Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

ObliqueRAT: New RAT hits victims' endpoints via malicious documents

$
0
0
By Asheer Malhotra.

  • Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we're calling "ObliqueRAT."
  • These maldocs use malicious macros to deliver the second stage RAT payload.
  • This campaign appears to target organizations in Southeast Asia.
  • Network based detection, although important, should be combined with endpoint protections to combat this threat and provide multiple layers of security.

What's New?

Cisco Talos has recently discovered a new campaign distributing a malicious remote access trojan (RAT) family we're calling "ObliqueRAT." Cisco Talos also discovered a link between ObliqueRAT and another campaign from December 2019 distributing CrimsonRAT sharing similar maldocs and macros. CrimsonRAT has been known to target diplomatic and government organizations in Southeast Asia.

How did it work?

This RAT is dropped to a victim's endpoint using malicious Microsoft Office Documents (maldocs). The maldocs aim to achieve persistence for the second-stage implant that contains a variety of RAT capabilities, which we're calling "ObliqueRAT." In this post, we illustrate the core technical capabilities of the maldocs and the RAT components including:

  • The maldocs based infection chain
  • A variant distributed using a dropper EXE.
  • Detailed capabilities and command codes of the RAT implant (2nd stage payload).
  • Communication mechanisms used.

So what?

This malware is an example of how a simple, yet effective RAT, is used to implement a wide variety of malicious capabilities. Key capabilities of ObliqueRAT include:

  • Ability to execute arbitrary commands on an infected endpoint.
  • Ability to exfiltrate files.
  • Ability to drop additional files.
  • Ability to terminate process on the infected endpoint etc.


Analysis of a recently discovered preliminary variant of ObliqueRAT in this post presents insights into the evolution of this threat. Analyses of the key similarities and differences between the two campaigns of ObliqueRAT and CrimsonRAT show us the changes in tactics and techniques of the attackers used to continue attacks while trying to bypass detections. This campaign also shows us that while network-based detection is important, it can be complemented with system behavior analysis and endpoint protections for additional layers of security.


Analysis of Maldocs

Initial Infection Vector

This threat arrives on the endpoint in the form of malicious Microsoft Word documents. The malicious documents (maldocs) prompt the end-user for a password to view the contents of the maldocs. The malicious VB script in the maldocs is activated once the user enters the correct password for the document.

The maldocs have been known to have seemingly benign file names in the wild such as:

  • Company-Terms.doc
  • DOT_JD_GM.doc
[DOT_JD_GM may possibly stand for "Department Of Telecommunications_Job Description_General Manager"]

These file names indicate that the maldocs may be targeted towards specific individuals as part of a targeted distribution campaign. The initial infection vector of this threat is most likely email based with the body of the malicious email containing the password required to open the maldocs.

Malicious VBA Analysis

Once opened, the maldoc activates a malicious VBA script that performs the following malicious activities:

  1. Extracts the contents of a form/textbox.

  2. This content consists of an MS Windows binary embedded as a character representation of the binary's bytes delimited using a specific character (e.g. "O" used as a delimiter).

  3. Delimited Malicious MZ embedded in maldoc highlighted.


  4. The malicious binary is extracted from the maldoc by the VBA script and dropped on the endpoint to the location:
    C:\Users\Public\sgrmbrokr.doc

  5. The file is consequently renamed to an exe : C:\Users\Public\sgrmbrokr.exe

  6. The malicious VBScript then creates a shortcut in the currently logged in user's Start-Up directory to achieve persistence across reboots for the malicious executable (MZ) written to the file system in previous steps. The shortcut created is:
    %userprofile%\\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\saver.url

  7. Once the shortcut is created the VBScript stops execution without executing the actual second-stage payload (ObliqueRAT).

Malicious VBA script in madocs


Second-stage payload analysis: ObliqueRAT


The second-stage binary (ObliqueRAT) contains the following features:

  • RAT capabilities (detailed below).
  • Ability to communicate with the command and control server (C2) to obtain command codes and send back executed command outputs.

Threat Grid detects this implant as malicious.

Threat Grid behavioral indicators for the implant.


Mutex Creation

The RAT ensures that only one instance of its process is running on the infected endpoint at any given time by creating and checking for a mutex named "Oblique". If the named mutex already exists on the endpoint then the RAT will stop executing until the next login of the infected user account.

Mutex creation by implant

Gather initial system fingerprint

Once the malware has created the named mutex, it attempts to gather an initial fingerprint of the system to identify the system. This information is then sent to the operating C2 to fingerprint the system to decide which commands to send next.

Sysinfo gathered by the RAT:

  • Computer Name.
  • Current User Account Name.
  • Windows operating system (OS) version in the form of a textual representation:
    • XP
    • XP SP2
    • Vista
    • 7
    • 8
    • 8.1
    • 10
    • OS bitness i.e.
        • 64 bits
        • 32 bits

      • Directory & File Check: A unique feature of the RAT is that it looks for the presence of a specific directory and all files residing inside it. The directory path (folderpath) is hardcoded in the RAT: C:\ProgramData\System\Dump.
        If this directory is present on the infected system then the RAT sends the keyword "Yes" to its C2 and "No" otherwise.
      • Another hard coded value from the implant "5.2" is sent to the C2. (May indicate version number of the implant)


      The sysinfo gathered by the implant is then put together as a single string with the character ">" used as a delimiter.

      Format used:

      (_variable_ = used for depicting a variable value)

      _ComputerName_>_UserName_>Windows _version-string_>_implant-name-on-disk_>_OS-bitness_>_Dump_dir_files_exist_>_hardcoded_implant_version_number_>

      E.g.

      DESKTOP-SCOTTPC>jon>Windows 10>sgrmbrokr>64 bits>Yes>5.2>

      Although the implant gathers the system information initially, it only sends this information out if it receives a specific command code from the C2. The implant also performs anti-infection checks before it fully activates itself on the endpoint.

      Anti-Infection Checks

      Another interesting feature in the implant is that after it gathers the preliminary system information for fingerprinting, it performs a series of checks against the user and computer name it has obtained to identify an endpoint or user account it must avoid its execution on/for. If any of the values from its blacklist match the current user/computer name, it simply stops its execution.

      The usernames blacklisted by the implant are:

      • John
      • Test
      • Johsnson
      • Artifact
      • Vince
      • Serena
      • Lisa
      • JOHNSON
      • VINCE
      • SERENA


      A similar check is done for the computer name as well. The list of computer name values blacklisted by the implant are:

      • JOHN
      • TEST

      Blacklisted user & computer names in the implant

      The anti-infection checks may have been implemented to:
      • Avoid successful execution of the implant on a Sandbox based detection system (Anti-Analysis Technique) OR
      • Prevent execution of the implant in the attackers' test environment.

      RAT command codes and functionalities

      The implant then connects to its C2 server using hardcoded values of its IP Address and Port Number.

      Implant connecting to hardcoded C2 server.

      On connection, the implant receives a command code from the C2 that corresponds to the capability the implant is supposed to execute next on the endpoint. Also, everytime the implant receives a command from the C2 it sends back an acknowledgement message to the C2 indicating that it has received the command code.

      The acknowledgment sent to the C2 is always the keyword "ack".

      "ack" sent to the C2 as an acknowledgment

      The command codes, supporting command data (both sent by the C2) and capability description are detailed below.


      Command Code = "5" Command Data = <filename or folderpath>

      This command code is used to find files and record file sizes in KB for files specified by a specific folder or file path. The data gathered by the implant is in format:

      (_variable_ = used for depicting a variable value)
      _filepath_<_size_in_KB_;_filepath_<_size_in_KB_;

      E.g.
      pony.txt<4;bigpony.txt<100;


      Command Code = "0" Command Data = None

      Send the already gathered system information (sysinfo) described previously to the C2 server for fingerprinting the infected host.

      Implant sending initial sysinfo to its C2 server.


      Command Code = "1" Command Data = None

      This command is aimed to trigger the implant to discover the category of various drives on the endpoint. The drives to be checked for are listed as hardcoded drive letters in the implant:
      • A:
      • B:
      • C:
      • D:
      • E:
      • F:
      • G:
      • H:
      • I:
      • J:
      • K:
      • L:


      The drive types for the drives checked on the system are represented textually by the implant using the following keywords:
      • Unknown
      • Removable Drive
      • Hard Drive
      • Network Drive
      • CD Drive
      • RAM Disk


      The data sent out for this command is in format:

      (_variable_ = used for depicting a variable value)
      _drive-letter_>_Drive-type_|_drive-letter_>_Drive-type_|

      E.g.
      C:>Hard Drive|D:>CD Drive|

      Drive letters and identification strings in the implant.


      Command Code ="4" Command Data=<filename> & <zip_file_name>

      Receive a target filename and ZIP filename from the C2server. Create a new ZIP file with the name provided in the %temp% directory and add the target file to it. Once done, send the contents of the ZIP file to the C2 server.

      The ZIP file is subsequently deleted from the endpoint after exfiltration.

      The implant also records the target filename that has been exfiltrated (in ZIP form) from the endpoint to a log file called: %temp%\lgb

      Log file containing the list of files exfiltrated from the endpoint.


      Command Code ="4a" or "4e" Command Data=<target filename>

      Variant of command code "4." The difference here is that the implant doesn't require a different ZIP file name from the C2 it simply uses the name of the target filename and creates a ZIP file.

      E.g. if the target file name is "abc.txt" then the ZIP file name is "abc.txt.zip"


      Command Code ="6" Command Data=<folder path>

      Accept a folder path from the C2 server, recursively find all files residing in the folders and ZIP them up into a ZIP file with the same name as the folder path specified by the C2. (The ZIP file is created in the operating directory of the implant). This ZIP file is then exfiltrated by the implant to the C2 and subsequently deleted.


      Command Code ="3" Command Data=<foldername>

      Variant of command code ="5". The difference here is that implant accepts only a foldername and recursively calculates the file sizes and builds the list of filepaths and filesizes in the same format:

      _filepath_<_filesize_;_filepath_<_filesize_;_filepath_<_filesize_;


      Command Code ="7" Command Data=<command_line>

      Execute given command line on the endpoint with a high priority (The output of the command executed on the endpoint is not sent back to the C2 though).

      Sample command executed by the implant on the endpoint.


      Command Code ="8" Command Data=<filename> , <filesize> & <file_contents>

      This command is used by the implant to write a file sent by the C2 to the infected endpoint. To achieve this functionality the implant recvs the following info from the C2 server:

      • Path of the file to be written to on disk.
      • Size of the file to be being sent by the C2.
      • Contents of the file to be written to disk.


      Command Code ="backed" Command Data= None

      Backup the contents of the lgb log file to another file. The backup is done

      From = %temp%\lgb
      To = %temp\lgb2

      The implant reads the lgb log file character by character and writes it to the lgb2 file. On encountering a newline character, the newline is replaced by "*\n" instead.

      Once the backup is done the implant will remove the "lgb" log file and then rename the lgb2 file back to "lgb" (Convoluted backup mechanism used here).


      Command Code ="rnm" Command Data= <old_filename> & <new_filename>

      Rename a file to a new name provided by the C2.

      File rename capability of the implant.


      Command Code ="tsk" Command Data= None

      This command is used to gather the list of running processes on the system, record this information to a log file and exfiltrate the contents of the log file. Once the log file has been sent to the C2 it is removed from the endpoint.

      Log filepath used = C:\ProgramData\a.txt

      Log file format =

      Running Processes
      <process_image_name>
      <process_image_name>
      <process_image_name>
      .
      .
      .

      Process list snippet written to log file by the implant.


      Command Code ="exit" Command Data= None

      Stop execution of implant on the endpoint without removing persistence from Star-tUp folder.


      Command Code ="restart" Command Data=None

      Restart the socket connection to the C2.


      Command Code ="kill" Command Data=<process_name>

      Find all processes by the name specified by the C2 and terminate them.

      The implant's capability to terminate processes running on the endpoint.


      Command Code ="auto" Command Data= Custom

      This command code is used to trigger a recursive search sweep of one or more directories specified by the C2 server. This sweep is done to verify the presence of files specified by a filename. The data specified by the C2 is:

      • Folder path(s) to find files in.
      • File name(s) to find.
      • File extension(s) to find files.


      Any files matching the specified criteria are logged into the file C:\ProgramData\auto.txt

      Format:

      _folderpath_>_filename1_,_filename2_,_filenameN_<_file-extn1_,_file-extn2_,_file-extnN_

      E.g.

      If the command data sent by the C2 is:
      c:\dummy>pony.txt,blah.exe<txt,exe

      Then if these files exist, the log file ("auto.txt") will contain:
      c:\dummy\pony.txt
      c:\dummy\blah.exe

      The log file (auto.txt) is then read and the contents are sent to the C2 followed by its deletion.


      Command Code ="rht" Command Data= <filepath>

      This command is used to delete (remove) a file specified by the C2 server from the endpoint.


      RAT(Implant's) Communication Mechanisms

      ObliqueRAT utilizes the ws2_32.dll library to communicate with its C2. This library is used to implement the core socket libraries supported by MS Windows.

      Keywords used by the RAT during communication are:

      • "ack\0" = Acknowledgment of the command code received as well as an indicator of successful command execution.
      • "nak\0" = Indicates failure to execute functionality without providing reason for failure to the C2.


      Variant #0 - ObliqueRAT

      Cisco Talos also discovered another variation of the ObliqueRAT attack distributed via a malicious dropper. The malicious dropper contains 2 EXEs embedded in it that will be dropped to disk during execution to complete the infection chain. The initial distribution vector of this dropper is currently unknown.

      Variant #0 Artifacts:

      Dropper EXE:
      • 4a25e48b8cf515f4cdd6711a69ccc875429dcc32007adb133fb25d63e53e2ac6

      ObliqueRAT Variant #0 EXE:
      • 9da1a55b88bda3810ccd482051dc7e0088e8539ef8da5ddd29c583f593244e1c

      Persistence Component EXE:
      • ad17ada0171b9e619000902e62b26b949afb01b974a65258e4a7ecd59c248dba


      Variant #0 Dropper Analysis

      The dropper consists of one EXE with another two additional EXEs embedded in it. During execution the dropper will perform the following activities:

      If specific file markers exist in the dropper's binary file on disk: (Markers used= "***")
      1. If the markers exist then read the data between the markers (there will be 2 such markers for 2 embedded EXEs) and write it to files on disk:
            C:\Users\Public\Video\hrss.exe
            C:\Users\Public\Video\lphsi.exe
      2. Execute these files using the ShellExecute API.


      If the markers do not exist then it will package its components into a new copy of itself:
      1. Look for files named "a.exe" and "b.exe" in the current working directory and read their contents into memory.
      2. Rename itself (the dropper) to "fin.exe".
      3. Append to itself (fin.exe) the magic markers specified ("***") and the contents of "a.exe" and "b.exe" thereby completing the packing process.


      ObliqueRAT component Functionalities (lphsi.exe)

      The ObliqueRAT sample dropped by the dropper has the same capabilities as the ObliqueRAT sample discussed above. There is a slight variation though (discussed in the comparison section below).

      Persistence Module (hrss.exe)

      The 2nd EXE (hrss.exe) executed by the dropper is used only to establish persistence for the ObliqueRAT sample (lphsi.exe). This is done by creating a shortcut in the currently logged in user's Start-Up directory to execute ObliqueRAT whenever the user logs into the infected endpoint.

      Shortcut created: %userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\script.lnk

      Malicious shortcut (script.lnk) used for persistence.

      Variant #0 Comparison

      Variant #0 (9da1a55b88bda3810ccd482051dc7e0088e8539ef8da5ddd29c583f593244e1c) discovered by Cisco Talos looks like a preliminary version of the ObliqueRAT attack detailed in this post (37c7500ed49671fe78bd88afa583bfb59f33d3ee135a577908d633b4e9aa4035).

      This is because of the following factors:

      1. Variant #0 has an earlier compile time of 04/11/2019 12:12:04 UTC while the ObliqueRAT implant detailed in this post has a later compile time of 27/11/2019 08:40:10 UTC.
      2. Although the hardcoded version number of both the implants is "5.2", variant #0 contains an additional feature where, if the implant fails to connect to the C2 server it will display any of two Message Boxes consisting of:
        Title = scokerr
        Text = sockerror

        and

        Title = grace
        Text = grace

      This indicates that variant #0 may be a test copy of ObliqueRAT that was released into the wild by the attackers without scrubbing the Message Boxes used for debugging the C2 connection functionality (Thus identified as "Variant #0").


      Related campaigns: CrimsonRAT vs. ObliqueRAT

      The malicious VBA Scripts in the maldocs discovered by Talos semantically resemble a previously observed maldoc distribution campaign (from 2019) delivering another .NET based RAT family popularly known as CrimsonRAT. CrimsonRAT has been known to target organizations in Southeast Asia.

      An example of a maldoc (from December 2019) observed distributing the CrimsonRAT malware is:
      • 965b90d435c1676fa78cdce1eee2ec70e3194c0e4f0d993bc36bfd9f77697969

      The CrimsonRAT sample dropped by the maldoc is:
      • 98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85


      Similarities Between the Two Campaigns

      This CrimsonRAT maldoc although not password protected (as in the case of the maldocs containing ObliqueRAT) contains the following similarities w.r.t the ObliqueRAT maldocs:

      • Similar VB variable naming conventions for filenames, folder names, ZIP file names:
        E.g.

        The ObliqueRAT VBScripts use variables named:
        file_Salan_name, fldr_Salan_name, zip_Salan_file

        while the CrimsonRAT VBScripts use variables named:
        file_Allbh_name, fldr_Allbh_name, zip_Allbh_file

      • Similar decoding technique for the next stage payload:
        Both sets of VBScripts extract the embedded next stage payload from a form (textbox) where the bytes of the next stage payload are character representations (of decimal numbers) delimited by a specific character.


      Differences Between the Two Campaigns

      • The CrimsonRAT maldocs drop the next stage payload to a ZIP file (E.g. %allusersprofile%\intaRD\thnaviwa.zip) on the filesystem.
        However the ObliqueRAT maldocs drop the RAT payload directly to a file named:
        C:\Users\Public\sgrmbrokr.exe
      • As mentioned above, the CrimsonRAT maldocs drop a malicious ZIP file on the disk first and then extract the EXE within the archive file. This malicious EXE (.NET based CrimsonRAT) is then executed on the infected endpoint.
        The ObliqueRAT maldocs however simply drop the malicious EXE (ObliqueRAT EXE) directly on the filesystem, create a shortcut in the infected user's StartUp folder. The EXE is not executed and the malware relies on the user to re-login for the ObliqueRAT infection to trigger.

      ObliqueRAT VBA (Left) vs CrimsonRAT VBA (Right) code

      Conclusion


      This campaign shows a threat actor conducting a targeted distribution of maldocs similar to those utilized in the distribution of CrimsonRAT. However, what stands out here is that the actor is now distributing a new family of RATS. Although it isn't technically sophisticated, ObliqueRAT consists of a plethora of capabilities that can be used to carry out various malicious activities on the infected endpoint. The fact that the maldocs are password protected (and that the ObliqueRAT implant consists of probable anti-analysis techniques) indicates the attackers' intent to hide the malicious activities of the infection from an analyst. This campaign started in January 2020 and is still ongoing. This campaign also shows us that while network-based detection is important, it must be complemented with system behavior analysis and endpoint protections.

      Coverage


      Ways our customers can detect and block this threat are listed below.



      Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

      Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

      Email Security can block malicious emails sent by threat actors as part of their campaign.

      Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

      Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

      Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

      Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

      Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

      AMP Detections

      AMP detects the ObliqueRAT implants as follows:

      ObliqueRAT AMP detection

      ObliqueRAT variant #0 AMP detection


      Indicators Of Compromise (IOCs)


      The following IOCs are related to this threat:

      ObliqueRAT

      Maldocs
      • 057da080ae0983585ae21195bee60d82664355a7fd78c25f21791b165c250212
      • dfad2a80dac91e7703266197ebbf5d67ef77467ab341dd491ad25d92d8118cac

      Dropper (for Variant #0)
      • 4a25e48b8cf515f4cdd6711a69ccc875429dcc32007adb133fb25d63e53e2ac6

      2nd Stage Malicious EXEs
      • ObliqueRAT - 37c7500ed49671fe78bd88afa583bfb59f33d3ee135a577908d633b4e9aa4035
      • Variant #0 - 9da1a55b88bda3810ccd482051dc7e0088e8539ef8da5ddd29c583f593244e1c

      Persistence Component
      • ad17ada0171b9e619000902e62b26b949afb01b974a65258e4a7ecd59c248dba

      Mutexes Created by 2nd Stage EXEs:
      • "Oblique"

      C2 IP Addresses and URLs:
      • 185[dot]117.73.222:3344


      CrimsonRAT

      Maldocs
      • 965b90d435c1676fa78cdce1eee2ec70e3194c0e4f0d993bc36bfd9f77697969

      Next Stage Malicious ZIPs & EXEs
      • 3671b7ed9f67098d2a534673ed9ff46e90c03269c0bdd9b6f39ae462915ecdcb [ZIP]
      • 2911a3da2299817533ca27a0d44c8234fdf9ecd0a285358041da245581673d6f [ZIP]
      • 98894973a86aa01c4f7496ae339dc73b5e6da2f1dbcd5fe1215f70ea7b889b85 [exe]
      • e436be68cdbdb7ea20e5640ad5fa5eca1da71edb9943c3bde446b4c75dacfbd0 [exe]



      Threat Source newsletter (Feb. 20, 2020)

      $
      0
      0

      Newsletter compiled by Jon Munshaw.


      Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

      We’ve got more ways than ever for you to get Talos content. We continue to grow our YouTube page with the second entry in the “Stories from the Field” series, this time with Matt Aubert discussing when to get lawyers involved in an incident.

      Our podcast family also continues to grow, with new episodes this week of Talos Takes and Beers with Talos.

      On the old-fashioned write-up end of things, we have the latest on our research into adversaries’ use of living-off-the-land binaries (also known as “LoLBins”). Recently, we’ve seen a wave of attacks utilizing the Microsoft Build Engine to conduct post-infection activities.

      And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week. 

      Upcoming public engagements

      Event: Cisco Live Australia 
      Location: Melbourne Convention & Exhibition Centre, Melbourne, Australia
      Date: March 3 - 6
      Speakers: Nick Biasini
      Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In Nick's talk at Cisco Live, he will perform a deep analysis of recent threats and show how Talos leverages large datasets to deliver product improvements and mitigation strategies.

      Event: “Everyone's Advanced Now: The evolution of actors on the threat landscape” at Interop Tokyo 2020
      Location: Makuhari Messe, Tokyo, Japan
      Date: April 13 - 15
      Speakers: Nick Biasini
      Synopsis: In the past, there were two clear classes of adversary an enterprise would face: sophisticated and basic. These basic threats were commodity infections that would require simple triage and remediation. Today, these commodity infections can quickly turn into enterprise-crippling ransomware attacks, costing organizations millions of dollars to recover. Now more than ever, organizations need every advantage they can get — and threat intelligence is a big part of it. Having visibility into your own environment and attacks around the globe are equally vital to success. This talk will cover these trends and show how the gap between the sophisticated and the basic adversary is quickly disappearing.

      Cyber Security Week in Review

      • Several American law enforcement and cyber agencies teamed up to detail a massive campaign by North Korean state-sponsored actors. In all, the entities tracked six different malware samples, linking them to the infamous Lazarus Group. 
      • A new report from the Cyber Threat Alliance warns that state-sponsored actors from North Korea, Russia and China could all pose threats to the 2020 Olympics in Japan. Potential attacks include disinformation campaigns and the disruption of key services tied to the games. 
      • The U.S. continues to trade barbs with Chinese tech company Huawei. American leaders even went as far as to warn other countries they may end information-sharing agreements if they use Huawei’s 5G technology. 
      • A vulnerability in a popular WordPress plugin leaves more than 200,000 sites open to be totally wiped. Remote attackers could send specially crafted to these sites and trigger a wiping function in the plugin. 
      • Amazon’s Ring smart doorbell and camera system made two-factor authentication required for all users. The settings change came after months of negative stories in the press regarding hacks of the devices and Amazon’s information-sharing with Facebook and law enforcement agencies. 
      • UCLA canceled its plans to install a new facial recognition system after pushback from students. The college planned to integrate the technology with its campus’ security system. 
      • Government leaders from the U.S. and England jointly blamed Russia for a cyber attack on the country of Georgia in October. State-run and private websites were taken down in the attack, including one belonging to the Georgian prime minister. 
      • An American natural gas pipeline had to be shut down for two days after a ransomware attack. The U.S. Department of Homeland Security has yet to disclose the exact strain of ransomware and the location of the pipeline. 

