be4c0b4f21bd636a72 19b8ed7ab551d89467c665ee7f509fe3ece9101679b5302cdc70c6d3a8c12ee6 26f294e691ec271d761a167704d495ca8bdc4d66cb0cd332a0e49313164988b1 27473eaee1e66c3a9581d17b4ff94d481c31f23032b810493d99a23eebee6b22 29f55d706d0e7390d7e77aceae79909654b4868179ff6913f28d78df945a5a51 2b3eb6cf09691b169c603cbeba508c4056eb6c8d1f12abe11b3c11c77b130604 2d3cef89943a95c57418be1996431f9803c6df4a9307d1890a3885c8794986af 3068250bcb0e8ffcee254c2da91e2696703bf36cfb195415aa3b0c454601dad1 3204ad689f3939402dae9670970c55c684b559ce1a8ba5726eb3e143a0beea4a 3622a2b3adfc7cbc7727a7a13dc6c895290c6f6fc93c8e64e753e2041cafed16 362ec0bc0738f083dcdbf9472ebf4e6227b33d093c9dacf1093607fa3b53ea01 38c56bc6885e546caab8faa8f9b75a6b1d82a60f686038ccaf72f148187fb1ee 3baa2fb31a69683a134a24d5a5a05aa1619ce65ba9811e34d254a5efd708580c 42ee0201d3a74bf465daef9178042cc7fb28bab5b932e6d7a865cbc11fce6c94 472736830d9114c83bad680bc95c138d3951213d1429e314749b18083ac5cdf2 4d583b00c74ef261c7c20e53563b521ddda7b85bf5b1ac98463af0c6488a55d0 54b3c135aa1fe9b870209d36e286df1d7dc4e6182b664285f3564c573dbbdc89
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (8483)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Atom Bombing code injection technique detected - (795)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Excessively long PowerShell command detected - (576)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Process hollowing detected - (288)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Kovter injection detected - (264)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Gamarue malware detected - (193)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (90)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Dealply adware detected - (61)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Reverse tcp payload detected - (13)
                An exploit payload intended to connect back to an attacker controlled host using tcp has been detected.
                WinExec payload detected - (13)
                An exploit payload intended to execute commands on an attacker controlled host using WinExec has been detected.

                Threat Source newsletter (Jan. 30, 2020)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                Be sure to pay close attention Tuesday for some changes we have coming to Snort.org. We’ll spare you the details for now, but please bear with us if the search function isn’t working correctly for you or you see anything else wonky on the site.

                And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

                Upcoming public engagements

                Event: A World of Threats: When DNS becomes the new weapon for governments at Swiss Cyber Security Days 
                Location: Forum Fribourg, Granges-Paccot, Switzerland
                Date: Feb. 12 - 13
                Speakers: Paul Rascagnères
                Synopsis: In this presentation, Paul will present two threat actors Cisco Talos has been tracking who are manipulating the DNS system. On Jan. 22, 2019, the U.S. DHS published a directive concerning this attack vector. We will present the timeline for these events and their technical details. One of the actors is behind the campaign we named “Sea Turtle.” This actor is more advanced and more aggressive than others we’ve observed in the past. They do not hesitate to directly target registrars and one registry. The talk will break down these two actors and the methodology used to target the victims.

                Cyber Security Week in Review

                • State-sponsored actors linked to Turkey are believed to be behind a recent wave of cyber attacks targeting governments in the Middle East and Asia. The attackers are using a technique called DNS hijacking that shows similarities to the Sea Turtle actor Cisco Talos discovered last year. 
                • Facebook executives backed the security of its WhatsApp messaging software, saying it could not have been at fault for the hacking of Amazon CEO Jeff Bezos’ phone. Reports state Bezos was sent a malicious video through WhatsApp and opened it, leading to the installation of spyware. However, Facebook laid the blame at the feet of Apple and iOS’ security. 
                • The Bezos incident has led to many wealthy individuals reaching out to cyber security vendors for private assistance with security. For example, one group is working on an information-sharing platform for cyber attacks targeting members of royal families across the globe. 
                • Dozens of United Nations servers and user accounts were breached during an August cyber attack, according to new leaked reports. Staff members working in the UN’s Geneva, Switzerland office were reportedly told to change their passwords but were not made aware of the breach. 
                • The Japanese government adopted a series of new policies this week designed to protect government services from a cyber attack during the upcoming Summer Olympics. A special panel called on infrastructure and public transportation services to investigate any potential vulnerabilities in their systems due to the use of internet-of-things devices, and report those flaws immediately to an administrator. 
                • Cisco launched a new security architecture platform for IoT devices this week. Cisco Cyber Vision provides users with software and services backed by Talos’ intelligence to identify threats and vulnerabilities in IoT assets in real-time. 
                • Facebook agreed to pay $550 million as part of a settlement of a class-action lawsuit in Illinois. The suit alleged Facebook violated a state law by using facial recognition technology to auto-tag users in photos without obtaining their consent. 
                • The actor behind the Maze ransomware dumped a large amount of victim data online this week, including information from an Ohio community college and a grocery store chain in Michigan. Administrators of Maze’s website said in a message that they were sparing recent victim Parkland, Florida, but still leaked some data to prove that they were hacked. 
                • The latest security update to iOS allows users to disable a location-tracking feature used by many apps. The latest patches also fixed a critical remote code execution vulnerability in the WebKit browsing engine. 

                Notable recent security issues

                Title: Cisco urging users to update Firepower Management Center immediately to fix severe bug
                Description: Cisco disclosed a high-severity vulnerability in its Firepower Management Center last week that could allow an attacker to bypass the usual authentication steps. The vulnerability — which was assigned a 9.8 severity score out of 10 — exists in the way Firepower handles LDAP authentication responses from an external authentication server. An attacker could exploit this flaw by sending a specially crafted HTTP request to the device. Users are also encouraged to turn off LDAP configuration on their devices. Cisco also disclosed seven high-severity flaws and 19 medium-severity security issues in some of its other products, including Smart Software Manager.
                Snort SIDs: 52627 – 52632, 52641 - 52646

                Title: Exploitation of Citrix vulnerability spikes after POC released, patches followed
                Description: Citrix rushed out a patch for its Application Delivery Controller (ADC) and Citrix Gateway products after proof of concept code leaked for a major vulnerability. The company first disclosed CVE-2019-19781 in December, saying a patch was forthcoming. But security researchers have noticed an uptick in exploitation attacks, forcing Citrix to move up its timeline.
                Snort SIDs: 52620

                Most prevalent malware files this week

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.85B936960F.5A5226262.auto.Talos

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: c0cdd2a671195915d9ffb5c9533337db935e0cc2f4d7563864ea75c21ead3f94 
                MD5: 7c38a43d2ed9af80932749f6e80fea6f
                Typical Filename: xme64-520.exe
                Claimed Product: N/A 
                Detection Name: PUA.Win.File.Coinminer::1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: d91abcd024d4172fadc5aa82750a18796a549207b76f624b8a9d165459379258 
                MD5: a917d39a8ef125300f2f38ff1d1ab0db
                Typical Filename: FFChromeSetters
                Claimed Product: N/A
                Detection Name: PUA.Osx.Adware.Macsearch::agent.tht.talos

                Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

                Threat Roundup for January 24 to January 31

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 24 and Jan. 31. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Doc.Downloader.Emotet-7561073-0 Downloader Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Ransomware.TeslaCrypt-7561199-1 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
                Win.Malware.Cerber-7561026-0 Malware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns other file extensions are used.
                Win.Packed.njRAT-7561028-1 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
                Win.Packed.Kuluoz-7561668-1 Packed Kuluoz, sometimes known as "Asprox," is a modular remote access trojan that is also known to download and execute follow-on malware, such as fake antivirus software. Kuluoz is often delivered via spam emails pretending to be shipment delivery notifications or flight booking confirmations.
                Win.Trojan.SmokeLoader-7562031-1 Trojan SmokeLoader is malware primarily used to download and execute additional malware. Read more about this threat on our blog at https://blog.talosintelligence.com/2018/07/smoking-guns-smoke-loader-learned-new.html.
                Win.Malware.Nymaim-7565328-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                Win.Packed.ZBot-7563206-1 Packed Zbot, also known as Zeus, is a trojan that steals information, such as banking credentials, using methods like key-logging and form-grabbing.
                PUA.Win.File.Dealply-7563212-0 File DealPly is an adware program that installs an add-on for web browsers and displays malicious ads.

                Threat Breakdown

                Doc.Downloader.Emotet-7561073-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID 5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: Type
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: Start
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: ErrorControl
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: ImagePath
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: DisplayName
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: WOW64
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
                Value Name: ObjectName
                5
                MutexesOccurrences
                Global\I98B68E3C5
                Global\M98B68E3C5
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                100[.]98[.]237[.]17915
                100[.]100[.]159[.]9315
                100[.]67[.]234[.]6215
                100[.]121[.]59[.]23315
                100[.]105[.]91[.]14515
                186[.]138[.]186[.]745
                35[.]203[.]98[.]505
                35[.]214[.]151[.]755
                173[.]194[.]205[.]108/313
                51[.]77[.]113[.]1003
                190[.]24[.]243[.]1863
                176[.]9[.]47[.]532
                193[.]70[.]18[.]1442
                17[.]36[.]205[.]742
                74[.]202[.]142[.]712
                86[.]96[.]229[.]292
                74[.]202[.]142[.]332
                200[.]44[.]32[.]432
                74[.]202[.]142[.]512
                172[.]217[.]6[.]2112
                196[.]43[.]2[.]1422
                123[.]58[.]177[.]2392
                74[.]202[.]142[.]252
                94[.]23[.]252[.]1812
                185[.]224[.]136[.]62
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                cliniquefranceville[.]net20
                institutpediatriesociale[.]com20
                cool-game[.]info15
                abakonferans[.]org15
                cnarr-tchad[.]org15
                imail[.]dahnaylogix[.]com2
                smtp[.]prodigy[.]net[.]mx2
                smtp[.]amilcargo[.]com2
                smtp[.]infinitummail[.]com2
                mail[.]cantv[.]net2
                smtp[.]alestraune[.]net[.]mx2
                smtp[.]saix[.]net2
                smtp[.]dsl[.]telkomsa[.]net2
                gwsmtp[.]lgdisplay[.]com2
                smtp[.]pangia[.]biz2
                mail[.]suntakpcb[.]com2
                smtp[.]grupobiblioteca[.]es2
                mail[.]1und1[.]de1
                smtp[.]mail[.]pjud1
                mail[.]ofsnt[.]com1
                smtp[.]svacv[.]es1
                smtp[.]roteisa[.]es1
                mail[.]ebrou[.]az1
                mail[.]assets[.]cl1
                hotelancor[.]com1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\976.exe20
                %TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp17
                %TEMP%\tst7C.tmp1
                %TEMP%\tstBC.tmp1
                %TEMP%\tstE.tmp1

                File Hashes

                020514ef776f7380cafd8d2999591c75e0d476fc139450d9ac6fdfe09dd7ae87 0b77b17216fc7fb3b5de978762f07a063f722709597d0444aa2625123b8925a8 25efcc40c30bdfc1415f61c5fa2da3a569c7f4a511933bb0b898292367ca6804 2ef37c6a7f53e69a4e81613d72c21e1bc4413d4c3ebfbdb59f4c5a43b7233ae2 339e0f2df55ba72558ab93082fbb5ef218fe8527611c2c1961a4506d7c6521c4 44713e481564f2ce7a930e43bcdda80390718b92301f85cb575098959de0f6e1 44b91893a8d2d4df847664829c426f8fa0f1f3b565b0614bcf958e18795bf144 44bcf15f4888850c235f6e5e7b88bb357a3be71e4b8b22cf9cbaa7ecadbce81c 52c9a08e9df80b7b3ee5dcba625f097da1ad214cad2fb488dd4ff5296f598a4d 544b49bce1aeac4879cdcd5526cab45257ada596d9a32b3cbd254b7cb5bab381 6591f298762dac4578f9a738d736e65002adb412139af02c8cdf129ea1eb96ad 6cfb6058d1b0f8aa7927a40680c7fcd88e0c3f67cdfc2b271af7823dd89754a3 70084c2ceb78bd84337fbbfdb4765d5cfcf58a003b9d39b07c4e1ca9e7e1291d 7d6b5fa35c763390dc6187b13dae9d0248b6adacdd1b3ecd57dabd29e6aeca22 b072a08b5c35f8fb107b90ee815584ac4f7b24bd6ae30a803717f1f3fdfbeaea ca7b1a3d7db2feeb5548928ff6adb85fdb993b11795f88fed56ec7649beef850 d4b2aaebb6b4c3413610303cd78a4c7a3c57d6d269e775421881f48d7e37b898 d97abe68b3f17ac6ed03f44542568c5fc3f1586ff71a618202a6d045ed296ccf f44dadeff2a79d2ce69d0e7f8c63b7fac1bd972306dc7f803440a6378b9af58c fa60f451bb2be89d13963f75bcfc165868a5fa32d9752debbf2f077916884ac5

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Ransomware.TeslaCrypt-7561199-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLinkedConnections
                21
                <HKCU>\SOFTWARE\XXXSYS 21
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                Value Name: CheckSetting
                21
                <HKCU>\SOFTWARE\XXXSYS
                Value Name: ID
                21
                <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'> 21
                <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'>
                Value Name: data
                21
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                20
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: clycoowjblev
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xcdjaxwnjnyv
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: kdkrjkoxcoox
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: jylmwtguxgkt
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ookfknruoagc
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: kjayrvnavhux
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xlfrocgqtuck
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: rjopbftidbxn
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: untudrlkcqaf
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: exoxvooruudo
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: itbqxmjmhgli
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ngtpiwrksqfm
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ajcdjvtakwtb
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: nhflhnkqeiix
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: sllccxaietxc
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: tauqjbughujc
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: pdfnqsbitrak
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: awjcujlsmtrl
                1
                MutexesOccurrences
                ityeofm9234-2342321
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                204[.]11[.]56[.]4821
                109[.]73[.]238[.]24521
                85[.]128[.]188[.]13821
                162[.]241[.]224[.]20321
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                en[.]wikipedia[.]org21
                www[.]torproject[.]org21
                tt54rfdjhb34rfbnknaerg[.]milerteddy[.]com21
                gwe32fdr74bhfsyujb34gfszfv[.]zatcurr[.]com21
                tes543berda73i48fsdfsd[.]keratadze[.]at21
                music[.]mbsaeger[.]com21
                surrogacyandadoption[.]com21
                imagescroll[.]com21
                worldisonefamily[.]info21
                biocarbon[.]com[.]ec21
                stacon[.]eu21
                Files and or directories createdOccurrences
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I0ZU5JT.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I478AKJ.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4FI238.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4FKVBH.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I4QK3KJ.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I5QX7W9.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I77RW1L.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I7J37KF.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I9NSD58.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IANXEE8.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IC5NB1M.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ID60W3E.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IIUTK07.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJE160U.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IKAVPAE.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IL2NS3P.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$INKC8CM.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IP8M1EE.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IPDP9E0.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ISIYA4I.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IV54ALI.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWK2JPN.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWYYKMD.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXC3P46.txt21
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IZ7KADN.txt21
                *See JSON for more IOCs

                File Hashes

                0bdadbb588f8cfc714bec1feb439cd5e06ebbfe33a1cb5676faad4d85304dd0b 11a166c4e1ecbe40cfc39cc03c57aafe2f812f2187a0a0d1e27c03ac932c869c 23d00f9302a58aa9903bafc850ed358fab58eb2ef82b8aa07515c22a558d23b7 335db66a2abb1f82bd92f5b6cd74722b9d5cf209beac6dcb2eefde17603d6a99 42b4d5ce541c8784936ece2082690368223730d112f108aa8d810192c54455d9 50e2f2c53166d6cb2466aa679a2917c71c6f65eb3348d350d2e38b3aeb738ddd 6d3e58844146e35ef586f8ec5b1d470a95cf360578e1d9c8aa9e012a736dd8f3 7edeacf55c94647b6826b71e08517702712d11ac41e7e5f14957812d1c9492a5 921ebcefaff3b70bf0cdd963a1442b172ac92872d4fcf757594a5998c49404cc 9482d8782e4cdefabd0d2e14645924fa508b4d49173861360db2d3d8099b713d 9d9d7709dcb74cbb2715375e4eea839263b1dd497bb27a3c8a6ada0c10aca1b3 9f7a453c5814a6ad35b0c227e97b8a1635e9b75d779c4955ff484645857f54bb b1c341cf5a3a405102e80a476986dc624e580b2d314fb80b93e967713790268a b3e5577ffd2705637a709a961aa9add3822eacd9d492b081385b1a5ac21dd34d c2d69d1b4e4977cbc97108ca5818e6fcfed517f3480b441726d6f75ac7962d84 ca6f903670b80305f33bb4b2431a8fa5c75fd59ac3938f06cf2826a98224be57 d2bcb8683986f9f06f38569c4402804cee939f56a90b40078b819e324400eb53 dec2f3b1b9b450843c1a9a4e8a368b325356f13ab1460ee3591525aae651e3d7 eb8c433674c2ae7030f0eca0bc639abb7f9dc79077cd1be6734edc31f6208a26 ef4c0401795082d5ac654c97254401435d2f844c80cdf4b9ed4ac1601ac37061 f5aae66779652b5b4abfe575f5d7f9c1f57deb2127a21e6031b01c16b148ccee

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Cerber-7561026-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\VOICES
                Value Name: DefaultTokenId
                19
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\VOICES 19
                MutexesOccurrences
                shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
                shell.{<random GUID>}25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                31[.]184[.]234[.]0/2525
                104[.]20[.]20[.]2518
                104[.]20[.]21[.]2516
                104[.]24[.]104[.]2544
                104[.]24[.]105[.]2543
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                en[.]wikipedia[.]org19
                www[.]collectionscanada[.]ca19
                alpha3[.]suffolk[.]lib[.]ny[.]us19
                www[.]archives[.]gov19
                www[.]vitalrec[.]com19
                www[.]cdc[.]gov19
                api[.]blockcypher[.]com10
                btc[.]blockr[.]io10
                chain[.]so7
                xxxxxxxxxxxxxxxx[.]xxxxxxxxxxxx[.]xxx2
                vyohacxzoue32vvk[.]v0xn1i[.]bid1
                vyohacxzoue32vvk[.]7jrv53[.]bid1
                vyohacxzoue32vvk[.]jtdcph[.]bid1
                vyohacxzoue32vvk[.]lpnef4[.]bid1
                vyohacxzoue32vvk[.]patchmans[.]gdn1
                vyohacxzoue32vvk[.]8g1k17[.]bid1
                vyohacxzoue32vvk[.]goodslet[.]win1
                vyohacxzoue32vvk[.]23fvxw[.]bid1
                Files and or directories createdOccurrences
                %TEMP%\d19ab989\4710.tmp25
                %TEMP%\d19ab989\a35f.tmp25
                \MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\README.hta20
                %ProgramFiles(x86)%\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\README.hta20
                %APPDATA%\Microsoft\Access\README.hta20
                %APPDATA%\Microsoft\Outlook\README.hta20
                %HOMEPATH%\Desktop\README.hta20
                %HOMEPATH%\Documents\Outlook Files\README.hta20
                %HOMEPATH%\Contacts\README.hta19
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp19
                %APPDATA%\Adobe\Acrobat\9.0\README.hta16
                <dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)10