      Notable recent security issues

      Title: Snake/Ekans malware adds new functionality to go after ICS
      Description: The Snake ransomware (otherwise known as “Ekans”) has added new capabilities aimed at going after industrial industries. Ekans first emerged in December, but now has a relationship with the MEGACORTEX ransomware that could allow it to spread quickly on ICS systems and even force some services to revert to manual operations. The malware’s code now includes direct references to HMI processes and historian clients that are commonly linked to ICS.
      Snort SIDs: 53106, 53107

      Title: Carrotbat malware, Syscon backdoor team up to target federal government
      Description: An American federal agency was targeted in late January with a series of phishing emails utilizing a variant of the Carrotbat malware and the Syscon backdoor. Attackers used six unique email attachments in the campaign, all relating to the ongoing strained relationship between the U.S. and North Korea. Security researchers say these attackers are still active, despite the majority of their activity taking place over the summer.
      Snort SIDs: 53129 – 53145

      Most prevalent malware files this week

      SHA 256: 1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7 
      MD5: 88cbadec77cf90357f46a3629b6737e6
      Typical Filename: FlashHelperServices.exe
      Claimed Product: Flash Helper Services
      Detection Name: PUA.Win.File.2144flashplayer::tpd 

      SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
      MD5: 8c80dd97c37525927c1e549cb59bcbf3
      Typical Filename: eternalblue-2.2.0.exe
      Claimed Product: N/A
      Detection Name: W32.85B936960F.5A5226262.auto.Talos

      SHA 256: 97d8ea6cee63296eaf0fa5d97a14898d7cec6fa49fee1bf77c015ca7117a2ba7 
      MD5: be52a2a3074a014b163096055df127a0
      Typical Filename: xme64-553.exe 
      Claimed Product: N/A
      Detection Name: Win.Trojan.Coinminer::tpd

      SHA 256: 9e9d85d9e29d6a39f58f4db3617526b92a5200225d41d0ab679a90c0167321b4 
      MD5: d45699f36a79b9d4ef91f5db1980d27b 
      Typical Filename: profile-6.exe
      Claimed Product:  N/A
      Detection Name: Win.Dropper.Zbot::222561.in02

      SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
      MD5: 799b30f47060ca05d80ece53866e01cc
      Typical Filename: mf2016341595.exe
      Claimed Product: N/A
      Detection Name: W32.Generic:Gen.22fz.1201

      Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

      Threat Roundup for February 14 to February 21

      $
      0
      0
      Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 14 and Feb. 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

      As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


      For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
      The most prevalent threats highlighted in this roundup are:

      Threat NameTypeDescription
      Win.Dropper.Gandcrab-7586670-0 Dropper Gandcrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB," ".CRAB" or ".KRAB". Gandcrab is spread through both traditional spam campaigns, as well as multiple exploit kits, including Rig and Grandsoft.
      Win.Packed.Mikey-7586709-0 Packed Mikey is a trojan that installs itself on the system, collects information and communicates with a C2 server, potentially exfiltrating sensitive information. This threat can also receive additional commands and perform other malicious actions on the system, such as installing additional malware upon request.
      Win.Malware.Qakbot-7586710-1 Malware Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
      Win.Malware.Razy-7588195-0 Malware Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypts the data, then sends it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
      Win.Packed.Generickdz-7586813-0 Packed This is a BobSoft Delphi application that wraps malware. In the current campaign, the HawkEye spyware is installed. The malware uses process hollowing to hide from detection and achieves persistence across reboots by leveraging an Autostart key in the Windows registry.
      Win.Packed.Tofsee-7586819-1 Packed Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator's control.
      Win.Malware.Nymaim-7586870-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain-generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
      Win.Ransomware.Remcos-7586925-1 Ransomware Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
      Win.Malware.Autoit-7586956-0 Malware This signature covers malware leveraging the well-known AutoIT automation tool, widely used by system administrators. AutoIT exposes a rich scripting language that allows adversaries to write fully functional malicious software. This family will install itself on the system and contact a C2 server to receive additional instructions or download follow-on payloads.

      Threat Breakdown

      Win.Dropper.Gandcrab-7586670-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 48 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: eegsjfdkqvr
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: ythjobixtnr
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: yeelxnznvki
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: umwdlwwsaaz
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: piveskqvesb
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: ispyjcnalox
      1
      <HKCU>\SOFTWARE\MICROSOFT\OFAGAS 1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: Diokydyb
      1
      <HKCU>\SOFTWARE\MICROSOFT\SYSTEM
      Value Name: Panda
      1
      <HKCU>\SOFTWARE\MICROSOFT\OFAGAS
      Value Name: Ydcyuxos
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: pkmkandzsro
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: ejmsgaummxr
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: hujteforzto
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: jcrillrkibx
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: hrsalhxnejd
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: dctzafzqnkl
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: cuzlcuudbwx
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: sxzpjghkvsd
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: wriuvpwacau
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: duivayvsjqx
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: xbxpanidwht
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: uethoblisdu
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: sarblkidckc
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: sujhhdohjjr
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: yfvdvhnadpu
      1
      MutexesOccurrences
      Global\pc_group=WORKGROUP&ransom_id=4a6a799098b68e3c46
      GLOBAL\{<random GUID>}1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      66[.]171[.]248[.]17846
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      ipv4bot[.]whatismyipaddress[.]com46
      1[.]1[.]168[.]192[.]in-addr[.]arpa46
      dns1[.]soprodns[.]ru46
      nomoreransom[.]bit46
      gandcrab[.]bit46
      nomoreransom[.]coin46
      bon[.]aungercote[.]org1
      ver[.]sceinsheru[.]org1
      Files and or directories createdOccurrences
      %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c546
      %APPDATA%\Microsoft\<random, matching '[a-z]{6}'>.exe46
      %APPDATA%\Enylf\vyku.exe1
      %APPDATA%\Guibc1
      %APPDATA%\Guibc\hyka.irp1
      %APPDATA%\Gyun1
      %APPDATA%\Gyun\vaxac.qae1
      %APPDATA%\Nozuo1
      %APPDATA%\Nozuo\quzui.exe1

      File Hashes

      099c47434a97a9bcd0c6bb5f0291bb69d70dd05ab002fa83487d63b997b90f96 09eeafacfe79c4fc87c45dab72ce88aa1e234e668e2535e209beaa4a8181610f 0d293a8759d4bae6aa5d8587108a508f6d40efb449dbc239800efebb7a2bf2d7 10ae8e44b98f0255ba8e6d819d804e8379336500f3e27a14bb5b8ea72a07eb80 134e8947ef2f684d816c6c1da588fba3f9f0c08c24533adc02cbcb93d9e1494a 145bcff3aca6ba04f241e0d5ced04e2781c8a0f225ebf51dcddfb238fdbc63ea 18213dfc3c25be525312f6ff70e4ea8861233bc562d1442a501a0ae7c7bd93f4 187591cccfe3eb0c7bea183e03a735be581f704866b2bf2f82c2f57c759f5fde 1a2e00ce828da6130592178bd3b0bf47f2b3edefafffe7e6371622aae1ceb9af 1a99329960098a5414c2fac1bad96ef143878fb5435bcdc6cef9d288081e8b4b 1d2d031f33ce5adea4a45c700e29e99903d55850481fb17deb479fe47d367a18 1e4294a2b465e27903582116b12d5db2a6999116e27c698b5b98ae52035649b7 1ee6e03bfe259cf4a95c093e85056ae9807fa53f83f465b8878d74a114f148fd 2164d2a4c1a861298c8003118855be9ae68614c5e557638830038658b2e6e47c 22d18aa907e4750c7fce359140c44db444c644e8576c8609ca54c2e85afa0ac7 234bcafc5700b9f59d30bbcd0b7ba4694e49ffe6621ed63a5a6f0464a6aba447 25a297586142486627a765200bfc30658cdb4500949c581a83d1be262c60c4c6 25ae0f8e3b3938131d098ff7832167a5b6629e6cb8972827b7f1175b69e063c9 2651e9bbd4004b56eefa43f4f7ffd982d16d07df2980423cb54b1ee585172ae5 274d2074201aabff30008390fbc34087fc9aead9ec924d18708a0d6670bb6995 276f56271a9b3e3fcce07ccd2e4dab2a4316b90e8e715e2657b572da0109c801 2a7ad044e7f131e71e794cc8dd31ce746f455d9c53e45b88c3696891f4f11b35 2bb8a6eae8695c55070f5f78371609052f73826a2df29a9e2ab82c7c89603369 2cecccc835e1485e21cc45c86571f82f06223e422f59410228c140e77862ef3a 2d239ffa8b5e13e8c19de06e5d5825e24df4c52f31741ab7373b2b74b612ab2f
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Packed.Mikey-7586709-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 16 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DEFAULTICON 4
      <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
      Value Name: Blob
      4
      <HKCU>\SOFTWARE\NEMTY 4
      <HKCU>\SOFTWARE\NEMTY
      Value Name: fid
      4
      <HKCU>\SOFTWARE\NEMTY
      Value Name: pbkey
      4
      <HKCU>\SOFTWARE\NEMTY
      Value Name: cfg
      4
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\unbhgouj
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: Type
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: Start
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: ErrorControl
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: DisplayName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: WOW64
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: ObjectName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: Description
      1
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config3
      1
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES 1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ 1
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config1
      1
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config2
      1
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config0
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\UNBHGOUJ
      Value Name: ImagePath
      1
      MutexesOccurrences
      Global\<random guid>7
      Vremya tik-tak... Odinochestvo moi simvol...4
      A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A3
      A238FB802-231ABE6B-F2351354-CF072D6D-090D08F11
      chv8VoF8462A240TQszdiFeaRyFs610A1
      A238FB802-231ABE6B-F2351354-7FCA0C5B-B9CFE7DF1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      172[.]217[.]164[.]1793
      172[.]217[.]7[.]2432
      104[.]26[.]4[.]152
      46[.]29[.]160[.]262
      104[.]26[.]5[.]152
      194[.]116[.]162[.]292
      91[.]215[.]170[.]2342
      46[.]4[.]52[.]1091
      104[.]47[.]36[.]331
      43[.]231[.]4[.]71
      93[.]171[.]200[.]641
      67[.]195[.]228[.]110/311
      168[.]95[.]5[.]112/311
      168[.]95[.]5[.]216/301
      168[.]95[.]5[.]118/311
      172[.]217[.]197[.]26/311
      98[.]136[.]96[.]76/311
      203[.]15[.]169[.]111
      67[.]195[.]204[.]731
      85[.]114[.]134[.]881
      67[.]195[.]204[.]751
      67[.]195[.]204[.]801
      98[.]136[.]96[.]92/311
      134[.]0[.]12[.]891
      198[.]35[.]20[.]311
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      www[.]myexternalip[.]com4
      nemty10[.]hk4
      api[.]db-ip[.]com4
      0300ssm0300[.]xyz3
      ghs[.]googlehosted[.]com2
      smtp[.]secureserver[.]net1
      ipinfo[.]io1
      api[.]pr-cy[.]ru1
      mx-aol[.]mail[.]gm0[.]yahoodns[.]net1
      hotmail-com[.]olc[.]protection[.]outlook[.]com1
      centrum[.]sk1
      post[.]sk1
      msx-smtp-mx1[.]hinet[.]net1
      www[.]google[.]no1
      damstein[.]no1
      clayvard[.]com1
      oppdal-booking[.]no1
      luthgruppen[.]no1
      gjestal[.]no1
      claytonwright[.]co[.]uk1
      hxqk[.]sk1
      lovetts[.]com1
      upkm[.]sanet[.]sk1
      loveumail[.]com1
      vae[.]sk1
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %TEMP%\CC4F.tmp7
      %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt6
      %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp6
      %HOMEPATH%5
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\01\0119C23D88292A0E4FEC04D5CF8629005A44E37C4
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\17\17542707A3D9FA13C569450FD978272EF7070A774
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\1A\1A141DBFA4083406630DD9A81AD35C416F6048004
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\47\47267F943F060E36604D56C8895A6EECE063D9A14
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\95\954D59EAEADC36CB19A224A5DDDFA1EDCFDC49CE4
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\A2\A2C4E53F8E58DC61E337D4CFBBDFBF5BA28258524
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\A5\A5B16A7D28D2BA79A9CCFC16ED480AD75A7571664
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\AF\AF210C8748D77C2FF93966299D4CD49A8C722EF64
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\B0\B066A9B35AE0BB605431AC8740DEA2A659EED4C44
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\Resources\D3\D34ED774F9FDCBA938A7807BD8FB1B398C51BC814
      %ProgramData%\Microsoft\Windows Defender\Scans\History\Results\Quick\{69EB062C-C99C-4979-B7E6-36430B258597}4
      %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\518e2bc94bc324e5e6f82437175ae1af_d19ab989-a35f-4710-83df-7b2db7efe7c54
      %ProgramData%\Microsoft\User Account Pictures\Administrator.dat4
      %ProgramData%\Microsoft\Windows Defender\Scans\CleanStore\LastBld.dat4
      %APPDATA%\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\Desktop\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\Documents\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\Downloads\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\Favorites\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\Links\NEMTY_GBF756G-DECRYPT.txt1
      %HOMEPATH%\NEMTY_GBF756G-DECRYPT.txt1
      *See JSON for more IOCs

      File Hashes

      0b02eb48cb0b7e88d3c5c6d6b6366dedc8d29f13e8ef252d768ce5f0acf3e6b7 2d2c2363a77afa2a914cf77e684cd279150bef2e5f5c27ba45e2be26b094d6e9 31145485a77c5167d0b01834793203c7f03e4298e532712773700f853bf494d5 4ed113b1e3967eea8beec9ac8b23017a25938dda53822c51c21d30c71a946660 53279dd8f9c45b2e213d4925c5a59cc0297a3446d566cb4eb2825b5042d912a9 7475233e2a3836d3a8b69fc76450cda8770beb5e61da095fb108898ef9bca0fb 7f944fc983d8100caf59f4918239e6d83f0cb2a498ea3f48e8623b3cebcc3250 944006ef7abb2e02f87ddafd0e50f8e3c600d3914462d6216027f5c5dd8db475 9f2a258a72368901ac1f99e7d0eadf62a85a2d33c56d3dca3d1406244dd0713a a30e02134af6767d48793d1ac857d428b11380fa6c2f4898918b1b3ed2012700 a969b88015cf14ae1b50cc903e82b75d754deddbca2a2bb1a39db4c6cf447c12 a9f6d5ad40d5b073be92fc46666ce1f96e30c50494a018d472cfee56ff2b8c65 cbe96c19bc6246b4c85242e87b74481be23ac7bebe61aea6b34ff7deb8f17275 d74cc221d6ab6e29b7049ab7f49a6ac80c9cde20ca7f4db31e128037f1bf9d4d dba02f5167986887ab29070b468c15bbc15d79942d62c8f9bcf95546c461d128 f15065bb9747e1c9a7f2bb41e80efdc2ef0435ac1f5b649d11c7537fa9095eba

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Malware.Qakbot-7586710-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 17 samples
      MutexesOccurrences
      ocmwn17
      Files and or directories createdOccurrences
      \TEMP\7dcd176143285b60a9dda1499593d0e2.exe1
      \TEMP\7119a1ba9e8866f9aca5360c337aa099.exe1
      \TEMP\8d6ac636eb8758ef5c1820e457f6f4c3.exe1

      File Hashes

      16e98279914ef3280950a2cba389e0aced7bc38d45db4f4e3b516bab17de41b2 2194ff71108712b66905dc46155aada3b0c5e56986e7db97f50b1dc5055aa41f 279be64e1b80827ebc2187f76914b57d8ce6fc14aa70ee908c8e29c1a6177f8a 2b8c204a35189a6937aa9740820a4ac6caf7ca372656d20d8bfc9f8583f02081 3cb499f2bb1838ad8066bae7254fa012a2b7ba4270ae284774537093898beda2 44b234565a5590957845f1c4e14e7c81ab5be8a9ae0d19a1f4e04ebcf67be907 46ab34a52c0e0f8a6cfb302d38085924f55e7a0d37c5bf8cd6b503ea83a2055e 58225241e8f436355e2cc739127490ad8a88d6d47620c727a26e56c5c1e786e0 5afa22c50fd430fed4f06437dcdb74248bc40917dd6a4f4844137528ae186aaa 8c17ae11559298aa36b6837b9e6a2f4fcee5a083004ea6463aa9384c04d016f3 abe179259e363dad7ab393685c3dd711550a9f8aa7fe5344de8141723352b0de b053b3570129f906cf09d2a63d034f724fd3d561d991fec761133c1cfe568ef6 b8a80038ab33b7a556f3b1e47cadfddc417d7301ee62c0a87610ab635e60360a bf052b65100259f2a13c98a20aad8f8bd8688a07639530aa12159200fb39c504 d6b4f5ce244ce922fbed636528ad6deb7ca306f543400657b5e07dc0ffd6521f db037e58c1bc214b4853bff0aedd8ba22a5ab60e37b127178fb36547b2124051 dc01374a8e4b46e82f3efc130065b8e7a93bdb537ece13e02ac303a881b138ac

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Malware.Razy-7588195-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 54 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
      Value Name: Locked
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\HOMEGROUP\UISTATUSCACHE
      Value Name: OnlyMember
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
      Value Name: CleanShutdown
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: Generation
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
      Value Name: Data
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{6DD1DC5F-5840-11E6-B80E-00501E3AE7B5}
      Value Name: Generation
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
      Value Name: Data
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA63-EF5C-11E4-BB8D-806E6F6E6963}
      Value Name: Generation
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
      Value Name: Data
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
      Value Name: Generation
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPLETS\SYSTRAY
      Value Name: Services
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES 1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: Drive Type
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: IsImapiDataBurnSupported
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\STAGINGINFO\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: DriveNumber
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\STAGINGINFO\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: StagingPath
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\STAGINGINFO\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}
      Value Name: Active
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING
      Value Name: CD Recorder Drive
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: FreeBytes
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: Blank Disc
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: Can Close
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: Live FS
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: Disc Label
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CD BURNING\DRIVES\VOLUME{509D0DCA-5840-11E6-A51E-806E6F6E6963}\CURRENT MEDIA
      Value Name: Set
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\HOMEGROUP\UISTATUSCACHE
      Value Name: UIStatus
      1
      MutexesOccurrences
      B4BBD0F7883AF46401A8F944D11D8E1698B68E3C40
      Global\<random guid>7
      opera_shared_counter642
      opera_shared_counter2
      <32 random hex characters>2
      {C20CD437-BA6D-4ebb-B190-70B43DE3B0F3}1
      1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      104[.]129[.]67[.]17022
      104[.]129[.]67[.]16818
      72[.]22[.]185[.]198/312
      185[.]53[.]179[.]71
      185[.]222[.]202[.]911
      62[.]149[.]210[.]91
      185[.]35[.]137[.]1471
      185[.]61[.]148[.]2241
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      www[.]msftncsi[.]com40
      ligue1[.]shop2
      klub11n[.]us2
      jong37[.]pw2
      klub046[.]co2
      ijust1fy[.]pw2
      ktfr34ks[.]pw2
      son0fman[.]pw2
      jsbook[.]info2
      js0c892[.]se2
      iyfsearch[.]com1
      ligue1[.]fun1
      www[.]mac-pro[.]it1
      j5cool[.]xyz1
      sm0osh[.]xyz1
      jo1b9[.]co1
      lip616[.]co1
      lip4u5[.]se1
      jsoc8492[.]us1
      jo15y[.]xyz1
      l0vew1n5[.]xyz1
      snd616[.]co1
      dill10n1[.]pw1
      j0011y[.]pw1
      j0nhy[.]pw1
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\sessuawh.lnk40
      %APPDATA%\Microsoft\Windows\sessuawh40
      %APPDATA%\Microsoft\Windows\sessuawh\jisgivdt.exe40
      %System32%\Tasks\Opera scheduled Autoupdate 31319613574
      %System32%\Tasks\Opera scheduled Autoupdate 31151841414
      %System32%\Tasks\Opera scheduled Autoupdate 29809666694
      %System32%\Tasks\Opera scheduled Autoupdate 31309130373
      %System32%\Tasks\Opera scheduled Autoupdate 31309127813
      %System32%\Tasks\Opera scheduled Autoupdate 31319614052
      %APPDATA%\Microsoft\Windows\sessuawh\sessuawh2
      %System32%\Tasks\Opera scheduled Autoupdate 30040350852
      %System32%\Tasks\Opera scheduled Autoupdate 31311093892
      %System32%\Tasks\Opera scheduled Autoupdate 31319621252
      %System32%\Tasks\Opera scheduled Autoupdate 31319613492
      %System32%\Tasks\Opera scheduled Autoupdate 31277671492
      %System32%\Tasks\Opera scheduled Autoupdate 30071808132
      %TEMP%\7CE0.dmp1
      %TEMP%\WPDNSE1
      %LOCALAPPDATA%\Microsoft\Windows\WER\ERC\statecache.lock1
      %System32%\Tasks\Opera scheduled Autoupdate 29893550211
      %System32%\Tasks\Opera scheduled Autoupdate 10444879321
      %System32%\Tasks\Opera scheduled Autoupdate 31319615521
      %System32%\Tasks\Opera scheduled Autoupdate 31319632611
      %System32%\Tasks\Opera scheduled Autoupdate 29809669251
      %System32%\Tasks\Opera scheduled Autoupdate 29897260241
      *See JSON for more IOCs

      File Hashes

      002f27cf7d9185bd0c0ee1c363a221be80e797db81f25e1abb9898de6906c6b6 00de50e39e76fe23df42f435dfe0c0571b41c06a4337f15dc0c70ef28182c332 03759da14ffcd558e1b492286a1f04cce519995b591a848ee4e76b1a00f9bfbd 038a84e68adbb095a8ad39ced3de6407f977113fee99c46c6e87dc7c2c66d739 070ef4de5fe79fe29dfb5d3db253ec2c4b6e20797116b608cbbadb110afc54d1 07ed129012419a5c63e2987883653f7781ccc214f2abe3580b3baac5df397b88 08f442c4d7bcbbfbed9cf39ed382529fdb1368f2cd8e8d88d39a987b566b705a 096add794410c4bc72ef29cebfba05db27ca895f9136eba710cf45ad3492e37d 0c260a56652727b6dd9e280cb741870e61b9c1a8fe54dad0e12b42b2163eb391 0ec389eaa5253a5477aff5a36b5af41a76430cc41a4231dba9dab9587650e36b 11c15bc5878e34eb98b320aa9d7dbe6fb71987603cec86d39c1d7a902e3b5eef 198501a9810da38bb19dc1e0f4dd3a669a86fa57165075485cebf6e7662600e7 1ac2a34d85e02dc74dc1f612d06634d160fd29e359d45b8a50ccc3bbd78c3975 20dd29c3c7271b2d44600e7896dc3e351e8d53b583f9535104fe9cca3077d219 21633fd3deaa6b4a8bb9095f3d396c894a0a8648edbd85919d4589068327c3b0 2c6a0eb320df561009681342b3ccb1dd8a585968ec0932716553389f19d0b620 2fa0184c94b5220ec52d03e99eaa43b00ee78ef956f4c3a5b09bb7dca8270f47 3563013bf168f3021b42950648dd8175e51baeea1f9b6f1a9c8dfe2fb28b0187 383dede6a6d363e97a2d34a002aca69378da4b6769b13976b0344a20272a7d9d 3d51cff2d7fe5c108b765525081c3c0ec62811d6fd8f6d1e8f7ccb23ce1b5160 40c184b47b2d4d52ab39aab7c81b9e80b85948e6321989eed2e071a2346c836e 41e87e94d52d08cd7d82e052a72b598421dbd469d676cfb58640521a15ec0eed 533418f5d648f0a9855adbea0b6001531d8ea6687db27e1ddc0a157174cbc605 560df0484842e569cf4ec7a3c9b6942fbab8a5e5ef1bf8516baa6317841aa4bf 586303e0a91cd70a44b2311a081462b396f0e57cd948edf0fa97a4896eb830a4
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Packed.Generickdz-7586813-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 37 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\REMCOS-ZUXZLQ 4
      <HKCU>\SOFTWARE\REMCOS-ZUXZLQ
      Value Name: licence
      4
      <HKCU>\SOFTWARE\REMCOS-ZUXZLQ
      Value Name: exepath
      4
      <HKCU>\SOFTWARE\REMCOS-V1R5VH 2
      <HKCU>\SOFTWARE\REMCOS-V1R5VH
      Value Name: exepath
      2
      <HKCU>\SOFTWARE\REMCOS-V1R5VH
      Value Name: licence
      2
      <HKCU>\SOFTWARE\REMCOS-6PU1BX 1
      <HKCU>\SOFTWARE\REMCOS-6PU1BX
      Value Name: exepath
      1
      <HKCU>\SOFTWARE\REMCOS-6PU1BX
      Value Name: licence
      1
      MutexesOccurrences
      QSR_MUTEX_ayVRCIIhAhYn6ZIdtI17
      Remcos_Mutex_Inj7
      Remcos-ZUXZLQ4
      3749282D282E1E80C56CAE5A2
      Global\{b1324b26-be01-4620-bf4b-b68b0ae0f95b}2
      Remcos-V1R5VH2
      57926c4f-8f06-4a2d-a8d5-a3428f4894fd1
      Global\8e50a541-4f19-11ea-a007-00501e3ae7b51
      Remcos-6PU1BX1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      208[.]95[.]112[.]117
      46[.]105[.]98[.]5317
      79[.]134[.]225[.]1232
      209[.]127[.]19[.]341
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      ip-api[.]com17
      variakeburne[.]ddns[.]net4
      randydidier2468[.]ddns[.]net2
      renaj2[.]ddns[.]net2
      worldatdoor[.]in1
      kitchenraja[.]in1
      sixteen147[.]ddns[.]net1
      Files and or directories createdOccurrences
      %APPDATA%\Logs17
      %APPDATA%\Microsoft\System32.exe17
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\System32.vbs17
      %APPDATA%\Logs\02-14-202017
      %APPDATA%\<random, matching '[a-z0-9]{3,7}'>13
      %APPDATA%\remcos\logs.dat7
      %TEMP%\96f91905-b339-4638-bd86-c6a77cf058d34
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\appsdatas.exe.vbs4
      %APPDATA%\appsdatas4
      %APPDATA%\appsdatas\appsdatas.exe.exe4
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\yfgr.exe.vbs4
      %APPDATA%\jnxc\yfgr.exe.exe4
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\lmwq.exe.vbs3
      %APPDATA%\hcek\lmwq.exe.exe3
      %APPDATA%\D282E1\1E80C5.lck2
      %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c52
      %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C52
      %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs2
      %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator2
      %APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\daxp.exe.vbs2
      %APPDATA%\gnwk\daxp.exe.exe2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\update.vbs1
      %APPDATA%\appdata\update.exe1
      %TEMP%\637172179772244000_d1934800-c529-4e3b-afff-37bcc71b45d4.db1
      *See JSON for more IOCs

      File Hashes

      08ce5d7fc0de04906c1c24dc0d72d279dbd125b61d4ff3361e5f960d3441e421 0a603c32a8e16c81e314e9030a6e6d45055ae5f93ca819121ba6538660fe3072 0c4b27461dbd294c5a6a3851051ab5ff3ecf6b6aa72b7588ba59a7381632f06e 12a2568481ee9eca1ccb7a522f5853a7b0aa30ed56abfa5d3f1a2168865f390a 13ac030d6a53c594e08ffb80140b43fcad93841e170be5d8043e9f4b1512ea7e 1514b3e4e3c01eae8d55693255f12c5efd68549491c007425b6cac2465ec07b2 16a94d5de704b8166684143480c0c93c522751eba3acc8a79d468d0e7b579a9e 17309647cddb67ae9146b2746461e0152240808f88231c790dfcf923a7b717a2 1fbc7923dbc28f31aed3114f6ae66cd7431b78639b0998af963f606dd430dd41 1fde04dd38b0e62c6e39c9cf83d946052d665ab43be1aad712c665d4f216becf 2766c878553e8b7fae74b133be1880b6a345ade8284d919717d0ca6427e85a38 2ae7fe445fcc08eb3179519a41aea3fb7310e33973af114efd17dfa8653cbc5d 2b70abdaf78867285774c432c365ad6a7ab5777f0eda50d9c202205fcfe576d5 30b44cab6a839ae845647b0d608f645cc44bf01af6d5a9b53aae92e46bc12159 312915777632ef010f7a3bb2c60c274ea7c6d3f195349efac5e1057f6ec8a46a 3328f4ca20a50c85d8ddb77e20b54822bb44c7fc7dfbaab279fcf39389a50355 35ed04364daa9a21e306204ea27f1d7186248a8ab6bbc03ab202fb8d6f998a05 38f23b5da8cba1044efabbf1bbdb29d0fc748206ff5709a9c8c0fc553c21418c 3e50718cfffca7db327d35011301206ce21a7103f6a68bd78859a666e5781f42 4124aa54761859ab9d92cb3d50a64e461c5fe76b70b0839e933117fdb91391f0 48a1f2cf546a630bc763375052b734d4d1bd8d121e440a1718ec2c09d1605f57 4b388553f1b23e229fed441a7ada1afd2a87dfb1e77dc43d86f86b4028c2d46a 553e69e62475f74dcf2762e5499167539ae77df7692f0967cc1f9408d0bd8ae4 557e52d63114622d6adec38238bdf81d944d66389b07ddbe542fb8799b8d0b3e 5d3a4d8448e8af881bb3f82ed0d34735491c076c7c7f1f642431ec2777f4dec9
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Packed.Tofsee-7586819-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 18 samples
      Registry KeysOccurrences
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES 18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Type
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Start
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ErrorControl
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: DisplayName
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: WOW64
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ObjectName
      18
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Description
      18
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config0
      18
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config1
      18
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config3
      17
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config2
      17
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ImagePath
      13
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\haoutbhw
      3
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\fymsrzfu
      3
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\nguazhnc
      2
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\unbhgouj
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\ibpvucix
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\exlrqyet
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\wpdjiqwl
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\tmagfnti
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\zsgmltzo
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\slzfemsh
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\mftzygmb
      1
      MutexesOccurrences
      sejavpsfushosuk7
      None4
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      69[.]55[.]5[.]25218
      85[.]114[.]134[.]8818
      239[.]255[.]255[.]25017
      192[.]0[.]47[.]5917
      46[.]28[.]66[.]217
      78[.]31[.]67[.]2317
      188[.]165[.]238[.]15017
      93[.]179[.]69[.]10917
      176[.]9[.]114[.]17717
      172[.]217[.]197[.]26/3116
      172[.]217[.]7[.]13216
      168[.]95[.]5[.]112/3115
      46[.]4[.]52[.]10914
      43[.]231[.]4[.]714
      209[.]85[.]202[.]26/3113
      98[.]136[.]96[.]92/3113
      67[.]195[.]204[.]72/3013
      216[.]146[.]35[.]3512
      211[.]231[.]108[.]46/3112
      12[.]167[.]151[.]116/3012
      67[.]195[.]228[.]86/3112
      168[.]95[.]6[.]56/2912
      64[.]233[.]186[.]26/3111
      192[.]0[.]56[.]6911
      96[.]114[.]157[.]8010
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      microsoft-com[.]mail[.]protection[.]outlook[.]com18
      252[.]5[.]55[.]69[.]in-addr[.]arpa18
      schema[.]org17
      whois[.]iana[.]org17
      whois[.]arin[.]net17
      252[.]5[.]55[.]69[.]zen[.]spamhaus[.]org17
      252[.]5[.]55[.]69[.]bl[.]spamcop[.]net17
      252[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org17
      252[.]5[.]55[.]69[.]cbl[.]abuseat[.]org17
      252[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net17
      bestladies[.]cn16
      bestdates[.]cn16
      bestgirlsdates[.]cn16
      sex-finder4you1[.]com16
      eur[.]olc[.]protection[.]outlook[.]com14
      aol[.]com13
      mx-aol[.]mail[.]gm0[.]yahoodns[.]net13
      hotmail-com[.]olc[.]protection[.]outlook[.]com13
      smtp[.]secureserver[.]net12
      mx-eu[.]mail[.]am0[.]yahoodns[.]net11
      msa[.]hinet[.]net11
      myibc[.]com11
      ipinfo[.]io10
      hotmail[.]fr10
      mx1[.]comcast[.]net10
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %SystemRoot%\SysWOW64\config\systemprofile18
      %SystemRoot%\SysWOW64\config\systemprofile:.repos18
      %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>18
      %TEMP%\<random, matching '[a-z]{8}'>.exe18
      %HOMEPATH%14
      %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)14
      %TEMP%\kjzvcyd.exe1

      File Hashes

      005ac256dddc3a368386cf19e2c8ff4ff897453e13d31c2a002389b1b8f6f0e6 0225cfc00d03fb8135dab6acdbb2165f678c8693927dd4e8180b7ddfa8bdcbae 2ecaa4a4541645f3d329b65981f97403c3a3cc2bf77feeecef4cc5108e5eb649 357ed9b86a1c594596641c650bce143f7d58f42c6c67fd508168389805eb2739 3ce3671481b73bf71782605b8e6429753a3c7a253b6ff8dd0c80af28eb881633 53210cdce3d628a61c5aed9fcad723d30634f6df74a8118183f9bfa8ba0b643e 53b68915686769a14855c37ad232b86f7d982d7c88e74ff641f1046612e04011 57917ee62c89309f3ac65a67ef6b3e983c2b882a9770e43b0095edb348ae9cb4 7e8a5dedb5852ba8f9f3970c0204657611bb7b3e8009c019e7105b7528111403 8f1d942a42022e2ad2c7ea175e742fc83785883df3e32e2f696cccb1785f9b04 9f23b12abc917fd84e47626f4695a2f811352dcf100224623dbb1343c2503bd2 a55ef46691eeebb5afe92223a87d8fa1332dc8406d5933d6dbadfebbea6708cc b833f9b5e15ceb0e9553dba19386e5f9420795251c499aee1f4dde3c19ae5571 bae92bcf28992f8a71f9216af418f3a38ca58435b0be6e9e998ba30680a9aa49 cf5208d9d87f44c5adc6cb07f050fa11693654384840cbf3f8ef6c7bcb299c39 d8cb668abbc88169df7393ef917f8214b53192c1cac6e372f46f048416fffe89 e29f7b44dbc846b438af94610b75f5d091ea15308536dfa337bf8c27bc80acdd e60fa6d29dcbac234244922ed994abff1e02a63ca62bdd7efb1393a1c22052c5

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Malware.Nymaim-7586870-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
      <HKCU>\SOFTWARE\MICROSOFT\KPQL 25
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
      Value Name: GlobalAssocChangedCounter
      25
      <HKCU>\SOFTWARE\MICROSOFT\GOCFK
      Value Name: mbijg
      25
      <HKCU>\SOFTWARE\MICROSOFT\KPQL
      Value Name: efp
      25
      MutexesOccurrences
      Local\{2D6DB911-C222-9814-3135-344B99BBA4BA}25
      Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
      Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
      Local\{D8E7AB94-6F65-71DE-8DA1-FE621BE2E606}25
      Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
      Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
      Local\{445DE72D-9B60-6571-D392-6925F65F5FE7}25
      Local\{E41B13B6-7B07-8560-4026-41A66FCE339D}25
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      46[.]4[.]52[.]1091
      93[.]179[.]69[.]1091
      78[.]31[.]67[.]231
      176[.]9[.]114[.]1771
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      neawce[.]in24
      cawugh[.]pw24
      bfjtkee[.]in24
      xnexvlnlm[.]in24
      xirvjdkza[.]pw24
      njzcxk[.]in24
      ozbpuhdibrq[.]in24
      kniqbngezi[.]net24
      pbgtihnv[.]com24
      gxdawu[.]net24
      gxvim[.]com19
      nkkzhqqslod[.]com19
      tiuzomycjp[.]com19
      wzfhxytur[.]net19
      cdnnoeem[.]net19
      qlqywqinnnof[.]net19
      upfqangse[.]net19
      cxtuswfapphv[.]net19
      vgazbwj[.]net19
      apdkokb[.]net19
      xknfwgwvcut[.]net19
      jwieiuggex[.]com19
      rpwecn[.]net19
      wcafbjwj[.]com19
      bjeuewe[.]pw19
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %ProgramData%\ph25
      %ProgramData%\ph\eqdw.dbc25
      %ProgramData%\ph\fktiipx.ftf25
      %TEMP%\gocf.ksv25
      %TEMP%\kpqlnn.iuy25
      %TEMP%\fro.dfx19
      %TEMP%\npsosm.pan19
      \Documents and Settings\All Users\pxs\dvf.evp19
      \Documents and Settings\All Users\pxs\pil.ohu19

      File Hashes

      0218e9c2cf3ca8f6201331e44bfa7d8a5448b1b5b08d8b14d85aebb65671e1a2 0454d49281ad2a9f99228f543428338353da11fbf78e36b7f5b31479c121bf6b 056dc90528fe0b52da0e2810dfecc00a33ecb3fb055d4b1887b06ab042dbae1e 09136689c46634da3d89dc3609bc2db9582cf70992b9ef92ef6c7dfb3416bee2 0a58ad96a90964d56735bf61afa86fa7c6a2a3e15092b66154c6418465bb3a00 0cbed52d77571cb00e68ca65ed017272b69c2b90b548f5a3354dec2fd4da677c 1725392d15f6eeee49ba8222c595faeb59a5434b9136b137dc03a9b61e084087 17f077b3721d13d89bfe4d84b297620ff8590b9949e0b3a90e754cd147808695 201591910712d7b75f17831436b9c2c7a5bc95e6009d7a744de0fd2fe34a1dc6 20b70cb79a5bef35145254e2c456da2d2d90f7e2de2f72d413ce0fbf844af66f 2696cc5afb7daf7e9acfa6b48e9c925961c8b3675d4dba20fcd840879695f8dd 287f5e0b40f6341f7f9b09a97d2efbb00b9c389053b76976ccade63027f02425 2b0b69fcba2279c7c731adc17ce5e395739a4d957afe75b4dffe79a911d06834 3343d61a8a5e8f19686995852ac47dec453da1a61f0544a2b6cc75b404ac40c1 37c3c75c995da210c09a6b6e258af839386c4a8661d16395ef179065326ebbd7 39c08d0ebe20734e86539503b615716ef692aa37ba6a490e0265d1560dbae71c 3cfc8edcb512891aeb4241df6a800981d83c329883eaeeb265f5b555be7c85a4 43983a108eee5452032f21f6895cb9d930af372f4fbbf51e217a58f68412c9c4 44033bd26650bac58f19414b2f937a3d0aebd819a145738d4d9e77a087d1b2e2 446952c8181f0736647c99e3d4160fafcf272c885a62b19e4028a41183227292 473e6d64b9b5d33250f89781d2d7d0b7a763563e6703907953ae226e078b2a49 589b303963958d48a6d5aa9a506955ed04242994f1f7e36b8819463200970b21 5b186038f17adbde16e02e1e29513354112ecdc9b3a8be5fe2978696ce9541ec 5d95754de0c3bda4841e7122b0b24bd5d949adc647735582d4e6af72274950d7 6123859235132aed86f0520e20d623e8d5d0438e082db32caf310d1b77aa9ec3
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Ransomware.Remcos-7586925-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 12 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\OSRS18HD-UKGZDR 12
      <HKCU>\SOFTWARE\OSRS18HD-UKGZDR
      Value Name: EXEpath
      12
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
      Value Name: Path
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
      Value Name: Hash
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
      Value Name: Triggers
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
      Value Name: DynamicInfo
      1
      MutexesOccurrences
      Remcos_Mutex_Inj12
      OSRS18hd-UKGZDR12
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      secure[.]jagexlaucher[.]top12
      Files and or directories createdOccurrences
      %SystemRoot%\win.ini12
      %APPDATA%\ErrorLogs12
      %APPDATA%\ErrorLogs\logs.dat12
      %System32%\Tasks\SearchUI12
      %APPDATA%\SearchUI.exe12
      %SystemRoot%\Tasks\SearchUI.job9

      File Hashes

      08606543b261293be2c91acebdd4100b77471a2cb2f29b8f558f2d12dd01c954 2d5275f0deb740be06001aa53d8719db88d08426f2e5f1b44bc4626fcc9b0258 46835bd196f40e56dfeb8fbdbf1e328358e545649ce10aa580575874ffeba5b1 778608ebdb66b22322989f6889668d11a5c243f540d094f834743651f847f6d3 b1edb734e012c5b941e7e7190b23c472937b5332b9af826e5eb07a807c7f0e80 c0a687a74845e57c671768eac45588576a194f36165279f19edb22d45a595904 cd9d9e7f425fbc41e1c6e12e7e9ffd0d9800aa703e690802a260f5f29837967a dc789666026dacfc446d3559c0aebeab538608668fac6645ba73591d9a4ced58 dda31fb5d2659b268d9f12541f26042e626d6162c442362b362f0eb80011c741 e6d0a9641a275e95ed0835cc1c65f861f03e6643b99ef24bb1b1e6711fe6b31e ec8cc8dd06095a94275b3e3f7564dfddbcb20ce78b84da301768b0e8484482a5 f21bb31466c5f318f41c021fc459caf0e413f580ade991087bc499bb5fa2ffa7

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Malware.Autoit-7586956-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      Registry KeysOccurrences
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A} 25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
      Value Name: ProxyEnable
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
      Value Name: ProxyServer
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
      Value Name: ProxyOverride
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
      Value Name: AutoConfigURL
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
      Value Name: AutoDetect
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
      Value Name: SavedLegacySettings
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
      Value Name: WpadDecisionReason
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
      Value Name: WpadDecision
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
      Value Name: WpadNetworkName
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
      Value Name: WpadDetectedUrl
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
      Value Name: CachePrefix
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
      Value Name: CachePrefix
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
      Value Name: CachePrefix
      25
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCHEDULE
      Value Name: NextAtJobId
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      Value Name: ProxyBypass
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      Value Name: IntranetName
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      Value Name: UNCAsIntranet
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
      Value Name: AutoDetect
      25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD 25
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\C8-B0-99-0A-48-DD 1
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}\C8-B0-99-0A-48-DD 1
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\C8-B0-99-0A-48-DD
      Value Name: WpadDecisionReason
      1
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\C8-B0-99-0A-48-DD
      Value Name: WpadDecisionTime
      1
      <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\C8-B0-99-0A-48-DD
      Value Name: WpadDecision
      1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      199[.]59[.]242[.]15325
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      infikuje[.]freevnn[.]com25
      11776[.]bodis[.]com20
      Files and or directories createdOccurrences
      \atsvc25
      %System32%\winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx25
      %System32%\Tasks\At125
      %SystemRoot%\Tasks\At1.job25
      %SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat25
      %SystemRoot%.exe25
      \Documents and Settings.exe25
      \MSOCache.exe25
      \PerfLogs.exe25
      %ProgramFiles(x86)%.exe25
      %ProgramFiles%.exe25
      %ProgramData%.exe25
      \Recovery.exe25
      \TEMP.exe25
      \Users.exe25
      %SystemRoot%\svhost.exe25
      \$Recycle.Bin.exe25
      %SystemRoot%\Driver.db25
      e:\System Volume Information.exe25
      e:\$RECYCLE.BIN.exe25
      \starup.exe25
      \System Volume Information.exe25
      %SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\list[1].htm25
      %SystemRoot%\list.txt25
      %HOMEPATH%\Local Settings\History\History.IE5\desktop.ini20
      *See JSON for more IOCs

      File Hashes

      0cfd5fcfbe7dcb0ca5d046e97815d68b7afec7562255c591efaf6e6ddff04dc3 176e3815db0582a528559fcd4ac5d556d8b44354470ef7000246a7dd70e02042 188fb9f78f7b0ec6ef4ddac9d5c3e246563a9d5e4689b49c5b4be343be805be6 1e401c8be910e4f07af2e40c1c20b25be23e896e3aef6c887bc505b4ffee805a 25290bd54de5289d9ea3cbcbf59fefa0a7efa1743196043989029d3b1a3aa23f 2c52210a40af62a33415f9d5fc31cf4ed0c9d60d87dc97fa53db86c028b4a486 2db7594e73018d54e9dca34869eed6fa7e523fd519e2cdc74a32a91d31c6a945 30226cf05067f4906bec842742691778bfe2f277a3ee3ebf82ebc5a2d313806c 32f9cec632967d84f191d9bb514409dcff9f4d8e59097e98fa72e74cbfd32ce9 3909a29ead2eb2248f107c1352e5259d244b3eda0c971b136fab7e671f63a7e2 3b2f4a185951364a131c6ece1b282f7442045063f0d00562bd1c462ddc45e8e5 433b74fd6206dcc64cdc96141263cf1fc5720f087e15ddb581b2084ba0604c1c 4544acce7aad2dc7f8ffc93815eaea59f714552a21863a70132a742e4938a852 478d53130c7b549c54401d4d1c8501a310e99a350846e0515ef8d416822d4ada 4872d9c8e75aa6ad18a1272b17c617811eff6c411f181cc450a52be747fc4d20 48d8d3219b405e7a7ac7e53dac401be58e50cc582d4d5a2c96eb3edab10a8920 4e0b6052c58992f28138a28c281c4bca93f3f90c6c14ef3b88ff697c821e3f34 520f5cfd75870100df9da88875a9d6aef2dae064901acf35695c7ea0d8f36410 56641ea2594a21e5aa25475b295b5130e49c94c78ec42d45b1aed9cf929ea300 65e7b497cebcd23ceb769656cc011a3cadfdd618657a0d66e14a63f94a113fcd 6b1821395bbba2f70b42f963dd63772d4dc97b9dcfeb13ea592ead01587c36d2 6f416a86789e81f95138751a71006189bf6e1215d8ea2063c370862738a996a3 75c38fa29ebe45c102663815d76491a566e34e404dd99088fb4257744539ed6e 78f0240b6e9c1a74546845b3d0ddfc84aecc388f8ff7d794cf80e33ae0de4c31 7f2e6da85f7ebb3dd066315504735c8dbcc4cdbc9c24d7d944cdeeb09df1c869
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Exploit Prevention

      Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
      CVE-2019-0708 detected - (3408)
      An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
      Excessively long PowerShell command detected - (414)
      A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
      Process hollowing detected - (210)
      Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
      Kovter injection detected - (143)
      A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
      Gamarue malware detected - (114)
      Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
      Installcore adware detected - (97)
      Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
      Dealply adware detected - (90)
      DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
      Atom Bombing code injection technique detected - (21)
      A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
      Corebot malware detected - (12)
      Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
      IcedID malware detected - (9)
      IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.

      Vulnerability Spotlight: Multiple vulnerabilities in Moxa AWK-3131A

      $
      0
      0

      Jared Rittle and Carl Hurd of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

      The Moxa AWK-3131A networking device contains several different vulnerabilities that an attacker could exploit to carry out malicious activities in an industrial environment. The AWK-3131A is a wireless networking device that is meant to be used in large-scale, industrial cases to provide
      communication across the environment in which it's deployed. This device contains several bugs that could lead to numerous malicious activities, including remote code execution and privilege escalation.

      In accordance with our coordinated disclosure policy, Cisco Talos worked with Moxa to ensure that these issues are resolved and that an update is available for affected customers.

      Vulnerability details

      Moxa AWK-3131A iw_console privilege escalation vulnerability (TALOS-2019-0925/CVE-2019-5136)

      An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A ServiceAgent use of hard-coded cryptographic key (TALOS-2019-0926/CVE-2019-5137)

      The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A, firmware version 1.13.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A encrypted diagnostic script command injection vulnerability (TALOS-2019-0927/CVE-2019-5138)

      An exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A multiple iw_* utilities use of hard-coded credentials vulnerability (TALOS-2019-0928/CVE-2019-5139)

      An exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities of the Moxa AWK-3131A, firmware version 1.13. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_webs DecryptScriptFile file name command injection vulnerability (TALOS-2019-0929/CVE-2019-5140)

      An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_webs iw_serverip parameter command injection vulnerability (TALOS-2019-0930/CVE-2019-5141)

      An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A WAP hostname command injection vulnerability (TALOS-2019-0931/CVE-2019-5142)

      An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-3131A firmware, version 1.13. A specially crafted entry to network configuration information can cause the execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_console conio_writestr remote code execution vulnerability (TALOS-2019-0932/CVE-2019-5143)

      An exploitable format string vulnerability exists in the iw_console conio_writestr functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A ServiceAgent denial-of-service vulnerability (TALOS-2019-0938/CVE-2019-5148)

      An exploitable denial-of-service vulnerability exists in ServiceAgent functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_webs user configuration remote code execution vulnerability (TALOS-2019-0944/CVE-2019-5153)

      An exploitable remote code execution vulnerability exists in the iw_webs configuration-parsing functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted username entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_webs account settings improper access control vulnerability (TALOS-2019-0955/CVE-2019-5162)

      An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted username entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low-privilege user to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Moxa AWK-3131A iw_webs hostname authentication bypass vulnerability (TALOS-2019-0960/CVE-2019-5165)

      An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      Versions tested

      Talos tested and confirmed that these vulnerabilities affect the Moxa AWK-3131A, running firmware version 1.13.

      Coverage

      The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

      Snort Rules: 52010 - 52018, 52024, 52025, 52086, 52241

      New Research Paper: Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem

      $
      0
      0
      Detection of malware is a constant battle between the technologies designed to detect and prevent malware and the authors creating them. One common technique adversaries leverage is packing binaries. Packing an executable is similar to applying compression or encryption and can inhibit the ability of some technologies to detect the packed malware. High entropy is traditionally a tell-tale sign of the presence of a packer, but many malware analysts may have probably encountered low-entropy packers more than once. Numerous popular tools (e.g., PEiD, Manalyze, Detect It Easy), malware-related courses, and even reference books on the topic, affirm that packed malware often shows a high entropy. As a consequence, many researchers use this heuristic in their analysis routines. It is also well known that the tools typically used to detect packers are based on signature matching and may sometimes combine other heuristics, but again, the results are not completely faithful, as many of the signatures that circulate are prone to false positives.

      [Armadillo v1.71]
      signature = 55 8B EC 6A FF 68 ?? ?? ?? ?? 68 ?? ?? ?? ?? 64 A1
      ep_only = false

      This signature can be found in many packer signature databases available online, and is responsible for many false positives (e.g. 7z.exe, a commonly used tool, is flagged as being packed by Armadillo).

      This imprecision has many consequences on malware related systems and studies:

      • Sample ingestion pipelines often rely on static data, which is not reliable if a sample is packed.
      • Machine learning based classifiers need to be trained with a solid source of ground truth. Polluted datasets negatively affect the reliability and performance of these approaches.
      • A wrong classification of packed vs. not packed malware can affect studies that analyze trends in malware.

      Researchers have sporadically mentioned the existence of low-entropy packers, but it was still unclear if this phenomenon is relevant or negligible. We conducted a systematic study over a curated dataset of 50,000 low-entropy malicious PE files belonging to multiple families, obtained from the VirusTotal public feed, observed between 2013 and 2019. Then, we leveraged a dynamic analysis system based on the PANDA binary instrumentation framework in order to provide ground truth about the presence of a packer and the scheme used to keep entropy low: byte padding, encoding, transposition, monoalphabetic and polyalphabetic substitution.

      For further details about these schemes, our dynamic analysis component, and how we designed and conducted these experiments, you can refer to the full paper. Our results show that over 30 percent of these low-entropy files adopt some type of run-time packing. Similarly, we obtained a dataset belonging to APT samples obtained from numerous reports and whitepapers, conducted a similar experiment and observed that up to 15 percent of these low-entropy files were packed. These numbers confirm that the phenomenon is not negligible and must not be ignored in future studies.

      In a second test, we evaluated the detection rates of commonly used tools such as PEiD, DIE, and Manalyze. All the tools had difficulties to recognize low-entropy packers as packed, and some of them showed false positive detections of common off-the-shelf packers due to weak heuristics or signatures.

      Finally, we conducted an experiment to evaluate several machine-learning based classification approaches to distinguish between packed and not packed files. For this, we collected all the features used to date in different academic publications. In all cases, these classifiers showed an important performance degradation when trained and evaluated on a dataset with low-entropy packers: even the best classifier was able to detect only 70 percent of the packed samples in our dataset.

      For more on our research, the authors of this research paper will be presenting their work at NDSS on February 26th, 2020. You can also download the full research paper here...

      Beers with Talos Ep. #73: Feature ownership, vuln advisories and fancy audio FX

      $
      0
      0

      Beers with Talos (BWT) Podcast episode No. 73 is now available. Download this episode and subscribe to Beers with Talos:

      If iTunes and Google Play aren't your thing, click here.

      Recorded Feb. 19, 2020

      Craig made an oopsie. Pardon his echo-chamber reverb. We had no idea until he sent in his audio for mixing. This is a shorter episode focusing on software licencing and features, as well as vulnerability disclosure. Join us to talk about vendors' abilities to disable feature sets and owning versus using products. We further chat about vulnerabilities and how a vendor with no security advisories is often seen as a “more secure” option, when in fact, that can mean the exact opposite.

      The timeline:

      • 01:00 — Roundtable: Oh man. That reverb. 
      • 04:25 — Software licensing: Do you own the features of the products and software you have purchased?
      • 15:35 — Vuln disclosure: How can security advisories be viewed as a bad thing?
      ==========

      Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler) and Nigel Houghton (@EnglishLFC). Hosted by Mitch Neff (@MitchNeff)

      Subscribe via iTunes (and leave a review!)


      Subscribe to the Threat Source newsletter


      Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

      Threat Source newsletter (Feb. 27, 2020)

      $
      0
      0

      Newsletter compiled by Jon Munshaw.

      Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

      We know we’ve kept you waiting for a while, but the new Snort Resources page is finally here. We’ve got new and improved documentation, but our most exciting feature is the new Snort 101 video series. In these short tutorials, you’ll learn everything you need to know about configuring Snort 2 and 3, and even dives a little bit into rule writing. Head over to the Snort blog for more.

      If you’re hanging out at RSA, what better way to escape the crowds for a few minutes than slinking off to listen to the new Beers with Talos episode. It’s shorter than usual, but we’ve still got plenty of talk of vulnerability research and software licenses.

      And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

      Upcoming public engagements

      Event: Cisco Live Australia 
      Location: Melbourne Convention & Exhibition Centre, Melbourne, Australia
      Date: March 3 - 6
      Speakers: Nick Biasini
      Synopsis: Cisco Talos specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In Nick's talk at Cisco Live, he will perform a deep analysis of recent threats and show how Talos leverages large datasets to deliver product improvements and mitigation strategies.