                File Hashes

                000315b74577c50c57b6572c33312f1911d3d55df50674a87ee95d88a3c0b1b2 011b56e8a271ce8853e3f3e61079c2f62ceab0424a2995fdb3c3f165d2e48666 016aecdd057f2a3881726fde3b86d252062b8891d37822b0dd48ba62ee258dbf 01a0d960c7d6cae948631473f5b39c85b490c83a362d1eeb5f36a5908127389f 040587bdd329f4db15db6f24162691421069e38324b38275449db69ac2cf2029 0430c8f48d38780eba6e1d1b31a80b9c27f3c2bc5507cee74f352546ef07fe7a 0458432198b913f1bf1180e489186297d510550ce908e1dae163a7163a7ade3f 04b76f05a328d0c650141e82da5dbecb4b8d6f0c9c1c7ad83fd111c1f915a0cc 08561dd16308a0871e531a56e834ef0feeafff902901ef7114f5901ee68735db 09172c06a88ed355a772a24f06657e126809dbd61d4b1dda3ad274fb6c7b28fa 0d6c99690789fb5c3a8f8e9f384a34e9da251533910e89df6fcd9098c5edc042 0d909f449bc71cf5ff20077c20215f0b0b358b9f7c1f6baea8fd0592e376248f 0e2aa56da62c5a9bddef4a0162ad5522b0530d2470a0aa9c39ef2c781c0f3672 0fc0d6c7c8b0661db73de058f1f30432d4fef0670dcf5a2f9416f7e2c723cfd1 0fea5d0606a587c7bfb985fbd896ac6cb4fcd6663538a8a5d1760a3171380834 1025c58e7ffef3535b7fb89a900ee09cfecfd11af644f0f5155a832dafd9a02c 1142746bc626e5ee64430de62de2b1383f193d84f4b7044ab67236c427600099 1658371db7a7e52a191522322cda7fe93d093b54e2e8cba65a5adae91a3f5bf1 17ff4c8f632ca8e4a9200e9a68f46a6d3440cac2dd7c8c4e8e1698291e8c7cd1 18192e9bffb8e02b8a3c7540f0d33d14d0f49464adaec86d86f5477a55694eb0 19f56bfaf4437ae7fc227ad695d16adc7d94a91ebf092cbac0e406e421d7c48a 1a1378b871bb6d0a00fe3c6e151d5510f28d92b00ed87031916247b91e13a216 1b7962b03eb0e7fb25f9f31d20d263e3ef6603623f8e0efc94a91a00f9b1b3f1 1bf19b2a823abd555002380c9fc5fc932c2e66826d1c949ac96050d51924ab41 1c018281e339f735fde9edb9180f3f08181f34226aefd3d43d8de6874bdd77c4
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid





                Win.Packed.njRAT-7561028-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 5cd8f17f4086744065eb0992a09e05a2
                3
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 5cd8f17f4086744065eb0992a09e05a2
                3
                <HKCU>\SOFTWARE\C2405709A54EC95CDDCC5C598F34081C 3
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c2405709a54ec95cddcc5c598f34081c
                3
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c2405709a54ec95cddcc5c598f34081c
                3
                <HKCU>\SOFTWARE\C2405709A54EC95CDDCC5C598F34081C
                Value Name: [kl]
                3
                <HKCU>\SOFTWARE\61EA4210CF20153E16C66B613536B9E0 2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 61ea4210cf20153e16c66b613536b9e0
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 61ea4210cf20153e16c66b613536b9e0
                2
                <HKCU>\SOFTWARE\61EA4210CF20153E16C66B613536B9E0
                Value Name: [kl]
                2
                <HKCU>\SOFTWARE\C550D26EE8BEBB2D926652BE861588B2 2
                <HKCU>\SOFTWARE\C550D26EE8BEBB2D926652BE861588B2
                Value Name: hp
                2
                <HKCU>\SOFTWARE\C550D26EE8BEBB2D926652BE861588B2
                Value Name: i
                2
                <HKCU>\SOFTWARE\C550D26EE8BEBB2D926652BE861588B2
                Value Name: kl
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c550d26ee8bebb2d926652be861588b2
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c550d26ee8bebb2d926652be861588b2
                2
                <HKCU>\SOFTWARE\ADOBE\ACROBAT READER\9.0\AVGENERAL
                Value Name: bLastExitNormal
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: f8782a013a20610e09216f21b705d856
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: f8782a013a20610e09216f21b705d856
                1
                <HKCU>\SOFTWARE\F8782A013A20610E09216F21B705D856
                Value Name: [kl]
                1
                <HKCR>\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\MUICACHE
                Value Name: C:\Program Files (x86)\Windows Photo Viewer\PhotoViewer.dll
                1
                <HKCR>\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\MUICACHE
                Value Name: C:\Program Files (x86)\Windows NT\Accessories\WORDPAD.EXE
                1
                <HKCU>\SOFTWARE\A283D5EDA9CD874157ADF0AF127AFD04
                Value Name: hp
                1
                MutexesOccurrences
                <32 random hex characters>11
                5cd8f17f4086744065eb0992a09e05a23
                c550d26ee8bebb2d926652be861588b2SGFjS2Vk2
                Acrobat Instance Mutex1
                a283d5eda9cd874157adf0af127afd04SGFjS2Vk1
                2AC1A572DB6944B0A65C38C4140AF2F44d4723374681
                2AC1A572DB6944B0A65C38C4140AF2F44d4723374901
                2AC1A572DB6944B0A65C38C4140AF2F44d4723374A41
                2AC1A572DB6944B0A65C38C4140AF2F44d4723374CC1
                2AC1A572DB6944B0A65C38C4140AF2F44d47233758C1
                2AC1A572DB6944B0A65C38C4140AF2F44d4723376DC1
                2AC1A572DB6944B0A65C38C4140AF2F44d4723377101
                2AC1A572DB6944B0A65C38C4140AF2F44d4723377501
                2AC1A572DB6944B0A65C38C4140AF2F44d4723378281
                2AC1A572DB6944B0A65C38C4140AF2F44d4723378B01
                2AC1A572DB6944B0A65C38C4140AF2F44d473EA61341
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                156[.]216[.]33[.]121
                141[.]255[.]152[.]561
                141[.]255[.]153[.]2121
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                imaneblueyes[.]ddns[.]net2
                mestry1212[.]ddns[.]net2
                amrfarag[.]ddns[.]net1
                njs1[.]ddns[.]net1
                emlpesa[.]ddns[.]net1
                facebock[.]ddns[.]net1
                Files and or directories createdOccurrences
                %TEMP%\server.exe4
                %TEMP%\Trojan.exe3
                %TEMP%\Trojan.exe.tmp3
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\c2405709a54ec95cddcc5c598f34081c.exe3
                %TEMP%\Chrom.exe3
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\c550d26ee8bebb2d926652be861588b2.exe2
                %APPDATA%\Adobe\Acrobat\9.0\AdobeCMapFnt09.lst1
                %APPDATA%\Adobe\Acrobat\9.0\SharedDataEvents1
                %APPDATA%\Adobe\Acrobat\9.0\UserCache.bin1
                %LOCALAPPDATA%\Adobe\Acrobat\9.0\Cache\AcroFnt09.lst1
                %APPDATA%\Adobe\Acrobat\9.0\SharedDataEvents-journal1
                %APPDATA%\Microsoft.exe1
                %TEMP%\Windows1
                %TEMP%\Windows Update.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\f8782a013a20610e09216f21b705d856.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9de3566e57ab5f0665456e9f5754a7d3.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\2f08ade869f075aa32331d77d03e57e5.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\77ca5176ec9da801e6934f1f927759d5.exe1

                File Hashes

                186dae58f108dac74fd244a34d8a508232ae314301992e52a166c2e6f82e50e3 28fa81e67c51b9ba0c71dde4b5ad4df0d3314f81deef202492be2d85a4af6c05 3335c86b6906fc3f0fc3ada7dec5fde0c10be9e8b0c20f9fe8719f2c54ff277b 41d83b4ddf1b6861b2f7b5f3fd949f208cd0bdd96966217c61b5d5ea45c3a1c4 488864edfd3a995a2733f842bdf18cdf638b1f03563fc1959da6b04c719f09d9 6e25e2b859bf13299c0c116bf94bd86ea97c470aada3fa94bc2a4522ca1a471b 70b10d403f814d4bc94e0fdaf9584563d47bb36d72a1afce40cfd0ebec1eafd9 7274ef9fd2c4bab07a9a3ca46fb0f4b37107748fb9d8632e27faeba6be597b46 77149e99944db0ebe0c44bee046dad27529a104c6b9214973fba67f707bb3566 7cf3348c2711766f5ef2222a3cc74033fa08577a023f4e69fd921acc50810fa8 a0e50a68677941f3b7e68f9d32e4d1e014dac945a2e01f6bb823e58adeb7ec09 aa74ffa3991bf176f7d9eca8da00f379f735bd2d3acd7e9dd74fc041bbf84d01 c10cfd2c2141fa2d49f0d6f1238e844b51ed3381f6c63fed03792ec90a198fce c1938290fa67d53419918fec56e9f2ee07627fd0f8c279fa7f13357c624041e7 e3b41f2a9223a9531b94c257cba97ecd5b075a04523e5f19c9bb07396097a99a f0d1321a4f4774b87d74b8d5a18be28d3dae01361f0d28be599e7bb955a140f8 fc6b24794dd8168be2adc39d831cd18ea43f7cd9e91942228df5fc70606c509e

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Packed.Kuluoz-7561668-1

                Indicators of Compromise

                MutexesOccurrences
                2GVWNQJz125
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                69[.]93[.]231[.]25218
                149[.]154[.]154[.]24918
                88[.]190[.]226[.]22317
                31[.]47[.]250[.]4116
                83[.]141[.]7[.]10212
                50[.]56[.]124[.]3510
                Files and or directories createdOccurrences
                %LOCALAPPDATA%\<random, matching '[a-z]{8}'>.exe25
                %HOMEPATH%\Local Settings\Application Data\tffgswtx.exe3
                %HOMEPATH%\Local Settings\Application Data\uhqbtmne.exe1
                %HOMEPATH%\Local Settings\Application Data\tmdejqpr.exe1
                %HOMEPATH%\Local Settings\Application Data\gesansxj.exe1
                %HOMEPATH%\Local Settings\Application Data\xfddgijv.exe1
                %HOMEPATH%\Local Settings\Application Data\sqslklnf.exe1
                %HOMEPATH%\Local Settings\Application Data\krkswwef.exe1
                %HOMEPATH%\Local Settings\Application Data\blvvvbjt.exe1
                %HOMEPATH%\Local Settings\Application Data\uswhecuu.exe1
                %HOMEPATH%\Local Settings\Application Data\stterjid.exe1
                %HOMEPATH%\Local Settings\Application Data\xuxivago.exe1
                %HOMEPATH%\Local Settings\Application Data\vhhvooxa.exe1
                %HOMEPATH%\Local Settings\Application Data\tqknmmob.exe1
                %HOMEPATH%\Local Settings\Application Data\pnitjnpg.exe1
                %HOMEPATH%\Local Settings\Application Data\tjucsrwv.exe1
                %HOMEPATH%\Local Settings\Application Data\fidbhpbb.exe1
                %HOMEPATH%\Local Settings\Application Data\qpuokdjt.exe1
                %HOMEPATH%\Local Settings\Application Data\mpwshjgw.exe1
                %HOMEPATH%\Local Settings\Application Data\uhpeqlrs.exe1
                %HOMEPATH%\Local Settings\Application Data\elsmwsrf.exe1
                %HOMEPATH%\Local Settings\Application Data\kwfdmcme.exe1
                %HOMEPATH%\Local Settings\Application Data\egcnjpnc.exe1
                %HOMEPATH%\Local Settings\Application Data\ntftgptb.exe1