      Event: “Everyone's Advanced Now: The evolution of actors on the threat landscape” at Interop Tokyo 2020
      Location: Makuhari Messe, Tokyo, Japan
      Date: April 13 - 15
      Speakers: Nick Biasini
      Synopsis: In the past, there were two clear classes of adversary an enterprise would face: sophisticated and basic. These basic threats were commodity infections that would require simple triage and remediation. Today, these commodity infections can quickly turn into enterprise-crippling ransomware attacks, costing organizations millions of dollars to recover. Now more than ever, organizations need every advantage they can get — and threat intelligence is a big part of it. Having visibility into your own environment and attacks around the globe are equally vital to success. This talk will cover these trends and show how the gap between the sophisticated and the basic adversary is quickly disappearing.

      Cyber Security Week in Review


      • Cisco announced the new SecureX security platform at the RSA conference earlier this week. The new product aims to simplify the patching process by bringing multiple products under one interface. 
      • The actors behind the DoppelPaymer ransomware launched a new site that they say will be used to post the information of victims who do not pay the requested extortion payment. There are already vague references to four different victims along with the information the actors stole. 
      • Verizon became the latest company to pull out of the RSA conference right before the conference was slated to begin earlier this week. Several security vendors have cited concerns over travel and coronavirus fears.  
      • Several security experts at RSA urged American election officials to switch to paper ballots for voting. Members of a panel suggested that technology be used as a check to audit voting results rather than the first line of defense.  
      • More than 120 million employees and customers of French sporting goods company Decathlon had their information leaked. An unsecured server contained information including email addresses and employee contracts. 
      • An attacker stole the information of more than 200,000 people connected to the Defense Information Systems Agency. The agency is responsible for overseeing communications between the White House and other defense agencies.  
      • Huawei says it is still open to licensing its 5G technology to an American company. Huawei, a large Chinese tech company, is still locked in a battle with the American government over cyber security concerns. 
      • Google released a patch for its Chrome web browser that fixes a type confusion vulnerability in its V8 engine that was being used in the wild. This is the third zero-day discovered in Chrome in the past year. 
      • The U.S. Department of Justice is hoping to pass legislation to force tech companies to help them decrypt users’ devices if they are involved in a criminal case. Companies like Apple have rebuked multiple asks from the U.S. Attorney General’s office to unlock iPhones in the past. 

      Notable recent security issues

      Title: ObliqueRAT spreads via malicious documents
      Description: Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we're calling "ObliqueRAT." These maldocs use malicious macros to deliver the second-stage RAT payload. Network-based detection, although important, should be combined with endpoint protections to combat this threat and provide multiple layers of security. According to Talos researchers, ObliqueRAT has connections to the adversaries behind the CrimsonRAT discovered last year.
      Snort SIDs: 53152 - 53163

      Title: Multiple vulnerabilities in Cisco Data Center Network Manager 
      Description: Cisco Data Center Network Manager contains a privilege escalation vulnerability and a cross-site request forgery vulnerability. Cisco disclosed the high-severity vulnerabilities late last week. In the casea of the privilege escalation vulnerability, an attacker could exploit the Network Manager in a way that would allow them to interact with the API with administrator-level privileges. A successful exploit could allow the attacker to interact with the API with administrative privileges.
      References: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-priv-esc

      https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-csrf
      Snort SIDs: 53171 - 53176

      Most prevalent malware files this week

      SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
      MD5: 47b97de62ae8b2b927542aa5d7f3c858
      Typical Filename: qmreportupload.exe
      Claimed Product: qmreportupload
      Detection Name: Win.Trojan.Generic::in10.talos

      SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
      MD5: 8c80dd97c37525927c1e549cb59bcbf3
      Typical Filename: eternalblue-2.2.0.exe
      Claimed Product: N/A
      Detection Name: W32.85B936960F.5A5226262.auto.Talos

      SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
      MD5: e2ea315d9a83e7577053f52c974f6a5a
      Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
      Claimed Product: N/A
      Detection Name: W32.AgentWDCR:Gen.21gn.1201

      SHA 256: 1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7 
      MD5: 88cbadec77cf90357f46a3629b6737e6
      Typical Filename: FlashHelperServices.exe
      Claimed Product: Flash Helper Services
      Detection Name: PUA.Win.File.2144flashplayer::tpd 

      SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
      MD5: 799b30f47060ca05d80ece53866e01cc
      Typical Filename: mf2016341595.exe
      Claimed Product: N/A
      Detection Name: W32.Generic:Gen.22fz.1201

      Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

      Threat Roundup for February 21 to February 28

      $
      0
      0
      Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 21 and Feb. 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

      As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


      For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
      The most prevalent threats highlighted in this roundup are:

      Threat NameTypeDescription
      Doc.Malware.Valyria-7595017-0 Malware Valyria is a malicious Microsoft Word document family that is used to distribute other malware, such as Emotet.
      Doc.Downloader.Emotet-7593277-0 Downloader Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. It is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
      Win.Dropper.Bifrost-7593600-0 Dropper Bifrost is a backdoor with more than 10 variants. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the client, to execute arbitrary code on the compromised machine. Bifrost contains standard RAT features including a file manager, screen capture utility, keylogging, video recording, microphone and camera monitoring, and a process manager. Bifrost uses a mutex that may be named "Bif1234," or "Tr0gBot" to obtain persistence.
      Win.Dropper.XtremeRAT-7594794-0 Dropper XtremeRAT is a remote access trojan active since 2010 that allows the attacker to eavesdrop on users and modify the running system. The source code for XtremeRAT, written in Delphi, was leaked online and has since been used by similar RATs.
      Win.Dropper.Upatre-7594799-0 Dropper Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
      Win.Dropper.NetWire-7597088-0 Dropper NetWire is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, remote desktop, and read data from connected USB devices. NetWire is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
      Win.Packed.njRAT-7595003-1 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
      Win.Packed.Zbot-7595026-0 Packed Zbot, also known as Zeus, is a trojan that steals information, such as banking credentials, using methods such as key-logging and form-grabbing.
      Win.Virus.Ramnit-7597892-0 Virus Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.

      Threat Breakdown

      Doc.Malware.Valyria-7595017-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 30 samples
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      169[.]254[.]255[.]2553
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      footarepu[.]top11
      zofelaseo[.]top10
      folueaport[.]top6
      vvorootad[.]top2
      dosehoop[.]top1
      Files and or directories createdOccurrences
      %HOMEPATH%\AppData\Roaming.eXE30

      File Hashes

      014b3b9e320110980c62166a08832fda7b2bd8a6b095ee18ea8bfe4372caa690 02909271cfee6ff35f7c9da9ed2354f589247809f4119b46b237c4ba45f02db5 02ac3145ddddff7fd3e75985cbb8bbe9f094ce01b973d4a12870d009df968be2 04476696529134b2926b26c0427fb471084227fbaf0104d6e480379f9990bb5b 071e792d60441d74fc28cc37ec9237a4174242ee4611fb0aaab3356fb3829331 074afa99c7845566231749b727db862f16924cf84a03a9bad5f8146c13e02947 078848b174d490b613545f8fbc98ad18543c426916451bfc7aee51fdc2b979c1 09f7f3c299beb9be5a5f223b6398b867433dd5171045b37dc8be815421e35119 0a2bdecf39d98dba8eeafad36252d9ae0164032bdc404a8f8da8f27623657fc9 0e2c6cbee4f20e09c92d2c8534dadd1665eb58f8f5a662ea63a9d9556c5a3bf7 1033538e6ac46ade3da7b644f3e1d07b5a89dc40f7f58cf6a501e885813fc0f7 11b707b076bb829d8e86b775e1f005e6bbab3e9dc3efd223a34e46e53ed2f747 13cf6351dee9bf68beeefa1aa8c003f6bc689303dd19e1e4c8e9dc88d39b82e7 148173cc7590e62277ad64cf59fea93a556bd0bd578bee8de3628aadcc93176c 14c490ab9716eac9edbcdf2d9f49f10ac1d431f47ef26f76c37611c5437b91d8 15ca3df33525ce91e6920ed4621c5deaee74a86b9299123e844d0832a885aa8b 18767f3890df85eb67b775c4fc37d39116f5e7c59222d430820d9d270508941e 189abb02afe2a834dfeba5613b2d2f3cefd8143237301be1b8f49d9ed72de130 18f431c306631e11bdbeb7d45668e12ec9e9a1fc2faf0d8202a5e5d78b621bd7 1ac3723f78e87ce505114e1204d40da4af14f6470779dc58f3662dc7a1cec046 1b882e4bf3c0c2b7c7ee7d98ad28a72c94684f0bf70acc34ca3fafcb517bd021 1da8654cfcc0a2c57d35cb8e9ca50034ea26a4e2a7ede9ba02244c4c030a69e7 1f567c2e7f5e0e0143259ce8daf14c07d29f6d6d71f227a62bc4c8861f406d63 202ed2316d5ecbd3670cefcd64c0fd49a577e77d3a61290a78a8450bb7c627e8 20f92cd40972708128a8e3b31441218de329e59c4858eb3419100c8a6a4de7e3
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Doc.Downloader.Emotet-7593277-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\33E4E80807204C2B6182A3A14B591ACD25B5F0DB 25
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      91[.]199[.]212[.]5225
      88[.]198[.]60[.]2525
      160[.]153[.]137[.]4025
      27[.]254[.]81[.]8725
      45[.]119[.]83[.]23725
      165[.]22[.]221[.]12125
      216[.]218[.]206[.]691
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      api[.]w[.]org25
      crt[.]sectigo[.]com25
      secureservercdn[.]net25
      pieceofpassion[.]com25
      raisabook[.]com25
      www[.]marketfxelite[.]com25
      biswalfoodcircle[.]com25
      tananfood[.]com25
      www[.]pieceofpassion[.]net25
      Files and or directories createdOccurrences
      %HOMEPATH%\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30D802E0E248FEE17AAF4A62594CC75A25

      File Hashes

      0b4c6649ad41af209e5bd5d857f68d5edc560bc48eda4267c50f806e831b7af3 0fda18ca90096cec78e462f95be4cc2d46dc7dfbdcf44f8a022cb754d7607241 10f31d5d1d70661af3e512d03007b2c6f403a4a581bc6a71d66b3c7a1420bf94 18e85a75805b522d05cd674ad0c5eff59cdcccafa94f815b58483c2b89d0fd7e 1a3a144d6425ae749452dc9fba14b9d7e24152164d01cc78f3606df039bca8da 20607ff7ce201c1f167de3b0fd5fbb8c99d3f372c3e23027d365c8003ce7da79 207bfdb50cbada73d08d6f6849a670795f88892f50a81d83712f5c606ac074fd 2a9b6c82e814645cbaf5e3b77245ee17b11c629f82cbe92414fc40df1cc01e7a 2b1d86c9c4196536d630631a0a0c7abc99b74482b8b1260b48d3ed21c57313d6 314a112563a7a9cb9bfd1fe0ff7e54b19b2ab00827c68e237a251c47e77d28c4 3dec594b76a5f10a5ccb22f02be9afab964409e42ad864264f79596470c3b926 4188c8122fd994514c68a441bbeb2ea4981045cdad3b81cb30973ce853b89dbf 483421df4aace161f9d26c50bd0b6638397a90ab367f128beb759250cac85083 4c27e7c8f0d03b93b78a043800c2bf165183825d0ab4b5aec1973d3367e0d0cd 562047aa50f97221552f04df509b3b65f91b86c6cea109d8b2774ff7b61c0a6c 56a7d0293ab5e87d137ec58d312d381b38a9c2b40726c8a18deffb2cf6d8811f 5fa2d1ab59588863601e287aa39f0475749f16ef458f693992a9cc6afc106fbb 624b6b4f70e271f1dfdef7c9dc26a7d18f17feb7c5e5057866c42c0305ef55c6 6294cd75c47243ce037d61b46271f8425b0ba4838f829ac99fa22e40b2573b5e 68d2cef91a68892ff659a172c561b3638d5456dede979e5cfbeb91b7a8a8f8e7 774f03a7a0f1b281015f56c111092f83645e8671bae737391a0aa740bef03ccb 77ca0111c22e9de19cb947a73243aceb08b5b2e75289fd6747b35361f78787c4 7933573f99948a9b1ff3e813f9f7e186aca213638cb47cb0c6e2e5f59c1ef0ce 7b20e376a7a0f2a41411f91aa19a295aebd0acb2edfb0c5b7b7fc027baf01637 7d3e63ec5e6b564f45e9cc027e39669b3ed166abc7e65fe7c864bb892244add4
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella


      Malware




      Win.Dropper.Bifrost-7593600-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 10 samples
      Registry KeysOccurrences
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
      Value Name: wextract_cleanup0
      9
      MutexesOccurrences
      Bif12349
      0ok3s1
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      lronaldinho[.]no-ip[.]biz1
      zoulou[.]zapto[.]org1
      snouci[.]no-ip[.]biz1
      Files and or directories createdOccurrences
      %TEMP%\IXP000.TMP10
      %TEMP%\IXP000.TMP\TMP4351$.TMP10
      %ProgramFiles%\bifrost\server.exe8
      %TEMP%\IXP000.TMP\server.exe7
      %TEMP%\IXP000.TMP\serve.exe2
      %ProgramFiles%\h4o\h4o.exe1

      File Hashes

      33dd43fa4d96ddbfb167ee204c864586150e115579c9cc67964e6dfde5e40661 4a90db4add682ee08ec03e4145b373503b7a6f23ff34c2b771fa78dee8e44bc3 68fe7fca6b557da2dc0492b70c44a7a4510b3a1e0f1d4c3d75662cfdc3fa5659 78fb8c5fd52940a7188f5e4788bd05d4a9d83faa78bb22e23e20cabdf839c963 8374b6d974e93d0b728514bb2f5db7dfb4b32969e15b7362c4c260e68fbdcace 90e4cff29fc9df5cd3bc27bdcc5dcbbed7cc391d45ce38a1826e111aacef0a79 96947aeb886bde239f1ca5e39fb1534afbeef46aa91dac46f448e3a82eee29e6 a4d8e5d6dbb820150af6bb616fd2673167b477cd711afaa5484c630c18f5bdcb b91894048d0a84b1aea9ce9b947f4b32b5b0b8bb690b5e1f0010e5964b7bdf18 f04c620d94e41e30acdbe1c18f6df6fae97fad15d437874d9ced40d8402b9409

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Dropper.XtremeRAT-7594794-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 21 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>
      Value Name: ServerStarted
      20
      <HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'>
      Value Name: InstalledServer
      20
      <HKCU>\SOFTWARE\<random, matching '[a-zA-Z0-9]{5,9}'> 20
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: HKLM
      9
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: HKCU
      8
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 5
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 5
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
      Value Name: Server
      3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
      Value Name: Server
      3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: dll
      3
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2} 2
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: vlc
      2
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{5460C4DF-B266-909E-CB58-E32B79832EB2}
      Value Name: StubPath
      2
      <HKCU>\SOFTWARE\FAKEMESSAGE
      Value Name: FakeMessage
      1
      <HKCU>\SOFTWARE\((MUTEX))
      Value Name: InstalledServer
      1
      <HKCR>\LOCAL SETTINGS\MUICACHE\\52C64B7E
      Value Name: LanguageList
      1
      <HKCU>\SOFTWARE\((MUTEX)) 1
      <HKCU>\SOFTWARE\FAKEMESSAGE 1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{4YYH6UVK-0H14-53J3-2EKB-QFCG58W0Y54X} 1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{4YYH6UVK-0H14-53J3-2EKB-QFCG58W0Y54X}
      Value Name: StubPath
      1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{4N6D64W4-JGT3-3SRU-VEIG-428Y3Y04H28J} 1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{4N6D64W4-JGT3-3SRU-VEIG-428Y3Y04H28J}
      Value Name: StubPath
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: msn
      1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{L026V375-M6QD-607A-01BW-NY4DH11HTA1N} 1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{L026V375-M6QD-607A-01BW-NY4DH11HTA1N}
      Value Name: StubPath
      1
      MutexesOccurrences
      XTREMEUPDATE21
      <random, matching [a-zA-Z0-9]{5,9}>20
      <random, matching [a-zA-Z0-9]{5,9}>PERSIST17
      <random, matching [a-zA-Z0-9]{5,9}EXIT>17
      ((Mutex))1
      ((Mutex))PERSIST1
      ((Mutex))EXIT1
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      in4ta[.]hopto[.]org2
      xtremerat[.]zapto[.]org1
      chrome[.]myvnc[.]com1
      antilove[.]zapto[.]org1
      lifefornoobs[.]no-ip[.]org1
      trancegend[.]servehttp[.]com1
      paxromana[.]no-ip[.]org1
      Files and or directories createdOccurrences
      %APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.cfg20
      %TEMP%\x.html13
      %SystemRoot%\SysWOW64\InstallDir9
      %TEMP%\~PI<random, matching [A-F0-9]{2,4}>.tmp7
      %APPDATA%\Microsoft\Windows\<random, matching '[a-zA-Z0-9]{5,9}'>.dat7
      %APPDATA%\InstallDir6
      %SystemRoot%\SysWOW64\dllcache4
      %APPDATA%\dllcache4
      %SystemRoot%\InstallDir3
      %SystemRoot%\SysWOW64\InstallDir\Server.exe3
      %SystemRoot%\SysWOW64\InstallDir\dll.exe3
      %APPDATA%\InstallDir\dll.exe3
      %SystemRoot%\InstallDir\Server.exe2
      %APPDATA%\Microsoft\Windows\((Mutex)).cfg1
      %APPDATA%\Microsoft\Windows\((Mutex)).dat1
      %SystemRoot%\SysWOW64\windows1
      %SystemRoot%\SysWOW64\dllcache\msn.exe1
      %APPDATA%\InstallDir\xyzl.exe1
      %SystemRoot%\SysWOW64\dllcache\xxsnd.exe1
      %APPDATA%\dllcache\msn.exe1
      %APPDATA%\dllcache\xxsnd.exe1
      %SystemRoot%\SysWOW64\InstallDir\xyzl.exe1
      %SystemRoot%\SysWOW64\rar.exe1
      %TEMP%\510photo1.jpg1
      %TEMP%\510photo1.jpg.exe1
      *See JSON for more IOCs

      File Hashes

      064c44467f1d528ec2d7da3190f5d0f0760825dd78dbdcd0800b5cf93ddfc35e 14b5b5b795998d35a0d7fdbec17264d677ccbe42ca0f0012ddea0b89c581998c 189815a3c61f115518eefef42514e5ade690d68c3f17cd5f25503114f8c76d39 18f93702d819615f2c6132ff4c9b72fe82d857f8c72ef8c0fa0568cfb87ce382 1f89323eccd76c387a536cbed269f64ae84abe86a25474d73a8d9ea48bc222bc 2ded94da0ecc3e9353762f4c097ab6bb4243ca51765e3075a60d575b4cda27c2 2f4d1036e0074d324b78bd15da52c63602aa467455ba8271520b7ea96b620f0f 4840f56924ba0b45a510341a7b748ec5507aefa1cf451c6c42ac6a5755f7a76f 4ed0da4f544326ee3d2ab53698ad556a7d79f2c71489be7586cb9489462c438b 6bc1a651a94482ad19df56647fb5b6e9b87be392ee8ba96794a778b8b27dfb34 716d6bb0792522da08ad4af7d0ad9500d25456c1138c6afb151a61cdac8c1d5b 8314a980d82e0c0abd2d51c44bbb9fcc0eb0d388e730d97e30b2d4abd8ec35ec 96b451f2217da28c874d357e574911ab5bf1534ef57cad4ee975c14dc1efe17c a0624e016eae6a07df74d75f4ff1a240c7502ce3e104a1df10ce3d8cd317815e ac7714fac188ff0cc932f752add2c001044b4ff3fb4aa73f5c3ef6f2a2ed17cf ace5f789b508a16e2a2a9b81ae6a2f8152546eee393dd7b37677cd4e22b7354b b893c36382ab489f6f23979f547b79a861457f08e0421a49756482a50a8a6d44 c0bc592589a215bb74bd525b44330246094db50cdeb5722d057485a7aff01156 d4fdf6ef3db3e219a672f7e7c18f81b3ded3d0639311cc8cb11df7ce0e128d98 ec04f36832901dfef1738c851a8f5df812c94762cf1ebdaadb2117f00b4e10a4 effa69e2b4b1301360f48fd51e759151a0ef8e656800d3da4a1107a590fc00ff

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Dropper.Upatre-7594799-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 27 samples
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      38[.]65[.]142[.]1227
      104[.]20[.]16[.]24215
      104[.]20[.]17[.]24212
      96[.]46[.]99[.]1835
      96[.]46[.]100[.]495
      217[.]168[.]210[.]1224
      81[.]90[.]175[.]74
      176[.]36[.]251[.]2084
      109[.]86[.]226[.]854
      68[.]55[.]59[.]1454
      37[.]57[.]144[.]1774
      64[.]111[.]36[.]523
      66[.]215[.]30[.]1183
      72[.]230[.]82[.]803
      104[.]174[.]123[.]663
      24[.]220[.]92[.]1933
      84[.]246[.]161[.]473
      216[.]254[.]231[.]113
      69[.]163[.]81[.]2113
      77[.]95[.]195[.]683
      76[.]84[.]81[.]1202
      85[.]135[.]104[.]1702
      24[.]148[.]217[.]1882
      98[.]209[.]75[.]1642
      24[.]33[.]131[.]1162
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      icanhazip[.]com27
      Files and or directories createdOccurrences
      %TEMP%\murzuja.exe27

      File Hashes

      0079acd8e4919c1d944690ed62db665df7ee2033f0788fce8819dbd1dc52b495 00acff5b0b1d66f3518cb494dd25453245dac6bcf7445f572138b216dc60dd5e 061a443b28bcfb65d9bf4535e28e8d069a57b3b02b7313ce724ce7d65ace6cc3 087b88d444146ca59a3c728f0c2a4a531ad7a2dbc3639ed84ee408bf6215d8ac 0964da3037876a30f6d12b9205eea90a49b9bd63d603e052b7949b9abc0a1163 111cc7917516def507f0fc251b26a34e20507848a99405ddd8160bf409026679 12fc0b95918c16ada8f0833f544a07611f30f85211c9a77c73a249ce045b81bc 13c52d814547e6ef4379d980f95bed78b3d40b39a279573b9e049fb5099fff5e 20833a3aa302aa6e67bf9a527e6b61f077b0740405231b1df53a7c6764558b6f 2347db85b21ae8dc4acbf72ff8c60d5793c27bc6e067fd394f2b8e0d16a50587 2499f88be18379c4d00539250b0524632521fb7858baa0eca4bd807a9a05e908 24b01c67de3e123e84dc436772999cdf49f63bfea5367b9508a123d9a2b9bb20 28a49addd94f0a2a849a1b9304fcf408ac231a65f1f21f667f1b962a0b9a7861 2a67adf844b4e0ea5cad4864680231f8724862213d1416155675739686450087 2b2ad88f7c73ed799197300e4c83ec7833fd6623d2c561690f9a1390de312714 2f3520224d08d4ce69596975e6d3e4aad40ebbe2514dc4acf30f97df967efeff 2fefbeb2b24e4114fbf0eb5e6cbadd214c2d6a846aba2c776a1f1643cc26c6e6 32434dcee2ab34dccea41dc4946094c49c85fe698a1337566d200eb83ed2edc2 339d409e062631e1e64bf39fd0d6d61a92a98da179a69463fac1c374b4d328d3 3ab907d9ae4834ad819d9b0c22d15ae37acd43af4deff184d90fed1ab9abee6c 3b60c441272ef1ef1520e8295c583ad4abfb725f4ac21b26c774ea8fd0793cb8 3b90fe50da30f4c4a11687995c861586d9365c8cfab3ea0f9738f1254994cd9c 3c6b988b8af205e01b2c6ce71e02826478a29c091badb34a2f86e0b196fda1ee 40ef4e2cc593c02e1f0c92e495ba7b76386e9e694e70707d681e4e8b0e3d5b01 40f3d8368c69f76e48aa4e23b621b8acd9ca694f1552741aeadff450656e1768
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Dropper.NetWire-7597088-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 34 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\WINRAR 22
      <HKCU>\SOFTWARE\WINRAR
      Value Name: HWID
      22
      <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
      Value Name: F
      22
      <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
      Value Name: F
      22
      <HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
      Value Name: F
      22
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: mkre
      1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: MSConfig
      1
      MutexesOccurrences
      -7
      jpbuqnlp1
      Global\54220ec1-56cd-11ea-a007-00501e3ae7b51
      Global\10d125c1-56cd-11ea-a007-00501e3ae7b51
      thxETPfM1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      194[.]4[.]56[.]2522
      104[.]215[.]148[.]631
      192[.]169[.]69[.]251
      104[.]47[.]54[.]361
      111[.]121[.]193[.]2421
      103[.]60[.]181[.]2381
      185[.]201[.]10[.]11
      103[.]48[.]6[.]141
      191[.]252[.]63[.]141
      68[.]65[.]122[.]861
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      james7[.]serveftp[.]com4
      dualserverz[.]info3
      myp0nysite[.]ru2
      uzo123[.]serveftp[.]com2
      api[.]w[.]org1
      gmpg[.]org1
      microsoft-com[.]mail[.]protection[.]outlook[.]com1
      web[.]whatsapp[.]com1
      gypsypy[.]duckdns[.]org1
      bags[.]mn1
      pornhouse[.]mobi1
      opixib[.]bid1
      bishop123[.]ddns[.]net1
      papergang[.]ru1
      tizardns[.]3utilities[.]com1
      eorul[.]com1
      sistemacplus[.]com[.]br1
      www[.]sistemacplus[.]com[.]br1
      frankweb[.]club1
      usbasri[.]co[.]id1
      Files and or directories createdOccurrences
      %TEMP%\-<random, matching '[0-9]{9}'>.bat20
      \TEMP\.Identifier7
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\filename.vbs6
      %APPDATA%\GHYTRFDRTTG4
      %APPDATA%\GHYTRFDRTTG\filename.exe4
      %APPDATA%\Install2
      %APPDATA%\Install\.Identifier2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\wind0ws.vbs2
      %APPDATA%\zqxhkpjwc2
      %APPDATA%\zqxhkpjwc\wind0ws.scr2
      %APPDATA%\Install\Host.exe1
      %APPDATA%\subfolder1
      %APPDATA%\subfolder\filename.exe1
      %TEMP%\99a0_appcompat.txt1
      %APPDATA%\Install\juyr.exe1
      %APPDATA%\FGBHYTUJIUY1
      %APPDATA%\FGBHYTUJIUY\filename.exe1
      %HOMEPATH%\obgtcgwm.exe1
      %TEMP%\711562.bat1
      %TEMP%\734171.bat1
      %TEMP%\760328.bat1
      %TEMP%\AA1AE.dmp1

      File Hashes

      03626570f585d84e55af0ce856078e9276419d199f905c54bddcd8b22ed59531 0fcd763cf9aacfe72a46b379a1b58234f969767077f0e58276d0c8496c780fcb 1aa57ab794a26bf3e5ffe959a232d76d0bbceae45b4e4a95cd0020b9544c6d0d 1cc2d9b34a545cd02771bf80cb5023dfbab5218c1e7de07625ac1acf7b2547db 23184d75b8da1d8098ad7781ddfc7b6ef77fdd829adb43983cac9f179ba38750 340e9f8c35eddc59064c602be4236f21168dca61b719c27c0663b79cef103a8b 3af3f307c5b1aaa3a45720cfae69ff81460dce4c9da0dea8c87a47a17faaa4cb 4265eab00295ca620c827e71be4674ee18570027ba01269a36604066b92f1920 4a9d1b415b5882f72096da7178edcb29748bc3307e3ae1419c856746eae66e8d 4d26a04fe07e1059cef86588306026a39acbd96796a2a971bcc1d6bb3be4637e 52f425836ad69e22d7594ef0b3ee22ecffd021a111e30f5dc9fc5425f6e0cac8 53d97906225832b310be044db70b6287ed3a20d23f43a4f4d4e0b6b2c13c08a8 579b412e9a175250a6f4248685924ad260b23ef4757173bea04ef62397027eda 752a6eabbd0eb73ed88633b288cde00fa4d47f66bbd42196d8631d5ff7525e53 82398b467b0d2d2f55111a2595fe665e416f9ee7fd47fc9ddb948a4d2f754bae 82c60953f478ac1f71ce1dbc4902c08058b20391915d32bb13ff8ff7d523b5b6 8761ab62984d012f514ec6ba9db5dabaf547729351c2db0d5bdcc3938a0381eb 9a2f9de8fd437e175e94688d9e84e77e2803d4b2c9d110a44597dead122484ca b7082b2820ff5e857b192f79a6d4fbfe55f66bd309bdcea06d9d8b214a3b4923 b9ba565eafc1c0d837bdf9e83e4be40c4966e8f9d23640b01c1a4a9caeca97a8 ba96661424707f2d430bf9d5e8c915c6925363b163f7ad9855b8f72255615116 c2f508a2d916a56c96985298988ac37e7352b013acfb30e142f13d7f998054f7 c602c39491544712670f4ae93ffaf76beeb2eb86d4d1ac55bbcc25852a3a260b cc4378d3d98efcb04fc4ac8071fa68e1a55b95b23283bf2dabcc74a593633b38 ce4b1e164c11a1cc3044cc0426f24eff4ed6149938cce855c116df7d21e4fef4
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Packed.njRAT-7595003-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 10 samples
      Registry KeysOccurrences
      <HKCU>\ENVIRONMENT
      Value Name: SEE_MASK_NOZONECHECKS
      10
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
      Value Name: ParseAutoexec
      10
      <HKCU>\SOFTWARE\9BD3387F7E8ABEB14EFCB3BDF5E7C89B 2
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 9bd3387f7e8abeb14efcb3bdf5e7c89b
      2
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 9bd3387f7e8abeb14efcb3bdf5e7c89b
      2
      <HKCU>\SOFTWARE\9BD3387F7E8ABEB14EFCB3BDF5E7C89B
      Value Name: [kl]
      2
      <HKCU>\SOFTWARE\BB0E5F604F30988E0B2498356D0A2358 2
      <HKCU>\SOFTWARE\BDBC444244C8D079DD87AC27E84A52E2 2
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: bb0e5f604f30988e0b2498356d0a2358
      2
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: bb0e5f604f30988e0b2498356d0a2358
      2
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: bdbc444244c8d079dd87ac27e84a52e2
      2
      <HKCU>\SOFTWARE\BB0E5F604F30988E0B2498356D0A2358
      Value Name: [kl]
      2
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: bdbc444244c8d079dd87ac27e84a52e2
      2
      <HKCU>\SOFTWARE\BDBC444244C8D079DD87AC27E84A52E2
      Value Name: [kl]
      2
      <HKCU>\SOFTWARE\38407B401D4C3FE12E0AA019ABFE1C1E 1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 38407b401d4c3fe12e0aa019abfe1c1e
      1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 38407b401d4c3fe12e0aa019abfe1c1e
      1
      <HKCU>\SOFTWARE\38407B401D4C3FE12E0AA019ABFE1C1E
      Value Name: [kl]
      1
      <HKCU>\SOFTWARE\9F78F6C54CD3644B404DDA00839B7FA6 1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 9f78f6c54cd3644b404dda00839b7fa6
      1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: 9f78f6c54cd3644b404dda00839b7fa6
      1
      <HKCU>\SOFTWARE\9F78F6C54CD3644B404DDA00839B7FA6
      Value Name: [kl]
      1
      <HKCU>\SOFTWARE\E425607C2D9B7766223C902817C469E3 1
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: e425607c2d9b7766223c902817c469e3
      1
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: e425607c2d9b7766223c902817c469e3
      1
      MutexesOccurrences
      <32 random hex characters>10
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      3[.]19[.]114[.]1851
      3[.]17[.]202[.]1291
      18[.]223[.]41[.]2431
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      systeamwon[.]ddns[.]net2
      shwii[.]ddns[.]net2
      0[.]tcp[.]ngrok[.]io1
      windowshost[.]sytes[.]net1
      hell3324[.]ddns[.]net1
      hidden4matrix[.]ddns[.]net1
      Files and or directories createdOccurrences
      %TEMP%\server.exe3
      %TEMP%\svchost.exe2
      %TEMP%\Config.exe2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9bd3387f7e8abeb14efcb3bdf5e7c89b.exe2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\bb0e5f604f30988e0b2498356d0a2358.exe2
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\bdbc444244c8d079dd87ac27e84a52e2.exe2
      %HOMEPATH%\svchost.exe1
      %TEMP%\svchos.exe1
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\38407b401d4c3fe12e0aa019abfe1c1e.exe1
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9f78f6c54cd3644b404dda00839b7fa6.exe1
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\e425607c2d9b7766223c902817c469e3.exe1
      %HOMEPATH%\facebook.exe1
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\5ebda11b3fd5a5a7f5d1714d88c0f3af.exe1

      File Hashes

      3ef25d1d353980ad2520e32b1b572f6cc89f9663b5fdede26e82a0ada4923c01 65d2420dd699fb1f44f67acd048eea2a25e38bf1d937c76409d3bab468504158 6d616a0f4624ac3bf296775b7d4f4463086874b03250c26f7d9ac70eead17de2 8e9b7527288d425e4ae9eaa8a1aa18b95211f633aa8c445d3ff3bb7d290e9099 a036f4468f651fcbdc9c127d6fd15a54e72e438d928558dc206fb36a154540a9 a3b9c055304610aa65535697bc17b5a4a24868f81d7b832013bb1efb544c416b ba8e06b7a75909f51aa597425432c532a92061fcdfb4652c5ad2566189720257 bd2707d424bc88be4dfcdf7a7c0a6bc53aa9a760634be11222b542f289c18a2d c9dba92e18ca02c2ea1a007ac18ad149d527889496a892159eb3642229865798 f021bdb5547ce84dc5a6dc3b49926db736b275823bfdf792a2643705724d99ee

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Packed.Zbot-7595026-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 11 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\WINRAR 11
      <HKCU>\SOFTWARE\WINRAR
      Value Name: HWID
      11
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      91[.]195[.]240[.]12611
      108[.]166[.]65[.]18211
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      aloucakbileti[.]com11

      File Hashes

      1483f9f04971cf117cde479d601b247b2799922e733e5d35fd751dfb752c170a 1a8719053b69c4a7c9276686eea82638f64c6c15c13ed44c532d4b650256212b 2dbcea2a92e98a3a4d41a2b4e281aaa7247de43ebd3c19d6461f8a6a5d288a29 32f4a6e21c6bb34c6a1cc0dd8cf8f796cae8f2e28f413b8b0b9498ae1679e682 48335f0bfbdbd881848966178e6b993a8a6ae5ea7a68b31b985ff8c77fc259a4 4c666cfa1f81701cd6756694a10e9840472ec0aef101a856b5f45bcaa4bef37c 6f6d0d9bf3a2e132194c83d63f1fe5e6b6112cbb707874beb51d27e55ca16959 904b1715e5ef21a0f8562ca8e785552459931cb7659fca83d5514e73b01e1242 9e12ac912d40f689ba60b1d7297a834c7928e1ecd298d60847eec5b9a6b79017 c71c0978b1eab31318e19dd3ba4147f947dfb88f2acba740c70ff9901bd1c732 e2b2f54504e9f02a8cb68ea87e3f5fcebc32269e907c64a89d1980751d1d0ed8

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Virus.Ramnit-7597892-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 15 samples
      MutexesOccurrences
      KyUffThOkYwRRtgPP13
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      204[.]79[.]197[.]20013
      72[.]26[.]218[.]7013
      172[.]217[.]164[.]17412
      13[.]107[.]21[.]2009
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      fget-career[.]com13
      Files and or directories createdOccurrences
      %ProgramFiles%\Internet Explorer\dmlconf.dat13
      %ProgramFiles(x86)%\Microsoft\DesktopLayer.exe13
      %ProgramFiles%\Microsoft\DesktopLayer.exe13
      %ProgramFiles(x86)%\Microsoft13
      %SystemRoot%\SysWOW64\rundll32Srv.exe13
      %System32%\rundll32Srv.exe13
      %SystemRoot%\SysWOW64\rundll32SrvSrv.exe7

      File Hashes

      176b9a90fd733e2a9e1740f169c326d1e9283aca061fb347077dda1f7f57d9ec 34d156c616d6afffc050fae92c5b9adff44272b171b60e70cb335784a2ad13b8 3525253f41b121d2355eb87270c8549d2ee43c39aaebbef5b3b59a282dd2d057 3d828f510bacb5c21461913f8d3675a39a0aa4b0528796ae464340a6b6cb3971 3fac755cdd70a60589efb24db320dfa9996f454298c30718cf82686de76d6a52 643a1a549572481e2135c12ce90059e027e39eb5196ad4e297547574c04987f9 6e89caaaa958c55fccff5adfc9a2c48af0050133ea388aea0d611a39be24d021 80b91b5430c4200ddd41340d7ab5e72083ef5e2da2bbb62d21f93dab73b09374 a3af4e90dc0a7cbb477be2d196dba7a0b4540a145075d1740deb9bd2a384be53 af1ee4f6576c31441a2274c256d4607b756e97cca20782f4a48e2f1dbe73d00d b5065239929ba72b4ba764c7bd80e9a81a59cd37977a6a7a9044ccd08f443254 bcc3ddeb859276e8b8d83e53eca72f22bb15131ff2be63b1847403f91c1c9ad5 be71f31ad183c4c4987d9fbcb7618888f13c8c0472b7dccc451c7a576f50af02 c0eef4571e9bf2e8a07986d4191a3bdec59e3b5781f067f774d178e5ffe3ceb8 e77bacc45b82228bf607ff0d32fbff385fa74ee4e5dd77962cee5a6ff9832cd9

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid




      Exploit Prevention

      Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
      CVE-2019-0708 detected - (3979)
      An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
      Excessively long PowerShell command detected - (402)
      A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
      Process hollowing detected - (340)
      Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
      Kovter injection detected - (109)
      A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
      Installcore adware detected - (89)
      Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
      Gamarue malware detected - (82)
      Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
      Dealply adware detected - (59)
      DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
      Corebot malware detected - (14)
      Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
      Reverse tcp payload detected - (10)
      An exploit payload intended to connect back to an attacker controlled host using tcp has been detected.
      Trickbot malware detected - (9)
      Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.

      Video: What defenders can learn from past ransomware attacks

      $
      0
      0

      The Cisco Talos Incident Response "Stories from the Field" video series returns with another entry from Matt Aubert.

      This time, Matt discusses ransomware infections he's seen in real-time, and shares what defenders can learn from others' mistakes and recovery.

      Is it ever smart to pay attackers' request extortion payment? Which ransomware families should organizations be most worried about? Matt covers all of this in just six minutes.

      You can watch the full video above or over on our YouTube page here. You can get all of the Stories from the Field videos in one place on our playlist, too.

      Bisonal: 10 years of play

      $
      0
      0

      By Warren Mercer, Paul Rascagneres and Vitor Ventura.

      Executive summary


      • Security researchers detected and exposed the Bisonal malware over the past 10 years. But the Tonto team, the threat actor behind it, didn't stop.
      • The victimology didn't change over time, either. Japanese, South Korean and Russian organizations were the prime targets for this threat actor.
      • The malware evolved to lower its detection ratio and improve the initial vector success rate.

      What's new?

      Bisonal is a remote access trojan (RAT) that's part of the Tonto Team arsenal. The peculiarity of the RAT is that it's been in use for more than 10 years — this is an uncommon and long period for malware. Over the years, it has evolved and adapted mechanisms to avoid detection while keeping the core of its RAT the same. We identified specific functions here for more than six years.

      How did it work?

      Bisonal used multiple lure documents to entice their victims to open and then be infected with Bisonal malware. This group has continued its operations for over a decade and they continue to evolve their malware to avoid detection. Bisonal primarily used spear phishing to obtain a foothold within their victims' networks. Their campaigns had very specific targets which would suggest their end game was more around operational intelligence gathering and espionage.

      So what?

      This is an extremely experienced group likely to keep their activities even after exposure, even if we identified mistakes and bad copy/paste, they are doing this job for more than 10 years. We think that exposing this malware, explaining the behavior and the campaigns where Bisonal was used is important to protect the potential future targets. The targets to this point are located in the public and private sectors with a focus on Russia, Japan and South Korea. We recommend the entities located in this area to prepare for this malware and actor and implement detections based on the technical details provided in this article.



      Victimology and campaigns


      From our analysis and the intelligence shared by the community throughout the last decade of activities of Bisonal, we can conclude that the actor behind this malware is specifically targeted at the South East Asian region, namely Japan and Korea with another significant focus on Russian-speaking victims.


      We identified a couple of decoy documents pointing to the victims. During the Heartbeat campaign documented in 2012 by Trend Micro, dating back to 2009, the attacker used Hangul Word Processor (HWP) decoy documents. This file format is mainly used in South Korea. The report mentioned political parties, media outfits, a national policy research institute, a military branch of South Korean armed forces, a small business sector organization and branches of the South Korean government. Later in 2018, Unit 42 released a Bisonal paper where we can see a spear-phishing campaign in Russian and a decoy document alleged to be from Rostec, a Russian state-owned holding conglomerate headquartered in Moscow.

      Finally, in 2018, Ahnlab released a paper about "Operation Bitter Biscuit" where Bisonal was used against Korean and Japanese entities. India is also mentioned, but it was by another malware named "Bioazih" by Ahnlab. In this paper, the editor mentions targets such as manufacturers, defense industry and government.

      Additionally, we can provide additional decoy documents. For example, a Korean document used in September 2014 where the title was "Contact member and counselor of the Agriculture, Forestry, Livestock, Food and Marine Fisheries Committee:"

      Or a Russian document about the CIPR Digital conference used in April 2018. This is an application document that has been used to provide a decoy to the Bisonal malware. This conference has some high-ranking government and business attendees.

      In 2019, a Russian RTF document — судалгаа.doc (research.doc) — was used with an exploit to drop the winhelp.wll file, which contains Bisonal.

      Last year, we also identified multiple Korean decoy documents using similar RTF exploits to deliver Bisonal, namely ☆2020년도 예산안 운영위 서면질의 답변서_발간(1).doc (State Council Candidate (Minister of Justice Chumiae) Personnel Hearing Execution Plan (1) .doc) and 국무위원후보자(법무부장관 추미애) 인사청문회 실시계획서(1).doc (Written Inquiry from the 2020 Budget Operation Committee (Published) (1) .doc) which are both alleged government documents.

      Based on our research and the released paper mentioned above, the Bisonal malware is part of the Tonto Team arsenal. Tonto Team was mentioned in the media in 2017 as one of the actors who targeted South Korea, when the country announced it would deploy a Terminal High-Altitude Air Defense (THAAD) in response to North Korean missile tests. At this time, researchers connected the Tonto Team to China.

      10 years of evolution


      Introduction


      The first variant of Bisonal publicly released went by the name of "HeartBeat." At the end of 2019, the actor changed their TTP and started using the Microsoft Office extension (.wll) to execute the Bisonal payload. Based on this recent change, we decided to dive into the 10 years of evolution of Bisonal. To do so, we analysed more than 50 different samples and focused on the changes that appear during the years of usage.

      2010: the birth


      The oldest version of Bisonal we identified was compiled on Dec. 24, 2010. This version is the simplest we identified. The attacker created a Windows library (.dll) designed as a Windows service (ServiceMain() entry point). When executed, the malware uses the Windows API to communicate with the Service Control Manager (SCM) and finally execute a thread. This thread contains the code of the malware.

      The C2 server of this first Bisonal variant is young03[.]myfw[.]us (port 8888). We can notice the usage of a dynamic DNS service. This is a Bisonal pattern. Even the newest version we identified used this kind of service. The domain name was not obfuscated:

      The IP address is a rollback if the first C2 server is down. In this campaign, the rollback was not used as it is configured to localhost. The communication to the C2 server is performed by using raw sockets:

      The first action of the malware is to send the hostname of the infected system and the "kris0315" string. The sent data is not encrypted or obfuscated. We assume the string is an identifier:

      The malware supports only three commands:

      • Command execution: The execution is performed by the ShellExecuteW() API
      • Listing the running processes
      • Cleaning the malware: The malware first removes the registry key of the service and removes the library. As the library is currently running, the deletion cannot be performed immediately. The developer decided to use MoveFileEx() API with the MOVE_DELAY_UNTIL_REBOOT to remove the file at the reboot.

      The malware contains the Bisonal string. It is interesting to notice the string is not used but is still visible:

      The sample was used in the HeartBeat campaign mentioned above.

      Sha256: ba0bcf05aaefa17fbf99b1b2fa924edbd761a20329c59fb73adbaae2a68d2307
      C2 server: young03[.]myfw[.]us

      2011: obfuscation my darling & more espionage capabilities


      2011 March: commect()


      We identified a sample from March 18, 2011. The sample is really similar to the variant from 2010. We can notice that the developers wanted to hide some API usage. They use the LoadLibrary() API followed by GetProcAdress(). But they obfuscated the function name strings by splitting it in two. Here is an example:

      Once the two strings are concatenated and with the little-endian, the string becomes "commect." After the malware replaces the "m" by "n:"

      They use this trick for a couple of other API such as CreateThread(), CreatePipe(), PeekNamedPipe(), CreateProcessA(), CreateToolhelp32Snapshot(), ReadFile(), WriteFile() and, finally, the string "cmd.exe."

      The attacker also implemented a new order: execution of a command by using named pipe to get the output of the executed command. The attackers execute cmd.exe, followed by the command to be executed. An interesting point is the adding of a charset on each executed command:

      This charset is designed to cover languages that use Cyrillic script such as Russian, Bulgarian and Serbian. This hardcoded string could be an indicator concerning the targets of this malware.

      sha256 : bb61cc261508d36d97d589d8eb48aaba10f5707d223ab5d5e34d98947c2f72af
      C2 server: kissyou01[.]myfw[.]us

      2011 September: The big changes


      The developer decided to remove the MFC library and put almost all the code in a unique function. The number of functions is divided by three. Here is the main thread graph flow:

      Additionally, the string such as the domain names of the URLs is encoded by using the XOR algorithm (0x1f for example). The network communication is also obfuscated with a XOR (0x28).

      On the version, the attacker supports the proxy server. It was a limitation of the previous variants. If the target would have a proxy, the malware would not be able to communicate outside. The attacker retrieves the proxy configuration in the registry:

      The network communication is divided in two parts. The first part uses the Microsoft Windows Wininet library. The purpose is to send reconnaissance information to the attackers. The data is sent to the server via InternetOpenA() and InternetOpenURLA(). The C2 server of the analysed sample is hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp. The malware sent to the operator the following information: the campaign ID (named Flag by the developer), the hostname of the compromised system, the IP address, the OS version, the proxy server of the system and if the system is running on VMware. To get this information, the attacker the VMXh-Magic-Value (0x0a). The second part of the communication is dedicated to the orders and the exfiltration. This part is similar to the previous samples: raw sockets usage.

      The features of the malware are the same as previously with new capabilities such as file creation and removal.

      The author removed the malware cleaning feature and implements two others features: the developer adds PostThreadMessageW() to send message inside the thread and in the previous version the developer used TerminalProcess() API to stop the process executed via the named pipes, in the version the developer append the "exit\r\b" string to the executed command in order to exit properly:

      Another interesting change is the fact they don't use CHCP command anymore to force the charset but use code page. You can see in the screenshot 0x4E3 (1251 - Cyrillic Russian) and 0x362 (866 - DOS Cyrillic Russian):

      Sha256: 43606116e03672d5c2bca7d072caa573d3fc2463795427d6f5abfa25403bd280
      C2 for the orders: dnsdns1[.]PassAs[.]us
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp

      2011 October: oops where is my cleaning function?


      In October 2011, the attacker re-implements the cleaning function.

      In this implementation, the developer first uses the Windows service management API in order to remove the service (instead of removing directly the registry key as he did previously) and, finally, remove the file with the same API as previously (MoveFileExA()).

      Sha256:43459f5117bee7b49f2cee7ce934471e01fb2aa2856f230943460e14e19183a6
      C2 for the orders: jennifer998[.]lookin[.]at
      C2 for rollback: 196[.]44[.]49[.]154
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp

      2011 December: Not a service anymore


      The new variant from December 2011 is not a service anymore but a simple library (.dll). The library is executed via a launcher (conime.exe) and the persistence mechanism is not a service anymore but a registry key (CurrentVersion\\Run\\task).

      The malware is lighter than the previous version but includes more espionage features such as file exfiltration, file listing, driver listing, process-killing, file removing. The other features are the same as previously.

      It is interesting to note that the obfuscated reconnaissance is still hard-coded in the binary but it is not used anymore. The code used for the reconnaissance was removed but the developer forgot the IP variable.

      Sha256: 915ad316cfd48755a9e429dd5aacbee266aca9c454e9cf9507c81b30cc4222e5
      C2 for the orders: v3net[.]rr[.]nu
      C2 for rollback: faceto[.]UglyAs[.]com
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/mh/o.asp

      Hardcoded identifiers


      In this version, we identify hard coded identifiers. We assume these IDs are campaign or target ID. Here is a list of IDs:
      • 1031
      • jp0201
      • jp-serv
      • mhi
      • m1213
      • classnk
      • 95mhi
      • nscsvc

      In the next version, a campaign ID will be also used. The ID we believe is in reference to Japan targets. We believe these targets to sit within both the public and private sectors and they are specifically targeted to further enhance the attacker's capabilities through espionage.

      2012: File format year


      February: Let's hide my code in an almost legit library


      In February 2012, the developer tried to hide the malicious code in the middle of a legit library. The malicious library was named msacm32.dll and contains the same exports as a legit library from Microsoft Windows named msacm.dll. Here is the export of the malicious library with the same name than the real one:

      As previously the hard-coded C2 for reconnaissance variable is here. Without being used.

      Sha256: 6f8bbea18965b21dc8b9163a5d5205e2c5e84d6a4f8629b06abe73b11a809cca
      C2 for the orders: since[.]qpoe[.]com
      C2 for rollback: applejp[.]myfw[.]us
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp

      2012 May & December: l miss services


      In May and December 2012, the developers modified the .dll to come back to a Windows service.

      As previously described, the hardcoded C2 for reconnaissance variable is here. Without being used.

      Sha256: b75c986cf63e0b5c201da228675da4eff53c701746853dfba6747bd287bdbb1d
      C2 for the orders: since[.]qpoe[.]com
      C2 for rollback: 69[.]197[.]149[.]98
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp

      Sha256: 979d4e6665ddd4c515f916ad9e9efd9eca7550290507848c52cf824dfbd72a7e
      C2 for the orders: usababa[.]myfw[.]us
      C2 for rollback: indbaba[.]myfw[.]us
      C2 URL for reconnaissance: hxxp://indbabababa[.]dns94[.]com/o.asp

      2012 October: Standalone PE


      In October 2012, the attackers used an .exe. The attacker chose a standalone PE.

      As previously the hard coded C2 for reconnaissance variable is here. without being used.

      Sha256: 6f4a1b423c3936969717b1cfb25437ae8d779c095f158e3fded94aba6b6171ad
      C2 for the orders: mycount[.]MrsLove[.]com
      C2 for rollback: mycount[.]MrsLove[.]com
      C2 URL for reconnaissance: hxxp://fund[.]cmc[.]or[.]kr/UploadFile/fame/x/o0.asp

      2013: RIP


      We did not identify any Bisonal samples used in 2013. The first explanation could be that it was used so much that it stays under our radar. The second explanation could be a publication from Trend Micro on January 3, 2013. In the publication, the editor described a campaign where Bisonal was used. Maybe the actor decided to stop using Bisonal?

      2014: The rebirth


      Packer


      For the first time, the Bisonal developers decided to use a packer: MPRESS. The Bisonal string also disappears from the binary however the workflow of the malware stays the same and some features are copy/pasted from the previous Bisonal variant.

      Obfuscation


      The domain and the port number are obfuscated but it is not a simple XOR anymore. The developers implemented its own byte manipulation algorithm. The developer also implemented an obfuscation concerning OS detection. The OS version string is not stored as a string anymore but as bytes:

      It is interesting to note that a few samples from 2014 do not use the obfuscation described above.

      Malware core


      The developer rewrote a large part of the code however the workflow is the same as previously and some features are copy/paste. The binary is compiled with the MFC framework.

      The biggest change is the network communication with the C2 server. The malware does not use a raw socket anymore but all the communications are performed with WinInet. The malware performs connection to the C2 server by using InternetOpenA() with an hardcoded User-Agent: "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322". Note the missing parenthesis at the end of the User-Agent. This typo will be there till today.

      This variant has exactly the same features as the previous variant: file listing, OS version getting, process killing, drive listing, execution via ShellExecuteW(), execution via named pipe, cleaning, file removal, file downloading.

      Here is an example of code similarities on the execution via named pipe function. On the left a sample from Bisonal 2014 and on the right Bisonal 2011. The code is not exactly the same but the workflow and some constants are similar.