                File Hashes

                0108740d41c4f9f055e365a2f69b297ce9c10c8bb1ba0de30bbf5d65dcb60c2c 012082d16c60291c94e03aad79d7363ee6500ddd1e775487960565977d3c87b9 02fba64a3b71a5ac96e3d827c8d38cce63a252d2e3569adbfef99910cdfadc51 0527a40a7d8fff9c7fcd999e746f484156c66714d2fbcce5fd3215de4ec89f05 0549b4e372310c856e724a3afc638e4e94b4faaf5d947dc7e517e6f84eff312f 060620d8e4038d2705cf20ae625a8b5eb23e4888b51ad0f7cbd7adf68d7deef2 061f8f8125741ed3271cd34d2b7a58bb92affbd4d652e332f5c8c26ee55883ee 06288e899058ab5d7773b7353f66565545a8feba7380b121d80112bbe0453d30 0696d337aa0b00ca9a22cd1f934fc7ea7cb4591073dc97bbc90263d9dcb5b232 078c9cfcab1871f10a2f8168a18f40dd5c90d7900f82ba73c16bd2425fee430e 093285215d738a1b2f5e66ace61ff34e561b3a941e664b1e2c583bc9392b57e8 09b48bfc7ad57b3d7924ed422defdfc9218c3c2b592e56b5c25a9faf1058d716 0a0e1e0ba5bc50ae1b4d83c4993c79abc783a3962f101516ef7c046d5d261697 0a9a6045b22468d1f35fe939f00318f841b26ebc4491d77e90c4d861902987ff 0b13ffc85de1b3e09f9850d010c85e64b4daa77f6acbfdf334b9126726fcf81f 0b516d370bd6e32d4e1f34c9119dbcd85ed302ff13abeb2433ac0c8fc97fb874 0ba092f829fa1a6d4a407c80b3032ae15b55a6a2bc4881e23fe1b2087d55bfd0 0c1b0a0154c6f83a96a949e26f42086af5bfaf2ad7c6cda273ae8d72c6412373 0c3a114fa273a56b3298ac93d7ee8358dcf6f16948b6ed7deaacec4eaef51860 0c4ae1b251bfed96d1e8eea56d618d35a56a6a0fe33ca76da299ed6232bf10da 0c88e57f1814b0bf3c5cd6520c368f4d7b3332614493d6fe87c280f6719ff6a3 0d6e734a8f3144b5fb657501546386535b86baec473f299857241a3b302cd320 0de30c8bd2a81c1a88cf936c811d36be0680c206d93a176351bb9bd92da48c7b 0e2d908f734e728e9cd08d696533004abf1723991541f687fa540352ef032c35 0ff08927fc2e34a84b9ce4cedb70a728b30c2babfd7aeeedd35769f1f0aeb6b3
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Trojan.SmokeLoader-7562031-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS 22
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 8
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Start
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                7
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 7
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 2827271685
                7
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 2827271685
                5
                <HKCU>\SOFTWARE\WINRAR 2
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
                Value Name: F
                2
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
                Value Name: F
                2
                <HKCU>\SOFTWARE\WINRAR
                Value Name: HWID
                2
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
                Value Name: F
                2
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Service Host Process for Windows
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: help
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: help
                1
                MutexesOccurrences
                qazwsxedc16
                04F453E614B75F818C01D1BD88F5825B98B68E3C7
                Frz_State5
                Local\https://docs.microsoft.com/1
                YAHWKKS65HAKSDJA1
                Mutex_Y1vFO98bB6v9Q8lC815ehD1xoEvADrFwNqccccSHudZP31Qt1
                Mutex_nLoOSZQIZqWgQsQHTpJ1ymgM69XnbNuwA89bPTRycpnppKwx1
                2BC133F114B75F818C01D1BDA7C0E24C98B68E3C1
                2CA90D003CEA016700C2B1832C6BBC833C28B0E41
                AA2A0D04BA6901638641B1872C6BBC833C28B0E41
                A1356D9DB17661FA8D5ED11E2C6BBC833C28B0E41
                7B0110536B421C34576AACD02C6BBC833C28B0E41
                B3CC54B3A38F58D49FA7E8302C6BBC833C28B0E41
                F99113FAE9D21F9DD5FAAF792C6BBC833C28B0E41
                0527C9131564C574294C75902C6BBC833C28B0E41
                12C5B9C22DB3D5B2119B6556035EDC943C28B0E41
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                204[.]79[.]197[.]2038
                23[.]193[.]177[.]1278
                23[.]66[.]61[.]1538
                40[.]91[.]124[.]1117
                40[.]90[.]247[.]2107
                23[.]6[.]69[.]997
                20[.]45[.]1[.]1075
                23[.]0[.]48[.]755
                23[.]13[.]211[.]1424
                23[.]218[.]40[.]1613
                13[.]107[.]21[.]2002
                36[.]38[.]34[.]2302
                40[.]112[.]72[.]2052
                172[.]217[.]12[.]2382
                104[.]102[.]89[.]2312
                212[.]27[.]63[.]1152
                23[.]0[.]209[.]1672
                23[.]221[.]48[.]2012
                207[.]148[.]248[.]1431
                204[.]79[.]197[.]2001
                184[.]105[.]192[.]21
                172[.]217[.]12[.]1421
                172[.]217[.]197[.]1561
                23[.]20[.]239[.]121
                40[.]76[.]4[.]151
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                m[.]googlex[.]me15
                w[.]googlex[.]me15
                outlook[.]com8
                rover[.]ebay[.]com8
                www[.]onenote[.]com8
                www[.]msn[.]com8
                java[.]com8
                itunes[.]apple[.]com8
                contextual[.]media[.]net8
                img-s-msn-com[.]akamaized[.]net8
                www[.]autotrader[.]com8
                g[.]msn[.]com8
                flights[.]msn[.]com8
                linkmaker[.]itunes[.]apple[.]com8
                www[.]comparecards[.]com8
                carrentals[.]msn[.]com8
                blog[.]msn[.]com8
                static-global-s-msn-com[.]akamaized[.]net8
                www[.]skype[.]com8
                www[.]adobe[.]com8
                www[.]fool[.]com8
                www[.]nextadvisor[.]com8
                e7933[.]dsca[.]akamaiedge[.]net8
                widgets[.]tree[.]com8
                redirect[.]viglink[.]com8
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %APPDATA%\aewefdvg7
                %APPDATA%\aewefdvg\jisgivdt.exe7
                %ProgramData%\Media Center Programs2
                %APPDATA%\csrss.exe1
                %APPDATA%\svchost.exe1
                %APPDATA%\InstallDir1
                %APPDATA%\InstallDir\help.exe1
                %APPDATA%\rundll32.exe1
                %APPDATA%\Other.res1
                %APPDATA%\cstbddwb1
                %APPDATA%\cstbddwb\jisgivdt.exe1
                %TEMP%\1539673208.bat1
                %TEMP%\1539674363.bat1
                %APPDATA%\ctrjauaa\dtcisave.exe1
                %TEMP%\52781.bat1
                %APPDATA%\rrcrauae\dtcisave.exe1
                %APPDATA%\rbdfguju\dtcisave.exe1
                %APPDATA%\hsabbafd\dtcisave.exe1
                %APPDATA%\sdttfesd\dtcisave.exe1
                %TEMP%\307718.bat1
                %APPDATA%\wjjbbdwr\dtcisave.exe1
                %APPDATA%\afchtjbd\dtcisave.exe1
                %APPDATA%\bctfsjtc\dtcisave.exe1

                File Hashes

                09c2143145ee9c113455c149c6ff6f951a2fd67638becc0c21bdb9c1a93e5bc3 1c6068227c934bd7eafa19513c90f83c6e84291689c529efdff52d3bbaee71ad 204fb306993b6547b953c6792d3f5e1c7c24ed1e70c40d0744f5c23d5ecc6260 2121cfce691f58d55a6865d9b0fbadfb37b1cc1b7f50e13914fc8c36d6df7a52 232c60a2fe47c6441527e0f708a695bad64770c4788d65d849895618b37ac537 2fd8a99f2e9d9940779d65f0271bedefccdea87cf9bfee5d456cdba538cd8701 322a2d80f46734cb2605d9eb0d8e7e3e100e36aced1e93302c5ce3151fffc728 34a56d4e0a80a296cfa11f929536f3d2d2ce576e28d1460259b3a2ae72c92a55 3858b2a58127adff7565ba59d9622cb82c27d7b60bb7338a35d7f9396bbb20b1 3c9dab4a204a151e2658a66e948a71790e876c657f48fd449cc57ecd79b50a77 4a461c876e41c8f10b8c682311650f535d607089e3aa930aecfcf7d0400bfb18 6854eeaf50e91cfd239713b8532ada3670c4007d30db92f7a10dcaf3919ad122 7baa48ce1d5b0783fe77a8236301991ebad8cbbfb2726d72ee7baf830be1bfac 9adc55c4337148fa4e463ef6bf008f2423dcf9a17eb0d5dcd245aa932dadd9f5 a6140aa4b277141779e6344174f88e6901e8c2921d49624f4d8a2419afa5cf93 aa6dea172c9db744c31a322163e6ec829517400a8f2af996dda345e9ab5097b8 b97f5e3d1a881e93633bcf38414d63916ba1dde8c5368d34a16aecdd227f16f1 c8a0dae1be189ebb115341551175322f8544c1a169573b43ac015b36ef2bf711 caab2cd143d3ad7e0890b3fe5a561b5a264c089186bf41ee213b1e4a32eedee4 d3cda596ba6945b34c331271ad243e81858a5614713143b04c18d1dea325e0f5 fc10ad68ba5fa127c089389f1acacb6635ae64df1525ec87dad928d7c6ac60b7 fee972c5f99500d1ac8e83ad65484494772885e18721c02f95e256c30f3f8bd2