      Hard-coded Identifiers & URL pattern


      In this new version, we identify three hard-coded identifiers:

      • Campaign ID: an ID put in the exfiltrated data with the hostname and the OS version. We assume this ID is used to identify the campaign and the target by the operator;
      • Malware ID: used to generate the first "word" of the URL. We assume this ID is used to identify the malware version (from a network protocol point of view);
      • Third ID: used to generate the end "word" of the URL. It generally looks like a file name.


      The URL pattern is the following: hxxp://C2_domain:PORT/MalwareIDVictimIPThirdID

      SHA256: c6baef8fe63e673f1bd509a0f695c3b5b02ff7cfe897900e7167ebab66f304ca
      C2 URL: hxxp://www[.]hosting[.]tempors[.]com:443/av9d0.0.0.0akspbv.txt

      2016: More packers


      In 2016, the developer implemented a new way of packing Bisonal. An initial static analysis immediately shows an executable with very little information. IDA Pro only shows five functions and almost no imports.


      Looking at the few functions available it becomes clear the packer uses several anti-analysis tricks. In the unpacking stage, the malware has a lot of useless jumps and calls which makes the code tracking in the debugger harder.

      After the unpacking is done the malware continued to use several anti-analysis measures. There are almost no direct calls to functions. It is common during the unpacking process to find useless code, like sequences of one instruction followed by a jump or increments in register values almost immediately followed by decrements. The initial unpacking is based on the manipulation of the return addresses pushed in the stack and the ordering of the data within the .text section. A second stage will allocate memory and unpack code into it, which finally will unpack code into a section that is originally empty called .textbss. This is where the core of the malware will be.

      All API calls are made through a dispatcher function. Which is not called directly either, before this function is called it goes through a series of jumps and the stack is filled with encoded offset values.

      The call of the jump table entry:

      Push parameter for dispatch function into the stack:

      Push all general-purpose registers into the stack:

      Before calling the actual dispatch function, all registers are saved to the stack, by doing this the offset value is no longer on the top of the stack so the malware needs to put it back on the top of the stack.

      At this time and just before the argument in the stack we also have the return address, inside the core of the malware. The dispatcher function will push the desired API function address into the stack. Afterward, it will do the same for the general-purpose registers.

      After calling the dispatcher function the malware will first restore the generic purpose registers from the stack, thus leaving the API function address at the top of the stack. Logically, after the ret instruction is executed the code will jump into the API function.

      This mechanism allows the malware to execute API functions without ever using the Call instruction, making it difficult to perform the analysis. The other side effect is that even after the code is unpacked if the analyst tries to dump it and analyze it statically, it will be hard for the disassembler to understand the code.

      The dispatcher function has other tricks up its sleeve. Every time it is called it will use the anti-debug GetTickCount() to check if it is being debugged. If there is a discrepancy in the timing it will terminate the process. The termination can be as simple as a call to ExitProcess(), or it will first resume a thread that will display a message to the user. So that it ensures the thread has a chance to run, it will return the API call sleep() no matter what was originally requested. Once sleep() is executed, the error message thread will have a chance to be executed and will terminate the process.

      From the functionality point of view, there aren't many differences between the 2014 versions. Always using three hard-coded identifiers mentioned previously but with different values.

      SHA256: 15d5c84db1fc7e13c03ff1c103f652fbced5d1831c4d98aad8694c08817044cc
      C2 URL: hxxp://emsit[.]serveirc[.]com/ks8d0.0.0.0akspbu.txt

      2018: I miss you


      During 2018, the attackers used a mix of samples using the MFC framework or the Visual C libraries. The registry key used for the persistence is now named "mismyou".

      In September 2018, the developer made a mistake. Normally on this variant of Bisonal the domain names are encoded. However, the developer forgot to obfuscate the strings and put them in clear text into the variables but the deobfuscation function is still executed:



      The mistake has for effect to destroy the domain and generate garbage strings. The malware will try to perfect connection to this bad domain (hxxp://硟满v鐿緲赥e ?r雀溝1kdi簽:70/ks8d0.0.0.0akspbu.txt). You can see here a screenshot of the debugger trying to perform a connect on it:

      SHA256: 92be1bc11d7403a5e9ad029ef48de36bcff9c6a069eb44b88b12f1efc773c504
      C2: kted56erhg[.]dynssl[.]com

      SHA256: d83fbe8a15d318b64b4e7713a32912f8cbc7efbfae84449916a0cbc5682a7516
      C2 fail: hxxp://硟满v鐿緲赥e ?r雀溝1kdi簽:70/ks8d0.0.0.0akspbu.txt

      2019 - Office Extension and a new packer


      Packer


      Static analysis of this executable shows only two functions, but a regular number of imports. This time the packer shares some of the characteristics from the advanced one used in 2016.

      There is a lot of useless code, including jumps and bswap operations. Upon detecting a debugger attached to it, the malware will display the message below and terminate the execution.

      This message translates to "The debugger was found to be running in your operating system. This turns it off before running the program again!".

      This packer also hides the calls to API functions. This time instead of using a dispatcher function, the malware pushes the arguments into the stack as usual but will then perform a call to a jump table built during the unpacking, in the .text section memory region.

      Even though a call is made, these are not functions, in fact, most of the code in this jump table is useless except for the last instruction of each entry. Each entry finishes with a jmp instruction into the respective API function. Effectively the malware doesn't do any call to API functions, it always performs a jump. The return address is loaded into the stack when the malware does a call to the jump table. The end result is the same has in the packer from 2016, but with a simpler mechanism.

      The majority of the code was moved into a packed area. The malware configuration (such as C2 server and the User-Agent) is outside that area. The packer uses a thread-local storage (TLS) callback to unpack some of the code. At this stage, it uses in-place unpacking avoiding memory allocations. One of the anti-analysis features included in this packer is the lack of calls to API functions. In the early stages of execution, the malware loads the libraries and retrieves the addresses from functions it needs.

      Feature-wise, there is no change when compared with the 2016 version, in fact when compared the C2 beaconing functions even share some of the offsets.

      Office Extension


      In 2019, the actor behind Bisonal used a new way to deploy the machine on the target's systems. They sent a malicious RTF document to the targets with an exploit targeting the CVE-2018-0798 (Microsoft's Equation Editor vulnerability). The purpose of the shellcode was not to execute the malware (as it is usual) but simply to drop it in the %APPDATA%\microsoft\word\startup\ repository with the .wll extension.

      The libraries in this directory with this specific extension will be loaded as a Microsoft Office extension. So next time the user opens an Office application, the malware will be loaded and executed. The purpose of the malware is to deploy Bisonal on the infected system ($tmp$\tmplogon.exe) and to create a Run registry key in order to execute Bisonal at the next reboot of the system.

      We think the purpose of this multistage execution is an anti sandbox technique. If you look at the report after executing the malicious document, you only see one action: the .wll file creation. The user also needs to open an Office application and finally a reboot is needed in order to execute the real payload: Bisonal.

      Bigger is better


      We identified a version of Bisonal using Office extension with a really specific behavior during the installation of the malicious payload. The dropper appends 80MB of binary data at the end of the Bisonal binary:

      The binary value is "56MM" is ASCII characters. If we look at the malware, we can see the appended data:

      We are not sure of the purpose of the creation of a huge binary. It could be an anti-analysis technique. Some tools limit the size of the analyzed files. For example, by using the VirusTotal standard API, we cannot upload files bigger than 32MB. We also identified sandboxes that cannot handle big files correctly. Remember, size matters.

      Malware code


      The developer partially refactored the code. The variant from 2019 keeps exactly the same features. The two main changes are the obfuscation and the network protocol to communicate to the C2 server.

      The developers used two different obfuscation algorithms: one for the C2 encoding and one for the data. The C2 encoding is a simple XOR (as in 2012):

      The C2 encoding communication is also different. As the data are now sent with the GET method, the data must be in ASCII. That's they add base64 encoding in order to get supported characters in the HTTP query.

      For the first time, the developer switched from POST requests to GET requests:

      The exfiltrated data is appended to the URL. Here is the pattern: hxxp://C2_domain/MalwareIDVictimIPThirdIDExfiltratedDataBase64

      SHA256:37d1bd82527d50df3246f12b931c69c2b9e978b593a64e89d16bfe0eb54645b0
      C2 URL:hxxp://www[.]amanser951[.]otzo[.]com/uiho0.0.0.0edrftg.txt

      Bisonal timelines summary

      Conclusion


      The actor behind Bisonal is clearly motivated and has an interest in Russian, Korean and Japanese victims. The development of Bisonal has been active for more than a decade. We have observed the code evolving with the different publications but also with the evolution of Microsoft Windows.

      However, specific functions are still used today, many years after the original implementation of the Bional malware. Even if Bisonal could be considered as simple with less than 30 functions, it has spent its life targeting sensitive entities in both the public and private sectors. Some campaigns were even mentioned on mainstream media against military entities within the mentioned regions.

      During the decade of activities, we also can see mistakes and rollbacks from the attackers. For example, in one campaign they put the domain name of the C2 server in plaintext in the malware which had the function to generate a non-ASCII string for the C2 servers once decoded. In this condition, the malware cannot work on the compromised system. Even after so many years of activities, the attackers make mistakes.

      We don't see any reason why this actor will stop in the near future. With this investigation and the analysis of this decade of activity, we hope to force this actor to innovate by providing a better understanding of his arsenal and more specifically how Bisonal works.

      Coverage


      Ways our customers can detect and block this threat are listed below.


      Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such as this automatically.

      Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

      Email Security can block malicious emails sent by threat actors as part of their campaign.

      Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), Cisco ISR, and Meraki MX can detect malicious activity associated with this threat.

      AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

      Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

      Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

      IOCs


      SHA256:


      0cf9d9e01184d22d54a3f9b6ef6c290105eaa32c7063355ca477d94b130976af
      7dc58ff4389301a6eccc37098682742b96e5171d908acdeb62aeaa787496c80a
      0ff88a6cd7dcd27f14ebb7b2c97727b81e1aa701280d1164685c52c234e4a9df
      8252f2cdedf16f404d43c81d005ea8ebb10594477f738e40efacf9013e1470d2
      915ad316cfd48755a9e429dd5aacbee266aca9c454e9cf9507c81b30cc4222e5
      1128d10347dd602ecd3228faa389add11415bf6936e2328101311264547afa75
      92be1bc11d7403a5e9ad029ef48de36bcff9c6a069eb44b88b12f1efc773c504
      15d5c84db1fc7e13c03ff1c103f652fbced5d1831c4d98aad8694c08817044cc
      9638e7bb963ac881bd81071d305dea91b040536c55b7ee79b526b8afcfad6972
      1e66579b856cd331518d67c351bcb2b102399d8ade53370797228b289e905dc1
      979d4e6665ddd4c515f916ad9e9efd9eca7550290507848c52cf824dfbd72a7e
      22b3a86f91d2eb5a8a1e1cdc044bcf6aca898663071be5233bac00c0f0d3c001
      9c86c2dd001c47b933c6b5f43c8f87a6d0c01c066e3520e651fab51d19355d3c
      2c1e0facf563bb2054d9a883144ef9bad77ba75cdb46cc80843821c363c0a9dc
      a4a5c60a392d236b76907f58597e83ba9c9d4cfc6a4502ef3e0e149b8710a0c6
      359835c4a9dbe2d95e483464659744409e877cb6f5d791daa33fd601a01376fc
      b1da7e1963dc09c325ba3ea2442a54afea02929ec26477a1b120ae44368082f8
      37d1bd82527d50df3246f12b931c69c2b9e978b593a64e89d16bfe0eb54645b0
      b75c986cf63e0b5c201da228675da4eff53c701746853dfba6747bd287bdbb1d
      43459f5117bee7b49f2cee7ce934471e01fb2aa2856f230943460e14e19183a6
      b85e4168972b28758984f919aef2ce0fde271ee1f0863510e521a2920fcc658e
      43606116e03672d5c2bca7d072caa573d3fc2463795427d6f5abfa25403bd280
      bd1a9b148580dad430683639b747d1c49932db5d8f6eb2d90e2583af976810dc
      436fc9530015c2d2b952a16d2a3dfa202d1cb1c577b580811b9b48355855591b
      c5496dc3fa96b657ab4467c551877bbced56fd07c00c7ccb199c1794235bf710
      444e864a3bb2abb1edccab4a5cd45bc0039f2a48e01615b2719da65a40a5140e
      c6baef8fe63e673f1bd509a0f695c3b5b02ff7cfe897900e7167ebab66f304ca
      cdba1a69d75f3e2256dccc16255aef07ded41c257b2cc95ccb801a0063445926
      5caada5737b0a6c8c8f8a27bfcd0fb2221af68a4856278c3919b37279daa7409
      d19b85891dd0f83808b70fbe68a56a64e828611dfe53d04a6c1c211f1352b5b5
      6676934d7f214cb256407400357c1f7ead69a523b3017f6a5bc30d06a11a8305
      d7692a71b85c869ee11647b80ea6d42b2e4303233c525a8fa7e6bec3599e2c8b
      67e286c7308dda5cd8fe4a1340f354927e5791ce6ef0ef02c93a4e063e11c4ad
      d83fbe8a15d318b64b4e7713a32912f8cbc7efbfae84449916a0cbc5682a7516
      6c714653a8fa54eef1de2f0148e5e8cf514907f6f523bf09c8ee126bebcdbdcc
      dd88b31275b7079899d945fc6de2dceaf7e8fc143ef24be5bb336585ddf6af1e
      6cc4707942f9323347c95066a43b30f874f1b1c783960cf8ed9ecf5914f85ba7
      eb7681c653ef1942103cd3272fd124eaf73e79bb830be978535c18b73c87b985
      6ef4df8460ba57b836f52a9a73e2d739a3f2aa832bec6b663af53b55dc74a63d
      effd31b11bdc6486082967c2d8e53d979e59a88ba28e68a1c94f5a064a8a966d
      6f4a1b423c3936969717b1cfb25437ae8d779c095f158e3fded94aba6b6171ad
      6f8bbea18965b21dc8b9163a5d5205e2c5e84d6a4f8629b06abe73b11a809cca
      f3a30e5f8bfd0f936597bcef7cb43df11ec566467001dff9365771900e90acb1
      77a36530555eada268238050996839bd34670e8bfda477c30d9dd66574625f59
      f9302b7ecc32b891edeaf61353dc5e976832b7104ec0d36f1641f1f40cf6fe12
      799d858ff77c29684fc1522804ed45c24171484d9618211c817df01424bc981a
      23d263b6f55ac81f64c3c3cf628dd169d745e0f2b264581305f2f46efc879587
      72f6a54d0d09a16e6fde9800aa845cd1866001538afb2c8f61f3606f5e13f35a
      4bad5898373eb644662a8c1d5d5c674e2558908e34bb2fd915f3350b0f28752b

      C2 servers:


      0906[.]toh[.]info
      dnsdns1[.]PassAs[.]us
      euiro8966[.]organiccrap[.]com
      jennifer998[.]lookin[.]at
      kfsinfo[.]ByInter[.]net
      kted56erhg[.]dynssl[.]com
      mycount[.]MrsLove[.]com
      since[.]qpoe[.]com
      usababa[.]myfw[.]us
      v3net[.]rr[.]nu
      www[.]amanser951[.]otzo[.]com
      www[.]amanser951.otzo[.]com
      137[.]170[.]185[.]211
      196[.]44[.]49[.]154
      21kmg[.]my-homeip[.]net
      61[.]90[.]202[.]197
      61[.]90[.]202[.]198
      69[.]197[.]149[.]98
      agent[.]my-homeip[.]net
      applejp[.]myfw[.]us
      dnsdns1[.]PassAs[.]us
      emsit[.]serveirc[.]com
      etude[.]servemp3[.]com
      euiro8966[.]organiccrap[.]com
      faceto[.]UglyAs[.]com
      games[.]my-homeip[.]com
      hansun[.]serveblog[.]net
      hxxp://硟满v鐿緲赥e ?r雀溝1kdi簽:70/ks8d0.0.0.0akspbu.txt
      indbaba[.]myfw[.]us
      kazama[.]myfw[.]us
      kreng[.]bounceme[.]net
      kted56erhg[.]dynssl[.]com
      mycount[.]MrsLove[.]com
      navego[.]serveblog[.]net
      shinkhek[.]myfw[.]us
      wew[.]mymom[.]info
      www[.]hosting[.]tempors[.]com
      www[.]nayana[.]adultdns[.]net
      www[.]dds.walshdavis[.]com

      Threat Source newsletter (March 5, 2020)

      $
      0
      0

      Newsletter compiled by Jon Munshaw.

      Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

      Sure, all anyone wants to talk about is coronavirus. But what about cyber security? We’ve still got cool stuff, like this huge write-up on the Bisonal malware and how it’s changed over the past 10 years. While its victimology has always stayed the same, we walk through how its creators have added on new features over time to avoid detection.

      There’s also another entry in our Incident Response “Stories from the Field” video series. This time, Matt Aubert discusses ransomware infections he’s seen in the wild and passes on some lessons to you.

      And, as always, we have the latest Threat Roundup where we go through the top threats we saw — and blocked — over the past week.

      Upcoming public engagements

      Event: “Everyone's Advanced Now: The evolution of actors on the threat landscape” at Interop Tokyo 2020
      Location: Makuhari Messe, Tokyo, Japan
      Date: April 13 - 15
      Speakers: Nick Biasini
      Synopsis: In the past, there were two clear classes of adversary an enterprise would face: sophisticated and basic. These basic threats were commodity infections that would require simple triage and remediation. Today, these commodity infections can quickly turn into enterprise-crippling ransomware attacks, costing organizations millions of dollars to recover. Now more than ever, organizations need every advantage they can get — and threat intelligence is a big part of it. Having visibility into your own environment and attacks around the globe are equally vital to success. This talk will cover these trends and show how the gap between the sophisticated and the basic adversary is quickly disappearing.

      Cyber Security Week in Review

      • The U.S. Federal Communications Commission proposed new fines against wireless carriers that sell customers’ location information $200 million. T-Mobile faces the highest fine at $91 million. 
      • Two Chinese nationals face new charges of helping a North Korean state-sponsored actor steal millions of dollars of cryptocurrency. The U.S. Justice Department said it believes the two men funneled money stolen in cryptocurrency mining campaigns and then sent the money back to North Korea to help pay in part for additional malicious cyber capabilities.  
      • The Super Tuesday round of presidential primaries in the U.S. went off without a publicly disclosed cyber attack, though several questions remain before November’s general election. Election officials are still being encouraged to use paper ballots, and state-sponsored actors may still be saving their best efforts.  
      • Facebook’s new “Off Facebook Activity” tracking feature allows users to see what apps are receiving their personal information, even when they’re not using Facebook. One reporter discovered that more than 60 health apps were sharing her information with the social media site, including prescriptions and menstrual cycles. 
      • T-Mobile is warning customers that it recently suffered a data breach, and that some users’ information may be affected. Individualized text messages are telling customers if their financial information was accessed, and if so, T-Mobile is offering a free two years of identity theft protection.  
      • American intelligence officials warned members of the Senate of potential security concerns with the popular social media app TikTok. One FBI official even went as far to say that the app is “basically controlled by a state-sponsored actor.” 
      • Netgear disclosed a critical bug in its popular Nighthawk line of wireless routers that could allow a remote attacker to take complete control of the device. The company also released fixes for 21 medium-severity vulnerabilities and two of high severity. 
      • The U.S. pledged to send $8 million to Ukraine to help bolster its cyber defenses. The two countries met this week to discuss security, after which the Americans agreed to invest a total of $38 million over the coming years. 
      • A Chinese cyber security company accused the CIA for an 11-year hacking campaign against the country. Qihoo 360 says Americans targeted the Chinese aviation and oil industries, as well as some government agencies. 

      Notable recent security issues

      Title: Details of new Mozart malware family unveiled
      Description: A new malware family known as “Mozart” uses DNS to communicate with a command and control seemingly belonging to its creators. It also evades detection by disguising itself and executing specialized JSScript files. Once infected, Mozart can download other types of malware onto the victim machine, including ransomware and cryptocurrency miners. This malware is typically spread through spam campaigns with malicious PDF attachments. If a victim opens the PDF, it displays a message saying that the PDF reader doesn’t support a specific font, and asks the user to download a font, which actually points to a malicious ZIP file.
      Snort SIDs: 53364 - 53373

      Title: Ryuk ransomware strikes across the globe
      Description: Several reports surfaced over the past week of the Ryuk ransomware being used in attacks over the course of the past year. Notable recent infections include an attack on a Fortune 500 company that specializes in mechanical and electrical construction, a local library system and police department in Florida and a school district in New Mexico. Ryuk primarily spreads through phishing emails and contains a number of capabilities, including credential theft and the downloading of a cryptocurrency miner. 
      Snort SIDs: 53333, 53334, 53336, 53337

      Most prevalent malware files this week

      SHA 256: c0cdd2a671195915d9ffb5c9533337db935e0cc2f4d7563864ea75c21ead3f94
      MD5: 7c38a43d2ed9af80932749f6e80fea6f
      Typical Filename: wup.exe
      Claimed Product: N/A
      Detection Name: PUA.Win.File.Coinminer::1201

      SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3
      MD5: 47b97de62ae8b2b927542aa5d7f3c858
      Typical Filename: qmreportupload.exe
      Claimed Product: qmreportupload
      Detection Name: Win.Trojan.Generic::in10.talos

      SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5
      MD5: 8c80dd97c37525927c1e549cb59bcbf3
      Typical Filename: eternalblue-2.2.0.exe
      Claimed Product: N/A
      Detection Name: W32.85B936960F.5A5226262.auto.Talos

      SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
      MD5: e2ea315d9a83e7577053f52c974f6a5a
      Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
      Claimed Product: N/A
      Detection Name: W32.AgentWDCR:Gen.21gn.1201

      SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
      MD5: 799b30f47060ca05d80ece53866e01cc
      Typical Filename: mf2016341595.exe
      Claimed Product: N/A
      Detection Name: W32.Generic:Gen.22fz.1201

      Keep up with all things Talos by following us on TwitterSnortClamAV and Immunet also have their own accounts you can follow to keep up with their latest updates. You can also subscribe to the Beers with Talos podcast here (as well as on your favorite podcast app). And, if you’re not already, you can also subscribe to the weekly Threat Source newsletter here.  

      Threat Roundup for February 28 to March 6

      $
      0
      0
      Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 28 and March 6. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

      As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


      For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicate maliciousness.
      The most prevalent threats highlighted in this roundup are:

      Threat NameTypeDescription
      Win.Dropper.Emotet-7600941-0 Dropper Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
      Win.Downloader.Upatre-7601201-0 Downloader Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
      Win.Malware.Kovter-7601670-0 Malware Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
      Win.Malware.Trickbot-7603048-1 Malware Trickbot is a banking trojan targeting sensitive information for certain financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
      Win.Malware.Nymaim-7602109-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
      Win.Packed.Bifrost-7603033-1 Packed Bifrost is a backdoor with more than 10 variants. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the client, to execute arbitrary code on the compromised machine. Bifrost contains standard RAT features including a file manager, screen capture utility, keylogging, video recording, microphone and camera monitoring, and a process manager. Bifrost uses a mutex that may be named "Bif1234," or "Tr0gBot" as signs that it's been successful.
      Win.Packed.Tofsee-7603095-1 Packed Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator's control.
      Win.Ransomware.Nemty-7603722-1 Ransomware Nemty is ransomware that encrypts files and demands payment in Bitcoin for files to be recovered.
      Win.Trojan.Gh0stRAT-7603864-1 Trojan Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.

      Threat Breakdown

      Win.Dropper.Emotet-7600941-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 15 samples
      Registry KeysOccurrences
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\API-MS-WIN-CORE-DEBUG-L1-1-0
      Value Name: ImagePath
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: Start
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: ErrorControl
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\API-MS-WIN-CORE-DEBUG-L1-1-0
      Value Name: DisplayName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: ErrorControl
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: ImagePath
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\API-MS-WIN-CORE-DEBUG-L1-1-0
      Value Name: WOW64
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: ImagePath
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\API-MS-WIN-CORE-DEBUG-L1-1-0
      Value Name: ObjectName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: DisplayName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: DisplayName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: WOW64
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\API-MS-WIN-CORE-DEBUG-L1-1-0
      Value Name: Description
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: WOW64
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: ObjectName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: ObjectName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\RASGCW
      Value Name: Description
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSUTB
      Value Name: Description
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE 1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: Type
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: Start
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: ErrorControl
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: ImagePath
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: DisplayName
      1
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IASDATASTORE
      Value Name: WOW64
      1
      MutexesOccurrences
      Global\I98B68E3C15
      Global\M98B68E3C15
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      104[.]32[.]141[.]437
      139[.]47[.]135[.]2156
      181[.]61[.]224[.]266
      216[.]75[.]37[.]1962
      212[.]174[.]57[.]1242
      89[.]108[.]158[.]2342
      74[.]105[.]51[.]751
      189[.]201[.]197[.]1061
      Files and or directories createdOccurrences
      %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt15
      %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp15
      %SystemRoot%\SysWOW64\KBDRO1
      %SystemRoot%\SysWOW64\rasser1
      %SystemRoot%\SysWOW64\sppc1
      %SystemRoot%\SysWOW64\rdpencom1
      %SystemRoot%\SysWOW64\ias1
      %SystemRoot%\SysWOW64\msctfui1
      %SystemRoot%\SysWOW64\sppinst1
      %ProgramData%\RPjyQXrZOqjIXJnOwMa.exe1
      %SystemRoot%\SysWOW64\iasdatastore1
      %SystemRoot%\SysWOW64\iprtprio1
      %SystemRoot%\SysWOW64\acppage1
      %SystemRoot%\SysWOW64\rasgcw1
      %SystemRoot%\SysWOW64\api-ms-win-core-debug-l1-1-01
      %SystemRoot%\SysWOW64\msutb1
      %SystemRoot%\SysWOW64\dsquery1
      %SystemRoot%\SysWOW64\api-ms-win-core-misc-l1-1-01
      %ProgramData%\PJiawWEgBV.exe1

      File Hashes

      0e4056035379093c420b6d84d9bcd77d2789c80d7729eb7e8635e489cfb0b9c0 0eabba5e6d29aadd3551715bab5279a1a2faf19f90a24f0168b8d903acee0d26 1afd9903eb0ba0b06fd05672c52a361551848d94215cf4071a329c3cd2743634 45bb0185b3b111814469ce0ec2d2e03e4c7e469170d42ae9733402c63f804431 486d1ab587964c3783faf01d9fb9b72c0719b512826984f17fb4b42553d2ad29 67baea8bd29156a72ecbf6d75c2abe452cf428aaa0503e3de41c93445f1bc163 6a1b89dc82ca6fe2944fb21d89e2e9cd50e18d7c102cef1986d9aebbb080b852 77110ce382c087ef3b89f354e0ff2362da40500c425e97e34c2e297d8ce83970 8257c2e631751a8a6114d4463debb0dfc2021a2630a7f463a928a4fe6c3bc211 83605486c96943d2a8a30a40b43c38dc588e86a05a667842132d69c5a0d7cac1 94a354a98259a0d92248531bd3c8ee59ebad766bc7c3cff4a4739bd467b1d244 96d43323599a68012b79990a2d2b861f6266a7c48ae3409f6f92aee912cb6fd4 bae886d7885453947e93c457f93b18c50cede1b7e17daebd2c934d32917d8d13 bd2e823604e511efa9b864d6e40d93b8d1f38d600c4ae6302e19078bd4ff0d0f de54dc917bcc60957bf16bc876080e485d5d2939c542057afc5aa5c098c2bc7e

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSAThis has coverage

      Screenshots of Detection

      AMP

      ThreatGrid


      Win.Downloader.Upatre-7601201-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 15 samples
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      181[.]143[.]164[.]1891
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      grupodolcearte[.]com15
      Files and or directories createdOccurrences
      %TEMP%\vitra.exe15

      File Hashes

      02e92a155d33c4ca944d13f25efc1cb64e18fe9a2f3343cb26abb1e898f03311 20ca23453249306f1b2f7e36cbca3f7b99daced979bbc6131d6cb6950bfb739f 23d112d78879dde9cd9f38b3de9b6fd41191a8a64d77734886b6e971fc0ca4cc 3595f2059b5d2ac9c110fa15ec32b94da8fe9fb2937327ec5fcd60dcf0c7669a 439a8dc0f85467bc1e34ea057e5f529aeea392a677db8e1fc2cd32a4b5c5011a 79cb02073d36f32ce34cad9618a3bebdf09c38c1c46629e3acd76c03dd0d9ba1 83fff77b45dab7b20920a22207a202cfeebfc4b0e19b1efff8ce1dac7cd2c5c9 b3368d3532c08ed8fd83aef55d0d10d55479c686a7b9659f598772c17abe2919 b4679d7520c1769e1bb4cd0d1a88652a036346c6de7d7d30ee1dd59a8d90251b dfb32e641900be3f65c7af2ba26c7728883ed123e6246808d2068444a1338f8a e42bd741b4596381169df7b9643466422cc0e071fbd4d69d4acfc08df00692da eb4abbc6e8b7980686f07344ef0ecb7cef00188339e65fa16258feab7be0dd02 f81d5c1f44065d3bf471255104b9740930b88347fb55fbd7116a967c1a6d3225 f95e463db1ea767128da0df3fa48817084e2522393a1758e70d80e9d17077927 fc9ab4d96279fc746aa4730ef51d9034fedb0eb3775e4a1aa29505261a5a8332

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Malware.Kovter-7601670-0

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      Registry KeysOccurrences
      <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
      Value Name: DisableOSUpgrade
      25
      <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
      Value Name: ReservationsAllowed
      25
      <HKLM>\SOFTWARE\WOW6432NODE\XVYG
      Value Name: xedvpa
      25
      <HKCU>\SOFTWARE\XVYG
      Value Name: xedvpa
      25
      <HKCR>\.8CA9D79 25
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: vrxzdhbyv
      25
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: ssishoff
      25
      <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 25
      <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE 25
      <HKCU>\SOFTWARE\XVYG 25
      <HKLM>\SOFTWARE\WOW6432NODE\XVYG 25
      <HKCR>\C3B616 25
      <HKCR>\C3B616\SHELL 25
      <HKCR>\C3B616\SHELL\OPEN 25
      <HKCR>\C3B616\SHELL\OPEN\COMMAND 25
      <HKCR>\.8CA9D79 25
      <HKLM>\SOFTWARE\WOW6432NODE\XVYG
      Value Name: svdjlvs
      25
      <HKCU>\SOFTWARE\XVYG
      Value Name: svdjlvs
      25
      <HKLM>\SOFTWARE\WOW6432NODE\XVYG
      Value Name: lujyoqmfl
      23
      <HKCU>\SOFTWARE\XVYG
      Value Name: lujyoqmfl
      23
      <HKLM>\SOFTWARE\WOW6432NODE\6EDCD1ACE8E1BEB04F 1
      <HKLM>\SOFTWARE\WOW6432NODE\AYIWU21XG 1
      <HKLM>\SOFTWARE\WOW6432NODE\6EDCD1ACE8E1BEB04F
      Value Name: 7627520618DA5D099
      1
      <HKLM>\SOFTWARE\WOW6432NODE\AYIWU21XG
      Value Name: 30CCbFnYqq
      1
      <HKLM>\SOFTWARE\WOW6432NODE\AYIWU21XG
      Value Name: 3WBi1nRFP
      1
      MutexesOccurrences
      EA4EC370D1E573DA25
      A83BAA13F950654C25
      Global\7A7146875A8CDE1E25
      B3E8F6F86CDD9D8B25
      Global\350160F4882D1C9820
      053C7D611BC8DF3A20
      408D8D94EC4F66FC19
      1F7768DE4B445CA41
      45D0E7B493967BD31
      Global\BBADD150515CFAC61
      Global\B8F225B5B0E546341
      389405CE233FA3A91
      2F37600C5F8C3F9D1
      B5169E04A784F73A1
      Global\0E043F99F52ADD231
      28F3C9E454B2BE4D1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      195[.]66[.]169[.]2141
      193[.]89[.]27[.]381
      82[.]26[.]6[.]1831
      110[.]19[.]168[.]1121
      205[.]74[.]243[.]981
      175[.]129[.]208[.]521
      75[.]78[.]164[.]641
      129[.]131[.]39[.]1411
      202[.]80[.]190[.]291
      2[.]92[.]35[.]1981
      78[.]174[.]172[.]251
      157[.]249[.]101[.]1311
      50[.]76[.]35[.]1831
      108[.]61[.]180[.]51
      89[.]115[.]171[.]1481
      33[.]237[.]143[.]291
      68[.]197[.]76[.]181
      39[.]92[.]225[.]1651
      50[.]185[.]184[.]1071
      216[.]28[.]85[.]1421
      74[.]50[.]14[.]51
      102[.]220[.]95[.]1041
      88[.]29[.]104[.]2091
      179[.]52[.]109[.]1881
      217[.]42[.]217[.]1051
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      maxcdn[.]bootstrapcdn[.]com1
      cpanel[.]com1
      certificates[.]godaddy[.]com1
      crt[.]sectigo[.]com1
      qdrtjvht[.]cn1
      Files and or directories createdOccurrences
      %LOCALAPPDATA%\4dd3cc25
      %LOCALAPPDATA%\4dd3cc\519d0f.bat25
      %LOCALAPPDATA%\4dd3cc\8e9866.8ca9d7925
      %LOCALAPPDATA%\4dd3cc\d95adb.lnk25
      %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91b4e5.lnk25
      %APPDATA%\b08d6625
      %APPDATA%\b08d66\0b3c0b.8ca9d7925
      %APPDATA%\db7a\c227.a778320
      %HOMEPATH%\Local Settings\Application Data\f4fa\97ea.lnk20
      %HOMEPATH%\Local Settings\Application Data\f4fa\c0ce.bat20
      %HOMEPATH%\Local Settings\Application Data\f4fa\d5a9.a778320
      %HOMEPATH%\Start Menu\Programs\Startup\d733.lnk20
      \REGISTRY\MACHINE\SOFTWARE\Classes\.bat2
      \REGISTRY\MACHINE\SOFTWARE\Classes\exefile1
      %APPDATA%\904327\acf971.5ad8d0d1
      %HOMEPATH%\Local Settings\Application Data\d23b56\48c11b.lnk1
      %HOMEPATH%\Local Settings\Application Data\d23b56\56341e.bat1
      %HOMEPATH%\Local Settings\Application Data\d23b56\8ed9fe.5ad8d0d1
      %HOMEPATH%\Start Menu\Programs\Startup\8f3c0b.lnk1
      %APPDATA%\ef9fd\dc166.73309a1
      %HOMEPATH%\Local Settings\Application Data\00594\249d2.73309a1
      %HOMEPATH%\Local Settings\Application Data\00594\7957c.bat1
      %HOMEPATH%\Local Settings\Application Data\00594\7b643.lnk1
      %HOMEPATH%\Start Menu\Programs\Startup\61575.lnk1
      %APPDATA%\2b7b\8e52.5c4031
      *See JSON for more IOCs

      File Hashes

      019b344a8e7f3c77456904825315980c4470a207baeaf73e4b27e806d3d29cb3 1bb5bc698bf1c157fd1d59a93b05042191cf10faf717f4a275a65d692b47b6b4 2865baa489d087b61ade44ab6dcc5cde74b460d7c6253e35df27c8ba083b2ade 29c170c9817f4e027bca34e4f18213e2fcd320706c626f9c5831b901b0069092 2d1675a1e1ab54f9fedf904a3b9d81a42c96da4a044a2bda43e226050f71bfcc 2dee218bbc4b07efb543c50b6d55e3e685a4c2e57b6c4d7c059823a1ec43ece7 3d481ecedf7418ce930c8291375b043fbc3a879a01b8719b93296680d86a8162 4bf67a114270f6506f6552ac552d9b9ef5a8f3a5bc8dd16a8a8a932d4706e1ba 4c9ab51001bd342ca1ce44e5ca4427e11006bf4499399789dc9343eaf3576e77 506b98313e47d5437a0e0d690c40f3501314a15b46e3be245a659e3729f70258 5547747470941e6f2b4c76ab2e811f61a0676b2112629bc45750ba5ec96007e0 5b870a8c9b77afc82f629efb7bde9f96e8546e53122011b41336eb5553c6e4ca 6402c25ebcf11608c1b05d27fe6642b47638d3546713766762e50d2d3d83ca09 6a53862c999e92e936492a1bf45823aa4bf0072bcbb4b451f47870ad6c077f76 720609e2de6c8210effaf2870d9cb2d09b11940a6806e79d23187a658379f660 75f47542b9efdd3a8e1ae7e149fd1017db8dddd414d1abe5c877e4d33c2f51f5 7799dafddc4a5e548d953d26ae900690445de42ced9b2cacf272291129980577 7f16e38c960c0db1e5f5fc9324e83bef46f6c55ed8efd0c11d44d56505590615 8252a6deb89935b6d4d28ae5e4d3309ecb13453a8c283314d2e7be1ec4953cb1 85bea08924265155253c171276bd3258037c0deaabc0e6e5f3788bb64125344e 8b8240abba2d007dfecff03fdf9dc46355056aec7f00e8693f07002455c821c5 8b9c2df052ae2d6809ff2d268fd0c7cc58df677aa90d83f527f59cc1781a7c7e 8f0e0af7ba99a4ba8e908562d084d23daa9d31ebd5d48f6990628711cd2b1c90 9ebe5a5b6e7219498b3c869207cc5c6fe989ea7045b8beae473199de36ef935a a657fa50766ac0c785be910723473c307f4bb9c4770f73afc94c096df8d4d353
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Malware.Trickbot-7603048-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 18 samples
      MutexesOccurrences
      Global\VLock18
      SafeGuard18
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      216[.]239[.]32[.]215
      216[.]239[.]34[.]214
      116[.]203[.]16[.]954
      195[.]62[.]52[.]963
      194[.]87[.]92[.]1133
      67[.]21[.]90[.]1063
      216[.]239[.]38[.]212
      216[.]239[.]36[.]212
      87[.]121[.]76[.]1722
      69[.]195[.]159[.]1582
      91[.]219[.]28[.]582
      104[.]20[.]17[.]2421
      191[.]7[.]30[.]301
      192[.]35[.]177[.]641
      51[.]254[.]164[.]2491
      84[.]238[.]198[.]1661
      67[.]21[.]90[.]1091
      91[.]219[.]28[.]801
      193[.]124[.]117[.]1891
      194[.]87[.]144[.]161
      185[.]86[.]150[.]891
      34[.]192[.]250[.]1751
      37[.]59[.]183[.]1421
      107[.]181[.]246[.]2131
      54[.]225[.]159[.]351
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      myexternalip[.]com4
      ip[.]anysrc[.]net4
      ipinfo[.]io4
      elb097307-934924932[.]us-east-1[.]elb[.]amazonaws[.]com4
      api[.]ipify[.]org4
      wtfismyip[.]com2
      ipecho[.]net2
      checkip[.]us-east-1[.]prod[.]check-ip[.]aws[.]a2z[.]com2
      checkip[.]amazonaws[.]com2
      icanhazip[.]com1
      apps[.]digsigtrust[.]com1
      apps[.]identrust[.]com1
      Files and or directories createdOccurrences
      %APPDATA%\winapp\Modules18
      %System32%\Tasks\services update18
      %APPDATA%\winapp\client_id18
      %APPDATA%\winapp\group_tag18
      %APPDATA%\winapp18
      %APPDATA%\WINAPP\<original file name>.exe18
      %SystemRoot%\Tasks\services update.job14

      File Hashes

      0734537582744df9451325031e9e8731642f668eccf59befd64edb7bc8fafe7e 6689bd8590bd31ff3527c49b5b11679264a1b9b10849dcc66cbe6900478eb871 67f0429ee85995d64131c87b6838e69ca53aa9e7b25d3ada30c97dab269ba7cd 7180b1814adf4ede4bdab8b9c61c81af3b170cdbcc12ad847f47690e2e526644 755a16e14820e83967b4b3e21f238fbd0a161032d1f6e837c21a1059678c1e94 84f89b0fd428f6932f1053d6456cddb2545f4de476e55029d410f1808fbf2a30 887e3e74d1c5d39a5bc52544fdb246b2c715068eb699cec7ad7adbe0c41afcba 903ac66acff8f25f7990d205cece0c3be4cf19782b81ef25dba48eb3d8deaf56 91894e74967a409a1237940d4e2c6bbe76399dedf57c771cb558aa12cfa5e3d1 9363dc1d3c9b8a07f523624f55707ce3c0d1723dad1efbbfe3f515008601cb96 b2103964af0368affa8fba5d7f6d240f4da2be650082498cfd7748c345275084 b892a452a962407b340e01b761b37a33e75a5dcfd06df33f24c6f12af68f88a3 c0189f5e94156e85176424967870b93eaadf3c56d6f37c71186aadb774e6339a c5f3bde9423af4d58282c14cf1b38ee6dd71982def8c3f6182ce1b75ecfda479 d94c6866a52bb26ed7b15e72f4ee8d762876a29a2e9efa6875aaf85899d49d0c dc47b07c0dafe93644c39795780bb3f73727fa1b9d18f45e6e5aa6445eebfa0c e2e0f5369df5a08b124098492de660aba4bdfbeb08fbe8af1ed86e165a45782a f04cda7271ff361471a8dc27f9d6de94255df35c15842fa65e030f27077d6ebd

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Malware.Nymaim-7602109-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      Registry KeysOccurrences
      <HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
      <HKCU>\SOFTWARE\MICROSOFT\GOCFK
      Value Name: mbijg
      25
      MutexesOccurrences
      Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
      Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
      Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
      Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
      Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}25
      Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}25
      Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}25
      Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}25
      Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}25
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      msmumcsogb[.]com20
      xoisb[.]com20
      fhcbczook[.]com20
      vkeumq[.]net20
      cuxpehneqok[.]com20
      owirepdi[.]net20
      kmwiwxxhst[.]net20
      scsutgsikbf[.]com20
      hpneu[.]com20
      vsnoaue[.]net20
      nzkmud[.]com20
      zaljqgpthcoh[.]pw20
      sasrqtpipjfa[.]pw20
      aonibtaatpb[.]in20
      klrjxmici[.]pw20
      kvowzwz[.]in1
      wkrpqmneiaq[.]pw1
      stspxcbi[.]pw1
      kunygnck[.]in1
      esqxhtdjfsy[.]net1
      dsnquebpv[.]net1
      kbicwcs[.]com1
      ehigsgoht[.]in1
      meeidu[.]in1
      mofmwfsocpdd[.]com1
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %ProgramData%\ph25
      %ProgramData%\ph\fktiipx.ftf25
      %TEMP%\gocf.ksv25
      %ProgramData%\<random, matching '[a-z0-9]{3,7}'>25
      %APPDATA%\<random, matching '[a-z0-9]{3,7}'>25
      %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>25
      %TEMP%\fro.dfx24
      \Documents and Settings\All Users\pxs\pil.ohu24
      %TEMP%\bpnb.skg3

      File Hashes

      0350f9f2984dac2a7a6770f5bf5870ad016b95d26feecde54f1dc7f6a7321c29 0b1d7aa06898c58946bad39134dafc13439a5db0e5dc2dc40ee4553dc3d29975 0c01e7d6a858233dd58b8b872e4893742455f50b76abff789ab29e1c483fde68 149b63f40ca4848f1ed92a281b1b4d069b93629062bbc581564c59b8c48b047a 149f0e351809f6cf4ad993a656ff6756dda959a8daee038be2d24fdfc8c8b007 1d813f7e5f17acf6d2181f544c00a9e1a990ed176fb33605f0e017cac91467bd 248e50d7d496167e3846f9093a70d875ad97c8654ae531c00b93c67d52cbb7bd 25c352c873caa5213f0665a9ce58ea7e348d8d203377742c377ede93e8b93cd7 26293d2fa07bbf9ed68c7d241e9b28ca4c644798d8f3fc33ef8616a6f6c74774 2ac299dd30fe2ca31768e34b8c75134dcfbfcff6c3457e6f2ae8385822a496be 2acf8806700ad8c0c6fa22b4fec49b63217c9be39f504feaee7de09e9bf49df8 363144700426ca0fad29bd473528038c1341991a941986eb609b4d5083efbb28 3b9103d8b1ea2bf26c2b8028caf6bdd9e1ad67b0e9db8b3067fd290b38c0c58f 46e04a66e76addea2a565390ee816c56ea118681c360f736ccd220edbbd86864 4c6902db08c7e033540304c254649849f49eebe6d91145d5d45c0fee95e2d80f 4e1bcc088361db93034f59a5b0c96f098def9b8ccd9959157f67e410423b41d7 526358c39c4015b12ae74212615fb4568b056f6b6a79272d71c77cab9f04aae8 68197f9c992f00577f0a25fa16c30f51fb21c4e263108eff26fecc4dc2ad79eb 7208ba495ff3980c1a1bc0221a5734cc27c87ce7c21fb9f4e9047bb46ce95555 819914daa5710e05f7eca95e29810ce75b9debb4d3cc9507c1baa18749d4b96d 83782a979f1f6d2a01c9872135f03ae220a48b405413cd8c149c1d009b4fba5b 86928bb41c2f85970a86fc00d6f8905dec0c90306e49efb5dba681eeca92c038 8c0d83941179966af6df1dc4d0ed5f96930e0df8f071451349ce51497d2d9aa7 8fbc0816bd1df870987de293d24e866ff98ea18fd0f22220556ae974cc4f9f8e 957160926bb20fec0fd05d4f50e41cc263f523616e5c27bb79a4523bdf7b96df
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Packed.Bifrost-7603033-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 25 samples
      MutexesOccurrences
      Bif123417
      0ok3s11
      explore1
      shhhhd1
      run1
      dll1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      79[.]210[.]124[.]471
      50[.]22[.]169[.]261
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      hh[.]servecounterstrike[.]com1
      dzalgerdz[.]no-ip[.]org1
      Files and or directories createdOccurrences
      %ProgramFiles%\Bifrost\server.exe8
      %System32%\Bifrost\server.exe4
      %APPDATA%\addons.dat3
      %SystemRoot%\Bifrost\server.exe1
      %ProgramFiles%\Java\java.exe1
      %ProgramFiles%\ \explorer.exe1
      %System32%\skype\sytem.exe1
      %System32%\drivers\win3r.exe1
      %System32%\system\wimsn.exe1

      File Hashes

      03558014784b043450fb11acd7fe1a8a8582f8b663766a8019053c76ef7215c5 08541f2d74b94ca3f90b039d2525340448b71460899b368aa1ee15bfc0d54390 0edb3da0e2cae96a8cffb48f8f5655fd039b01c7d2d79272232202f959d1af6b 13e9c893b0135a03ec67f4dbbb43e59981a35989777eff4477bce63a7fe49727 154e008a36ace894fb97b5e3738cfa0055d0fed2004f67e954c438812d20cc3b 16588e48147f6ef7182fa47399c520c95b559d11e69749027d16f7c6cb127725 26401cc5346770c7023dee159079637155a6292f096bc0fa47cf91b74a927570 29456dcc06e1d342c9d6c6afa5f7a445839853395e5cb624c44f1fd9b5390500 2daced6a63c11b3399b36c23214d73e026cff2907b559c288db2a03e7ca7da57 3159696d5d368ad8d214b668556c8cc8071e7a83331c7812f893af9125de092b 32e9d1f5e0764c7471775247ad0b06680980f9db491b92281de56e93d1594c91 3ee1fa6daec1659e53d238dda830f6c344f65b32ea3c90c9b441a92b5d4b8b78 4d94d1641c75b880e31dbb5948c8727f82858c56480a8ed1832bedebc0cceb1a 54b54ca691dde91cf1f3e1db60eea375ea280d100dc6a5f5ea1c3b39cc4ef7f1 61071881d3e077cbb87783faf73532e7dbca80c3252d1a398d96da0818dacc2a 68fa9c845333388e4f2f44aa79db05c0fc10c91ebcce819f6959feec7a3ccce3 76d71fad336a1082358567a0c5ef949bc4748397ab1258327673c316e1820c84 83f1bd6ff8de246bdf3b8e5a7549f26eed7a5dbcce9156ca12601ff7f7b0db55 8e95da958f0e5beae769d9adf0bd523a4cba0a97abebee99d51642a0c484a193 9620adde046b1ad8291d817e5b06c7eaeda4b5db457e5c5541cfac83806c049d 97dc870dd36389d74e9f77c725f513654c62b7152a5f18387dfb8e6c300e2415 9b8f14dea7b8f6f88606f2451fe8c0e51dd029aa95180e2e08e4f7833405e104 a51c89aa132abce4937e32d57a2d9903e507a89a1c696767164d6a33ce3eb28e b81853affa6b46779eb7024f5bc388ed406d337a1913f4b15788e6e54e969dc1 b8f1c8dcef8270105cae8058740b64dea319f284c20bbcc1a0640b011d6784ea
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid




      Win.Packed.Tofsee-7603095-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 26 samples
      Registry KeysOccurrences
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES 26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Type
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Start
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ErrorControl
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: DisplayName
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: WOW64
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ObjectName
      26
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: Description
      26
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config0
      26
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config1
      26
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config3
      22
      <HKU>\.DEFAULT\CONTROL PANEL\BUSES
      Value Name: Config2
      22
      <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
      Value Name: ImagePath
      14
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\jcqwvdjy
      4
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\haoutbhw
      3
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\kdrxwekz
      3
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\mftzygmb
      3
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\exlrqyet
      2
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\buionvbq
      2
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\dwkqpxds
      2
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\gzntsagv
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\nguazhnc
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\zsgmltzo
      1
      <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
      Value Name: C:\Windows\SysWOW64\slzfemsh
      1
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      43[.]231[.]4[.]726
      69[.]55[.]5[.]25226
      85[.]114[.]134[.]8826
      239[.]255[.]255[.]25022
      46[.]4[.]52[.]10922
      192[.]0[.]47[.]5922
      46[.]28[.]66[.]222
      78[.]31[.]67[.]2322
      188[.]165[.]238[.]15022
      93[.]179[.]69[.]10922
      176[.]9[.]114[.]17722
      12[.]167[.]151[.]116/3121
      172[.]253[.]63[.]9421
      173[.]194[.]204[.]26/3119
      67[.]195[.]204[.]72/3017
      104[.]47[.]54[.]3616
      172[.]217[.]7[.]22716
      157[.]240[.]18[.]17415
      64[.]233[.]186[.]26/3115
      172[.]217[.]197[.]26/3115
      98[.]136[.]96[.]76/3115
      172[.]217[.]7[.]13215
      216[.]239[.]32[.]2114
      216[.]239[.]34[.]2114
      211[.]231[.]108[.]4614
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      microsoft-com[.]mail[.]protection[.]outlook[.]com26
      252[.]5[.]55[.]69[.]in-addr[.]arpa26
      schema[.]org22
      whois[.]iana[.]org22
      whois[.]arin[.]net22
      bestladies[.]cn22
      bestdates[.]cn22
      bestgirlsdates[.]cn22
      252[.]5[.]55[.]69[.]zen[.]spamhaus[.]org22
      252[.]5[.]55[.]69[.]bl[.]spamcop[.]net22
      252[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org22
      252[.]5[.]55[.]69[.]cbl[.]abuseat[.]org22
      252[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net22
      hotmail-com[.]olc[.]protection[.]outlook[.]com21
      www[.]google[.]co[.]uk21
      sex-finder4you1[.]com21
      eur[.]olc[.]protection[.]outlook[.]com19
      ipinfo[.]io18
      www[.]google[.]ru16
      auth[.]riotgames[.]com16
      msn-com[.]olc[.]protection[.]outlook[.]com15
      msn[.]com15
      mta6[.]am0[.]yahoodns[.]net15
      hanmail[.]net14
      mx0a-001b2d01[.]pphosted[.]com14
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      %SystemRoot%\SysWOW64\config\systemprofile26
      %SystemRoot%\SysWOW64\config\systemprofile:.repos26
      %TEMP%\<random, matching '[a-z]{8}'>.exe26
      %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>25
      %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)21
      %TEMP%\wvlhokp.exe1
      %TEMP%\poeahdi.exe1