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Malware.Nymaim-7565328-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK 12
                <HKCU>\SOFTWARE\MICROSOFT\KPQL 12
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                12
                <HKCU>\SOFTWARE\MICROSOFT\KPQL
                Value Name: efp
                12
                MutexesOccurrences
                Local\{06258131-BA39-27D4-02A0-AD682205B627}12
                Local\{2D6DB911-C222-9814-3135-344B99BBA4BA}12
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}12
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}12
                Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}12
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}12
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}12
                Local\{338F4080-2AF8-328F-1D44-E65FAFBB3088}12
                Local\{83B9D177-24D4-29BF-C0FB-035E7B3F2D46}12
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                gvjmoleiqx[.]com11
                hjlxybnt[.]pw11
                mxsffkacgxhb[.]in11
                aqnwun[.]net11
                sppja[.]net11
                wkbbomuxzbhk[.]com11
                ipfmg[.]pw11
                tznyr[.]com11
                tajlmh[.]com11
                flphjxmni[.]com11
                ezkdeavdhzte[.]com11
                lmlnzwlwgn[.]com11
                ebiodd[.]pw11
                krbmzpx[.]com11
                llqikewmnt[.]net11
                lgniduzwgg[.]pw11
                rdbaqoj[.]pw11
                ljcpqydcptw[.]pw11
                jaokwlaiwjx[.]in11
                spiesfhvlq[.]in11
                pewxbb[.]pw11
                yabnl[.]in11
                gejetvtxpjze[.]in11
                qrqtmeuk[.]net11
                wicxqfc[.]in11
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %TEMP%\fro.dfx12
                %TEMP%\npsosm.pan12
                \Documents and Settings\All Users\pxs\dvf.evp12
                \Documents and Settings\All Users\pxs\pil.ohu12
                %ProgramData%\ph12
                %ProgramData%\ph\eqdw.dbc12
                %ProgramData%\ph\fktiipx.ftf12
                %TEMP%\gocf.ksv12
                %TEMP%\kpqlnn.iuy12

                File Hashes

                0a32a31d2b9d356c8887506ac547d5f44cc34ab40d8549d3f79709a9fa84381c 14d5e17e32f558058739e0633b2e61851186500c0aa80967dac57968e018fe37 16b1ca029162ab6c4a241d60d2de8a015a8cd866f050b9847d228ab3ba0704ba 4019c94cf57c53ae814fe62f7aa804829a909d19c23922b60921f1418deb51e8 46eef4a7440acb228050b0ec2c4ba6c3e47d5e3f75a6f6bb184a946bd502ce66 4b3dead1bc0865f079731c4f7ce6e19487724e80b39ded94371c09edc6978a48 6c89b38394fbfdcc1766d401d0bf54281e7c4d47388e1a0c99c962655bc6fdb6 7878d706f9f3a683904db685ebe2b6ead7464ec142ef239f242e19ebe1a6fe67 8875970e47c112f058e29d254371350ce058376a791fd9fdabad2ab2ed8dc83c b79952df8a801d9a8619d1254a24bde3ce37ea8ebfd17ca8eb48bdd90b27b305 d1c1dcbee46d723b931f1a18ec83f5f22c515edfcdf4dcd9e04a9ab8f173b4d2 d9273903d761b64374ab16e83b854d412ac27983b95a908f52254992b6092903

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Packed.ZBot-7563206-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: LoadAppInit_DLLs
                19
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: AppInit_DLLs
                19
                Files and or directories createdOccurrences
                %System32%\Tasks\aybbmte19
                %ProgramData%\Mozilla\thfirxd.exe19
                %ProgramData%\Mozilla\lygbwac.dll19
                %HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll16
                %HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe16
                %SystemRoot%\Tasks\kylaxsk.job16

                File Hashes

                32d3d77c246077febd6a51c1c4af6cd0ef6e991f9d058814670b4d9b1ffb5929 35dba41629d3ef8e563339fe6169c2ddd9c630667a60e90e50d4901ce0fb3114 47364b16ec0b8af99154c5afb4c55f758c5ffbdc19759c039195d0f630a9fddd 5a3bdec2815d798fed747fd136c383305614c2d708805f5b5100dccce12188d9 64d56df10e94e1fff9ba9592660193168dcaece38ec92682326f7e3a6302c2ca 6ddf8b1b3866f32e26e61bf68e33e74444b591dc64642afe1b842d86cfdf5b33 7319a595fc991cae27e5057bb14714efa68ad74456f8c7c6eedd23575f3c5a47 7dfbb5e40028da7c503344cd4630727b71448ce1bcb2b2164e3217652578e623 8b3a463fc845258b9a4f60f60e853243b748de58ad4758e167decbc22ffe80cb 8c5f9e03729e46d8feb08d5357f21e888f1c922fd13edd626b9e5fea5ade7876 908e06fa764660785cc8f7c02090cbc783b8c2824a2524caefdf26279bae831c b2e187349a3e50eb0e1252a242f65d675cae2e32d362c6025c8cc966922dbf63 cbf3982f100358e34b4c2dc2782886a76432f1dad59761f747c1e8bc10ccec8c d5125b8c5dffe7fa67289ca75fed8d237ba399c779032bef27326d59fc458754 d84cd0947dd7a4c73239b992173267907bdf55fc28976797d2af7ed300bfaf83 d9134462d8be534f26973c5e19767c3c745262573f294cef1ab3b917eb410f98 d9c47353ee4c964a9f2bc115c1d47d02b0219839dbeccc6a72ac5d2df0a6905a e032675300402235fcd213f5b6790097b430051353034d23cacf207a0f642647 f21985a67551565d464004a7661d21a29d1581157955349e9a04dea717ab23d5

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                PUA.Win.File.Dealply-7563212-0