      File Hashes

      0054ae6df8395634c36f1a99f4b4df3edd3ca28e515b90a3a3eb30e0808bc640 006fe42eaaadf87e7ce537f1c2b2a9930a2cfa8cf5ec44a87c221b3f7ab1f9c1 0232e76cabc4c09b8191691e41ffd0cc2b9f1a88c762128cd179998148a5d111 05279b3deda1fd52dff2cda7700bcf0856584a25ed6f43eb9171ad60b943c081 0875682d36433cb0e7ac2d6fa0e6938189937260e150680b0b97c5c55efe73ac 0890de225e6d85aad88e5f99da81acb5a11148586eb39d02bf0a9fb9daf0525b 0b4fef0e6e222e43c42fed0bbdd300e997f7811a952dc1ff8a01f01500634412 0dbc8d645507f63e94d6d66646bd33c27a5e3b1409941453b6dc85b3fffe6cf8 12e14f7b0a204406116cc09ceea2c1b4d8f08feca9e2d6e7dd12c10916681121 1417719dfd0bc1acfbb76e86b3113759165e66e8e22062f27b173cdb8a7679fa 1426700dc20043556efa4c1c8c269117e1a1d09c7ca991f7bff0f63ba0db91a5 164c4890fff93d7cb73b341c111d911022500ee9da52450f97b2f68f8106fd2c 1997d4dda81bf4b308fbade5e162f5854c384c5e9cf0f7681e0c77ab9a60a772 1e0a9bca0a83e65ecd1a2b5752adf0795abec4109b6b61434d53ba42b393b40c 1e1769e2f970bc0b1c1d5d46ec4922c6de04e86ca5741a5007378ad18574d583 223f7e305d45ea14fb64b89ef9c16389325070c95eae48a30d31b421f3535df6 27bb321ef817b127f2f49c38d65811432dae5d940e32b9fc2d54234cbc63071e 28c25b55f98a02762851825a7c1748f70ed5426fd80431c7bd5dcc6d340b849b 34e436d8a2f7af8dfc8e5e90ba44536983849aa398058de2be70ca8c87d54133 370a67967f9728399e59a6bf28697bef6272e3ecbf1800ec0f0dab7df9961caa 37aa3e2ae08143083f21cbfaf8477d8b2def9bec4e219732387d91c102bb5e0d 3a400bef1869adb2525b641f1f7425fd882a26df1b1533ce56c66729461ab311 3fec44d6ea7f776d9446b54e3acd858af66713177fe216cde91441069c85d9ed 4161ceee9fcc738a00cbddfaba624b29484aab3376a14a9c3539d321e26a14cb 41bdc0e1616182febe37864cff2f7fd011615b33796e5443ef7fad0f497eb924
      *See JSON for more IOCs

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid



      Umbrella




      Win.Ransomware.Nemty-7603722-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 15 samples
      Registry KeysOccurrences
      <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
      Value Name: Blob
      6
      <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTELLIFORMS\STORAGE2 3
      <HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX 3
      <HKLM>\SOFTWARE\WOW6432NODE\MOZILLA\MOZILLA FIREFOX\20.0.1 (EN-US)\MAIN 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000001 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000002 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9375CFF0413111D3B88A00104B2A6676\00000003 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\0A0D020000000000C000000000000046 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\13DBB0C8AA05101A9BB000AA002FC45A 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\33FD244257221B4AA4A1D9E6CACF8474 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\3517490D76624C419A828607E2A54604 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\4C8F4917D8AB2943A2B2D4227B0585BF 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\5309EDC19DC6C14CBAD5BA06BDBDABD9 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\82FA2A40D311B5469A626349C16CE09B 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\8503020000000000C000000000000046 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9207F3E0A3B11019908B08002B2A56C2 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\9E71065376EE7F459F30EA2534981B83 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\A88F7DCF2E30234E8288283D75A65EFB 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\C02EBC5353D9CD11975200AA004AE40E 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\D33FC3B19A738142B2FC0C56BD56AD8C 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DDB0922FC50B8D42BE5A821EDE840761 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\DF18513432D1694F96E6423201804111 3
      <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS MESSAGING SUBSYSTEM\PROFILES\OUTLOOK\ECD15244C3E90A4FBD0588A41AB27C55 3
      MutexesOccurrences
      8-3503835SZBFHHZ3
      Global\<<BID>>98B68E3C000000001
      Global\<<BID>>98B68E3C000000011
      K41BS5D2301JFDHG1
      S-1-5-21-2580483-106038993676701
      6Q9114S7BUVv1I9Z1
      L157BD647S7vKCZY1
      S-1-5-21-2580483-106028657909891
      S-1-5-21-2580483-8886060544901
      S-1-5-21-2580483-106024173930801
      da mne pohui chto tebe tam bol'no... dlya menya veshica i ne bolee...1
      S-1-5-21-2580483-148425136345861
      S-1-5-21-2580483-19242913060701
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      172[.]217[.]7[.]2385
      23[.]20[.]239[.]123
      172[.]217[.]9[.]1933
      172[.]217[.]7[.]2063
      13[.]107[.]42[.]12/313
      172[.]217[.]7[.]1743
      170[.]250[.]53[.]2402
      205[.]144[.]171[.]1551
      192[.]0[.]78[.]251
      184[.]168[.]221[.]661
      50[.]63[.]202[.]391
      185[.]230[.]60[.]2111
      146[.]66[.]113[.]1871
      138[.]201[.]168[.]291
      81[.]19[.]186[.]1671
      3[.]234[.]181[.]2341
      40[.]90[.]22[.]1871
      40[.]90[.]22[.]1881
      23[.]21[.]50[.]371
      63[.]250[.]41[.]1071
      172[.]217[.]7[.]1931
      104[.]26[.]5[.]151
      162[.]213[.]253[.]1921
      31[.]220[.]121[.]731
      103[.]72[.]146[.]1211
      *See JSON for more IOCs
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      www[.]hugedomains[.]com3
      securepasswel[.]ru3
      api[.]ipify[.]org1
      data-vocabulary[.]org1
      balancer[.]wixdns[.]net1
      www[.]namebright[.]com1
      miowweb[.]gr1
      api[.]db-ip[.]com1
      doc-0o-28-docs[.]googleusercontent[.]com1
      www[.]somebodydial911[.]com1
      www[.]prefre[.]com1
      www[.]slacktracks[.]info1
      www[.]befitbehealthybeyou[.]com1
      doc-0o-2k-docs[.]googleusercontent[.]com1
      www[.]showshow[.]club1
      www[.]eleumedia[.]com1
      www[.]spiritindosolo[.]com1
      www[.]worstig[.]com1
      www[.]baiyuetongxun[.]com1
      www[.]illuminatiam666[.]world1
      www[.]jackiesj[.]com1
      www[.]vierhimmelsrichtungen[.]com1
      www[.]zlateprase[.]com1
      www[.]wide-saddle[.]com1
      www[.]barayehfarda[.]com1
      *See JSON for more IOCs
      Files and or directories createdOccurrences
      \$Recycle.Bin\<user SID>\$<random, matching '[A-Z0-9]{7}'>.txt1
      \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\desktop.ini.id[98B68E3C-2275].[checkcheck07@qq.com].Adame1
      %HOMEPATH%\subfolder1\filename1.exe1
      %HOMEPATH%\subfolder1\filename1.vbs1
      %HOMEPATH%\Subla\Mot1.exe1
      %HOMEPATH%\Subla\Mot1.vbs1
      %HOMEPATH%\ecstas\Toxino7.exe1
      %HOMEPATH%\ecstas\Toxino7.vbs1
      %APPDATA%\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Desktop\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Documents\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Downloads\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Favorites\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Favorites\Windows Live\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Links\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Local Settings\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\NetHood\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\PrintHood\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Recent\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Saved Games\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Searches\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\SendTo\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Start Menu\NEMTY_U1XTAJZ-DECRYPT.txt1
      %HOMEPATH%\Templates\NEMTY_U1XTAJZ-DECRYPT.txt1
      *See JSON for more IOCs

      File Hashes

      1d65adf3d53d2e6a7967de17f625d0556f0821958816637c60f76940e4c28520 211c8a29f76ac8521b51ba578764c2c22a18472c4bcc5e19f7e321951243b97c 21264886ed27cea1812b312ff85d2262b72e8af026dc290da8214e1e8960972b 232573e18d3f45b5b9a9abb50e09eb67ffe2e049d63dd602f411d46b02f18f2e 2c2635859e5436830913c41981130ca02b9ff1f91f6149702af84243f42ac225 31dccda43edcd3002ceb8f7cbc68bd749309ba953e592a48da0cf45b8d482d0b 4036eef611df5fafcff1ea69bd37bffb2b0b091b6421100c671aa40b7d807f8a 9ea864bf39f23d4115db192bdddda486c9ac67bd74ac0320900cdb75d048d674 a6421d2ffa3af855b46ccf0c2d9ba0c763ef16f8c80c41a7dc74412e4787217d af8f4b4b4cefaf594499c086483b94a43efc151cfe102f04bdb2451beeda269f b51d82b498581119a661400c90e9dc0b6cb15ba011f0fe55aa2e0bc4b6f64f30 bcaf8b9b2ad9a86c500055a3d4879ab37ecf475dd459a1781e586dbba4f1209c bd4a8ff85771eb162655f05317ec893041abf532b4b1a7313c9d86e0f4ad6bb5 f730d7caf3e44c1429cb7bbabeb2d801c4f49f100c834b26eb4fab8d72528a98 fdbc0107fa0fa6923e0caa39bdbb2e04c72134879ac845ecc6992301d2fc5784

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network SecurityThis has coverage
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      UmbrellaThis has coverage
      WSAThis has coverage

      Screenshots of Detection

      AMP


      ThreatGrid


      Umbrella




      Win.Trojan.Gh0stRAT-7603864-1

      Indicators of Compromise

      • IOCs collected from dynamic analysis of 20 samples
      Registry KeysOccurrences
      <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
      Value Name: SelfRunDemo
      17
      MutexesOccurrences
      127.0.0.12
      101.200.58.1772
      117.78.50.1972
      112.74.75.1432
      210.222.25.2231
      192.168.99.251
      118.125.192.1121
      60.190.216.2251
      w1464642840.f3322.org1
      www.cq52.top1
      xiaoxinzadan.gicp.net1
      113.214.1.341
      69.165.69.981
      IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
      103[.]45[.]105[.]2443
      101[.]200[.]58[.]1772
      117[.]78[.]50[.]1972
      112[.]74[.]75[.]1432
      210[.]222[.]25[.]2231
      117[.]168[.]99[.]1641
      118[.]125[.]192[.]1121
      60[.]190[.]216[.]2251
      113[.]214[.]1[.]341
      69[.]165[.]69[.]981
      Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
      ip[.]aa2[.]cn3
      whois[.]aa2[.]cn2
      www[.]1182[.]org2
      site[.]aa2[.]cn2
      beian[.]aa2[.]cn2
      fl[.]aa2[.]cn2
      www[.]aa2[.]cn2
      pr[.]aa2[.]cn2
      link[.]aa2[.]cn2
      www[.]jqgcw[.]com2

      File Hashes

      2737d0c8ab41b5bf6abf457fb940b7a4f8f90c7688600a4df87fbdb654623779 550d6397943cd525439a0d62c79459519d29438f1b1fcfddbbf2eb4a48660e63 60d7cae08475fb78cab77e09df43468cc0f6d2f01f847fc7582f56731672b0e8 699d3462c7c71c5bf0ad9c2dfc15faceb7d4858d2d0c341c9e18c27398718a40 8f3642fef8a0f84c1615efd6e3b90e26fcb8907d9a6e4904d2587dacd741932b 9d2c079618d2b3cbaa4c022048da451ecf0148fbae4cf41f8f19c363e9c23736 a9722843aa8d6b1b5a5e5400556c57b9cc31bf5a216bb5b458ce9241e818469d ac0ad4dc0abc6563b1ed7dc14703d2b77dfc606cffe875776c1167a95d6faba8 ac1807117ea4b5221dad637a8891e567849473d15cdfe49856d38877e1463019 b3ca2156cb96fb2d609bcf2b31080884d9a5621a3e1973c5338be746aec8317e b49b9e9f1457c63665a8e58d4f09a4811b0fa7733f650d163b87d686f4326203 b927b88cb9fb216b54b307fbf9d90fe6189af102d6b2b65a6e82ec1ee8cb7d7b c353e7a5e14c1aecae9d044da58c51daa0446118bbda54bc58777e9f39cdbfee cc2f2e01b07ea319cf4d5953bcf96c2c58ec218a4d0090b968291977d2e5b5f3 d43226aa4cba93b5bee9797da90d9a703c209cc8188693f93a603fdb60340063 d8b1847f025c2d48f775099421979c788816a1ea2c527f3c16f28aad1bc12d81 da7cd6233482da9114bf51bd6fb42825d4f4a044c4239a6e267d2134eb21282b e1ce464fd9c93969082c215d2358e6fb3e84e173fdaf36b1b1ddf6918a949109 e333a3c187ceea41f37e91b83dd79b5b6de3d96dfaa4dd76b9f5c9689683206b fede423fee4e77f708b95fb3e6efc2262e333fc295b1576f7f5b3163b053b565

      Coverage

      ProductProtection
      AMPThis has coverage
      Cloudlock N/A
      CWSThis has coverage
      Email SecurityThis has coverage
      Network Security N/A
      Stealthwatch N/A
      Stealthwatch Cloud N/A
      Threat GridThis has coverage
      Umbrella N/A
      WSA N/A

      Screenshots of Detection

      AMP


      ThreatGrid




      Exploit Prevention

      Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
      CVE-2019-0708 detected - (3886)
      An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP) request. Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
      Process hollowing detected - (189)
      Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
      Gamarue malware detected - (120)
      Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
      Excessively long PowerShell command detected - (117)
      A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
      Installcore adware detected - (95)
      Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
      Kovter injection detected - (73)
      A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
      Dealply adware detected - (59)
      DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
      Fusion adware detected - (13)
      Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
      Corebot malware detected - (12)
      Corebot is a Trojan with many capabilities found in other prominent families. It features a plugin system to enable it to load a variety of features from the C&C server at any time. Known plugins include RAT capabilities such as taking desktop screenshots, as well as being able to intercept and modify browser communications and steal data, especially data related to banking.
      A Microsoft Office process has started a windows utility. - (10)
      A process associated with Microsoft Office, such as EXCEL.exe or WINWORD.exe, has started a Windows utility such as powershell.exe or cmd.exe. This is typical behavior of malicious documents executing additional scripts. This behavior is extremely suspicious and is associated with many malware different malware campaigns and families.

      Vulnerability Spotlight: WAGO products contain remote code execution, other vulnerabilities

      $
      0
      0

      Patrick DeSantis, Carl Hurd, Kelly Leuschner and Lilith [-_-]; of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

      Cisco Talos recently discovered several vulnerabilities in multiple products from the company WAGO. WAGO produces a line of automation software called “e!COCKPIT,” an integrated development environment that aims to speed up automation tasks and machine and system startup.
      The e!COCKPIT software interfaces with different automation controllers, including the PFC100 and PFC200. The vulnerabilities described here exist within the e!COCKPIT software or the two associated automation controllers. A remote attacker could exploit these vulnerabilities to carry out a variety of malicious activities, including command injection, information disclosure and remote code execution.

      In accordance with our coordinated disclosure policy, Cisco Talos worked with WAGO to ensure that these issues are resolved and that updates are available for affected customers.

      Vulnerability details


      WAGO e!Cockpit authentication hard-coded encryption key vulnerability (TALOS-2019-0898/5106)


      A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit, version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.

      Read the complete vulnerability advisory here for additional information.

      WAGO e!Cockpit network communication cleartext transmission vulnerability (TALOS-2019-0899/CVE-2019-5107)


      A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit, version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC100/200 Web-Based Management (WBM) authentication regex information disclosure vulnerability (TALOS-2019-0923/CVE-2019-5134)

      An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC100/200 controllers. A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure, such as password hashes.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC100/200 Web-Based Management (WBM) authentication timing information disclosure vulnerability (TALOS-2019-0924/CVE-2019-5135)

      An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) web application on WAGO PFC100/200 controllers. The WBM application makes use of the PHP `crypt()` function which can be exploited to disclose hashed user credentials.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC100/200 Web-Based Management (WBM) FastCGI configuration insufficient resource pool denial of service (TALOS-2019-0939/CVE-2019-5149)

      The WBM web application on firmware prior to version 14 (03.02.02) (tested on versions 12, 13, and 14) on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to "provide high performance for all Internet applications without the penalties of Web server APIs." However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to a total of two, which can be abused to cause a denial of service of the entire web server.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 cloud connectivity parameter values code injection vulnerability (TALOS-2019-0948/CVE-2019-5155)

      An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC200. An attacker can inject operating system commands into any of the parameter values contained in the firmware update command.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 cloud connectivity TimeoutPrepared command injection vulnerability (TALOS-2019-0949/CVE-2019-5156)

      An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200. An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 cloud connectivity TimeoutUnconfirmed command injection vulnerability (TALOS-2019-0950/CVE-2019-5157)

      An exploitable command injection vulnerability exists in the cloud connectivity function of the WAGO PFC200. An attacker can inject operating system commands into the TimeoutUnconfirmed parameter value in the firmware update command.

      Read the complete vulnerability advisory here for additional information.

      WAGO e!COCKPIT firmware downgrade vulnerability (TALOS-2019-0951/CVE-2019-5158)

      An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.

      Read the complete vulnerability advisory here for additional information.

      WAGO e!COCKPIT file path improper input validation vulnerability (TALOS-2019-0952/CVE-2019-5159)

      An exploitable improper input validation vulnerability exists in the firmware update function of the WAGO e!COCKPIT automation software. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers while executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update file using a hard-coded password. The user must initiate a firmware update through e!COCKPIT and choose the malicious `wup` file using the file browser to trigger the vulnerability.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 cloud connectivity improper host validation vulnerability (TALOS-2019-0953/CVE-2019-5160)

      An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200. A specially crafted HTTPS POST request can cause the software to connect to an unauthorized host, resulting in unauthorized access to firmware update functionality. An attacker can send an authenticated HTTPS POST request to direct the Cloud Connectivity software to connect to an attacker-controlled Azure IoT Hub node.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 cloud connectivity remote code execution vulnerability (TALOS-2019-0954/CVE-2019-5161)

      An exploitable remote code execution vulnerability exists in the cloud connectivity functionality of the WAGO PFC200. A specially crafted XML file will direct the cloud connectivity service to download and execute a shell script with root privileges.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 iocheckd service "I/O-Check" cache DNS code execution vulnerability (TALOS-2019-0961/CVE-2019-5166)

      An exploitable stack buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 iocheckd service "I/O-Check" cache multiple command injection vulnerabilities (TALOS-2019-0962/CVE-2019-5167 and CVE-2019-5175)

      An exploitable command injection vulnerability exists in the iocheckd service "I/O-Check" function of the WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 iocheckd service "I/O-Check" cache multiple code execution vulnerabilities (TALOS-2019-0963/CVE-2019-5176 and CVE-2019-5182)

      An exploitable stack buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

      Read the complete vulnerability advisory here for additional information.

      WAGO PFC200 iocheckd service "I/O-Check" cache gateway memory corruption vulnerability (TALOS-2019-0965/CVE-2019-5184)

      An exploitable double-free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

      Read the complete vulnerability advisory here for additional information.

      Versions tested

      Talos tested and confirmed that TALOS-2019-0939 affects the WAGO PFC200 running firmware versions 03.00.39(12) and 03.01.07(13) and the PFC100 running 03.00.39(12) and 03.02.02(14).

      The WAGO PFC200, firmware version 03.00.39(12) and 03.01.07(13) and the PFC100, version 03.00.39(12) is affected by TALOS-2019-0923 and TALOS-2019-0924.

      TALOS-2019-0948, TALOS-2019-0949, TALOS-2019-0954 and TALOS-2019-0950 affect versions 03.02.02(14), 03.01.07(13) and 03.00.39(12) of the PFC200.

      Based on the inspection of earlier firmware versions, Talos believes these vulnerabilities affect the past 10 versions of the firmware in both devices, and possibly even earlier.

      TALOS-2019-0952 and TALOS-2019-0951 affect WAGO e!COCKPIT, version 1.6.0.7.

      Talos tested and confirmed that version 03.00.39(12) of the WAGO PFC200 and PFC100 is affected by TALOS-2019-0862 through 0864 and TALOS-2019-0870 through 0874.

      Coverage

      The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

      Snort Rules: 50786 - 50789, 50790 - 50793, 50797, 52023, 52131, 52238, 52274, 52275

      Vulnerability Spotlight: Information disclosure in Windows 10 Kernel

      $
      0
      0

      Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

      Cisco Talos recently discovered an information disclosure vulnerability in the Windows 10 kernel. An attacker could exploit this vulnerability by tricking the victim into opening a specially crafted executable, causing an out-of-bounds read, which leads to the disclosure of sensitive information.
      Microsoft disclosed and patched this bug as part of their monthly security update Tuesday. For more on their updates, read the full blog here.

      In accordance with our coordinated disclosure policy, Cisco Talos worked with Microsoft to ensure that these issues are resolved and that an update is available for affected customers.

      Vulnerability details

      Microsoft Windows 10 Kernel SetMapMode MM_HIENGLISH information disclosure vulnerability (TALOS-2020-1016/CVE-2020-0791)

      An exploitable information disclosure vulnerability exists in the kernel of Microsoft Windows 10. A specially crafted executable can cause an out-of-bounds read, resulting in information disclosure. To trigger this vulnerability, the attacker needs to execute a specially crafted executable.

      Read the complete vulnerability advisory here for additional information.

      Versions tested

      Talos tested and confirmed that the kernel in Microsoft Windows 10 is affected by this bug.

      Coverage

      The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

      Snort Rules: 53257, 53258

      Microsoft Patch Tuesday — March 2020: Vulnerability disclosures and Snort coverage

      $
      0
      0











      By Jon Munshaw and Vitor Ventura.

      Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 117 vulnerabilities, 25 of which are considered critical. There is also one moderate vulnerability and 91 that are considered important.

      This month's patches include updates to Microsoft Media Foundation, the GDI+ API and Windows Defender, among others.

      Talos released a new set of SNORTⓇ rules today that provide coverage for some of these vulnerabilities, which you can see here.

      Critical vulnerabilities

      Microsoft disclosed 25 critical vulnerabilities this month, 20 of which we will highlight below.

      CVE-2020-0684 is a remote code execution vulnerability in Microsoft Windows that arises if the user opens a specially crafted, malicious .LNK file. This file could be presented to the victim on a removable drive or remote share, and then when opened, would execute a malicious binary embedded in the file.

      CVE-2020-0801, CVE-2020-0807, CVE-2020-0809 and CVE-2020-0869 are memory corruption vulnerabilities in Microsoft Media Foundation. All of these could allow an attacker to gain the ability to install programs, view, change or delete data or create new user accounts on the victim machine. A user could trigger this vulnerability by opening a specially crafted, malicious file or web page. Attackers are most likely to try and exploit this vulnerability via spam emails with malicious links and attachments.

      CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833 and CVE-2020-0848 are all memory corruption vulnerabilities in the way the ChakraCore scripting engine handles objects in memory. If successful, an attacker could corrupt the victim machine's memory in a way that would allow them to execute arbitrary code in the context of the current user.

      CVE-2020-0824 and CVE-2020-0847 are remote code execution vulnerabilities in the VBScript engine. An attacker could exploit these bugs by tricking the user into visiting a specially crafted website in the Internet Explorer web browser or by marking an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the Internet Explorer rendering engine. These bugs specifically require user interaction and would rely on some form of social engineering on the attacker's part.

      CVE-2020-0881 and CVE-2020-0883 are remote code execution vulnerabilities in GDI+, an API for C and C++ programmers. An attacker could exploit these bugs by hosting a specially crafted website and then convincing the user to open it. Additionally, a victim could open a malicious document designed to exploit this vulnerability that's provided to them via email or any other file-sharing method.

      These are the other critical vulnerabilities:

                    Important vulnerabilities

                    This release also contains 91 important vulnerabilities, five of which we will highlight.

                    CVE-2020-0850, CVE-2020-0851, CVE-2020-0852 and CVE-2020-0855 are all remote code execution vulnerabilities that exist in the way Microsoft Word handles objects in memory. If successful, the attacker could use these bugs to carry out malicious actions in the context of the current user via the Word document. Attackers are likely to use spam emails to try and distribute these malicious documents.

                    CVE-2020-0761 is an elevation of privilege vulnerability in Microsoft Office. An attacker could exploit this bug to execute the OLicenseHeartbeat task at the SYSTEM level after replacing a normally legitimate file with a specially crafted one, corrupting memory. This vulnerability could be used with other remote code execution vulnerabilities disclosed this month to carry out a more serious attack with higher than usual privileges.

                    The other important vulnerabilities are:

                    Important vulnerabilities

                    There is also one moderate vulnerability, CVE-2020-0765.

                    Coverage 

                    In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                    These rules are: 52213, 52214, 53402 - 53409, 53414 - 53419, 53420 - 53424

                    Threat Source newsletter (March 12, 2020)

                    $
                    0
                    0
                    Newsletter compiled by Jon Munshaw. Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week. Obviously, COVID-19 is dominating headlines everywhere, and for good reason. We hope everyone out there is staying safe and healthy and making the appropriate decisions when it comes to traveling and working. In certainly less serious news, we have our monthly Microsoft Patch Tuesday post and the accompanying Snort rules out. There...

                    [[ This is only the beginning! Please visit the blog for the complete entry ]]

                    Beers with Talos Ep. #74: Impacting civil society

                    $
                    0
                    0
                    Beers with Talos (BWT) Podcast episode No. 74 is now available. Download this episode and subscribe to Beers with Talos: If iTunes and Google Play aren't your thing, click here. Recorded March 2, 2020 We open up the show with a sugary sweet poem before talking about RSA and our annual trip through the startup hall. Matt expertly segues the crew into talking about the impact the security industry can have on public-interest technologies and civil society - both in the industry sense as...

                    [[ This is only the beginning! Please visit the blog for the complete entry ]]

                    Threat Roundup for March 6 to March 13

                    $
                    0
                    0
                    Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 6 and March 13. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is...

                    [[ This is only the beginning! Please visit the blog for the complete entry ]]

                    Threat Source newsletter (March 19, 2020)

                    $
                    0
                    0
                    Newsletter compiled by Jon Munshaw. Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week. We hope everyone is staying home (if possible) and staying safe. Unfortunately, the bad guys aren’t going anywhere, so we’re still plugging away remotely. Hasn’t anyone told them we need a break? COVID-19 is obviously on the top of everyone’s mind. We are working on some new content around working from home and COVID-related malware....

                    [[ This is only the beginning! Please visit the blog for the complete entry ]]

                    Beers with Talos Ep. #75: Now That Coronavirus Made a Global WFH Policy...

                    $
                    0
                    0
                    Beers with Talos (BWT) Podcast episode No. 74 is now available. Download this episode and subscribe to Beers with Talos: If iTunes and Google Play aren't your thing, click here. Recorded March 13, 2020 Of course, we have to talk about the implications of coronavirus. It's affecting the way business and security are getting done. While everything about the COVID-19 pandemic seems to be a fluid situation, a rare constant has been the same rehashed disaster scams. But that could quickly...

                    [[ This is only the beginning! Please visit the blog for the complete entry ]]
                    Viewing all 1927 articles
                    Browse latest View live


                    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>