                Indicators of Compromise

                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                54[.]146[.]91[.]24714
                52[.]41[.]141[.]11112
                34[.]231[.]131[.]8411
                54[.]149[.]89[.]2298
                198[.]50[.]173[.]2238
                54[.]69[.]88[.]1177
                35[.]164[.]24[.]1697
                52[.]37[.]160[.]1765
                54[.]213[.]123[.]752
                207[.]154[.]205[.]32
                172[.]217[.]12[.]1741
                172[.]217[.]12[.]1421
                151[.]80[.]42[.]1031
                23[.]221[.]50[.]1221
                5[.]9[.]9[.]181
                172[.]217[.]13[.]2381
                23[.]54[.]219[.]511
                185[.]107[.]71[.]411
                51[.]38[.]57[.]1681
                159[.]89[.]184[.]1381
                23[.]3[.]126[.]2191
                165[.]227[.]137[.]2521
                23[.]0[.]52[.]1941
                178[.]79[.]169[.]1931
                149[.]56[.]157[.]1121
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                info[.]yidadaridap[.]com25
                rp[.]yidadaridap[.]com25
                sourceforge[.]net9
                media[.]phpnuke[.]org8
                os2[.]yidadaridap[.]com8
                os[.]yidadaridap[.]com8
                mydati[.]com3
                schema[.]org2
                www[.]gstatic[.]com1
                market[.]android[.]com1
                i[.]ytimg[.]com1
                lh3[.]googleusercontent[.]com1
                img-prod-cms-rt-microsoft-com[.]akamaized[.]net1
                developer[.]android[.]com1
                channel9[.]msdn[.]com1
                store[.]office[.]com1
                products[.]office[.]com1
                assets[.]onestore[.]ms1
                statics-marketingsites-wcus-ms-com[.]akamaized[.]net1
                pf[.]benjaminstrahs[.]com1
                www[.]deadpoolgame[.]com1
                trials[.]dynamics[.]com1
                www[.]azure[.]com1
                www[.]befunky[.]com1
                www[.]rockstargames[.]com1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %TEMP%\in10F4BD1625
                %TEMP%\in10F4BD16\472F35C2.tmp25
                %TEMP%\<random, matching '[A-F0-9]{8}'>.log25
                %TEMP%\INH162~1\css\ie6_main.css24
                %TEMP%\INH162~1\css\main.css24
                %TEMP%\INH162~1\css\sdk-ui\browse.css24
                %TEMP%\INH162~1\css\sdk-ui\button.css24
                %TEMP%\INH162~1\css\sdk-ui\checkbox.css24
                %TEMP%\INH162~1\css\sdk-ui\images\button-bg.png24
                %TEMP%\INH162~1\css\sdk-ui\images\progress-bg-corner.png24
                %TEMP%\INH162~1\css\sdk-ui\images\progress-bg.png24
                %TEMP%\INH162~1\css\sdk-ui\images\progress-bg2.png24
                %TEMP%\INH162~1\css\sdk-ui\progress-bar.css24
                %TEMP%\INH162~1\csshover3.htc24
                %TEMP%\INH162~1\images\BG.png24
                %TEMP%\INH162~1\images\Button.png24
                %TEMP%\INH162~1\images\Button_Hover.png24
                %TEMP%\INH162~1\images\Close.png24
                %TEMP%\INH162~1\images\Close_Hover.png24
                %TEMP%\INH162~1\images\Icon_Generic.png24
                %TEMP%\INH162~1\images\Loader.gif24
                %TEMP%\INH162~1\images\Pause_Button.png24
                %TEMP%\INH162~1\images\Progress.png24
                %TEMP%\INH162~1\images\ProgressBar.png24
                %TEMP%\INH162~1\images\Quick_Specs.png24
                *See JSON for more IOCs

                File Hashes

                029c5f2c2dbec036f397cd9f0352c99b5518adb48e9e0c14479b1042de97a8e1 043768f5d9923ecd231657dd90b8c5557987c0a96dbb0e90366c64d62893911d 049576cad41dcdad343c0e1b724cdc9ff854ad7f519d02dff60f5e5e611d4e4b 10e6962923b5afccb804f0089fdcfc47d33f8006bdc6b806b6d954e8a9df2ac2 192426fc265d7bd4d385b3c5a983725a754927d65ebc62c3097b2f41f447e4fa 1c99f891424cb56a090d2e1eb5625db0786f04c6704c82532198024a63a7c50a 2a1a4e11fa18befb29b00399de5af5c17d1d62c361cf1ca0ea069041a79abc39 2fc2a60b7154f47293e51d82e49f8c467b0e61dfa308b1bc53496a885fe730a6 49c4f31b2aae590042eaf9822d3256471ba862a5d2de4b6e8c1c9ba7994f42cd 4e62b6d6df8e3c2b00e4c8769e50cd8a8649b050b99c21e86bff2a344b43ee0b 528941efc56008a7f2c96ebf3f48a27733d95cc3802e1047be791bf0b1524795 57ff8a4bb6c0ff378c413d8e671ac4df2a896124a2b8bfdd56778ec44ba9641e 5be89eb16dab481ea1fb47f9800113bda32e7242230937f9500ce5df602ae1dc 5e4c796fa1e9e895c559d56bf51378a5af8a1341c8a253b289cc97530b757dd7 62a0f3ce3d7b54ca3bd95ec76ab45c226dfbce40ac0743d2dc0d5c73288e6d13 69d1e5b5468e4d083b98f6ed1fc85b98154144286e659390f63a8ad4fee575e6 6acacd65413137480a9e3ee60aa2cb8be000e0e5fc5ff4af2e206d8fcaddb3cf 6cb2a0a139bd72d43509b892d108c93ecf4e1f24e8267ce3862fe48ca35f4447 72948fecb2e7925785c76419a7d94686b1fa4dc3b165607f4cdf28655d69c612 72d3672de410e718288fdb19a2ea817f303f7b68a3358e2b63c4c6c06e4ee6f6 88ccf70fd42ad193bb82044191e4a3cb7eda3b7af3a9a1034104fe5b99e43888 914573db0bfe9ccdf1a102828397523f3abac13a8859b13d743f15fa7de00096 948cb02c5eb1afade4086c04f3954748cd37707a1f44ba6854bd38258844cbec a0c5d45bb1b35ff2f76e4b96112de328d2bf0032a5fefa843a6be6c14cf96d0f ac927c4c24469eb1de203e32a56bce3a0fa4eca37b4388fd35e6be699f8dc7e7
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (5959)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Process hollowing detected - (313)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Kovter injection detected - (220)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Gamarue malware detected - (188)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Installcore adware detected - (111)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Excessively long PowerShell command detected - (84)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Reverse http payload detected - (32)
                An exploit payload intended to connect back to an attacker controlled host using http has been detected.
                Atom Bombing code injection technique detected - (32)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Dealply adware detected - (22)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Corebot malware detected - (16)
                Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.

                Beers with Talos Ep. #71: I Have the Power(Shell)

                $
                0
                0

                Beers with Talos (BWT) Podcast episode No. 71 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Jan. 17, 2020

                PowerShell is a frequent flyer in security headlines — a powerful and oft-wielded tool for attackers and defenders alike. This episode takes a look at PowerShell and how to help ensure its security posture as an effective management tool. We also look at the missing-the-forest-for-the-trees concept behind being concerned about the latest shiny ATP before all else.

                The timeline:

                • 00:50 — Roundtable Q&A: Nigel questions Craig's mid-life crisis
                • 07:00 — PowerShell and being a master of your Windows universe
                • 13:15 — Using PowerShell with security in mind
                • 29:05 — Defense-in-depth (a fave topic): Strategy, not tactics, is how to defend against APTs
                • 44:00 — Closing thoughts and parting shots

                Links and resources:

                ==========

                Featuring: Craig Williams (@Security_Craig), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Talos Takes back with new episode, feed

                $
                0
                0

                By Jon Munshaw.

                Talos Takes, our new bite-size podcast, is back with its own feed and a new show.

                We first unveiled Talos Takes in early December, and took some time to develop a new Talos Podcasts page to accommodate Talos Takes and Beers with Talos. Now you have two Talos shows you can subscribe to!

                We'll be adding Talos Takes to Apple Podcasts, Google Play and other services very soon. For now, you can check out our RSS feed and all episodes here.

                Our newest episode focuses on password management, hosted by Nick Biasini and Earl Carter.
                Viewing all 1927 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>